Tuesday, February 28, 2012

How To Get Someone’s Ip Address Through Facebook


Step 1 – First invite or ping that person for a chat on facebook .
Step 2 – Make sure your all other tabs in browser and other services in computer are closed. If Possible for you then delete all the cookies-cache and browsing history from your browser.
Step 3 – While chatting on Facebook go to Start >- Run >- cmd .
Step 4 – After Opening command Prompt Type  netstat -an command and hit Enter.
Step 5 – Now you will get Ip Address of all the established connections there .

trace facebook ip How To Get Someones Ip Address Through Facebook

Step 6 – Note all the suspicious Ip’s and trace user using ip address tracer sites like whatismyip or ipmango.com .
Thats It !
You can use same trick for tracing ip of someone’s on Skype, gtalk and Yahoo Messenger .

Increase Virtual RAM and Make Your System Faster.



Step 1 – Right Click on My Computer and Select Properties .
Step 2 – Now Click on the Advanced Tab.
Step 3 – Now Under Performance Tab click on Settings .

virtual ram Increase Virtual RAM to Make Your System Faster

Step 4 – Click on Advanced Tab on the Button that Pops up .
Step 5 – Now Under Virtual Memory Click on Change >- Custom Size.
Step 6 – For the initial size (depending on your HD space), type in anywhere from 1000-1500 ,and for the Maximum size type in anywhere from 2000-2500.
Step 7 – Now Click on Set and then exit out of all the windows.
Step 8 – Restart your Computer and now you have faster computer and 1-2 GB Virtual RAM

How to Hack Gmail, Facebook with Backtrack 5


First open your backtrack terminal and type ifconfig to check your IP
How to Hack Gmail, Facebook with Backtrack 5
Now Again Open Your Backtrack terminal and Type cd  /pentest/exploits/set
Now Open Social Engineering Toolkit (SET) ./set
How to Hack Gmail, Facebook with Backtrack 5
Now choose option 2, “Website Attack Vectors”.
How to Hack Gmail, Facebook with Backtrack 5
In this option we will select option 4 “Tabnabbing Attack Method”.
How to Hack Gmail, Facebook with Backtrack 5
In this option we will choose option 2 “Site Cloner”.
How to Hack Gmail, Facebook with Backtrack 5
Enter the URL of the site you want to clone. In this case http://www.gmail.com and hit enter. SET will clone up the web site. And press return to continue.
How to Hack Gmail, Facebook with Backtrack 5
Now convert your URL into Google URL using goo.gl and send this link address to your victim via Email or Chat.
How to Hack Gmail, Facebook with Backtrack 5
When victim open in their browser it should be a message that the page is still loading. so victim start to open another tab. As soon as victim open new tab, our fake website start working. That script will redirect the victim to the phishing page your derived.
How to Hack Gmail, Facebook with Backtrack 5
How to Hack Gmail, Facebook with Backtrack 5

Monday, February 27, 2012

How to become really smart in 365 days

REALLY I DON'T POST LIKE THIS ARTICLES BUT HERE GOES


I had a revelation a few years ago. You see I was just like anybody else. I read books. I attended seminars. I did stuff. And I trundled along. Made profits and had my day in the sun. Till I decided I wanted to have a lifetime in the sun.
So I studied people.
One of the earliest influences in my metamorphosis was Jim Collins, author of ‘Built to Last’ and ‘Good to Great (which you must read by the way).
So there I am soaking in Jim’s amazing knowledge and I stumble on a page that lists out the books he’s going to read. And there are about 100 books on that list. He’s reading about the Dalai Lama, Psychology, Takeovers and God knows what else. (You can see the entire list by going to http://www.jimcollins.com/lib/readingRoom.html)
So there I am sitting and wondering. 100 books. Mmmm. In a year. Mmmm. That’s a lot of books. But if Jim can do it, despite having a crazy schedule, so can I. So I sat down and wrote my goal for the year. 100 books.
That’s 2 a week.
Sure I had to cut out TV. And newspapers. And I started listening to tapes in the car. But heck, I learned. And the more I learned, the more I realised how little I knew.
I’m a certified info junkie now. And you should be too. One year.
One year is all it takes. It can change your life forever, if you have a learning and application goal. I slipped in the application bit there, but it’s important. Possibly even more than the learning.
Learn. Apply. Repeat (I read that somewhere)
And have a learning goal. If you want to go someplace have a map. And get started today.
Summary:
1) You’re not busier than Jim Collins. Drop your excuses.
2) Cut out the crap from your life. TV, Radio, News. They will eat into your life and waste your precious time.
3) You don’t know what you don’t know. And there’s no way you’re going to learn if you don’t read and listen to audio.
4) Read one book a week, if not two. That’s about 40 books more than you’re possibly reading.
5) Apply. There are people I know who are professional students. They learn and don’t apply. Duh!
6) Decide you want to be really smart. If you want a lifetime in the sun, you can’t afford to fluff around. If you have excuses, read Point 1.
7) Notice the headline. It doesn’t say ‘Instant Success.’ It says one year. That’s a loooooooong time away. Start now because today’s almost over.

