Friday, 13 September 2013
Friday, 2 August 2013
Hi ! Friends
Today i have a good news for all PTC users. why you all still using Neo Bux and clicking Ads for 0.001$
Here is a PTC site they give 0.1$ for a ad and daily 43 ads you can make 4.3 ads daily
and also thery provide paypal,Payza,Egopay,Okpay,Solidtrustpay,Perfect Money
Signup Today and Earn More Money .....!
Happy Earning Folks.......!
Today i have a good news for all PTC users. why you all still using Neo Bux and clicking Ads for 0.001$
Here is a PTC site they give 0.1$ for a ad and daily 43 ads you can make 4.3 ads daily
and also thery provide paypal,Payza,Egopay,Okpay,Solidtrustpay,Perfect Money
Signup Today and Earn More Money .....!
Happy Earning Folks.......!
Monday, 29 April 2013
Hi Friends!
Have a Happy Day!
I Found Another website where we can get money by just click ads they provide ads every day
we can upgrade our account and earn more money!
step 1:
just sign up and earn money
http://adf.ly/O2JVa
Have a Happy Day!
I Found Another website where we can get money by just click ads they provide ads every day
we can upgrade our account and earn more money!
step 1:
just sign up and earn money
http://adf.ly/O2JVa
Sunday, 28 April 2013
Alternative google Adsens Programe
hi friends
i found a alternative program for Google Adsense
it is clicksor register your blog and post your ads in this blog then you can earn money
here is the signup link
http://adf.ly/NxDIQ
happy earning!
i found a alternative program for Google Adsense
it is clicksor register your blog and post your ads in this blog then you can earn money
here is the signup link
http://adf.ly/NxDIQ
happy earning!
Easily Earning Money by psring the links
hi dudes i have another methods earn money from facebook and twitter just copy and past the links in your wall
using adf.fy
step1: copy the url and paste shrink and paste where you want if u get more clicks you will get more money
stpe 2: this is the link for the adf.ly account
http://adf.ly/NxDwk
happy earning folks!
using adf.fy
step1: copy the url and paste shrink and paste where you want if u get more clicks you will get more money
stpe 2: this is the link for the adf.ly account
http://adf.ly/NxDwk
happy earning folks!
Saturday, 27 April 2013
STEPS TO INCREASE GOOGLE ADSENSE CLICK-THROUGH RATE
The purpose of this article to is
to help you increase your revenue from CTR using Google AdSense.
Following the steps outlines will help you optimize your websites to
give you the best possible moneymaking strategies.
Step 1 - Apply and Comply Having a website can generate revenue for you twenty four hours a day, seven days a week. Google AdSense is a free program that has an advertising revenue especially designed to help websites like yours to increase their revenue simply by displaying AdWords ads.
Each page on your website must be content rich on various topics. These pages should all be centered around a theme which Google will use to target relevant ads to your website. Once you have applied Google will set up an account for you and provide you with the code you need for displaying ads. Insert the code into the pages on your websites and you can start displaying ads immediately. Google search and page-ranking technology will search for ads that are relevant to your content pages. This technology matches the primary language of your pages and ads are targeted to your specific geographic location. This means that ads that serve users from Canada, for example, will not be the same ads that appear on your website for users in Australia. This 'geotargeting? by Google akes the ads relevant to all the visitors to your website and it also means that you may not see all of the ads that are targeted to your website. You do not have to be technologically literate to display AdSense ads on your web pages. Google does it all for you. All you have to do is insert the code and maintain the website. At first, you may see public service ads appearing and you do not get paid for these.
Step 2 - Create More Content Pages For Your Website Content pages are the pages in your web site that Google will use to target ads to your website. These pages should be content-rich. In other words, you should have lots of content that the user will be interested in. Each page of your website should be centered around one keyword that is related to the whole theme of your website. A keyword is the focal point of the article. When you decide on a theme, brainstorm list of suitable keywords for which you can write articles. For example, keywords for a website dealing with lawn care could include the following keywords: Seeding your lawn Hedges Mowing the lawn Preventing insect infestation Flowers Flowering shrubs
Then you proceed to write articles for each keyword which can be anywhere from 150 to 500 words. Each keyword article will have its own page where you can display ads. The more content pages you have, the more ads you can display and this, of course, leads to more revenue for you. Keyword articles can be of several kinds - keyword rich and informative. Keyword rich articles contain the keyword in virtually every sentence. The rate is typically 4 - 8 % of the total word count. Informative keyword articles have a more conversational style and are easier to read. If the content pages are clearly focused, Google will be able to serve highly relevant ads to your pages. This means your visitors will be interested in the ads, resulting in more click-thrus and more money for you.
Step 3 - Use higher paying keywords whenever possible You will earn more if the average AdWord that Google displays pays more per click. You should not create pages on unrelated keywords just because they pay more. Some of the high paying keywords that users query on search engines are: Vacations Education Investing Money Medicine However, don't create a page on vacations on a lawn care page, just because the ads pay more. It takes away from the legitimacy of your website. If you are an AdWords advertiser, you can log into your account and Experiment. As you will be sharing the revenue with Google, you will receive a percentage of the amount each advertiser pays per click. For example you may find that if you type in 'ladders?, the maximum price per click is 15 cents. A percentage of this will not get generate a very high revenue. However, if you type in 'valium?, you may find that the price per click is $5.00. The bottom line is the keywords you use can increase the amount of money you earn.
