Wednesday, 21 May 2014


███▓▒░░.Top Ten Tips To Improve System Speed.░░▒▓███

1.Let your PC boot up completely before opening any applications.

2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3.Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4.Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5.Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6.Delete the temporary internet files regularly.

7. Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8.Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9.When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10. Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.


Tuesday, 4 March 2014

money online
10 DIFFERENT METHODS TO MAKE MONEY ONLINE



                 

               Web marketing is one of the biggest source of making money. Weather you are earning online as profession or as part time work. Internet is best way but its not so much easy to survive online Because their are too many ways to make money online but difficult part is, which we have to choose and which is easy to understand and having better earning also.

But Today i decided to discuss about the different online methods. I  already discuss about ways to make money from ads. But these are combine 12 ways for everyone who having less knowledge about web designs or other technical skills.

  Cost Per Click ( CPC )


This method is based on earning from click on ads published on your site, web pages, forum or any apps. I have already discuss about cpc in my article about ads. If you want to learn more in details about cpc must read my article about ways to make money from ads.
PPCThe following best cost per click networks which offers best rates for every click are
  1. Google Adsense:-  It one of biggest and popular trusted network by everyone. Google Adsense Offers Highest CPC and CPM rates. But its earning is totally depend on your visitors location and CTR also. It not so easy to get approval of adsense.
  2. Media.net:- This is new network form by partnership of yahoo and bing with media.net. It is good competitor of adsense. It offers good CPC rates as compare to others.
  3. Chitika:- It is also most popular network for CPC. It also offers best revenue from ads but slightly lesser than Adsense
  4. Infolinks:- It is one the best program for text based ads. It offers good revenue for In-text link ads and for other banner ads also.
  5. Bidvertiser:- It is also relative good as compare to others but its is lesser as compare to above programs. But Still it is best one.

  Cost Per Mile ( CPM )


This method is based on earning from every impression made on ads published on your website or blogs. For every 1000 unique impression you will earn money. But difficult task is to choose best network which offers best rates. It is also known as CPM method.
Some best CPM networks are
    CPM
  1. Tribalfusion
  2. BrustMedia
  3. BuysellAds
  4. Valueclickmedia
  5. VibrantMedia
  6. Adpepper
  7. Cpxinteractive
  8. MadadsMedia

Sell Affiliates Products


Affiliates marketing is commission based program. Means  for every successful sale made buy you. Then you will earn commission. In my recent article i discuss about Bigrock affiliates program which offers commission for every sale of domains names  and hosting plans. If you want to learn more about affiliates then i suggest you read in  more detail about affiliates program. 
Here are following Best affiliates which offers good commission
    affiliates
  1. Google Affiliates
  2. ClickBank
  3. Commission Junction
  4. E-junkie
  5. Amazon Affiliates
  6. eBay Affiliates
  7. DigiResult 
  8. FreeLancer

  Cost Per Action ( CPA )


In this method you will earn money for every successful action done by user which required on that spot. It is just like an affiliates but in this network if their ads about filling any details or subscribing email service or any other . If someone fill details required by ads then you will earn for every successful action.
  1. ClickBooth
  2. Peerfly
  3. CPAWay
  4. MaxBounty
  5. CPALead
  6. NeverBlue
  7. Mgcash

 Earn From Uploading


PPD

Their are many programs which based on download program. But in last few years their are many report about increasing spam in these types of programs. It means for every successful download of your file will get earn. some programs are on premium based but some offers free service.
Some trusted download networks are
  1. ShareCash.org
  2. CashFile.org
  3. Uploadables

Write For Other Sites


pay per post

If you are interested in writing online then this is best to make money . If have knowledge about any specific topic or field. Then the best way is to write articles for other services or you can also hire yourself to write for other blogs who want any author for their blogs.
Below Given are Some networks which gave you money to write for them
  1. PayPerPost
  2. Social Spark 
  3. Sponsored Review
  4. RevewMe
  5. Payu2Blog 

  Complete Online Surveys


This is one of the effective and easiest way for everyone who want to make money online because it don't required any web knowledge or technical skills.  In this network you have to fill the accurate information for every question ask on survey. This is best way to make side earning for working  2,3 hours on internet.
Some Best survey programs are
    pay per survey
  1. MySurvey
  2. Dollersurvey
  3. SurveyMonkey
  4. SurveySpot
  5. Myview
  6. ClearvoiceSurvey
  7. Toluna
  8. GlobalTestMarket