All Types Of Hacking Techniques – 17 ways to bring accounts to your Mercy..!!!

So, Its time now that we should know what are various categories hacking fall into. I will try to focus on the ones based on password hacking. There is no distinct classification of hacking.. but i will list all i could remember..

So, as you all would have guessed this will not be a practical application.. I will give tutorials on all of them in coming posts.. but its the most important thing to have basic knowledge about all the techniques available.. So, consider going through the post once..

Common Methods for Hacking Computer Terminals(Servers):
This comprises of either taking control over terminal(or Server) or render it useless or to crash it.. following methods are used from a long time and are still used..


1. Denial of Service - 
DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic(which can be e-mail or Transmission Control Protocol, TCP, packets).

2. Distributed DoSs -
Distributed DoSs (DDoSs) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.

3. Sniffing - 
Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.

4. Spoofing - 
Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping

5. SQL injection -
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It uses normal SQL commands to get into database with elivated privellages..

6. Viruses and Worms - 
Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.

7. Back Doors - 
Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in the network.


So, not interested in these stuffs.. huh??? wait there is more for you.. So, how about the one related to hacking the passwords of email and doing some more exciting stuffs.. The various methods employed for this are:

8. Trojan Horses -
Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the software can take the full control over the system and you can remotely control the whole system.. great..!!! They are also reffered as RATs(Remote Administration tools)

9. Keyloggers -
Consider the situation, everything you type in the system is mailed to the hacker..!! Wouldn’t it be easy to track your password from that.. Keyloggers perform similar functionallities.. So next time you type anything.. Beware..!! Have already posted about keyloggers and ways to protect yourself from them..
10. BruteForcing - 
The longest and most tiring job.. don’t even consider this if you don’t know the SET of password for your victim..

11. Secret Question - 
According to a survey done by security companies, it is found that rather than helping the legitimate users the security questions are more useful to the hackers.. So if you know the victim well try this..

12. Social Engineering - 
Ya this was one of the oldest trick to hack.. Try to convince your user that you are a legitimate person from the system and needs your password for the continuation of the service or some maintainence.. This won’t work now since most of the users are now aware about the Scam.. But this Social Engginering concept is must for you to have to convince victim for many reasons..!!!

13. Phishing - 
This is another type of keylogging, here you have to bring the user to a webpage created by you resembling the legitimate one and get him to enter his password, to get the same in your mail box..!! Use social engginering..

14. Fake Messengers - 
So its a form of phishing in the application format.. getting user, to enter the login info in the software and check your maill..!!!

15. Cookie Stealer - 
Here the cookie saved by the sites are taken and decoded and if you get lucky.. You have the password..!!!

Hmmm.. not satisfied with single account at a time..?? so there are ways to hack lots of accounts together.. I know few but there exists many..!! listed are the ones i know and will teach you in coming posts…

16. DNS Poisoning or PHARMING - 
So, phisihing is a tough job.. isn’t it..?? convincing someone to enter their password at your page..?? what if you don’t have to convince..?? what if they are directed automatically to your site without having a clue..?? Nice huh..?? Pharming does the same for you.. More about it in my next post..

17. Whaling - 
This method gets you the password of the accounts which are used by the hackers to recive the passwords.. So you just have to hack one ID, which is simplest method( Easy then hacking any other account, will tell you how in coming posts..) and you will have loads of passwords and so loads of accounts at your mercy..!!!

I would like to add one thing the methods metioned under exiting ways are easy but are for newbiees and script kiddies so if you really want to learn hacking then do some real work, then relaying on the softwares or tools.. will give info of that in my later posts.. or comment if you want any more info.. 