Step 4 - Create new pages with higher paying keywords and at the same time maintain relevance to the theme of your website. Selecting keywords related to the same topic, can make a difference in how much money you earn by users clicking on relevant ads on your pages. Check the theme of your website for higher paying keywords and create articles related to these words. The terminology you use can determine how effective your website will be in attracting visitors. For example if you are selling teeth bleaching products a query for toothpaste may or may not select your website in the search. If you are selling products on your website, ensure that you have keyword articles related to the competition as well as your own products. This does not mean that you will advertise for the competition. The article can be a comparison of your product with another demonstrating why the user should purchase your product.
Step 5 - Create a brand new website with higher paying keywords You can create a brand new website to take advantage of Google's AdSense program. Therefore, you will need to select a topic with high paying keywords. Then provide great information about that topic. Now that you have the content pages and keywords you want, you need to place the ads where they can be seen, and clicked, by the visitors to your website. Most Internet users are so bombarded byads that they automatically tune out the ads that appear on a website. Your goal is to make your ads more appealing to the users and less like ads. Any time that users click on an ad, they have an actual interest in what that ad is selling. To maximize the number of click-thru ads on your site receive, you have to make them less like traditional advertising.
Step 6 - Create different kinds of web pages Different pages on your website serve different purposes. If the object of your website is to sell a particular product or service, create web pages specifically for that purpose. Then have other pages on your website that are geared towards high search engine traffic. Once you realize which pages you are creating for AdSense, select appropriate keywords. Try to select keywords that are the highest paying keywords on the topic.
Step 7 - Create high quality information pages Give the visitors to your website the answers they need. The keyword articles should give information about the topic and not ramble on with a disjointed list of sentences. When writing keyword articles, do not copy and paste from other websites. This is illegal. It's much better to write something new and unique. The writing in the articles should be of a conversational tone using language that the ordinary person will understand. For example, it would be of no point to write this ebook in completely technical language that only a computer programmer would understand. You would not be able to understand it and therefore not apply the techniques. The same is true of keyword articles. If the user does not like the first few sentences, he/she will not continue reading and will move on. Do not create a page about a topic and save it with another to try to generate high paying ads to your page. If your page is relevant to the topic, visitors will click-thru to other pages and ads.
Step 8 - Use the Best Ad Format For Your Web Page Research has shown the best format for ads to maximize click-thrus are 336 x 280 rectangles. The next best size is 300 x 250. Banner are the worst ads to show on a site and the tall thin ads don't fit well on a page because they are usually on the left or the right. The best placement of ads on a page is in the center - right in the users line of vision. You have to put the ads in their face to maximize the effect of click-thrus by users. The best size ad to use is the 336 x 280 rectangle or if space ia at a premium use the 300 x 250 rectangle.
Step 9 - Make Sure That the Ad Block is Positioned Properly Where you have the ad located on your web page affects how often users will click on it. Ads should be as close to the top and the middle as possible. Internet users look to the center of the page to find information. If your ad is placed down the sides, it will often be overlooked. People who use your web page because of a keyword search are generally looking for specific information. Having the ad placed front and center will get their attention, whereas ads on the side will not. Place the large rectangle ads just above the content, not in the right or left hand columns.
Step 10 - Choose the Best Colors for Your Ads Google AdSense offers advice for publishers as to the color of the ads on their web pages. They allow you to customize your ad colors. The recommendation from Google for using custom palettes is to:
? Have the background of the ads the same color or a color similar to the background color of the page.
? Have the border of the ad a color that is predominant on the page.
? Have the title of the ad a color that is similar to the color of the text on the page.
? Have the URL of the ad a color similar to other links on the page. Statistics show that navy blue color works best as a link. The color of the URL should not stand out on the page. The top ranking color for URL's is dark gray. It does not mask the advertiser URL even though light grays do the same thing. Avoid unconventional colors for URLs. Blue is actually considered a non-stimulating color, and some publishers say it can actually have a negative effect on purchasing or deciding to click-thru. Blue is considered by many to be sleep inducing, and is the worst choice if you are interested in a call to action. Sometimes if the effect you want is calming, blue can be integrated effectively. When starting out with placing ads on your web pages, the best advice is to experiment until you find a combination that works for you. Research and statistics have shown the default layout provided by Google AdSense is not the best option.
Step 11 - Don't try to cheat your way to a higher revenue Many publishers have tried to increase their revenue from Google AdSense by clicking on ads on their own website or using software which automatically repeats clicks. Such attempts to gain more money from the ads displayed on your web pages is fraudulent and will result in the automatic cancellation of your account. Google has engineers who can detect this type of fraud. By trying to spam your way to extra money won't work out. You will get kicked out of the program and you won't make any money at all. Prohibited methods of clicking include:
? Repeated manual clicks
? Use of robots
? Automated clicking tools
? Deceptive software
? Clicking on your own ads Legitimate clicks are those that are generated as the result of a user to your site clicking on one or more ads on various pages
Step 1 - Apply and Comply Having a website can generate revenue for you twenty four hours a day, seven days a week. Google AdSense is a free program that has an advertising revenue especially designed to help websites like yours to increase their revenue simply by displaying AdWords ads.