  Online Projects / Freelance


It is freelancer job means like data entry jobs. Their are many programs in which you can apply your application or as per rule. Then you have to complete specific project and task. For every successful completing project you will get earn. Their are many programs which are based on freelancer services.
Some Networks which are based on freelancing are below
    Pay per Projects
  1. Microworkers
  2. Elance 
  3. Fiverr
  4. Odesk
  5. BreakStudio
  6. ConstantContent

Selling Products which you own


E-CommerceIt is also an effective to way to make money online if you have any product and service which you feel that peoples likes to buy. You can also put your product on online auction which is best idea to earn more. You can also design any product which you own. you can also sell some services or plans online to get earn.
  1. Amazon
  2. eBay
  3. Quikr
  4. OLX
  5. Sell.com
  6. Gazelle.com

Selling Products which you don't own


It just like an affiliates marketing selling any product which you don't owns but you can sell them of any direct advertiser or by using any network. You can also sell spaces on your website or blog for displaying ads of any product. Which help to earn money for every product sale.
  1. Amazon Associates
  2. ebay
  3. Shirtcity
  4. CafePress

Above Mentions are 10 different ways to start working online. I try to cover more topics as much as possibles. I hope all the above methods are clear and helpful for everyone to make bright future online you have to do work hark. Their are many other networks related to above categories but i publish those which i feel simplest and best.

If you find this article helpful then please don't forget to share it with others also. If you feel anything missing, wrong or find any doubt feel free to share your view in below comment box.

COMPUTER AWARENESS

COMPUTER AWARENESS
*******************
1) The code for a Web page is written using Hypertext Markup language
2) The first computers were programmed using Machine language
3) A filename is a unique name that you give to a file of information
4) This can be another word for program software
5) Any data or instruction entered into the memory of a computer is considered as storage
6) Which part of the computer displays the work done monitor
7) A series of instructions that tells a computer what to do and how to do it is called a program
8) Hardware is the part of a computer that one can touch and feel.
9) The role of a computer sales representative generally is to determine a buyer’s needs and match it to the correct hardware and software.
10) Supercomputers refers to the fastest, biggest and most expensive computers
11) Executing is the process of carrying out commands
12) The rectangular area of the screen that displays a program, data, and or information is a window
13) The process of a computer receiving information from a server on the internet is known as downloading
14) Disk drive is the part of the computer helps to store information
15) Arithmetic operations include addition, subtraction, multiplication, and division
16) A keyboard is the king of input device
17) An error is known as bug
18) A collection of related information sorted and dealt with as a unit is a file
19) Sending an e-mail is similar to writing a letter
20) IT stands for information technology
21) A menu contains commands that can be selected
22) Plotter, printer, monitor are the group consists of output devices
23) Edit menu is selected to cut, copy and paste
24) The most important or powerful computer in a typical network is network server
25) The primary purpose of software is to turn data into information

Friday, 28 February 2014

Different Technologies & Their Founders.......

Different Technologies & 

Their Founders.......
























1. Google: Larry Page & Sergey Brin

2. Facebook: Mark Zuckerberg
3. Yahoo: David Filo & Jerry Yang
4. Twitter: Jack Dorsey & Dick Costolo
5. Internet: Tim Berners Lee
6. Linkdin: Reid Hoffman, Allen Blue & Koonstantin Guericke
7. Email: Shiva Ayyadurai
8. Gtalk: Richard Wah kan
9. Whats up: Laurel Kirtz
10. Hotmail: Sabeer Bhatia
11. Orkut: Buyukkokten
12. Wikipedia: Jimmy Wales
13. You tube: Steve Chen, Chad Hurley & Jawed Karim
14. Rediffmail: Ajit Balakrishnan
15. Nimbuzz: Martin Smink & Evert Jaap Lugt
16. Myspace: Chris Dewolfe & Tom Anderson
17. Ibibo: Ashish Kashyap
18. OLX: Alec Oxenford & Fabrice Grinda
19. Skype: Niklas Zennstrom,JanusFriis & Reid Hoffman
20. Opera: Jon Stephenson von Tetzchner & Geir lvarsoy
21. Mozilla Firefox: Dave Hyatt & Blake Ross
22. Blogger: Evan Willams

Thursday, 27 February 2014

HOW TO BECOME A HACKER

ON THE DEMAND OF OUR FANS How to
become a HACKER :-

---------------------------------
1. Learn TCP/IP, Basic Information gathering,
Proxies, Socks, SSL, VPN, VPS, RDP, FTP,
POP3, SMTP, Telnet, SSH.

