This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Showing posts with label Internet. Show all posts
Showing posts with label Internet. Show all posts

Computer Acronyms

ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

7 ways to increase Torrent Speed

The use of Bit Torrent is an efficient way to transfer files of just about any size quickly and efficiently. How this works is by breaking the huge files into smaller pieces and is from one or many of the different sources. This is one of the best ways to transfer bulky files quickly even when you are using a low bandwidth connection. There are many more things that you can do with Bit Torrent, but here we are going to discuss how to make this work much faster.
increase torrent speed
Here are some essential tips for the same,
  1. Start with your ISP:
All ISP has a preset maximum upload and download speed, and you cannot make your torrent work beyond this speed. All you can do is to use the best use of this upload and download speed even when the signal is weak. You can check the maximum speed that you can achieve by conducting a broadband speed test and compare with the DSLReports that comes with your uTorrent.
  1. Opt-In for healthy seeds and peers:
A peer is any computer participating           in downloading and uploading of torrent files along with that of yours. A seeder is one who has a complete copy of the file that is being shared across a torrent network. A leecher is the person who has joined the network recently and do not have most of the file that you or the peer has. This leecher becomes the seeder when they download the entire file and is able to share it across the network.  For getting high torrent speed, you need to increase the number of seeders to increase the chance of healthier and reception of higher speeds.
  1. Get through the firewall:
Many times, you will find the administrator or the firewall in your web browser is set to block and receive torrent files. The first thing that you need to do is to get appropriate permissions for downloading torrent files, and add this to your firewall, which will enhance the speed at which you can download torrent files. If the internet is through a router, then you have to set the torrent file to cross the barrier of the security of the router also.
  1. Go to a different port:
The default port for BitTorrent protocol is always between the numbers 6881-6999. This is because BitTorrent sharing will involve high bandwidth usage. However, this is possible that you can configure a different port for your torrent client and this has been best advised to set this number to somewhere around 10000.
  1. Limit your upload rate:
A peer to peer network is sharing alike on the same or similar platform and therefore you should be able to set your client’s upload speed rate to a maximum amount, which will usually be about 80 percent of your maximum upload speed that is being offered by your ISP. Keep this speed, as high as possible, but you have to play your cards well as the upload speed affects your download speed as well.
  1. Use your common sense:
If you understand the concept of how Bit Torrent works, then your common sense will automatically tell you that this is possible to view the individual files being downloaded and disable the ones that you are not in need off, which will  help you to speed up the process of downloading the files using Bit Torrent.
  1. Bandwidth and connections:
This is possible to set the maximum number of connections, maximum number of peers connected per torrent and number of slots per torrent so that you can decide on which numbers gives the maximum efficiency from your Bit Torrent files.
Now is that you have some tips on how to increase the speed of downloading while using Bit Torrent, why not try these tips out next time! Comments are appreciated!!

Useful Direct Links


Kaspersky
http://dnl-eu10.kaspersky-labs.com/devbuilds/



Bitdefender

http://download.bitdefender.com/windows/

http://download.bitdefender.com/updates/

http://download.bitdefender.com/SMB/



AVG

http://download.grisoft.cz/softw/80free/update/



Symantec Ebooks & Guide

ftp://ftp.symantec.com/public/english_us_canada/products/



Mozilla Firefox

http://releases.mozilla.org/pub/mozilla.org/firefox/releases/


Opera

ftp://mirror-fpt-telecom.fpt.net/mirror/opera/win/



HP Drivers

ftp://ftp.hp.com/pub/softlib/software1
ftp://ftp.hp.com/pub/softlib/software2
ftp://ftp.hp.com/pub/softlib/software3
...10



IBM Drivers & Tools

ftp://ftp.software.ibm.com/pc/



All Drivers

ftp://202.65.194.211/pc/



Windows Tools

http://ftp.unb.br/pub/

Hack Youtube To Watch the Best Quality Videos


Whenever you connect to my youtube channel (http://www.youtube.com/),
if you see some videos can not watch with high quality, you can use this TIPS ...


Step1: Click to video that you want to see, the link will display on Address bar. E.x: http://www.youtube.com/user/wildminer?blend=6&ob=4

Step2: Add &fmt=6 to the end of that string. That address like:
http://www.youtube.com/user/wildminer?blend=6&ob=4&fmt=6

Enjoy it ! The higher quality video !!!

