Showing posts with label Tutorial. Show all posts
Showing posts with label Tutorial. Show all posts

Saturday, April 16, 2016

google algorithms the secret for SEO

google algorithms


Seo and google algorithms


On this post I will talk about SEO and the recent Google algorithms that are making the life harder for most webmasters.

A lot of persons are asking me to post more SEO articles and software download links etc, due to the very fast success this webpage is having with thousands of visitors despite being little more then 1 month old. So due to popular demand! I will reveal some secrets about the google algorithms.

It is completely essential to know this by heart so you can get your website or blog flying through the ranks of every search engine and not just google. (Most webpages will rank others according to Google position)

The google algorithms Iam going to talk about on this post are:

watch movies online free

Panda Algorithmhidemyass


 

Penguin Update


 

Penalty Algorithms


 

Domain Name MatchThis


 

Hummingbird Algorithm


 

PDF Algorithm


 

 

Tuesday, April 12, 2016

Free Security Tips

On this article I will give you some great Security Tips. This guide will focus on the Windows OS, but it can and should be used with any other OS you may use, just like Mac osX, Linux or even Android. No system is completely safe so we should take some precautions.



Free security Tips


First and foremost we should perform this common tasks.


 

1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates)


have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall.


Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.

3. Install a free spyware blocker.


[caption id="attachment_2507" align="alignleft" width="300"]Free security Tips Get the complete Norton protection![/caption]

You can always Google for free spyware blocker 2016 this will give you lots of free software to download. But I strongly recommend you get McAfee antivirus from HERE Or the complete Norton Security Deluxe Package HERE

 

 

 

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program).


Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically.


Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts. You can check our post on Creating Strong Passwords

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed.


The update and current versions patch numerous vulnerabilities.

Sunday, April 10, 2016

Openvpn configuration for Windows Tutorial

How to setup OpenVPN configuration on Windows



Openvpn configuration for Windows TutorialA. Download and Install OpenVPN GUI


1. Download the latest stable community version of OpenVPN client (Windows Installer) HERE
Note: If you have a 32-bit Operating System, download the 32-bit version of the installer. You
can check your System Type by going to Control Panel > System and Security > System.
2. Open the folder where installer is downloaded and double-click the 'openvpn-install-
<version>.exe' file to begin installation.
3. You may encounter a Security Warning screen: "Do you want to run this software?" If you see
the Security Warning screen, click Run to run the software.
4. The Setup Wizard prompt will appear. Click Next to continue.
5. The OpenVPN license agreement and terms appear. Click I Agree to continue.
6. The component selection dialog appears. Leave all components checked with their default
settings and click Next.
7. Select your destination folder and click Install. Note the Destination Folder location during
install (usually C:\Program Files\OpenVPN)
8. When the installation is complete, click Next.
9. The wizard will notify you of the completion of the installation and prompt you to click Finish.

This are the basic steps to install OpenVPN on any Windows system 

Wednesday, April 6, 2016

Chess for linux – Jin review and Download

When you switch from Windows to Linux, you will miss some “commercial” software. To be completely honest most of them does not have a Linux version, but do not despair!

All software you run on Windows can eventually be run under Linux.

Unfortunately most of it as a big learning curve to be able to run correctly, and Chess for linux is no exception.
But despite that you can find good and free alternatives to get Chess for linux.

Chess for linux

Today Iam going to guide you on how to obtain a chess client to play online on the FICS (Free Internet Chess Server)
There are a lot of different “clients” to play on FICS as you can see on their webpage LINK.

jin icon

I choose Jin because it is really easy to set up, as a small learning curve, you just need to configure it once, create a link and that's it you can forget it is even there. This will be the easiest solution to get Chess for linux.

So lets start the tutorial to get Jin working with FICS



Jin Download and set-up tutorial


The first step is for you to create a FICS account.

You can do that by browsing to FICS webpage here LINK

Fill the form with First name, user name, email, etc (Be sure to use a real email because you need to click the activation link they are going to send)

Check your email, click the activation link.

Now you have a FICS account, but you still need the software to play chess online on your Linux distro.