2. Learn Linux, Unix, Windows - You can do
this using vmware or any virtual desktop
utility.

3. Learn a programming language that's
compatible with all OS - Perl, Python, C .

4. Learn HTML, PHP, Javascript, ASP, XML,
SQL, XSS, SQLI, RFI, LFI

5. Learn Reverse engineering and crack some
programs for serials easy ones like mirc,
winzip, winrar or old games.

6. Code a fuzzer for common protocols - ftp,
pop3, 80, 8080 - Pick some free software like
ftp server, mail server, apache or iis webserver
or a webserver all-in-one pack, or teamspeak,
ventrilo, mumble.

7. Code a tool that uses grep to sort out
unique code in source codes.

8. Make a custom IPtable, IPsec firewall that
blocks all incoming traffic and out going traffic
and add filters to accept certain ports that
your software or scripts use.

9. Pick a kernel in linux or unix, also pick a
Microsoft OS version lets say Winxp pro sp2
put them on the virtual desktops (vmware) and
find and code a new local exploit in those
versions, then install a Apache webserver on
the Linux/Unix and a IIS webserver on the
winxp pro and attempt to find and code a new
local reverse_tcp_shell exploit.

10. Learn Cisco Router and Switch
configuration and setup.

11. Learn Checkpoint Setup and Config

12. Learn Wifi scanning, cracking, sniffing.

13. Pick a person in you phonebook for the
area code you live in or city then ring the
person on a anonymous line like skype or a
payphone or a carded sim and attempt to
social engineer the person for his name,
address, data of birth, city born, country born,
ISP connected with, Phone company connected
with, What bank he/she uses and anything else
you can get. Then Attempt to ring using a
spoof caller ID software with the person's
phone number - call the ISP and try reset the
password to his/her internet connection/
webmail, get access to bank account or ask
them to send out a new *** to a new address
(drop) with a new pin, reset of phone company
passwords.

14. Use your information gathering skills to get
all the information off a website like a shop
then use the spoof callerID software or hack
your phone to show a new number of the
Webserver's Tech Support number then ring
the shop owner and try get the shop site
password.

15. Do the same thing but attempt to use a
web attack against a site or shop to gain
admin access.

16. Once got access upload a shell and
attempt to exploit the server to gain root using
a exploit you coded not someone else s
exploit.

17. Make your own Linux Distro

18. Use your own Linux Distro or use a vanilla
Linux gnome (not kde) keep it with not much
graphics so you can learn how to depend on
the terminal and start from scratch install
applications that you will only need for a
blackbox (Security test box), make folders for
fuzzers, exploits, scanners..etc Then load them
up with your own scripts and other tools ( By
this stage you shouldn't need to depend on
other peoples scripts).

19. Learn macosx and attempt to gain access
to a Macosx box whether it be your own or
someones else s.

20. Create a secure home network and secure
your own systems with your own Security
policies and firewall settings.
All this isn't a over night learning it will take a
nice 3 - 4 years to learn a bit of this 5+ years
to learn most of it and even then you may
need time to keep learn as IT keeps changing
everyday.

Difference between VIRUSES,TROJANS,WORMS,MALWARE

Difference between Viruses, Trojans, Worms and Malware.

I. What is Malware?


The word Malware is short for malicious software, and is a
general term used to describe all of the viruses, worms,
spyware, and pretty much anything that is specifically
designed to cause harm to your PC or steal your
information.


II. Viruses --> Wreak Havoc On Your Files


The term computer virus is often used interchangeably
with malware, though the two don’t actually have the
same meaning. In the strictest sense, a virus is a program
that copies itself and infects a PC, spreading from one file
to another, and then from one PC to another when the files
are copied or shared.
Most viruses attach themselves to executable files, but
some can target a master boot record, autorun scripts, MS
Office macros, or even in some cases, arbitrary files. Many
of these viruses, like CIH, are designed to render your PC
completely inoperable, while others simply delete or
corrupt your files—the general point is that a virus is
designed to cause havoc and break stuff.
You can protect yourself from viruses by making certain
your antivirus application is always updated with the
latest definitions and avoiding suspicious looking files
coming through email or otherwise. Pay special attention
to the filename—if the file is supposed to be an mp3, and
the name ends in .mp3.exe, you’re dealing with a virus.


III. Spyware --> Steals Your Information


Spyware is any software installed on your PC that collects
your information without your knowledge, and sends that
information back to the creator so they can use your
personal information in some nefarious way. This could
include keylogging to learn your passwords, watching your
searching habits, changing out your browser home and
search pages, adding obnoxious browser toolbars, or just
stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your
expense, it doesn’t usually kill your PC—in fact, many
people have spyware running without even realizing it, but
generally those that have one spyware application
installed also have a dozen more. Once you’ve got that
many pieces of software spying on you, your PC is going
to become slow.
What many people don’t realize about spyware is that not
every antivirus software is designed to catch spyware. You
should check with the vendor to make sure the application
you are using to protect you from malware is actually
checking for spyware as well. If you come across a PC that
is already heavily infected, run a combination of
MalwareBytes and SuperAntiSpyware to clean it
thoroughly.


