Wednesday, December 2, 2015

Monday, November 9, 2015

Content Marketing - Media Channels

By media channels, we mean the platform you decide to use in order to market your content. This is an important step of your overall content marketing strategy because the channel also determines what content you must create. For instance, if the channel is a blog, then the content you can create are feature stories, product announcements, etc. Similarly, if it’s your website’s Facebook Page, then the content can be images, status messages, weblinks, etc.
There are three major strategies that you must consider while defining your media channels:

Analysis of Your Situation

The first thing to do is to understand what existing channels do you have and which new ones you need or want.
  • Do you already have a Facebook Page for your website?
  • Do you need to develop a separate blog?
  • Will it help in telling your story effectively to your customers?
The information about your customers and the story you want to tell are both crucial in deciding what media channels you want. It also depends on your budget and bandwidth.

Your Channel Objectives

Now that you have a fair idea of your situation, you need to map the objectives of your channels. For instance, depending on the story you want to tell and your content marketing goals, you might decide that a blog would be the best channel. So your channel’s primary objective would be to get more subscribers to your blog, which will generate leads for your sales.

Content Plan for Your Channel

This is the part where you bring together your channel objectives and your content plan. Taking the above example, the primary objective of your blog is to get more subscribers, which brings in more leads. To achieve this, you might decide to write a couple of articles and club them together as an ebook, which you can then provide for free to new subscribers. However, before you decide the right content for your channel, you also need to consider the different personas of your customers.

Content Marketing - Content Creation

Marketing gurus and pundits have often repeated the line that it’s the company that tells a better story wins and not the company which is bigger in size. This truism is even more relevant today with the growth of new forms of online media, which have empowered consumers like never before.
However, the question still remains largely unanswered. How do you tell a better story? Do you create a 10x10 feet poster, listing out the features of your product, and stick it on every billboard in town or do you create a swanky television advertisement? Which is the option that will give you more business and more revenue? Well, to be honest, building a good story and creating great content requires much more than that. It requires you to answer the 3Ws:who, what, and why.
To create a great story around your business, you need to clearly answer the following:

Why are You Creating the Content?

Defining your content goals is the first step.
  • Why do you want to create a specific type of content?
  • What is it that you want to accomplish?
  • Does the content strategy match your overall business goals?
These are important questions that need to be answered.

Who are Your Customers?

It goes without saying that identifying your customers is the most important step of content marketing. You can refer to Part 2 of this tutorial to learn how to identify your customers. The bottom line is to list out the problems and preferences of your audience and figure out what kinds of content will they like best. Also, you need to answer the important question - what is the unique thing that you have to offer to you customers?

What do You Want Your Content to Achieve?

You must ask yourself - how will my content help my customers? Will it help them to arrange a travel, buy a house, or train for an examination? You need to clearly define and understand how your content will affect the lives of your customers?

Content Marketing - Target Customer

Identifying your target audience is the easy part. What is more challenging for a business is to understand the pain points of its customers. Once you grasp the problems of your consumers and understand their requirements, you would be able to come up with perfect solutions to cater to those particular requirements.
When you want to create a content marketing strategy, finding out about your audiences and their needs is the most important task. But how do you make sure that you have penned down the real problems of your customers and not just imagined them? You can do this by following the four steps mentioned below:

List Your Primary Customers

To accurately list your primary customers, give them specific names and identities. For instance, if you run a travel company, your audiences might fall under: experienced travelers, occasional travelers, tourists visiting a city, local residents touring the city, etc.

Collect Information about Your Customers

You can collect information about your major customers in a number of ways such as:
  • Conduct a survey of customers visiting your site
  • Ask your customer service for the questions customers are asking
  • Read the emails and feedback of customers on your Contact or Help page

Identify the Characteristics of Your Primary Customers

Identifying the characteristics of your primary customers means learning about your customers’ experiences. For example, experienced travelers might know about airport codes and e-tickets but occasional travelers might not. Such well-rounded information helps you to build content that caters to each and every customer’s needs.

Create Personas

The best way to visualize and understand a customer‘s needs is to create personas. While creating personas, give specific details to a customer, for instance:
  • Assign a name - John
  • Age - 45 years old
  • Profession - Senior IT manager
  • Web tasks - Reads technology news daily, books travel tickets, buys things on weekends, etc.

Digital Marketing

Content Marketing Tutorial

Content marketing is known by many names such as inbound marketing, corporate journalism, branded media, native advertising, and customer publishing to name a few. However, the basic idea behind the strategy remains the same, i.e., to create and distribute content that engages and attracts a targeted audience, while encouraging them to take action which is profitable to a business.

What is the Use of Content Marketing?

The growth of the World Wide Web, social networks, and mobile technologies has changed the relationship between consumers and businesses. Average consumers today don’t buy a product just by passively watching its advertisement on a billboard. They research on Google to compare similar products, read the product’s review online by experts, and even ask their friends on social networks, before spending their money.
As a result, businesses need to rethink their traditional marketing strategies and channels if they want to earn the trust of their customers and influence their buying decisions. This is where content marketing plays an important role. It helps businesses to attract potential consumers’ attention towards their products by highlighting and promoting their key features.