Chess for linux

 

Second step Download Jin.

To always get the latest version, you should proceed to the download through the official Jin website on this LINK

Click on Download Jin, it will start the download of a tar.gz file which works exactly as a ZIP file on Windows.

- After you download the file, open the folder that contains it. Right click and choose “extract here

- Open the folder just created jin-2.14.1 or the version you got.

Double-click jin

Select the first option “Run in Terminal

Choose the server (In this case the second one Free Internet Chess Server)

Login with your username and password.

Chess for linux

 

And thats it Welcome to Jin and FICS :)


 

This are the most basic steps to get Jin up and running on your linux OS.

But there are some other important tweaks you should do to personalize your experience and make it easier to use:

 

Chess for linux

 

 

 

 

 

 

jin iconCreate a Link to Jin on your Desktop

First of all, you do not want to navigate to Jin folder every-time you want to play it right?

Just like in other OS whe need to create a link to Jin application and drag it to your desktop.

To create a link using Linux the easiest way is just to grab the program with your mouse, drag it to where you wish while pressing Ctrl+Shift on your keyboard this will create a link to the file instead of creating a copy of the file.

 

jin iconChange the link Icon

When you create the link, the Icon it will show, will be the regular Shell command Icon. To change it to “Jin” Icon:

Right click the link on your desktop > select properties > click the icon on the properties page > browse to your Jin folder and click the Icon.

 

Personalize Jin behavior and feel

To change options like pre move and automatic promotion you need to open Jin.

Log in. Click on Preferences > Chess board… > Moves – And here you can select the Auto promotion option and the Moving in Advance select the (premove)

Feel free to mess around with the remaining menus and set everything to your own taste.

Chess for linux

 

This is all there is to know to get Jin up and running on your Linux system

* When I first installed Jin I had a problem with sound delay. I would only listen to the piece move, a few seconds after it did. If this is happening to you. The probable cause is your JAVA version. The fix is simply to download Oracle Java, from your Linux Distro Repository, or from Oracle official Webpage Here: LINK

Chess for linux

 

 

As always, If you enjoyed this article please do share it by using the social buttons below (Facebook, Twitter, Stumbleupon, etc)
Really soon, I will update with another news article, a onion website review, some downloads, good tips, etc. you will need to pass by again to see what changed.
Stay tuned with securityfreak, thanks.

Monday, April 4, 2016

Tails - Get your privacy back

Tails, because there is never too much security!tailslinux


Almost all O.S. (Operating systems) like Windows, Mac, Ios, Ubuntu, Android, etc will track you and send your details to other persons.

This means that for you to become secure, first and foremost you will need to increase your privacy.

On this post I will guide you step by step on how to achieve this.
Following this steps, In the end you will get a fully working O.S. running on your computer from a pen drive!

The system that I will recommend you to use is named Tails, it is a Unix based system, specially design to keep your online activity anonymous.

You are going to need a Internet connection to download the ISO and a Pen drive (4gb is enough for what you will need)

Lets start with the instructions

Step by step guide to create a bootable Pen disk with Tails the anonymous system


Tails USB

end-to-end encryption

end-to-end encryption and its importance


end-to-end encryption

Hello, this article will focus on end-to-end encryption. I will briefly explain what it is, why you should use it, and how to use end-to-end encryption to send your data.

Lets start with some basics:
End-to-end encryption means that data (including communications data) is encrypted at your end, and decrypted only at the intended recipient’s end. The important point is that no ‘middle man’ who can access your unencrypted data is involved. Because a middle man can always be regarded as suspect, end-to-end-encryption should be seen as an absolute must if you care about security.

A case in point is Microsoft, who while they encrypt all emails and files held in SkyDrive, also hold the encryption keys, and used these to unlock the emails and files of its 250 million worldwide users for inspection by the NSA. 