IV. Trojan Horses --> Install a Backdoor


Trojan horses are applications that look like they are doing
something innocuous, but secretly have malicious code
that does something else. In many cases, trojans will
create a backdoor that allows your PC to be remotely
controlled, either directly or as part of a botnet—a network
of computers also infected with a trojan or other malicious
software. The major difference between a virus and a trojan
is that trojans don’t replicate themselves—they must be
installed by an unwitting user.
Once your PC has been infected with the trojan, it can be
used for any number of nefarious purposes, like a denial of
service (DoS) attack against a web site, a proxy server for
concealing attacks, or even worse—for sending out
buckets of spam. Protection against trojans works the
same way as viruses—make sure that your antivirus
application is up to date, don’t open suspicious
attachments, and think long and hard before you try and
use a downloaded crack for Photoshop—that’s one of
malware authors’ favorite spots to hide a trojan.


V. Worms --> Infect Through the Network


Computer worms use the network to send copies of
themselves to other PCs, usually utilizing a security hole
to travel from one host to the next, often automatically
without user intervention. Because they can spread so
rapidly across a network, infecting every PC in their path,
they tend to be the most well-known type of malware,
although many users still mistakenly refer to them as
viruses.
Because worms often exploit a network vulnerability, they
are the one type of malware that can be partially prevented
by making sure your firewall is enabled and locked down.

Sunday, 23 February 2014

Keyboard DIsco Of Led LIghts.AwEsOme !!!!!!!!!



Copy and paste the exact code  given below:-


Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop

2. Save the file as Disco.vbs or "*.vbs".

Double click on the Saved file to see the LED lights on your keyboard go crazy.
This trick has been tested on Windows XP, Windows Vista and Windows 7 and found to be working perfectly.

You can disable the keyboard disco by following these steps

Open Task Manager ( ctrl+alt+del )
go to process tab
select wscript.exe
click on end process......

Friday, 21 February 2014

BEGINNERS GUIDE

INFORMATION :-

5 Of the most common mistake made by beginners  in hacking.

I decided to create  tutorial for Novice Hack in,WE all have gone through,We have committed mistake without knowledge so i decided to share with you,

1)Never trust sites that ask you for money in exchange for software piracy or claim Hack Email Id in exchange for money.
All these thimgs are Scam.Fake software named : Fake

2)There is no software DIRECT HACK FACEBOOK,Google,Yahoo or any other important site.
All software that claim to do is scam.They are simply designed to take your money and in the worst cases,these software are :
Trojans and Keyloggers in them.
THerefore your account is hacked.

3)Never Ever use keyloggers or trojans that you find freeware  on the internet.The pirates are not stupid.They compile keyloggers and Trojans with almost all software and when you install them,you are already hacked before trying to hack others.

4)You will never be a good hacker without knowledge of programming languages and scripting.
When you plan to use only the software ready and do not depend on them for all this piracy then your functionality is limited to the functionality of the software.When you are not going to use your brain,just do the right thing copy and paste,then?:
How can you think you are a good hacker ?

5)If you age a good hacker ,you have to become a good programmer,good script writer,a good webdeveloper and an expert in excellent security.Well all good Hacker /must have a good knowledge of the various aspects and programming languages.
To XSS(Cross Site Scripting),PHP,SQL injection,Phishing attacksetcFootprint must be good at programming and scripting.And when you know the loopholes are different vulnerabilities and safety tips you have become an expert in computer security.
So never Ever under believes that the term Hacker.
Not a hacker is a person who just hacks email id or servers,but a real Hacker is a computer genius whose knowledge of computer more than anyone.

Wednesday, 19 February 2014

WELCOME TO HackerZ ZONE


GUYs,

HacKErZ ZONE IS MaInLy AiMeD At HeLpInG PeOpLe NeW To HaCkInG& It Is FoCuSeD On HaCkInG,TeChNoLoGy&TrOuBlEShOoTiNg.It Is An InItIaTiVe To InSpIrE YoUnG MiNdS & SpReAd ThE PoWeR Of ImAgInAtIoN & CrEaTiViTy AcRoSs ThE WoRlD.So I aM ShArInG BeSt Of BeSt EtHiCaL HaCkInG TiPs & TrIcKs WiTh U AlL.

PlEaSe SuPpOrT Me FrIeNdS