Each page on your website must be content rich on various topics. These pages should all be centered around a theme which Google will use to target relevant ads to your website. Once you have applied Google will set up an account for you and provide you with the code you need for displaying ads. Insert the code into the pages on your websites and you can start displaying ads immediately. Google search and page-ranking technology will search for ads that are relevant to your content pages. This technology matches the primary language of your pages and ads are targeted to your specific geographic location. This means that ads that serve users from Canada, for example, will not be the same ads that appear on your website for users in Australia. This 'geotargeting? by Google akes the ads relevant to all the visitors to your website and it also means that you may not see all of the ads that are targeted to your website. You do not have to be technologically literate to display AdSense ads on your web pages. Google does it all for you. All you have to do is insert the code and maintain the website. At first, you may see public service ads appearing and you do not get paid for these.
Step 2 - Create More Content Pages For Your Website Content pages are the pages in your web site that Google will use to target ads to your website. These pages should be content-rich. In other words, you should have lots of content that the user will be interested in. Each page of your website should be centered around one keyword that is related to the whole theme of your website. A keyword is the focal point of the article. When you decide on a theme, brainstorm list of suitable keywords for which you can write articles. For example, keywords for a website dealing with lawn care could include the following keywords: Seeding your lawn Hedges Mowing the lawn Preventing insect infestation Flowers Flowering shrubs
Then you proceed to write articles for each keyword which can be anywhere from 150 to 500 words. Each keyword article will have its own page where you can display ads. The more content pages you have, the more ads you can display and this, of course, leads to more revenue for you. Keyword articles can be of several kinds - keyword rich and informative. Keyword rich articles contain the keyword in virtually every sentence. The rate is typically 4 - 8 % of the total word count. Informative keyword articles have a more conversational style and are easier to read. If the content pages are clearly focused, Google will be able to serve highly relevant ads to your pages. This means your visitors will be interested in the ads, resulting in more click-thrus and more money for you.
Step 3 - Use higher paying keywords whenever possible You will earn more if the average AdWord that Google displays pays more per click. You should not create pages on unrelated keywords just because they pay more. Some of the high paying keywords that users query on search engines are: Vacations Education Investing Money Medicine However, don't create a page on vacations on a lawn care page, just because the ads pay more. It takes away from the legitimacy of your website. If you are an AdWords advertiser, you can log into your account and Experiment. As you will be sharing the revenue with Google, you will receive a percentage of the amount each advertiser pays per click. For example you may find that if you type in 'ladders?, the maximum price per click is 15 cents. A percentage of this will not get generate a very high revenue. However, if you type in 'valium?, you may find that the price per click is $5.00. The bottom line is the keywords you use can increase the amount of money you earn.
Step 4 - Create new pages with higher paying keywords and at the same time maintain relevance to the theme of your website. Selecting keywords related to the same topic, can make a difference in how much money you earn by users clicking on relevant ads on your pages. Check the theme of your website for higher paying keywords and create articles related to these words. The terminology you use can determine how effective your website will be in attracting visitors. For example if you are selling teeth bleaching products a query for toothpaste may or may not select your website in the search. If you are selling products on your website, ensure that you have keyword articles related to the competition as well as your own products. This does not mean that you will advertise for the competition. The article can be a comparison of your product with another demonstrating why the user should purchase your product.
Step 5 - Create a brand new website with higher paying keywords You can create a brand new website to take advantage of Google's AdSense program. Therefore, you will need to select a topic with high paying keywords. Then provide great information about that topic. Now that you have the content pages and keywords you want, you need to place the ads where they can be seen, and clicked, by the visitors to your website. Most Internet users are so bombarded byads that they automatically tune out the ads that appear on a website. Your goal is to make your ads more appealing to the users and less like ads. Any time that users click on an ad, they have an actual interest in what that ad is selling. To maximize the number of click-thru ads on your site receive, you have to make them less like traditional advertising.
Step 6 - Create different kinds of web pages Different pages on your website serve different purposes. If the object of your website is to sell a particular product or service, create web pages specifically for that purpose. Then have other pages on your website that are geared towards high search engine traffic. Once you realize which pages you are creating for AdSense, select appropriate keywords. Try to select keywords that are the highest paying keywords on the topic.
Step 7 - Create high quality information pages Give the visitors to your website the answers they need. The keyword articles should give information about the topic and not ramble on with a disjointed list of sentences. When writing keyword articles, do not copy and paste from other websites. This is illegal. It's much better to write something new and unique. The writing in the articles should be of a conversational tone using language that the ordinary person will understand. For example, it would be of no point to write this ebook in completely technical language that only a computer programmer would understand. You would not be able to understand it and therefore not apply the techniques. The same is true of keyword articles. If the user does not like the first few sentences, he/she will not continue reading and will move on. Do not create a page about a topic and save it with another to try to generate high paying ads to your page. If your page is relevant to the topic, visitors will click-thru to other pages and ads.
Step 8 - Use the Best Ad Format For Your Web Page Research has shown the best format for ads to maximize click-thrus are 336 x 280 rectangles. The next best size is 300 x 250. Banner are the worst ads to show on a site and the tall thin ads don't fit well on a page because they are usually on the left or the right. The best placement of ads on a page is in the center - right in the users line of vision. You have to put the ads in their face to maximize the effect of click-thrus by users. The best size ad to use is the 336 x 280 rectangle or if space ia at a premium use the 300 x 250 rectangle.