So thats all for now.. Comment if like the post.. I will highly Appriciate your interest.. 

How To Use USB Flash Drives As A RAM

You might be probably searching for such software that can convert your 4 GB USB flash drive to usable RAM. I am going to guide you through the steps and tools that will be using your USB storage as a RAM. Though windows supports virtual paging file which uses your harddisk as a temporary RAM. But if you are working on notebook with lower RAM then Virtual RAM will boost up the harddisk usage. Finally dropping your battery life.
Therefore, using your USB storage device as RAM can be one of the best alternative for your real RAM.
First of all, you’ll need to download this file, Eboostr (Trial Version) or Eboostr (Full Version from torrent ).
Now you’ve one of the above file downloaded to your computer. Install it with default settings.
After installation, it is compulsary to reboot your computer.
Insert your USB flash drive first then open eBoostr from start menu.
In the program window, go to Edit > Add new cache device
You’ll see your USB disk at the left screen. Select it and click ok.
Then start caching the memory in your USB drive.
Alternatively, you can also click on Autoconfiguration button. Program will diagnose your system. After the diagnose is ended, click next. Choose all the recommended option to increase your system performance and click Next.
Now program will start to cache your memory. You may feel some difference in your windows performance.
This software requires USB device more than 256 MB.
It stores the current memory as a cache in your USB device. Eboostr stores cache of your frequently used applications on your USB Flash drive. It will help to reduce the Hard Disk access which is comparatively slower as compared to access in chips. Since hard disk requiers motor to rotate the disks, it will also consume a lot of your battery.

Sunday, February 26, 2012

World first hacking

A history of hacking

first hacking,world hacking,old hacking,last hacking,new hacking,firsthacking
Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country’s brand new phone system by enraged authorities. Here’s a peek at how busy hackers have been in the past 35 years.
1.Early 1960s
University facilities with huge mainframe computers, like MIT’s artificial intelligence lab, become staging grounds for hackers. At first, “hacker” was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.
2.Early 1970s
John Draper
John Draper
John Drapermakes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children’s cereal. Draper, who later earns the handle “Captain Crunch,” is arrested repeatedly for phone tampering throughout the 1970s.
Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called “phreaks”) make free long-distance calls.
Two members of California’s Homebrew Computer Club begin making “blue boxes,” devices used to hack into the phone system. The members, who adopt handles “Berkeley Blue” (Steve Jobs) and “Oak Toebark” (Steve Wozniak), later go on to found Apple Computer.
3.Early 1980s
Author William Gibson coins the term “cyberspace” in a science fiction novel called Neuromancer.
In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory.
The Hacker Quarterly cover Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.
Two hacker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany.
2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.
3.Late 1980s
The Computer Fraud and Abuse Act gives more clout to federal authorities.
Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks.
At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison.
First National Bank of Chicago is the victim of a $70-million computer heist.
An Indiana hacker known as “Fry Guy” – so named for hacking McDonald’s — is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles “Prophet,” “Leftist” and “Urvile.”
4.Early 1990s
After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab St. Louis’ “Knight Lightning” and in New York grab Masters of Deception trio “Phiber Optik,” ” Acid Phreak” and “Scorpion.” Fellow hacker “Eric Bloodaxe” is picked up in Austin, Texas.
Operation Sundevil, a special team of Secret Service agents and members of Arizona’s organized crime unit, conducts raids in 12 major cities, including Miami.
A 17-month search ends in the capture of hacker Kevin Lee Poulsen (“Dark Dante”), who is indicted for stealing military documents.
Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs “Data Stream,” a 16-year-old British teenager who curls up in the fetal position when seized.
A Texas A&M professor receives death threats after a hacker logs on to his computer from off-campus and sends 20,000 racist e-mail messages using his Internet address.
Kevin Mitnick
Kevin Mitnick [photo / AP ]
In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomuraat the San Diego Supercomputer Center.
5.Late 1990s
Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.
Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone.
A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message: “The media are liars.” Family’s own 15-year-old son eventually is identified as stalking culprit.
Hackers pierce security in Microsoft’s NT operating system to illustrate its weaknesses.
Popular Internet search engine Yahoo! is hit by hackers claiming a “logic bomb” will go off in the PCs of Yahoo!’s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. “There is no virus,” Yahoo! spokeswoman Diane Hunt said.
1998
Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway.
In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called “spamming.”
Hackers break into United Nation’s Children Fund Web site, threatening a “holocaust” if Kevin Mitnick is not freed.
Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.
The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation’s telecommunications, technology and transportation systems from hackers.
Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

how to create fake login page? – How Phisher Works?