Step3: Add &fmt=18 to the end of that string, you'll have the best quality video with direct download link !
http://www.youtube.com/user/wildminer?blend=6&ob=4&fmt=18

Note: Appending &fmt=6 to the URL delivers a 448x336 resolution version of the video and appending &fmt=18 delivers a even better 480x360 resolution version.

Be Careful Before You ‘Like’ This on Facebook

Warning: If you receive news feed carrying any of the following links ‘Liked’ by any of your Facebook friends, don’t click on the link to check it out. It’s a clickjacking worm attack spreading through the ‘Like’ option and has affected hundreds of thousands of users.
These messages include: “LOL This girl gets OWNED after a POLICE OFFICER reads her STATUS MESSAGE,” “This man takes a picture of himself EVERYDAY for 8 YEARS!!,” “The Prom Dress That Got This Girl Suspended From School” and “This Girl Has An Interesting Way Of Eating A Banana .Check It Out!”

Clicking on any of these links takes you to a blank page saying “Click here to continue”. Clicking on this page then publishes the same message to your profile and news feed. The worm doesn’t harm in any other way but you’d rather be not carrying it in your account.

Security firm Sophos has identified the linked pages as being infected with the Troj/iframe-ET worm and has recommended deleting any such entries showing up in your news feed and also making sure no such WebPages have been linked to your Profile.

How to Hack a MySpace Account

MySpace is one of the most widely used Social Networking website by many teenagers and adults acropss the globe. I have seen many cheaters create secret Myspace accounts in order to exchange messages with another person and have secret relationships. So, it’s no wonder many people want to know how to hack a Myspace account. In this post I’ll give you the real and working ways to hack a Myspace.
THINGS YOU SHOULD KNOW BEFORE PROCEEDING

With my experience of about 6 years in the field of Hacking and IT security, I can tell you that there are only TWO ways to hack a Myspace: They are Keylogging and Phishing. All the other ways are scams! Here is a list of facts about Myspace hacking.

1. There is no ready made software or program that can hack Myspace just by entering the target username or URL. If you come accross a site that claims to sell a program to hack Myspace then it’s 100% scam.

2. Never trust any Hacking Service that claims to hack a Myspace account just for $100 or $200. All the them are scams.

The following are the only 2 foolproof methods to hack Myspace.
1. HOW TO HACK MYSPACE – The Easiest Way

The easiest way to hack Myspace is by using a keylogger (Spy Software). It doesn’t matter whether or not you have physical access to the target computer. Hacking Myspace becomes just a cakewalk if you use a keylogger since it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.

1. What is a keylogger?

A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. A keylogger is also called as a Spy software or Spy program.

2. Where is keylogger program available?

There exists tons of keyloggers on the internet, but most of them are useless and doesn’t turn out to be effective. But with my experience I recommend the following keylogger as the best to hack Myspce since it supports remote installation.
1. HOW TO HACK MYSPACE – The Easiest Way

The easiest way to hack Myspace is by using a keylogger (Spy Software). It doesn’t matter whether or not you have physical access to the target computer. Hacking Myspace becomes just a cakewalk if you use a keylogger since it doesn’t need any technical knowledge. Anyone with a basic knowledge of computers can use keyloggers.

1. What is a keylogger?

A keylogger is a small program that monitors each and every keystroke that a user types on a specific computer’s keyboard. A keylogger is also called as a Spy software or Spy program.

2. Where is keylogger program available?

There exists tons of keyloggers on the internet, but most of them are useless and doesn’t turn out to be effective. But with my experience I recommend the following keylogger as the best to hack Myspce since it supports remote installation.

http://www.sniperspy.com/

3. How to install a keylogger?

Keyloggers can be installed just like any other program. At the installation time, you need to set your secret password and hotkey combination, to unhide the keylogger program whenever it is needed. This is because, after installation the keylogger becomes completely invisible and start running in the background. Because of it’s stealth behaviour the victim can never come to know about that the presence of the keylogger software on his/her computer.

4. I don’t have physical access to the target computer, can I still use Sniperspy?
It doesn’t matter whether or not you have physical access to the victim’s computer.
Because SniperSpy offers Remote Installation Feature. So, you can hack Myspace remotely installing the keylogger on the target PC.

You can attach the keylogger with any file such as image, MS excel file or other programs and send it to the victim via email. When the victim runs the file, it will automatically get installed without his knowledge and start recording every activity on his computer. The logs containing these activities are sent to you by the keylogger software via email or FTP.