Step 9 - Make Sure That the Ad Block is Positioned Properly Where you have the ad located on your web page affects how often users will click on it. Ads should be as close to the top and the middle as possible. Internet users look to the center of the page to find information. If your ad is placed down the sides, it will often be overlooked. People who use your web page because of a keyword search are generally looking for specific information. Having the ad placed front and center will get their attention, whereas ads on the side will not. Place the large rectangle ads just above the content, not in the right or left hand columns.
Step 10 - Choose the Best Colors for Your Ads Google AdSense offers advice for publishers as to the color of the ads on their web pages. They allow you to customize your ad colors. The recommendation from Google for using custom palettes is to:
? Have the background of the ads the same color or a color similar to the background color of the page.
? Have the border of the ad a color that is predominant on the page.
? Have the title of the ad a color that is similar to the color of the text on the page.
? Have the URL of the ad a color similar to other links on the page. Statistics show that navy blue color works best as a link. The color of the URL should not stand out on the page. The top ranking color for URL's is dark gray. It does not mask the advertiser URL even though light grays do the same thing. Avoid unconventional colors for URLs. Blue is actually considered a non-stimulating color, and some publishers say it can actually have a negative effect on purchasing or deciding to click-thru. Blue is considered by many to be sleep inducing, and is the worst choice if you are interested in a call to action. Sometimes if the effect you want is calming, blue can be integrated effectively. When starting out with placing ads on your web pages, the best advice is to experiment until you find a combination that works for you. Research and statistics have shown the default layout provided by Google AdSense is not the best option.
Step 11 - Don't try to cheat your way to a higher revenue Many publishers have tried to increase their revenue from Google AdSense by clicking on ads on their own website or using software which automatically repeats clicks. Such attempts to gain more money from the ads displayed on your web pages is fraudulent and will result in the automatic cancellation of your account. Google has engineers who can detect this type of fraud. By trying to spam your way to extra money won't work out. You will get kicked out of the program and you won't make any money at all. Prohibited methods of clicking include:
? Repeated manual clicks
? Use of robots
? Automated clicking tools
? Deceptive software
? Clicking on your own ads Legitimate clicks are those that are generated as the result of a user to your site clicking on one or more ads on various pages
Saturday, 30 March 2013
FaceBook Malware And Countermeasures in a Nutshell
FaceBook Malware And Countermeasures in a Nutshell
Social media’s history precedes the 21th century
and ever since then malevolent people have attempted to infiltrate the
computers of innocent people using these media in hope of
- Obtaining sensitive information such as bank details and personal information,
- Using the machine as a bridge in major cyber-attacks
- Impersonating you and using your account for their own ends,
- Installing some form of adware on your computer and bombarding your machine with endless pop-up ads, spreading spam through your computer for material gains, deceiving you to fill out a survey or by any other means try to acquire financial resources and transmitting the virus to more people via your machine with the hope of multiplying their material gains,
- Retaliating, gaining fame or proving that they can infiltrate someone’s machine or/and spreading the virus to a lot of people for the same reasons.
Generally, every virus is malicious
as this is its raison d’être. To effectively combat viruses in
Facebook, one must be aware not only of the necessary steps that ought
to be taken in order to protect himself, but one also needs to know the
various ways in which they can be transmitted to his machine as this
will greatly reduce the risks of getting a virus by showing when and
where to expect them. In addition, one must also acquaint himself with
the means of combating an existing malicious code on his machine imported by a social media such as Facebook.
Below, I discuss several notorious Facebook viruses and talk about their purpose, their way of dispersal, ways of avoiding them and last but not least, getting rid of them.
There are 9 popular ways of attacking your Facebook profile. They are:
1. Clickjacking, where hidden actions are executed when you click on a button or link in plain sight.
2. Drive-by downloading,
where a malware is immediately installed on your device when you visit a
website. Drive-by downloading usually occurs without any permission
request or notice that you are downloading the malware.
3. Password compromise
is when the criminals create false log-in pages to mislead you into
giving your login details in Facebook applications or by other means
request these details via Facebook’s apps.
4. Direct messages
can be malicious when one or more of your friends’ accounts are
compromised (infected) and they unwittingly send you messages which
often lead your machine contracting the malware as well.
5. Malicious content
is another way in which criminals spread their malware. After your
friend is infected, he will most likely send Wall Posts (and other means
of spreading the word) with malicious content.
6. Shortened links are a way for criminals to disguise the malign content the real URL contains.
6. Shortened links are a way for criminals to disguise the malign content the real URL contains.
7. Harmful apps
can be installed on your device after you click on a malign link. This
usually happens when after you click the link and you are requested to
update a popular program like Adobe Flash Player (if the malicious app
is disguised in a video). These apps may also request for sensitive
information or login details.
8. Fake profiles
are a widespread practice and that is why you should not add people in
Facebook that you do not know. Usually, these profiles include pictures
of a very beautiful woman or man. This is in order to make the profile
appealing and to trick you into adding the criminal as a friend. Once
you do, they will not only spy on your personal information and photos,
but also send you malicious content and messages.
WORM_STEKCT.EVL
Stekct.Evl is a relatively new Facebook virus, transmitted via the Facebook pop-up
chat window. It can infect your machine if someone from your friend
list who is infected unwittingly sends you a harmless-looking link to a
website and you open it. If you open such a link from a Facebook chat
message, the worm will automatically download a replica of itself. It
affects only 1 OS; namely, Windows.
