Sunday, March 16, 2014

Google AdSense Payment Methods


After joining Google AdSense the first thing came to my mind was how can i withdraw my money from the google adsense So, I wondered about AdSense payment methods which i am going to share with you. The payment methods, through which publishers can receive their earnings, are listed below.

Western Union: The most convenient way of receiving money from AdSense is the Western Union Quick Cash. When your earnings reach the minimum payout threshold of $100, they are calculated and verified by 7th of next month and are issued between 22nd to 28th of the next month. You can view the payment details in your AdSense account dashboard. Once the payment is issued, you are given an MTCN (Money Transfer Control Number) which can be obtained from AdSense dashboard. You can then collect your AdSense earnings from any Western Union agent by giving him the MTCN, your NIC or any other document’s copy and payment details including the received amount and sender’s information.


Standard Checks : Second popular method of receiving AdSense payments is via standard checks. When your earnings reach the payout threshold, you are sent a check from Google. This check can be cashed out in your local currency. Receiving payments via Standard check isn’t recommended, as it takes long to reach the check to you. Secondly, the check may get misplaced.

Check via Secured Express Delivery: It costs a fee of $25. When you choose this method for receiving your AdSense earnings check, your check is delivered through a secured courier service and you are also given a tracking number through which you can check the status of your check’s delivery. This method is much more secure and faster than the standard check delivery and the check will be delivered to you within 5-10 business days.

Receiving Payment by EFT (Money deposit in Direct in Bank a/c): Electronic Funds Transfer or EFT is the fastest and most secure method of receiving your AdSense earnings, but unfortunately, this method is currently available in some chosen countries only. When you choose EFT as your payment method, your AdSense earnings are deposited directly into your bank account and they are converted to the local currency.

Minimum Payout Threshold
The minimum payout threshold for AdSense earnings is $100. When your earnings reach this limit in a particular month, you will be issued the money by 28th of next month. For example if your September’s earnings reach $100, they will be calculated and verified by 7th October and will be issued to you between 22nd -28th of October.

This was the information about AdSense payment methods and the minimum payout threshold. I hope it helped you a little in understanding the payment process of AdSense.

Like it ? Share it.

Friday, March 14, 2014

Command tweaks in Kali Linux



These are some funny terminal commands. I am sure you people will like these commands as well enjoy it .

1. Open terminal, type nice man woman and Press Enter. Then read the Result.
(Click image for large view)

2. Open terminal, type ^How did the sex change operation go?^ and Press Enter. Then read the Result.

3. Open terminal, type %blow and Press Enter. Then read the Result

4. Open terminal, type make love and Press Enter. Then read the Result.

5. Open terminal, type [ whereis my brain? And Press Enter. Then read the Result.
(Click on image for large view)



Like it ? Share it.

Thursday, March 13, 2014

Fire in Kali Linux


Aafire displays burning ASCII art flames.

1. How to install – Open terminal, type apt-get install libaa-bin and Press Enter.
(Click on image for large view)

2. Open terminal, type aafire and Press Enter
(Click on image for large view)





Like it ? Share it.

Wednesday, March 12, 2014

Big Rock Discount Coupon


Bigrock is India #1 domain registration and web hosting provider. You can register domain names in many different name spaces including .com, .net, .org, .biz, .info, .mobi, .in, .co.in, .co.uk, .asia, and many more..

Discount Coupons


geekyshows.com


How to Use Big Rock Discount Coupon/ How to Purchase Domain from Bigrock
1. Open www.bigrock.in and write your domain name then click on Go
(Click image for large view)

2. It is showing domain is available. Now click on Add. Sometime it shows 'Unavailable' It means your domain is not available and you have search again with a different domain name.

3. Now you are ready to checkout so just click on 'Checkout'. Notice the amount of this domain its Rs. 639 before applying our discount coupon. 

4. If you do not want to purchase other services. Click on No Thanks

5. As you can without geekyshows.com coupon the price is Rs. 639

6. Now copy our Coupon code which is given above.

7. Paste Coupon Code and Click on Apply. Now you will notice that your checkout balance has been deducted. 

8. Now login and Pay the Bill with your own choice of payment Mode. If you do not have an ID. Please Create an ID its free of cost. 
(Click image for large view)



Like it ? Share it.