5. What if the target user (victim) refuses to run the attached file?

Sometimes the victim may refuse to run the attachment that you send via email because of suspicion.

6. How can a keylogger hack Myspace account?

You can hack Myspace using keylogger as follows: You install the keylogger on a Remote PC (or on your local PC). The victim is unaware of the presence of the keylogger on his computer. As usual, he logs into his Myspace account by typing the Myspace username and password. These details are recorded and sent to your Sniperspy account. You can login to your Sniperspy account to see the password. Now you have successfully hacked the Myspace account.

In case if you install the keylogger on your local PC, you can obtain the recorded Myspace password just by unhiding the keylogger program.

7. Why SniperSpy is the best?



I have given a complete review of SniperSpy in my new post Which Spy Software to Choose. This should answer your question.

So what are you waiting for? Go grab it.

For a complete installation guide and more information on SniperSpy visit the following link:
http://www.sniperspy.com/

2. HOW TO HACK MYSPACE – Other Ways

Phishing
Phising is the most commonly used method to hack MySpace. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Yahoo, Gmail, MySpace etc. The victim is fooled to believe the fake Myspace page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her Myspace login details are stolen away.

Phishing is proved to be the most effective way to hack Myspace and also has high success rate. The reason for this is quite simple. The users are not aware of the phishing attack. Also the users are fooled, since the fake login pages imitate the appearance of the original pages. So, you may use the phishing technique to hack your friend’s MySpace account (just for fun). But you must have a detailed technical knowledge of HTML and server side scripting languages (php, perl etc.) to create a fake login page.

Input Validation Attacks

Input Validation Attacks are where an attacker intentionally sends unusual input in the hopes of confusing the application.The most common input validation attacks are as follows-

1) Buffer Overflow :- Buffer overflow attacks are enabled due to sloppy programming or mismanagement of memory by the application developers. Buffer overflow may be classified into stack overflows, format string overflows, heap overflows and integer overflows. It may possible that an overflow may exist in language’s (php, java, etc.) built-in functions.
To execute a buffer overflow attack, you merely dump as much data as possible into an input field. The attack is said to be successful when it returns an application error. Perl is well suited for conducting this type of attack.
Here’s the buffer test, calling on Perl from the command line:
$ echo –e “GET /login.php?user=\
> `perl –e ‘print “a” x 500’`\nHTTP/1.0\n\n” | \
nc –vv website 80
This sends a string of 500 “a” characters for the user value to the login.php file.
Buffer overflow can be tested by sending repeated requests to the application and recording the server's response.

2) Canonicalization :- These attacks target pages that use template files or otherwise reference alternate files on the web server. The basic form of this attack is to move outside of the web document root in order to access system files, i.e., “../../../../../../../../../boot.ini”. This type of functionality is evident from the URL and is not limited to any one programming language or web server. If the application does not limit the types of files that it is supposed to view, then files outside of the web document root are targeted, something like following-
/menu.asp?dimlDisplayer=menu.asp
/webacc?User.asp=login.htt
/SWEditServlet?station_path=Z&publication_id=2043&template=login.tem
/Getfile.asp?/scripts/Client/login.js
/includes/printable.asp?Link=customers/overview.htm

3) Cross-site Scripting (XSS) :- Cross-site scripting attacks place malicious code, usually javascript, in locations where other users see it. Target fields in forms can be addresses, bulletin board comments, etc.
We have found that error pages are often subject to XSS attacks. For example, the URL for a normal application error looks like this:
http://website/inc/errors.asp?Error=Invalid%20password
This displays a custom access denied page that says, “Invalid password”. Seeing a string
on the URL reflected in the page contents is a great indicator of an XSS vulnerability. The attack would be created as:
http://website/inc/errors.asp?Error=<script%20src=...
That is, place the script tags on the URL.

4) SQL Injection :- This kind of attack occurs when an attacker uses specially crafted SQL queries as an input, which can open up a database. Online forms such as login prompts, search enquiries, guest books, feedback forms, etc. are specially targeted.
The easiest test for the presence of a SQL injection attack is to append “or+1=1” to the URL and inspect the data returned by the server.
example:- http://www.domain.com/index.asp?querystring=sports' or 1=1--

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength



3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e-mail service provider.
Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity management system attacks (such as abuse of Self-service password reset) and compromising host security.
However, cracking usually designates a guessing attack.

Rapidshare Hack,No waiting for 15 mins

-: Rapidshare Hack :-
There are two hacks to beat Rapidshare download limits and waiting time.