The bad part is that if you are using an older version of this OS (Windows 2000, Windows XP, Windows 9x etc.) and an out-of-date AV product without full real-time protection and sandbox when you get infected, your anti-virus software might not be able to deal with it. Stekct.Evl
not only attempts to overrule such protective software but also tries
to delete it from your machine. This may make post-infection treatment
difficult for some users and the best way for them to deal with this
malware is to not get infected at all.
Prevention.
One
effective way of avoiding the worm is to ensure that it was a friend of
yours who actually send the message. You just have to be patient before
opening the link and ask your friend about it, whether they sent it or
what it contains. If he wants you to see this link, then he will surely
answer.
However,
if he does not answer it is very likely a message send by the malware
and you should disregard it. Normally, if it is the worm, they will
either not respond to your message (as it was not they who sent the
original message and they might not be looking at their Facebook at the moment)
or they will tell you that they did not send you any link. In both
cases, you are safe from the malware and you will not enable it to
spread to your friends as well.
After you have ensured that this is a malware, you can notify your
friend that they are infected so they can take measures to remove it.
Another means to be protected is to have a decent AV product with full
real-time protection and sandbox.
Prevention – Continued
It is indeed an executable file and actually not that cunningly masked. Thus, be sure to trace the path of the link and see if there is a “May09…” should you be in doubt whether a link by your friend leads to this particular malware.
The URL in the Facebook message leads to an archive file named
“May09-Picture18.JPG_www.facebook.com.zip”
It is indeed an executable file and actually not that cunningly masked. Thus, be sure to trace the path of the link and see if there is a “May09…” should you be in doubt whether a link by your friend leads to this particular malware.
The only problem is that the actual link is not in plain sight due to a URL shortening technique (there are more than 300 URL shortening providers now).
Thus, in order to be safe you first have to preview the link, to see
where it leads to and what sort of thing is there. Every famous URL
shortening service provider gives you the option to preview a shortened
link before opening it.
For
instance, to get a preview of the link when it is shortened by bit.ly
and goo.gl just copy the shortened link to your browser and add a plus
sign at the end of the URL. Click here to see a more comprehensive list
of ways to preview a shortened URL on the various websites that
offer shortening services. Another way of viewing what is the real URL
behind the shortened one is to use a URL decoder like
http://trueurl.net/. If you cannot get a preview of the link then follow
the other step mentioned above to avoid infection.
Purpose
The purpose of the worm is to collect sensitive information (possibly for identity theft
or infiltrating your bank account) and as it uses your Facebook account
to send messages to your friends. This is so as the worm Stekct.Evl
aside from deleting your anti-virus software installs another worm
called “WORM_EBOOM.AC” which monitors your browsing activity in various
social media such as Facebook, Twitter, MySpace and WordPress. It
examines not only your private messages but also posted messages which
were deleted and message posting.
Post-infection treatment.
Treatment
includes running your computer in safe mode and deleting several
registry values and files via the Registry Editor, then restarting your
device in normal mode and running your anti-virus software to perform a
scan for files named “WORM_STEKCT.EVL”. Click here to see exactly what
ought to be deleted in the Trend Micro Threat Encyclopedia; the
procedure is described in section “Solution”.
The Koobface Virus (WORM_KOOBFACE.AZ)
Koobface
is a not so recent malware which transmits through Facebook and other
social media. Basically, you get a message from a friend in Facebook
(not through the pop-up chat window) providing you with a sentence like “This is the video with you on the street” and a link to watch it.
If
opened, the link seems like you are entering YouTube (classic phishing)
or another trustworthy website and it also seems that a legitimate
video is hosted because the name of your Facebook friend is stated in
the website (the website could be YouTube or it could be different) to
have hosted the video and there is a photo extracted from his Facebook
further indicating this.
The thing is that “before”
playing the video you are required to install something (such as a
newer version of Adobe Flash Player) and if you click “Install” (thus,
downloading setup.exe) the worm is saved on your device. The worm
then browses through your cookies, connects to your social media sites
via the login information saved in these cookies and attempts to infect
your friends by sending them the same message.
Purpose
The
purposes of this worm, from the objectives mentioned in the
introduction are 4, 1, and 3.Namely, the worm will alter your Google
search results to consist of sites it wants to advertise and, thus, you
will be bombarded with search results, which are ads and generate money
for the wicked guys .Also, if you own and develop websites, the Koobface
worm may steal your passwords and misuse them Moreover, the malware
may open on your machine pop-ups asking you to install “security
software” which serves their own ends; the malware may also use your
social media accounts to send messages to your friends
Prevention
Prevention methods are many. Firstly, you should only install software from respected and trustworthy websites (like the Adobe Flash Player update
in the above mentioned example). Secondly, you should always confirm
that the link points to the trustworthy website it claims to point to.
Thus, to effectively guard yourself against the worm and the phishing attempt, you should always check if the spelling of the website is correct, there might be a missing letter or an extra one.
You
should turn on any firewall you might have and have reliable AV
software installed which is actively protecting you. Another way to
avoid the Koobface is explained earlier concerning Stekct.Evl,
but it somewhat applies to this particular worm as well.Last but not
least,make sure that your browser gets frequently updated and that you
use a browser that has an anti-phishing blacklist.
Post-infection treatment.
It
is not difficult to get rid of Koobface. Firstly, you should remove
your cookies and change your password. This will disable the worm from
using your Facebook account. Secondly, you should enable login
approvals. This will make logging in from a new device to require a
security code sent to your mobile phone.