Note- this tutorial is just for demonstration Purpose and to make you conscious that how much we have to take care while entering passwords. please do not use it for personal benefits. we do not promote hacking. If you know html or php, you will find it very easy. lets See how simple it is to construct and set up a fake login page and steal the password.
.

Requirements

1) A web hosting account
There are hundreds of websites available that offer free web hosting account, normally 100mb free with a Subdomain. Create a free web hosting account with Subdomain on any of them. The Problem with free hosting is that, as soon as they come to know that you have hosted phisher, they will Ban you. so the Smart choice is to Put some useful articles on the website that you will be getting at Doteasy Free Hosting and side by side you can also host phisher in the separate directory for example: yourname.domain.com/mywork.
Free Webhosting: Doteasy Free Hosting (read note below)
Note : Never use any suspicious keywords like gmail, facebook, hotmail, gmail-login, etc in the subdomain or username. if you use, you will get banned for sure. Instead use your own name or any other name.
2) A fake login page
To create a fake login page, just visit the desired login page. lets say yahoo’s login page. now Right Click on that page and click on ‘view source’ or view ‘page source’. after this a new window will open with the source code. just select all the code using ctrl+a and copy it with ctrl+c. open notepad and paste this code in it. and save it with extension .html on the desktop.
for eg:- yahoo.html
3) A php code that writes data on to a text file
Just copy the below php code in red and paste it in a notepad. after this save it as .php file on the desktop.
for eg:- code.php
<?php
header (‘Location: original login page’);
$handle = fopen(“passwords.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>

4) A text file to save hacked password
Just create an empty text file, name it as password.txt and save it on the desktop.
note- if you don’t create a text file, the ‘fopen’ command in code.php will automatically create a new text file

Creating phisher

Now we have the 3 required files yahoo.html,code.php,password.txt on the desktop.
The next task is to link(connect) the 3 files. such that we must link them in the order yahoo.html>>code.php>>passwords.txt.
ie yahoo.html must be able to communicate with code.php and further code.php must be able to communicate with passwords.txt
Linking yahoo.html and code.php
Just open yahoo.html with text editor and search for ‘action’ field ( Press ctrl+F to search). Upon finding ‘action’ field you will see something like this:

Replace everything in red with code.php, and save the file.

You just connected yahoo.html to code.php
[ * ] There may be more than one action field. follow the same procedure of Replacing with Code.php
Linking code.php and passwords.txt
In the above given code, passwords.txt is already connected with code.php.
Now just open code.php with text editor and  in the 2nd line replace “original login page” with the desired original login page of your phisher.
In our eg it is https://login.yahoo.com/config/login_verify2?&.src=ym and save it.
You just told code.php to open passwords.txt file when run and after the victim enters the login details, redirect him to the original login page.
Now that everything is ready, the next step is to host the phisher that you just created on to a free web hosting server.

Hosting Phisher

#step1 login to your newly created free hosting account
#step2 click on ‘file manager’ to open file manager
#step3 now navigate to your subdomain directory. to do so just click on your subdomain in the files view area.
#step4 Now just create a new directory(folder) and name it according to phisher you have created.
#step5 navigate to the desired directory that you just created in ‘step3′
#step6 Upload all the 3 files(phisher) ie yahoo.html,code.php,passwords.txt in this directory.
note- all the 3 files must be in the same directory.
#step7 copy the addresses of .html and .txt files
#step8 Send this phisher to your victim. just send the link (.html file’s address) to your victim via email or any other medium.
#step9 be patient . When the victim logs in on your fake page, the username and password gets stored in a test file ie. passwords.txt and now it can be opened any time to see the username and password.

That’s it! you are done. enjoy!

Top 6 Websites Like Adsense

Let us have a look on the Top 6 Google adsense alternatives. First of all let me ask you one thing… What made you to read this post? Maybe you got banned from adsense and searching for another site like adsense. Right?
So I will explain you the biggest Alternatives for the All time best Pay Per Click website – Adsense

1. Adbrite

AdBrite being the best Alternative to Google adsense, has got Many Great features. Although they are not good enough to provide you wide range of Ad Formats, publishers can use some commonly used formats. If your site has Good Amount of Traffic, You can rank higher in Adbrite Marketplace enabling to get more advertisers.