Transfer Balance Docomo to Docomo

Tata Docomo Users can share their own talktime with friends and others. Docomo has started balance transfer facility via USSD *363#. They are allowing to transfer any amount between 5-40 and Rs.51 and Rs.101.

I. First of all Dial *363#
II. You will see a flash message in your mobile screen "Welcome to Tata DOCOMO Talktime Services. Press exit now to receive the main menu".
III. Simply 'Exit' it
IV. Now you will see the Main Menu
    Welcome Reply With Option
     1. Share Talktime
     2. Ask for Talktime
     3. Send Call Me Back SMS
V. Choose from the option as per your need and follow instruction and enjoy this awesome tata docomo Gifting Service.

Service Charges are as follows:-
1. 5 - 10 – Rs.2 extra ( If you are transferring balance between Rs 5 to Rs 10. You will be charge Rs 2 Extra. This amount will deduct from your Main Balance)
2. 11-20 – Rs.3 extra
3. 21-30 – Rs. 4 extra
4. 31-40 – Rs.5 extra.
5. Rs.51- Rs.8 extra
6. Rs.101- Rs.14 extra.



Like it ? Share it.

Monday, March 10, 2014

Remote Exploit


An Exploit (from the verb to exploit, in the meaning of using something to one’s own advantage) is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.


Classification

There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with social engineering method. Another classification is by the action against vulnerable system: unauthorized data access, arbitrary code execution, denial of service.

Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root.

Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete for newer versions of the software. This is the reason why some blackhat hackers do not publish their exploits but keep them private to themselves or other hackers. Such exploits are referred to as 'zero day exploits' and to obtain access to such exploits is the primary desire of unskilled attackers, often nicknamed script kiddies.


Types

Exploits are commonly categorized and named by these criteria:
The type of vulnerability they exploit (See the article on vulnerabilities for a list)
Whether they need to be run on the same machine as the program that has the vulnerability (local) or can be run on one machine to attack a program running on another machine (remote).
The result of running the exploit (EoP, DoS, Spoofing, etc.)

Pivoting

Pivoting refers to method used by penetration testers that uses compromised system to attack other systems on the same network to avoid restrictions such as firewall configurations, which may prohibit direct access to all machines. For example, an attacker compromises a web server on a corporate network, the attacker can then use the compromised web server to attack other systems on the network. These types of attacks are often called multi-layered attacks. Pivoting is also known as island hopping.
Pivoting can further be distinguished into proxy pivoting and VPN pivoting:
  • Proxy pivoting generally describes the practice channeling traffic through a compromised target using a proxy payload on the machine and launching attacks from this computer. This type of pivoting is restricted to certain TCP and UDP ports that are supported by the proxy.
  • VPN pivoting enables the attacker to create an encrypted layer 2 tunnel into the compromised machine to route any network traffic through that target machine, for example to run a vulnerability scan on the internal network through the compromised machine, effectively giving the attacker full network access as if they were behind the firewall.
    Typically, the proxy or VPN applications enabling pivoting are executed on the target computer as the payload (software) of an exploit.
Remote Exploit

Remote Exploit allow hacker to get access on a server. Depending on what service is exploited, hacker will get user or root privileges on the exploited server. Some times, it is user privileges, then hacker scan the server for any known Local Exploit, if he found one, he use that to get root access on the server. Once hacker get root access they install rootkit (backdoors), that allow him to login and work on the server with out tracked by server administrator or other users.

A common way to classify attacks is whether they are done remotely by a hacker from across the Internet, or whether they are done locally by a user who already has privileges on the system. The important difference is that a "remote" attack can be launched by any of the hundreds of the of millions of people on the Internet at any time without first logging on. Point: A hacker may need to use a combination of remote and local exploits in order to gain control over a system. More and more services are running within sandboxes in order to limit the "spread of the infection". A local exploit may be needed in order to break out of the sandbox. Key point: The most common remote exploits are buffer overflow and other unchecked input attacks. They are either done against public services (such as HTTP and FTP) or during the logon of protected services (such as POP and IMAP).

Like it ? Share it.

Sunday, March 2, 2014

Idea 3G/ 2G Internet trick 2014


Idea 3G/ 2G Internet trick 2014

1. Your balance should be less than Rs. 1.

2. Change Your Mobile Setting according to below details:
APN: mmsc
IP: 010.004.042.015
Port: 8080

3. Save the setting

4. Restart your device.




Like it ? Share it.