Thus,
even if you get the Koobface, your Facebook will be unharmed. To
effectively remove the worm and eliminate the other consequences
stemming from the presence of Koobface on your device just run a
full-system scan using up-to-date AV software.It is that simple.
Malicious applications on Facebook
Malicious applications on Facebook have appeared and disappeared just as quickly, but not without leaving a trail of destruction. The thing is that Facebook promptly notices these malicious apps and removes them from its directory but many people get infected before, as Facebook has 1 billion users and each second that such a malware is in the apps database, a lot of people get affected.
“WARNING FROM FACEBOOK TEAM” (defunct)– analysis of similar malicious apps in the context of the former one.
Background.
This malicious malware
was removed from the Facebook’s apps database, but it was active last
year. This does not mean that similar malicious apps do not circulate
Facebook’s directory as we speak. If you are security savvy, you will
immediately notice that such a warning cannot be from the Facebook team
as it is dispersed through your friend list.
Once
you got curious and opened the request notification that one of your
friends sent you, the app would have taken you to its index where you
would be further informed that you have to verify your Facebook account,
otherwise it would be terminated. This warning may have caused a sense
of urgency to act for many,making them agree to whatever the app
requested from them.
Thus,
they would not only give it their basic information, access to their
profile information and photos, but also enable it to post on their
behalf (status updates, photos, etc…). In this way, the application
would have had control over an ever-expanding number of people. Similar
malicious apps exist and have the same goals which are merely wrapped in
a different message.
Purpose
The
purpose of this (now defunct) and similar malicious apps which
circulate the Facebook’s directory is and from the Introduction.
Namely, to impersonate you and use your Facebook account to expand their
scope of victims and to lead every victim to a page which claims that
you need to complete a survey in order to continue – the so
called survey scams which, if filled out, would provide material gains
or other similar apps may intend to obtain sensitive information to the
hackers.
Treatment
Treatment methods vary: You can search in Google
or other search engines for an app that you suspect of being malicious
and check if there are reports claiming that it is malicious or scam, if
it is – then definitely someone wrote about it. You can also ask the
friend who sent the message whether the app worked for him or if it
proved malicious. Most importantly, trust only the apps of reliable
developers/creators. This will help you avoid giving permissions to
rogue apps. It is also useful to be able to deduce from the apps
messages, context and presented ideas the degree of its reliability and
credibility.
Post-infection treatment
Assuming
that you have installed a similar app, you should be certain that it is
dispersing spam to your Wall, Timeline and friends, so you should
delete all traces of its messages, including references to it in the
newsfeed or/and profile. Next, you need to terminate its control over
your Facebook. This is done by clicking the down triangle in your Facebook, Account Settings and then clicking on Applications.
After
you have entered, just pick the one(s) that are malicious, remove and
block them from the list of apps which you have authorized to interact
with your Facebook. Also, do not forget to signal Facebook for this
misconduct by entering the app window and clicking the “Report/Contact This App” link.
Further context
An
instance of a similar malicious app is Profile Viewer which had the
same purpose as the false Facebook team warning. Specifically, it claims
that it does or shows something which it does not do or show (that you
can see who viewed your profile and when) so you can give the app
permissions, which it will use to your detriment. In addition, it is
also a survey scam as it requires that you fill out a survey before “continuing”.
Bear
in mind that all apps which claim to track your profile views are fake,
as developers are not allowed access to the information necessary to
create “Profile Viewer” applications. This means that one should
be very cautious when an app is claiming to add new features to the
Facebook platform, such as a profile viewer or dislike button, as such
apps are most likely fake and contain malware.
Also,
be aware that as Facebook has around 1 billion users more and more
people will try to achieve their own ends by tricking people, so one
should be cautious and attentive to detail in order to differentiate
between fake and real apps. The malicious app’s demand will definitely
come from some popular notion, idea, person or event. This is proved by
the fact that numerous survey scams were “successful” by claiming that
they show the demise of Osama Bin Laden, Whitney Houston or Lady Gaga.
Finally,
you should not give your Facebook account and password to third-party
websites, you should not click on a notification (for instance, that
somebody tagged you in a picture) that seems illegitimate, instead you
should open it yourself from your profile (if the notification is real)
and, lastly, to avoid scam mails which pretend to be coming from
Facebook team itself, bear in mind that the Facebook team will never ask
for your password via email and that legitimate mails from Facebook
usually begin with “update” rather than “notification”.
Conclusion
It can be concluded that malware has penetrated the Facebook community, to some extent. There are several reasons (I have enumerated 6 in the Introduction) why malware is created. These malware take various forms, whether of applications or executable files which you will not even notice installing and have negative effects on your device. To effectively combat Facebook malware one must:
- Regularly change your password and not use cookies
- Remove any apps that seem shady and that have not performed what they claimed they perform
- Be aware that messages in your inbox, chat messages, posts on Walls and Timelines, and notifications (such as a “notification” that claims that somebody tagged him in a picture) may contain malware if the friend sharing them is infected and one should ask your friend whether it was he who sent the message
- Enable login approvals
- Use up-to-date anti-virus software, preferably, with full real-time protection and up-to-date version of his OS
- Enable a firewall and use up-to-date browser that has an anti-phishing blacklist
- Check the path of shortened URLs by previewing them or using a URL decoder
- Not give your Facebook account and password to third-party websites
- Delete spam, viral or malicious messages that can be found in your Facebook profile and report any malware found
- Only use the services of trustworthy developers
- If a dubious link points you to a well-known website, always check the website’s spelling to avoid phishing
- Note that legit mails from Facebook usually consist of “update” notices instead of “notification” and that Facebook will never ask for his password via mail
- Don’t click on a notification if it appears illegitimate, but see what it is about from your profile (if the notification is real)
- Deduce from the app’s messages, context and presented ideas the degree of its reliability and credibility
- Only add friends that you know are real – don’t add unknown people as friends to your Facebook account.