2. Bidvertiser

Bidvertiser can be a useful alternative to Google and offer some intriguing ad formats including what they refer to as free design. This lets you specify the look and dimensions of your text ads. Another important pros of Bidvertiser is that they will show the high paying ads first and then the rest of ads below that. Thus more chance to get more earnings per click.

3. Chitika

Chitika (pronounced CHIH-tih-ka) was founded in 2003 and is the industry’s leading impulse merchandising company. Chitika was founded in May 2003 and is based in Massachusetts. For advertisers and media buyers, Chitika is a proven channel for targeting on-line consumers and qualified buyers. For all publishers, Chitika is an easy-to-use platform for earning daily ad revenue.

4. Yahoo Publisher Network

Yahoo are currently playing catch up to Google and are trying to release their own context sensitive advertising service. This promises to be an excellent alternative to Google Adsense but in reality is likely to be a simple copy with the same restrictive terms and conditions as Google, including $100 minimums on payouts.

5. AdToll

AdToll pays on a CPC basis. Their user interface is great and navigating through the user panel is both easy and pleasant. Payments are available via Cheque, Paypal, ePassporte and Wire/Bank Transfer. It is also possible to use the revenue you earn as a publisher to advertise your website further.

6. Clicksor

They have payouts up to a market leading 85% and unlike a number of alternatives the cost per click bid values are high enough that you can earn a decent income.

Saturday, February 25, 2012

Learn How to hack

How to hack. It’s a very often asked question with around 1,000,000 Google searches each month. I know that anyone that runs a hacking related website get’s asked this question daily. The same questions get asked from me again and again eg.My girl friend is cheating me i need her password? or Some one is really abusing me i need her password?
Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in the same situation this is right place for you.


I am very happy to tell you that my book "A Beginners guide to Ethical Hacking" has just launched.I have been working on this book for past few months.I have dedicated this book completely to beginners who want to become hackers.


 


How will the information in the book affect me?

  • You will learn All Ethical hacking techniques and also you will learn to apply them in real world situation
  • You will start to think like hackers
  • Secure your computer from trojans,worms, Adwares etc
  • Amaze your friends with your newly learned tricks
  • You will be able to protect your self from future hack attacks

And Much more...

Reality about Password Hacking softwares


You might have heard about some paid password hacking softwares which claim to hack a password on entering the email account.But in reality all those softwares are fake.If you believe what they say then you are just wasting your time and money.These all softwares are fake.If there exists such a software, will there be any security on web. And all expert engineers at Google, Yahoo and other services are not mad. They are all engaged in ensuring security of their customers ie email account owners. So, no such software exists.
So stop wasting your time and money on these foolish softwares and services and learn real Ethical Hacking methods which hackers use to access email accounts.

For Download Link visit the following site

Ethical Hacking Book

Surf web anonymously with Real Hide IP


Your IP is exposed when ever you visit a website,when your Ip gets exposed it becomes easy to trace you and find out your personal information, Hackers can use your Ip to gain access to your personal files and documents and even can get into your paypal,alert etc accounts,Real IP hide is a Software which masks your IP with one click and you can surf web anonymously,on the other hand Hackers can use this software to hide their identity and not get caught, its benificial for all and i recommend that every Pc should have this software installed



Features

  • Key Features
  • Easily Conceal Your IP Address
  • Anonymous Web Surfing
  • Advanced Application Support
  • Protect Your Identity and Stop Hackers
  • Un-ban Yourself From Forums, Blogs, Etc...
  • Prevent websites from tracking your online activities
  • Quickly delete all Internet Explorer and FireFox cookies 

                             

8 Easy Ways Students Can Make Money Online



We should stop wasting time, in over connecting through social media! I feel sorry for my friends who waste hours and hours of their precious time on Facebook or any other social media it may be, which doesn't give back any thing at the end of the day.
At this point of time where i know something about the potential of constructive nature of internet, i cant even look back where i use to waste 8-10 hours of continuous online gaming! That was terrible. My online gaming rig (xfire) has registered more than 1200 online gaming hours. Wish i had spent those on blogging or any other constructive work on online.