1) Rapidshare Hack (For Firefox Users) :-
The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors.
The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment.
But most of the time, that advantage is available only to people with the programming skills to make the changes they want.

That's where Greasemonkey, a free plug-in for Firefox, comes in -- it simplifies hacking the browser.

Released at the end 2004, Greasemonkey is the latest in a growing arsenal of Firefox customization tools.
It changes how Web pages look and act by altering the rendering process.

http://greasemonkey.mozdev.org/

1) Install the Greasemonkey extension>>
http://downloads.mozdev.org/greasemonkey/greasemonkey_0.2.6.xpi
2) Restart Firefox
3) Go to http://rapidshare.de/files/1034529/rapidshare.user.js.html
4) Right click on rapidshare.user.js and choose "Install User Script".
5) Run FireFox.
6) From 'File' Menu click on Open File then browse to whereever you saved the 'greasemonkey.xpi' plug-in.
Open it, wait a couple seconds for the install button becomes active.
7) Click on it to install this plug-in then CLOSE FIREFOX.
8) Run FireFox again.
From the File Menu click on Open File then browse to whereever you saved the 'rapidshare.user.js'.
9) Open it.
10) Click the Tools Menu then click on Install User Script then click OK.
11) Close FireFox.

The script will let you enjoy "no wait" and multiple file downloads......!


2) Rapidshare Hack (NIC Tricks and MAC Cloning) :-
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day.
To get around this, you need to show the rapidshare server a different IP address.
Here are some methods for doing this-

A] Short-Out the javascript:
1) Goto the page you want to download
2) Select FREE button
3) In the address bar put this- javascript:alert(c=0)
4) Click OK
5) Click OK to the pop-up box
6) Enter the captcha
7) Download Your File

B] Request a new IP address from your ISP server:
Here’s how to do it in windows:
1) Click Start
2) Click run
3) In the run box type cmd.exe and click OK
4) When the command prompt opens type the following. ENTER after each new line.
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit
5) Erase your cookies in whatever browser you are using.
6) Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens.
Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work.
If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.

C] Use a proxy with SwitchProxy and Firefox:
1) Download and install Firefox
2) Download and install SwitchProxy
3) Google for free proxies
4) When you hit your download limit, clean your cookies and change your proxy

D] You can use a bookmarklet to stop your wait times:
1) Open IE
2) Right Click On This Link
3) Select Add to Favorites
4) Select Yes to the warning that the bookmark may be unsafe.
5) Name it “RapidShare No Wait”
6) Click on the Links folder (if you want to display it in your IE toolbar)
7) Click OK
8) You may need to close and reopen IE to see it
9) Goto rapidshare and click the bookmarklet when you are forced to wait

Reveal Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?
Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the javascript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox.

How to know someone's IP Address


In many cases, it's desired to know the IP address of someone in the reconnaissance phase. The first question to ask is what information do I have about this person. In most cases it's possible that you have the email or IM of the target. First let's discuss the methods: love love
Method 1

if you have a web server hosted someplace where you can see its logs then it's very easy to send someone a URL of an image or any webpage hosted on your web server (http://123.123.123.123/veryfunnyimage.jpg) whenever this page is visited the web server keeps a log of who visited that page (IP address, time, browser, OS ... and lots of more info) where you can check later to collect IP addresses.


Method 2

sometimes people get freaked out from addresses that have ip addresses in the URL so having your webserver with a domain name would really help the person you sent the URL to press on the link (www.mywebsite.com/veryfunnyimage.jpg)


Method 3

Some paranoid people don't open links to unknown sites. so here comes the cool trick. you can embed the image in a post of yours in a known site that allows HTML tags with image sources like < img src = (your image URL). in this case the URL you are going to send to the person is a link to a known website but the website contains another link to your web server. And whenever someone views this page on the known website, the "img src" link is invoked and voila!, you have a log entry on your webserver.


Method 4

Some Ultra paranoid people don't open links at all!! for these people I use my old trick. I send an email to the target that looks important to him (depending on the target actually and what's important to him). This email is in HTML format and contains a tag that links to an image on my webserver (probably a white image not to attract attention). Now upon merely opening the email, my webserver is invoked and a log entry is saved about the persons current IP address.


Note that this method only works if the email client allows images to be displayed (gmail disable that by default)

Method 5

A more faster approach is IM. If you have the IM of the target, then it's possible that you try to send him a file (not malicious, a picture or smthng). upon sending the file, a direct connection is established between you and the target. with a simple connection monitoring application (e.g.netstat on windows), you can know the Ip address.