- Don’t trust apps which claim to add a new feature to the Facebook platform, such as profile viewer and dislike button
- Avoid links which lead to surveys that need to fill out before you”continue,” as they are most likely scams
- Be aware that popular ideas, notions, people and events are often a basis for scams
- Periodically read materials on the latest threats in Facebook to understand how to handle them.
How To Use Mspy To Monitor Cellphones Remotely
How To Use Mspy To Monitor Cellphones Remotely - Complete Guide
Mspy is currently the best and cheap Cellphone spyware in the market, Unfortunately there is no proper step by step guide on how to use Mspy. So today i will be writing a step by step Guide (in Faq Format ) On How to Use Mspy to monitor Cellphones Remotely
Cellphone Spyware or keylogger is piece of software, which once installed on a cellphone will record all the phones activity such as calls ,sms ,mms , emails and other such credential data and will send them to the attacker (hacker)
Mspy is currently the best Cellphone Spyware both in features and in cost , Following are some of the best Features in Mspy
- SPY on Calls
- SPY on Sms
- SPY on Emails
- Track Gps
- Remote Control
- Easy To Install
- Completely Undetectable
- View All Logs Online
- Compatible with All SmartPhones (Ios, Android, Blackberry, Symbian , Windows )
Some of the popular uses of Mspy are
- Monitor your chilidern , Employees
- Spy on Your Spouse
- Locate Cellphones via GPS
You can get a Copy of Mspy from the following link
Download Mspy
You can choose the number of months as you wish but best would be to select 3 months
You can Monitor Multiple Cell Phones by selecting The Business plan from the following link
Once you purchase Mspy, You will recive an e-mail containing a password to your mSpy Control Panel
Step 1. Log into your Control Panel and follow installation instructions given by the wizard.
After logging in, you will see the Wizard asking you to select the OS of the target mobile device and install the surveillance software. The installation takes just a couple of minutes.
Step 2. You'll be shown the combination code by the Wizard.
After installing mSpy, dial the combination code you get from the wizard on the target phone.
Step 3. View the data captured by the software online.
If all the settings are configured, you'll be able to view the first
logs in a couple of minutes. Congratulations! Now all activities on the
target phone are monitored and can be viewed any time in your private
mSpy account.
Once installed Its impossible for the owner of the target phone to
detect the mSpy software .Currently Mspy is not detected by Any
Antivirus Software's
Adding background images to windows drives
Adding background images to windows drives
Isn't it cool to have great wallpaper for your desktop but it might be
more fun to have amazing background images for your drives. Drives Background Image
is a Windows freeware application that allows you to set a wallpaper
for each disk drive on your computer. This program is very easy to use
you only need to select wallpaper for your background, it also provide
option to change icons of your drives, changing text color and it
provide instant preview of your selected settings. But keep in mind
that Windows 7 users need administrator privileges
while running this program, as the application attempts to modify the
configuration of the local hard drives. Its pretty nice program for
window customization and every one should try this tool. Follow below
steps to download and learn to use this program.
Features of the program:
- Autodetect Available Drives
- Set Background To Multiple Drives
- Remove Background From Multiple Drives
- Set Icons To Multiple Drives
- Remove Icon From Multiple Drives
- Auto Recover Default Icons
- Events Log
- Drive Preview
- Icon Preview
- Easy Clean GUI
Download Here
Learn To Hide Files Behind The Images
Learn To Hide Files Behind The Images
There are some important files or document you want to hide from others on your computer.
To do that you might be creating folder inside folder to hide such
files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.
How To Hide File Behind Image ?
In order to do this you should have basic understanding of command line, but if you don't know check out tutorial given below.
1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
- Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
- Replace filename with name of your file you want to hide. It must be in .rar format.
- Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
How To Access Hidden File ?
To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.
1. Open winrar
2. Now locate your image and open it or simply drag your image in winrar.3. Extract the file and done.
Posting Facebook Status Upside Down
Posting Facebook Status Upside Down
In this tutorial i will share with you simple facebook status trick. If you want to post something creative or something cool as your facebook status then this trick will let you post any facebook status upside down. Basically this is a website which allows you to flip your text. so lets dive into it.
How To Do ?
- First GoTo FlipText Website by Clicking Here.
- Enter you message or text in text area and click on Flip.
- Copy the upside down text and paste it in your facebook status or where ever you want to use it.
- Enjoy!
Making Nameless Folder In Windows
In this small tutorial i will show you a smilpe windows trick. Basically you can not make folder with no name on windows. This trick will allow you to make folder without any name. This trick works on any windows operating system.
How To Make Nameless Folder
Before attempting this trick, try to make a folder with no name and you will fail to do so. This is what this trick will let you do. Below is screenshot of folder before and after doing this interesting trick.
- Make a Newfolder on desktop or where ever you want.