I would recommend my fellow friends through this post, that kindly think out of the shell (beyond your age). Gaming or Facebooking is not every thing in the world. Here i am to list some of the great ways by which students, housewives, teens, or who ever it may be, would feel blessed to know, the list of top 12 money making ventures online.

Didn't you ever wished to have that extra pocket money, that you could spend out by your own will? For the gamers out there, who just cant leave their gaming world (as i couldn't get out of it easily), i have an exciting news for you later in the post. You need to read this one, before you jump back to your game!

Same is the case with housewives, who often want to pass their time constructively, they can earn really good sums through these money making opportunities while sitting in their homes. Its interesting and exciting. That's why i wish i had started my online career 5-6 years from now.

1. YouTube Career- Make Money From Uploading Videos To YouTube

YouTube is another world. No doubt about that. I have 2 channels, one for my blog and another where i used to put random vlogs/tutorials i liked. Though i never make any money out of it, as the Partnership program wasn't available in Pakistan, but its a great way to (if you have viewership and if you live where partnership program is available).


Below is the country list where YouTube partnership program is available.

YouTube Says:

If you live in country where partnership hasn't officially been launched, you will be redirected to the homepage. Currently, the YouTube Partner Program is only available to users in Argentina, Australia, Brazil, Canada, the Czech Republic, Germany, Spain, France, the United Kingdom, India, Ireland, Israel, Italy, Japan, New Zealand, Mexico, the Netherlands, Poland, South Africa, South Korea, Sweden and the United States.
But note that you could even get into money program without joining YouTube partners program. How basically that works is that imagine you have started making quality videos (that you upload to your YouTube channel regularly) and if you videos start getting decent hits (like 10k+ approx), that is when people like your stuff, then YouTube often invites the person to join their money program. 
You could then be able to display Adsense ads on your videos and start earning revenue. In case you get accepted into YouTube partnership program, there is nothing better than that (if you have passion making videos online) as YouTube would then start paying you out monthly according to the number of hits/views you get on average. That is by your popularity/viewership.
If i had been accepted into Partners program, i would probably not have faced towards the blogging career of mine. Just saying. I love making videos :) (plus i am good at editing, so that's makes out a perfect combination that you need for YouTube success)
So i would say that do give it a try. This is specially great for youngsters, teens, students. Housewives can actively participate in the YouTube community too if they would not get bored of making videos eventually. Every thing needs consistency. 
(I am going too long for this one)

2. Make Money By Playing Games Online (Testing/Reviewing)

Yeah by playing games! Did you ever wish for something like this to happen. You can keep on playing hours and hours, but this time you would be get paid. There are so many companies that pay out the gamers community to play on their games, often before releasing period so that they could give out their feed back. This lets the companies to improve any glitches or other gaming experience bugs that could later drop their game sales.


Few thousands dollars could save their entire millions project. Win win situation for both the parties. The gamers and the developers.

There are few such sites that require you to signup (paid) which i don't feel is much practical for students, so instead they could op tin for just paid to play games. Where you get paid by simply playing number of hours on the site.

The companies give out a portion of their ads revenue.

3. Write Articles To Get Paid Online

Hubpages/Squidoo

Many people often consider website like Hub pages/squidoo in this category which i don't really believe too. These popular websites work in a way, where users publish articles on their hub, which is kinda their profile page. The articles could be of any category. I think you choose the category in which you would write in when you make up your profile for the first time.

They don't pay you for publishing articles, in fact you get revenue by the Adsense ads that get displayed beside your articles (hubs). For that you have to link your account with your Adsense account. Other options are Kontera. They also accept affiliate links in the article.


So i believe this option is good for those who doesn't want to or doesn't know to build up their own blogs from zero level. As these sites do the SEO work for you. The users would make more money out of ads if their articles are good enough to attract traffic from search engines (as our normal blog posts does).

I would not prefer this one over blogging. You could work a little more hard on setting up your blog and would get thousand times more reward in future for the same level of handwork with your articles.

 Paid To Review Articles
 
Then their are those sites which pay for review different products. May it be a neutral product or something of their own. A website like review stream pays out 2$ to the writers for each review that gets published (accepted) and then .1$ for each comment that is based on the review.

The more quality reviews you write, the more you get.