Method 6

Some paranoid people don't accept files! so another trick in case of MSN is background sharing. the default for MSN is to accept backgrounds shared by others. Actually background sharing performs file sending if the background is not one of the default backgrounds. So the trick is to set your background for the IM to a cool pic from your computer and share it. if the default setting was not altered on your target's IM, then he will automatically accept it right away and a connection is opened. here comes again the connection monitoring app where you can identify the new connection and extract the IP add of the target.



Well those are one's that I used .. do you have any other methods ?? sometimes I only have the username on a forum or website. Any clues?

Method 7

In MSN messenger, if u don't have the display picture of the person you're talking to, the messenger will try to download it by default. this cause the the MSN to open a direct connection. Using a sniffing tool like wireshark will allow you to know the IP of the remote person.So basically if you don't have his display picture and you opened the chat window you'll get your log entry. You can either convince the target to change his/her display picture or you can remove the your local directory that caches the display pictures for all contacts (located in application data folder for the msn) to force the messenger to redownload the picture.

Access GMail offline

GMail introduced a new feature recently, that is browsing mails offline.
Today we are going to see how to do that.

First you need to install Google Gears, you can download the online installer from here
http://gears.google.com/

Run the online installer and it will install Google Gears on your system.

Now open your GMail and navigate to the settings and then to the Labs tab, there you will find a feature called offline, Enable that.

Thats it you are almost done, just a few clicks away. It will ask your permission to install offline access for GMail, click next.Then you get a Google Gears security warning, allow it.Click ok in the next window and you are done.It will download all your mails to your hard drive for offline browsing. You can see the status in the status window.

Have fun browsing gmail offline.

Guide to Hotfile Ranks: What are they and how to improve?


For those who dont understand how hotfiles uploader rank works, Ur rank depends on the following factors:
1. How much resources u are using: the ratio of total no. of files u have uploaded / total space used.

2. Resource usage may also include how much ur earning from hotfile. This can be seen clearly as most ppl who earn a lot have lower ranks....as far as i have seen.

3. How much ur files are being downloaded

4. How much sales u are bringing hotfile. More sales = higher rank


How to Improve Rank / Get More Downloads:

1. Use less resource -> try to earn with already uploaded files and dont upload like a glutton

2. HF uploaders shud delete old files tht are not being downloaded anymore or hav very less downloads.

3. DONT use hotfile just to provide mirrors or as file backup. if ur a rs uploader then try to post only hotfile links from time to time coz rs knows were doin piracy and they wont pay us like hf does.
Hotfile Links + Rapidshare Links = No Earning In Hotfile
Only Hotfile Links = High Earnings...

4. Try to get more sales from ur files / site and directly from ur hf account. This can be done in the following way:

a) Promote via files-> Post ur files in as many places as possible and upload popular content. Since this point is the most important so I repeat: Upload popular content.
* Read the end of the guide for a bid more clarification on this point!

b) Promote via site-> Dont know the general consensus but it can be done by making an attractive and persuasive banner which can say things like "If u want to support this site then please buy a HF account" or "Havin problems with RS download quota? Try HF NOW!"

c) Promote via Site sales->Site sales can be increased with integrating ALL of ur sites with ur hotfile account (from here: http://www.hotfile.com/mysites.html)

5. Upload files above 100mb (105mb to be safe)

6. Always make posts with Posters/Covers and Screenshots/Caps. Thisll get u more downloads

7. The most valuable trick For HF is try uploading less with less links/parts...

8. Dont upload daily. If u have a higher rank try to sustain it by promoting ur older files or sales....if ur rank is low then also do the same thing but then u can upload a bit.

9. keep in mind that if ur links dont get enough downloads b4 theyr reported/deleted hotfile will still consider that u used theyr resources so ur rank will keep falling no matter how much u upload and at how many places u post
So i guess im tryin to say is keep uploading and posting by also try to keep ur links alive by not posting it at TOO MANY places or at places which are very likely to get ur links reported.

10. If ur having a hard time increasing ur rank then u can just start with a new hotfile account and upload from there....dont be ur own referral though. The max ive seen ppl use here is 3 hotfile accounts. Also keep in mind that u can ask for payment to a single account (webmoney, paypal. epassporte) from all of ur hotfile accounts.