Basically, services that encrypt your data on their servers, rather than you encrypting your own data on your own machine, should be strongly avoided.
The terrifying scale of the NSA’s attack on public cryptography and its deliberate weakening of common international encryption standards has demonstrated that no proprietary software can be trusted; even software specifically designed with security in mind. It is now a proven fact that the NSA has co-opted or coerced hundreds of technology companies into building backdoors into their programs, or otherwise weakening security in order to allow the NSA access. US and UK companies are particularly suspect, although the reports make it clear that company’s across the world have acceded to NSA demands.

The problem with proprietary software is not just that as sole developers and owners, companies can be fairly easily approached and convinced to play ball with the NSA, but that their source code is kept secret, making it easy to add to or modify in dodgy ways without anyone noticing.

The best answer to this problem is to use free open source software (FOSS). Often jointly developed by disparate and otherwise unconnected individuals, the source code is available to everyone to examine and peer-review, thereby minimizing the chances that it has been tampered with. Ideally this code should also be compatible other implementations, in order to minimize the possibility of a back-door being built in.

It is of course possible that NSA agents have infiltrated open source development groups and introduced malicious code without anyone’s knowledge, and the sheer amount of code that many projects involve means that it is often almost impossible to fully peer-review all of it.

Still, despite these potential pitfalls, FOSS remains the most reliable and least likely to be tampered with software available, and if you truly care about privacy you should try to use it exclusively (up to and including using FOSS Operating Systems such as Linux).

On this Article I tell you how to obtain and use PGP to encrypt your files LINK

As always, If you enjoyed this article please do share it by using the social buttons below (Facebook, Twitter, Stumbleupon, etc)

Really soon, I will update with another news article, a onion website review, some downloads, good tips, etc. you will need to pass by again to see what changed.

Stay tuned I will upload something new very soon, thanks.

Thursday, March 24, 2016

Stronghold Paste .onion Review

Hello, on this post I will give you another onion website review, this time Iam going to talk about Stronghold Paste


Stronghold Paste url http://nzxj65x32vh2fkhk.onion

Stronghold Paste works pretty much like pastebin.com, but as with all .onion webpages you can count on a huge level of anonymity and little to none propaganda.
The idea of the webpage is to freely leave text files on the "cloud". This pieces of text can be accessible by anyone or you may require a password.

Stronghold Paste

Some features from Stronghold Paste

Friday, March 18, 2016

detecting the operation system from any person

On this post I will give you a small tutorial, on how to detect what OS any person is using, and how to protect against such a detection.


This detection can be used by malicious hackers to use the correct applications, to hack into the targets.

Everyone should at least know the basics to be able to prevent the attack and keep their system a bit more secure.

There are not many prerequisites to be able to do this. But the basics are:

Having a *nix system

Connecting to the Internet

Downloading the Xprobe applications

First let me talk about the Xprobe application.

 

Xprobe is a simple tool to perform a fingerprint of a remote server.

The Xprobe application is used to identify the possible operating system (OS) of the target.

An attacker uses this information to launch appropriate attacks for the results obtained.

This is the download link : https://sourceforge.net/projects/xprobe/

detecting the operation system with xprobe2

Wednesday, February 17, 2016

Transparent Proxies in Squid

With, the extremely uncontrollable growth in the number of Hackers, not only system administrators of servers have to worry about the security of their system, but even if you are running a  standalone PPP Linux box, you simply cannot afford to ignore your system's security, to prevent that you need to configure a transparent proxie.
If your system is the main server which communicates with the external untrusted network called the Internet, or even if you simply use your linux box to connect to your ISP and surf the net through PPP, then you should definitely think about installing a firewall on your system.
The preferable and the best option in this case is to install a commercial firewall. However, this option is not always possible and is more often than not unnecesarry. Buying, installing and configuring a good commercial firewall is not only expensive but most beginners find it pretty formidable.

OK, I do not want to go through the hassle of a commercial firewall, what do I do?

Well, 'ipchains' hold the key for you.
The Firewalling code in the Linux Kernel changed considerably after the release of Kernel 2.2. Since then, a lot of new utilites and features have been added. Amongst these improvements, is a kewl feature called 'ipchains', which is primariarly used for configuring the firewalling rules and other such related details.