- Right click on this newly created folder and select Rename.
- Erase the text showing "New Folder".
- Now keep Pressing Alt (i.e alter key) and type 255. If you are on laptop then you need to enable your Num Lock and type from the highlighted number keys not from those below function keys.
- After that leave alt key and Press enter.
- Done you just created nameless folder.
Wednesday, 27 March 2013
FaceBook Security Question Hacking
Facebook ID Can Be Hack by Stealing Security Question - Answer
Hello !! HW readers after a long time, I posted trick on Hacking and Stealing. Today's post is about Facebook "Security Question" - Answer Stealing, I mean, This post gonna show you how to steal victims Security Question - Answer and hack victims Facebook ID. Basically here I'll use SET and Phishing attack fully 100% FUD (Fully Un-Detectable), we gonna use this two tricks to steal Facebook Security Question- Answer.
✔ Requirements :
- Victim Profile Link or Username.
- G-mail or Yahoo Fake ID as same as victim's real Info.
- Victim Security Question.
- Must Know Phishing Attacks and Stealing Password
- FB Sec Ans Stealer Phishing Page. (Download, skip ads after 5 seconds)
✔ Find out Victim FB Profile Link.
Open your FB Home page Click Here
Search your victim name in search Box and copy Link
Copy this Address link from Profile
✔ Find out Victim's Security Question.
- Log out your Session or any other FB ID running.
- Go to FB Account Recovery Page, Click Here.
- Paste Victim's profile link and click on search
Here, we got victim's ID, now click on This is my Account
After you will be redirected to victim A/c Recovery page
Click on "No longer have access to these
- Victim Profile Link or Username.
- G-mail or Yahoo Fake ID as same as victim's real Info.
- Victim Security Question.
- Must Know Phishing Attacks and Stealing Password
- FB Sec Ans Stealer Phishing Page. (Download, skip ads after 5 seconds)
✔ Find out Victim FB Profile Link.
Open your FB Home page Click Here
Search your victim name in search Box and copy Link
Copy this Address link from Profile
✔ Find out Victim's Security Question.
- Log out your Session or any other FB ID running.
- Go to FB Account Recovery Page, Click Here.
- Paste Victim's profile link and click on search
Here, we got victim's ID, now click on This is my Account
✔ How to Steal FB Security Answer.
- Download Phishing Page from here.
- Extract all files on Desktop, and Open Verification.html in Notepad and Hit Ctrl + F and search for "ADD YOUR QUESTION HERE" and replace this line with your Question for Eg. In What City or town your Mother was born.
- Now, Save it and Compress it using Winrar in .zip format
- Create new Account on 000webhost and Get your free Domain and upload your all Phishing files to server.
- {If you Don't know how to upload and host your free website or Phishing page click here}
Make your Victim fool or delude him using SET tricks and Mind, Look at below Image >>>
Stealing Process and Get FB Sec Ans.
- When your Victim will go on your Phished Page he will see something looks like this.
And
when your Victim will Enter his or her Security Question - Answer and
clicks on Continue, The Answer Provided by him will be stored in log.txt
file on your Phishing server. Download it and Open it.
✔ How to Steal FB Security Answer.
- Download Phishing Page from here.
- Extract all files on Desktop, and Open Verification.html in Notepad and Hit Ctrl + F and search for "ADD YOUR QUESTION HERE" and replace this line with your Question for Eg. In What City or town your Mother was born.
- Now, Save it and Compress it using Winrar in .zip format
- Create new Account on 000webhost and Get your free Domain and upload your all Phishing files to server.
- {If you Don't know how to upload and host your free website or Phishing page click here}
Make your Victim fool or delude him using SET tricks and Mind, Look at below Image >>>
Stealing Process and Get FB Sec Ans.
- When your Victim will go on your Phished Page he will see something looks like this.
And
when your Victim will Enter his or her Security Question - Answer and
clicks on Continue, The Answer Provided by him will be stored in log.txt
file on your Phishing server. Download it and Open it.
- Download Phishing Page from here.
- Extract all files on Desktop, and Open Verification.html in Notepad and Hit Ctrl + F and search for "ADD YOUR QUESTION HERE" and replace this line with your Question for Eg. In What City or town your Mother was born.
- Now, Save it and Compress it using Winrar in .zip format
- Create new Account on 000webhost and Get your free Domain and upload your all Phishing files to server.
- {If you Don't know how to upload and host your free website or Phishing page click here}
Make your Victim fool or delude him using SET tricks and Mind, Look at below Image >>>
Stealing Process and Get FB Sec Ans.
- When your Victim will go on your Phished Page he will see something looks like this.
And
when your Victim will Enter his or her Security Question - Answer and
clicks on Continue, The Answer Provided by him will be stored in log.txt
file on your Phishing server. Download it and Open it.
Stealing Process and Get FB Sec Ans.
- When your Victim will go on your Phished Page he will see something looks like this.
Stealing Process and Get FB Sec Ans.
- When your Victim will go on your Phished Page he will see something looks like this.
And
when your Victim will Enter his or her Security Question - Answer and
clicks on Continue, The Answer Provided by him will be stored in log.txt
file on your Phishing server. Download it and Open it.
And
when your Victim will Enter his or her Security Question - Answer and
clicks on Continue, The Answer Provided by him will be stored in log.txt
file on your Phishing server. Download it and Open it.
Subscribe to:
Posts (Atom)