HOW To Use GMail offline with Google Gears

Gmail has introduced its latest Labs feature called offline Gmail to enable e-mail access even when you are not connected to the Internet.
While this might sound uber geeky, the concept is simple enough when you actually use it. Oh, and the “offline” mode is already available in a simpler form if you happen to use Outlook or any other email client with Gmail POP access.

Gmail uses its Google Gears open source web application to enable the “offline” mode. Currently, Google lists Firefox 2, 3, and the Internet Explorer 7 in its list of supported browsers. Strangely, there is no mention of Google’s own, the Chrome! However, it might be because Chrome support is obvious.
Browse Gmail offline with Google Gears

Browse Gmail offline with Google Gears
What it does

The feature, which needs to be enabled from under the “Labs” option under “Settings,” downloads e-mails onto your computer and allows access even when there is no Internet connectivity. Users will be able to access most of their emails, reply to them, and view starred and unread messages, just like they do when Gmail is online. When you perform an action that needs web access, Gmail will queue the action and will execute it as soon the connection is restored. While it might not sound very exciting initially, I, for once, can realize how useful this might turn out to be. For many users, Gmail has become a data center, and I suspect that there are many people out there who would want to have a look at their mails and archives even when not connected to the Internet. The best thing is that once this feature is installed, Gmail will be able to go offline or online by detecting the network status, so you do not need to switch on/off the Offline mode manually. There is also this “Flaky Connection Mode” that detects a slow connection and uses the local cache for accessing data, and only uses the server when Gmail needs web access – like when hitting the send button.

Not all Gmail features work, though, in the offline mode. What does work, however, are the sending and replying to emails, searching your archives, and the much-needed auto-complete function. You will not be able to add attachments or add/manage contacts. However, most users will be able to live with such minor inconveniences.

Issues

As expected of a Labs feature, this application has been tested internally amongst 20,000 Google employees and has then been made available to the Labs. Not all users may see this enabled in their accounts, but the feature should be available to all in the coming days. As for the issues noticed, I have not seen anything go wrong in the little time that I have used this. However, CNET does report issues of the local cache going out of sync, but most issues can be sorted out by disabling and re-enabling the feature.
Related posts:

1. How to use Google gears to access GMail offline

2. Add Your Location Automatically to Your Gmail Signature

3. Google introduces Video Chat in GMail

4. Google launches their new browser “Google Chrome”

5. Invisible mode in Gmail

Use a Shortcut to Local Area Network Connection Information

Here's something new in Windows XP, instead of using the command line program and typing ipconfig to get local area network information, you can try using the following shortcut:
* Click on Start, point to Connect to, and then click Show All Connections.

* Right–click the connection you want information about, and then click Status.

* In the connection Properties dialog box, click the Support tab.

* For more information, click on the Advanced tab.

To automatically enable the status monitor each time the connection is active, in the connection Properties dialog box, select the Show icon in taskbar notification area when connected check box.

"Unlimited Internet Usage" not actually "Unlimited"

Yup, just as the title describes; Unlimited doesn't actually mean unlimited! I'm in the UK and of course, we have many different internet companies such as "TalkTalk" and such. i'm currently with a company known as "British Telecoms" (BT for short, a.k.a Bloody t**ts)
Now then, you've probably heard all these internet companies giving away "unlimited usage of up to MB broadband". As I recall, these can sometimes include "Unlimited Phone Line Usage" and of course, the cheap television service. Usually, I would be one to jump at the chance of being promised "Unlimited Internet usage for £18" but of course; theirs always a catch!!!

I used to be with AOL at one point, after the Asian telephone person told me the same technological bo**ocks over and over again thinking i didn't know he was taking the mick and hadn't a clue what he was on about! (which, to be honest, he sounded as confused as a cat with a bird on the other side of a window)

Now then, im currently on BT's "Total Brodban Option 3" which gave me the promise of unlimited usage with up to 20mb speeds... big emphasis on the "UP TO" (lets face it, i only know one person who gets just over 19MB and they life in the middle of no-where...) Now then, i recieved the most ridiculous email ever:


HOLD IT!! (Good ol' Phoenix Wright) I was promised that i would get unlimited broadband, surely that can't be right? well, looks like the fish is stuck in the net... I've been had!!

on BT's fancy lil web page, it doesn't mention anything about my downloading having a limit!!! oh but it does, i missed one tiny little problem... the little symbol next to each little detail. not many people want to read small print so they ignore those symbols (such as ^ and *) but, unfortunately you have to take note!!! so what did i do? i decided to flick through a few of the pages.. and when i found this "Bt Option 3" it didn't mention anything about a download cap! only that the offer was extended to date xx/yy... i even looked for this so called "fair usage policy" and in the end... my old friend Google had to lend a hand...