In this manual, we will learn about how to use ipchains to configure a transparent proxy on your linux box.
So what exactly is a transparent proxy?
Well, a transparent proxy is basically something which fools the client (who connect to the server running the transparent proxy) into believing that they are directly connected to the web server (and not through a proxy.). OK, I am sorry, that is not exactly the correct way to describe it. ;-) Read on for a better description.

Well, a transparent proxy works in the following manner: It listens to a specific port (like the HTTP port i.e. 80) for any connections. As soon as it gets a request for a connection (in this case a HTTP request for a file.) then it redirects the user i.e. connection to another port on the same machine. Now this new port to which the connection is transferred is actually running a Proxy.
So, in affect what happens is, the client i.e. the user who connects to the server where the transparent proxy installed,
assumes that it is directly connected and is communicating with the HTTP daemon. However, the truth of the matter is that all communication is being carried out via the proxy running on the server. All this would be clearer when you see the below picture of what happens:
Client --------> Server(Port 80 or HTTP)transparent proxy

 
The rules of the ipchains transfers client to the port where the proxy is running. So, now the communication takes place in the following manner:

 

Client --------> Server(Port of Proxy) --------> Server (Port 80 or HTTP)
So, the connection to Port 80 is indirect, however the client has little idea about it.
Now, that you know the working of transparent proxies, let us get down to configuring them on your machine.
However, before we get down to the actual process, you need to check whether this is possible on you system or not. Simply look for the file:
/proct/net/ip_fwchains
If you have this file, then well and good, else you will have to recompile your Kernel. However, I am sure almost 98% of you would definitely have this file.
NOTE: In this case, we will be transferring all connections from Port 80 to Port 8080 where Squid runs by default.
You could always transfer connections to any proxy port of your choice, by changing the revelant parts. I have taken up Squid, as it is the most common one.

Firstly, in order to transfer all connections from Port 80 to Port 8080, add the following lines to your startup script, so that they are executed each time you boot up.

Note: The server IP is xxx.xx.xx.xx
ipchains -A input -p TCP -d 127.0.0.1/32 www-j ACCEPT
ipchains -A input -p TCP -d xxx.xx.xx.xx/32 www-j ACCEPT
ipchains -A input -p TCP -d 0/0 www-j REDIRECT 8080
NOTE: If you are using ipfwadm, then add the following lines to the startup script:
ipfwadm -I -a-a -P tcp-s any/0 -D 127.0.0.1
ipfwadm -I -a-a -P tcp-s any/0 -D xxx.xx.xx.xx
ipfwadm -I -a-a -P tcp-s any/0 -D any/0 80 -r 8080
Once this is done, then configure Squid by following the below process. Please note that you need atleast Squid 2.x
to be able to make use of Transparent Proxies. Anyway, to configure Squid, edit the, /etc/squid/squid.conf file and make the following changes:
httpd_accel_host virtual
httpd_accel_port 80
httpd_accel_with_proxy on
httpd_accel_uses_host_header on
Then,restart Squid by typing:
/etc/rc.d/init.d/squid.init restart

Voila, your transparent proxy is configured and running!!! Anyway, have fun and watch out for updated versions of
this manual.

Monday, February 15, 2016

Basic Carding Tutorial

By this article I hope most of beginners will find answers of their most main
and chain – if you’l enter card in any place you see you won’t get stuff. Mainly this
chain includes two people – who card the stuff and who this stuff accept. For the
beginner do this both thing by himself is almost unreal. So let’s explore it deeper.

How to Use PGP

First I will give you a brief description on what PGP is:

Basically PGP stands for Pretty Good Privacy, it is a program that allows the user to encrypt and decrypt any type of data. The most common use  (at least on the dark net) is to encrypt the text messages you send, particularly between vendors and customers .

It is vital not to send your details unencrypted because odds are you are getting watched by someone you don’t want to know the contents of the message.

Now back to PGP:

Sunday, February 14, 2016

Deep web and Dark web

Most persons already heard about the deep web, most of us have no idea of what it really is or how to access it.

On this post I will tell you all about it so keep reading

deepweb