4. Get Paid To Listen To Music Online

This doesn't have any age barriers. Music is a universal language that could suite any one of any age. Companies pay you to listen to the music that is yet to launch. Why? Because they get an opportunity to get feedback from music lovers by which they could improve the final addition of the song. This helps them to launch successful music to the industry and makes huge sums.

Promosquad, SonyMusicAwards are example sites where housewives, teens, students, almost any body  could hear to music and get paid.

5. Chat With Friends To Make Money Online

You get paid to chat with your loved ones with the chat system of these sites, just like Facebook etc. Its just that you get paid for what you do. It has great potential. If you can resist chating to your friends and would not be able to leave social media, than you can try this out. Yuwie and Mylot are few examples. You get paid when your pictures are viewed, .5$ / 1000 picture views. Referrals give out a better response. In an all, getting  a penny is better than wasting time at all. But personally i don't really think this would justify the time we would put in.

 6. Put Advertisement On Your Car To Make Money

You can add banners of various sizes on your cars, to publicize other companies/products and get paid in return. This might suite somebody who travels a lot. Full car advertisement pays as much as 500$/month. For smaller ads, you can expect to make 1000$ a year.

For qualifying, you have to drive around 1000 miles/ month. The ads can be easily taken off and doesn't damages your car in general. You can check out Paidrides site for an example.

7. Type Documents And Papers To Make Money Online

If you are good at typing, then this might be a constructive hobby for you. You simply would be given task (documents/papers) to type and then get paid. This includes writing articles for blogs, for sites that offer paid articles jobs etc.

8. Get Paid By Answering Questions

If you are good at any subject, you can always help others about it. Imagine answering questions in Yahoo answers and get paid. Student Questions and know Brainers can be a good example to give here.

Hope these ways would make you more productive. As an all, i am really in the favor of blogging. Though you wont be getting any instant money but after 8-10 months of handwork, you would find your self in a position which you might have dreamt of.



How to Trace the location with Ip address



Do you want to know where your Internet visitors are coming from? Which country? Which state? Which city? Which ISP? Which domain name? Which connection type? Which ZIP code?




IP2Location™ is a geo IP solution to help you to identify visitor's geographical location, i.e. country, region, city, latitude, longitude, ZIP code, time zone, connection speed, ISP and domain name, IDD country code, area code, weather station code and name using a proprietary IP address lookup database and technology without invading the Internet user's privacy.



Just go to http://www.ip2location.com/?rid=939 and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.




1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address.
A sample snapshot of the results from ip2location.com is given below
trace ip address

Which Photographs Sell Well and Make Serious Money?



how to sell photographs?you can earn money by selling your photographs. Photography is an expensive hobby and now you can make money from it as well. To me it was a new concept and I felt interested in finding out its details. Would you like to read what I have found? To begin we need to know the proper terminologies. Stock photography is the term referring to the photographs or images that can be licensed for specific use. And micro stock photography means you can buy high quality and high resolution images at specified prices.


Why Micro Stock Photography?

You must be curious to find out why we need such type of business? Actually this is popular among designers, advertisers, marketing professionals etc. for the use of images in their websites, advertisements, brochures and magazines etc. Instead of hiring a professional photographer who may be much expensive and can cost them in terms of time as well, they prefer to select images or photographs already available, make payment and own it.

How to make good Stock?

Of course you need to have stock of your digital photographs which you are willing to sell. As every other industry, it has also got competition and you can’t sell each and every image of yours. There are some very basic points that can help you gather a good stock; and can pay your hard work.

1-Good quality:

make money selling photographsYour photographs must be clean, sharp, and free of digital noise, high quality images with correct exposures. A recommended practice is to shoot your images in RAW format.

2-Commercial photographs:

‘Snapshots’ which are usually your family photographs or still images are not a suitable choice.  You must check what is most demanded, if you want to earn a reasonable amount. If you are persistent to capture landscapes and tourist type photographs, that’s fine too; they will pay you less. Photographs or images that can be used in brochures, flyers or advertisements can add up to your stock. For example, if you take a still image of your school going child, it would be rejected. But, if you show him in uniform, hanging his school bag with a brighter smile on his face; this photo can easily be selected by any milk or butter advertisement.

3-No trademarks:   

There should be no trademarks and no logos of the company, to whom you are selling photos. Also, if you have an image in which a person is wearing a shirt with its brand name; it may be rejected.

4-Signed Model release:

Each agency has its own standard model releases.  Don’t forget to ask for it. It is a form that you fill in and send along with each image containing identifiable person.