oh no what do we have here!!! monthly usage is still "Unlimited*" for my option... and the little * leads to a "subject to netwrok management"... no help at all! so is this email REALLY genuine? hmm well the email address states it is... but wait theres more!! if you scroll down to the "network management" section... it clearly states the following:



so now what? i wont get charged if i go over the "100gb" limit but i will get my speed capped for 30 days if i do... well kiddos, looks like the "Unlimited web usage and up to 20mb download speeds" is a arce... leave up some comments on what you think of this and ill gladly reply! why not leave a message about a bad experience with internet providers and ill post it up in my next article and what i think?

50 Traffic Strategies for your site


YOU SHOULD CHOOSE 5 OF THE BELOW STRATEGIES WHICH YOU FIND THE EASIEST TO IMPLEMENT AND WORK ON THEM FOR 5 DAYS (1 DAY EACH). THEN CHOOSE THE NEXT 5 AND IMPLEMENT.
IMPLEMENTATION IS THE KEY HERE, WORK UNTIL YOU HAVE EXECUTED ATLEAST 30 OF THE STRATEGIES AND YOU WILL HAVE QUALITY TRAFFIC FOR A LONG TIME. love love

1. Trade an adequate amount of Stumbles to improve your site’s Stumble Ranking. StumbleUpon is a feasible option, where-in better the content, higher the hits. Also, Diggs can be utilised to get your site indexed quickly.

2. Backlinks can be substantially incremented through sites such as Propeller, OnlyWire and SocialMarker, which serve the purpose of improving indexing and rankings.

3. A suitable press release publicizing your site can be submitted directly to PRWeb.com to attain a good flow of traffic and even rankings.

4. If a competitor with high traffic-site uses Ad Sense, then you can use Google’s Site Targeting Program to get your ad directly to your competitor’s site, evading hassles of contacting the owner.

5. Advertise your site with certified and commonly visited classifieds such as the centralized network on CraigsList.org.

6. Posting quality content through constant offerings on groups, communities and forums with common interests will help attract a good amount of traffic.
7. LinkedIn.com has a widespread online business social networking forum which effectively helps increase your contacts and repo amongst other online marketers.

8. It is essential to keep updating and modifying your site in order to make it seem more dynamic. This will attract more visits from popular search engines.

9. Publishing brochures or even a mini-book based on what your site is all about can assist in creating huge publicity spreads.

10. Posting regularly on your blog and then pinging each time you write in is of great help. Also, each post must contain apt keywords concerned with the business in order to initiate better search results.

11. Writing eye-grabbing reviews about products that belong to the same niche as yours on blogs in your own niche with a link back to your site.

12. Helpful suggestions or comments can be left on other people’s blogs, with a backlink to your site attached at the bottom.

13. Options such as social bookmarking, Refer to a Friend and other such viral techniques will enable a widespread of your site’s popularity.

14. Sites such as OnlyWire.com help in automating social book marking, which enables you to generate more backlinks automatically, thus resulting in traffic from affiliated sites.

15. Offering free items on your site, such as free courses, affiliate products or e-books will help gain a higher number of subscribers and repeat traffic.

16. Attaining membership to the Better Business Bureau will not only help you develop marketing skills, but also enable you to have your site’s link posted on their website.


17. Submitting articles with qualitative contents to popular article directories and blogs and forums.

18. Business cards are also an effective method to create contacts and expand networks.

19. At times, you can get to advertise your site on the Thank You and Reference pages of other Sales websites in return of a nominal charge for the site owner.

20. Personal profiles on popular social networking sites such as Facebook, MySpace and Twitter can prove heavily beneficial to circulate your site’s information and backlinks.

21. A video-clip containing informative footage regarding your site can be uploaded on common video hosting sites such as YouTube. The link to your site must be included primarily in the About Video/Information section of the clip.

22. Buying advertisements on EBay or using PPC techniques is a way of spending your way into luring customers.

23. Some local Radio stations often accept advertisements at relatively affordable costs. So, investing some amount in advertisements on Radios in another medium of mass-communication with a large reach.

24. Also, sponsoring a small segment on a local News channel is a viable long-term option to spread word about your site.

25. Niches impact traffic flows heavily. Picking the correct niches to venture into and combining them with properly researched keywords thus becomes important for long term traffic.

26. If the content is able to generate enough heat, encouraging people to subscribe to your RSS feeds will become easy, which is an efficient method of building a loyal base of visitors.

27. Many readers who use backlinks to reach your site may not necessarily enter your index page. Hence, each standalone page of the site must be intriguing and attractive enough to make them navigate further and read on.

28. Multiple blogs can be created with one parent site to backlink to. Since all of these blogs act as channels leading to the same parent site, continuous traffic inflow is ensured.


29. Giving out attractive bloggers’ awards or rewarding the best blog entries in cash or kind can prove to be a healthy way of attracting a constant inflow of bloggers.

30. Posting backlinks on websites in similar niches and higher Page-Rank will assist in getting your site’s ranking up. Higher the Page-Rank, better the rankings on Search Engines.

31. If you use Yahoo, then it is a common trick to set up a feed on MyYahoo. This will help Yahoo keep automated track of the updates on your site and blogs.

32. Web campaigns either earn money or cost money. Thus, it becomes vital to keep track of your site’s campaigns from time to time through effective tests of their feasibility.

33. An effective offline strategy, which is slightly expensive and lesser known, involves bringing forth your advertisements in front of the common public via modes such as posters, t-shirts, publishing in magazines etc.

34. Also, public places such as alleys, bus stations, cafes etc. are apt sites where you can put up paper Stick-Ons to promote your URL amongst the common masses.

35. The Alexa Tool Bar is an efficient tool to monitor traffic reports and acquire traffic rankings after searching profitable niche keywords on search engines like Google.

36. Hosting Tele-seminars or Webinars with other marketers of your niche can prove to be critical tools in enlightening members of your network with information about your site.
37. If you can’t get famous, get infamous. A trick to attract more eyes is to generate a controversial idea, against the popular beliefs common in the market, and then spread it around through articles and e-books.

38. There could be sites with misspellings or variations of your domain name floating on the web. Try and purchase some space on them in order to forward your URL.

39. Buying an authoritative site and getting high powered people to use it adds to your reputation. Following that up with a few press releases helps attain publicity.

40. Every time you make a presentation to a club, forum or local society, it is highly advisable to mention your site as many times as possible and expand your contacts amongst other online marketers.

41. Write articles and submit to E-zine articles and build backlinks to them if necessary(for quick google rankings), link back to your main page.

42. Use twitter to direct traffic, use automation software to add followers.

43. Add valuable articles to forums in your niche and have a link in your signature.

44. Write guest posts on high traffic blogs in your niche. Do a domain whois search for getting the details of the owner or write a comment telling that you have an offer that can be of mutual benefit.

45. Build a list and send them quality information once a week, soon you can have them come to your site just by requesting.

46. Build relationships in your niche. With fellow webmasters and more importantly the traffic. Make lists and satisfy them with good information.

47. Make video files watermarked with your URL and upload to torrent sites and other sharing hubs (mediafire,rapidshare). Give links to these download pages in forums.

48. Make linkwheels and keep at it consistently.

49. Ping, social bookmark and submit your RSS feeds to rss feed aggregators to get a steady source of traffic each time you update your site.

How To Report Fake, Phony Facebook Profiles

How To Report Fake, Phony Facebook Profiles
One of the most commonly-found “sports” on Facebook is create fake and phony profiles and make other users think and believe that they belong to famous people such as actors/actresses, singers, politicians etc. Facebook team is well-aware of this issue and that’s why it encourages you to report any suspect profile. But how to do it? This brief tutorial will teach how to report bogus profiles by using the Imposter Profile Facebook Form.
1. Go to Impostor Profile .
2. Enter your email address, the URL of the imposter and other data.
3. Click Submit.
4. Done!

Download as a PREMIUM Member from Depositfiles

1. Go to your Depositfile link and click "free downloading"
2. Click the right mouse button and from the dropdown menu select "Page Source", "View Source" or "source code" .

3. Press CTRL+F then begin looking for the following code:

4. Copy this link into your browser or download manager.

Enjoy Instant Gold Download.

No speed limit. No time limit.

View Hidden files With Google

You can view documents that are suppose to be kept quiet, and the public are not suppose to read, all you got to do is………
1. Go to Google

2. Type this into the search bar "not for public release" -.edu -.gov -.mil

3. Exactly the way it is, along with your search quotes!

Enjoy; Guys thank me if you like my post.