5-Technical details:

For technical details and copyright issues, you may like to go through this manual at www.istockphoto.com/training_manuals.php

Where to sell?

There are many micro stock agencies; you should start from the basic step. Your ultimate target should be doing business with the leading company; but postpone this idea until you get some experience and understand the tactics of photographic market. Most of the websites are not doing exclusive business so you can sale the same image to different agencies. We are listing a few of these agencies:

Hide your IP address

Your IP is exposed when ever you visit a website,when your Ip gets exposed it becomes easy to trace you and find out your personal information,Hackers can use your Ip to gain access to your personal files and documents and even can get into your paypal,alert etc accounts,Hide the Ip is a Software which masks your IP with one click and you can surf web anonymously,on the other hand Hackers can use this software to hide theiridentity and not get caught,its benificial for all and i recommend that every Pc should have this software installed

Hide the IP to be the best one. It’s ease of usereliabilitywide range of optionsspeed and unmatchable price were on top when compared to that of the remaining IP Hising softwares on the market.


Key Features of Hide the IP:



Hide IP Address »
 Single click to completely hide your Online Identity. Others will see a fake IP address masking your real IP, thus, protecting your privacy.


Select Your Physical IP Location »
You decide which country will be indicated as your origin by simply choosing from a country list. We have hundreds, hourly updated, IP addresses available for use.


Anonymous Web Surfing »
You are protected from hackers who will be tricked by your fake IP instead of your real. They will never be able to find any information about you by tracing the fake IP.
Send Anonymous E-mails » Hide your IP in E-mail headers. Be protected while sending emails from Yahoo!, Hotmail, GMail. Upgrading to Platinum Service add-on will protect you in Outlook!


Bypass Website Country Restrictions » 
Surf websites which are restricted for your country. Surf in forums on which you were banned.



Supports Internet Explorer, Firefox, Google Chrome, Safari, Opera.
So what are you waiting for? Download the free trial and test Hide the IP on your computer now! For more information on Hide the IP visit the following link.

Hide the IP

My Porn Blocker - Block Porn sites and Protect your Kids




Has Your Child Been Exposed to Porn?

Do you want to Protect your children from Watching Porn videos? 

The average age of first Internet exposure to pornography is 11 years old.One in five children ages 10-17 have received a sexual solicitation over the Internet.Most of the parents are worried about their Children and  Exposure to pornography can have a serious impact on children since it has the ability to easily distort the tender minds. If you are a parent, then you are most likely reading this because you are in search of a Porn Blocker to block Internet Porn.Well Below is the Porn blocker which i recommend and is used by most parents that want to Protect their Childrens to being exposed to porn

My Porn Blocker - No 1 Porn blocking software:


Porn blocker
Features of Porn blocker:

1.Block offensive content -Works behind the scenes and stops harmful websites before they appear, including newsgroups

 
Integration With All Search Engines-This means your children can't search on a search engine and even see links to blocked sites. This new internet safety feature enables better protection against pornographic images when doing an "imageonly"search.

Stop Illegal File Sharing / P2P Software-Only program on the net to block over 50 File Sharing Programs

Works with IE 5.0+, FireFox, Netscape, Opera-Smart and effective content filtering works with any and all the popular browsers!

Stealth Mode: - Run silently and completely hidden from the task bar, system tray, process list, start menu and add/remove programs section!

Block All Chats - Chat can be fun but it's also a very dangerous place where sex predators like to target kids, restrict chat effortlessly

Blocking/Limiting social Networking sites -Blocking or limited access to popular but potentially inappropriate services such as MySpace and Facebook

Automatic ScreenShots:
Secretly take high quality pictures of the screen every every x minutes and then view a handy DVD style slide show later to see everything!)

And much more!

Why Porn Blocker?

Most similar programs check ONLY the URL of the requested page against a database of supposed "indecent" addresses - and these databases have to be updated constantly. This way of porn blocking is not GUARANTEED effective because hundreds of new sites appear online every minute - YES! EVERY MINUTE.
Unlike these other programs, MyPornBlocker™ has special functions that allow specific analyzing of the page content itself. It doesn't rely on a database of URLs or suspicious sites...
It checks and double checks the actual content that is being loaded and displayed on the PC itself.

                                           JUST DOWNLOAD
      
Recommended Post Slide Out For Blogger