Content Marketing Strategy

Before you create a content marketing strategy for your business, you need to define the goals first. What are you trying to achieve with your content? Is it more subscribers to your blog? Or is it traffic acquisition? Or maybe, you want certain sales pages of your website to convert? Whatever they are, you need to clearly list the goals before you even begin laying down the strategy.
That being said, there are certain overarching elements to a content marketing strategy which are the same, regardless of your goals. They are listed in brief below, as we will look into them in detail later in this tutorial:
  • Understanding your customers
  • Building your brand message or story
  • Defining the content you want to create
  • Measuring the success of your content marketing efforts

Friday, October 23, 2015

php tutorial 2

PHP started out as a small open source project that evolved as more and more people found out how useful it was. Rasmus Lerdorf unleashed the first version of PHP way back in 1994.
  • PHP is a recursive acronym for "PHP: Hypertext Preprocessor".
  • PHP is a server side scripting language that is embedded in HTML. It is used to manage dynamic content, databases, session tracking, even build entire e-commerce sites.
  • It is integrated with a number of popular databases, including MySQL, PostgreSQL, Oracle, Sybase, Informix, and Microsoft SQL Server.
  • PHP is pleasingly zippy in its execution, especially when compiled as an Apache module on the Unix side. The MySQL server, once started, executes even very complex queries with huge result sets in record-setting time.
  • PHP supports a large number of major protocols such as POP3, IMAP, and LDAP. PHP4 added support for Java and distributed object architectures (COM and CORBA), making n-tier development a possibility for the first time.
  • PHP is forgiving: PHP language tries to be as forgiving as possible.
  • PHP Syntax is C-Like.

Common uses of PHP

  • PHP performs system functions, i.e. from files on a system it can create, open, read, write, and close them.
  • PHP can handle forms, i.e. gather data from files, save data to a file, thru email you can send data, return data to the user.
  • You add, delete, modify elements within your database thru PHP.
  • Access cookies variables and set cookies.
  • Using PHP, you can restrict users to access some pages of your website.
  • It can encrypt data.

Characteristics of PHP

Five important characteristics make PHP's practical nature possible −
  • Simplicity
  • Efficiency
  • Security
  • Flexibility
  • Familiarity

"Hello World" Script in PHP

To get a feel for PHP, first start with simple PHP scripts. Since "Hello, World!" is an essential example, first we will create a friendly little "Hello, World!" script.
As mentioned earlier, PHP is embedded in HTML. That means that in amongst your normal HTML (or XHTML if you're cutting-edge) you'll have PHP statements like this


   
   
      </span><span class="pln" style="box-sizing: border-box;">Hello World</span><span class="tag" style="box-sizing: border-box; color: rgb(0, 0, 136);">
   

      </span><span class="pln" style="box-sizing: border-box;">Hello World</span><span class="tag" style="box-sizing: border-box; color: rgb(0, 0, 136);">
   
php echo "Hello, World!";?>

PHP tutorial 1

The PHP Hypertext Preprocessor (PHP) is a programming language that allows web developers to create dynamic content that interacts with databases. PHP is basically used for developing web based software applications. This tutorial helps you to build your base with PHP.

Before proceeding with this tutorial you should have at least basic understanding of computer programming, Internet, Database, and MySQL etc is very helpful.


     
   
      </span><span class="pln" style="box-sizing: border-box;">Online PHP Script Execution</span><span class="tag" style="box-sizing: border-box; color: rgb(0, 0, 136);">      
   
php echo "

Hello, PHP!

"
; ?>

Tuesday, August 25, 2015

How to Hack Gmail , Facebook with Backtrack 5 or Kali linux

first open your backtrack terminal and type ifconfig to check your IP


Now Again Open Your Backtrack terminal and Type cd  /pentest/exploits/set
Now Open Social Engineering Toolkit (SET) ./set
Now choose option 2, “Website Attack Vectors”.


In this option we will select option 4 “Tabnabbing Attack Method”.
In this option we will choose option 2 “Site Cloner”.
Enter the URL of the site you want to clone. In this case http://www.gmail.com and hit enter. SET will clone up the web site. And press return to continue.
Now convert your URL into Google URL using goo.gl and send this link address to your victim via Email orChat.
When victim open in their browser it should be a message that the page is still loading. so victim start to open another tab. As soon as victim open new tab, our fake website start working. That script will redirect the victim to the phishing page your derived.


For Any help and Information Follow me on 

Tab Napping


         



Tab Napping is a new form of phishing that is hitting the internet now. With the conventional form of phishing, for example, you might receive an email that is supposedly from your bank, and it might ask you to login and update or confirm your account details, of course, there would be a link to your banks website in the email for you to click, which would take you to a page that looks identical to your real banks login page.
How does it worksTab napping is more sophisticated than the phishing scams we’ve seen so far, and it no longer relies on persuading you to click on a dodgy link. Instead it targets internet users who open lots of tabs on their browser at the same time (for example, by pressingCTRL + T). if you have multiple tabs open and you are reading the page on your current active tab, any of the other inactive browser tabs could be replaced with a fake web page that is set up to obtain your personal data, the web page will look exactly the same as the page you opened in the tab, you probably wont even even know it has been replaced with a fake page.fraudsters can actually detect when a tab has been left inactive for a while, and spy on your browser history to find out which websites you regularly visit, and therefore which pages to fake.This may surprise you, but phishers and fraudsters in general can actually detect when a tab has been left inactive for a period of time, which means they can spy on your browsing history, this tells them which websites and web pages you visit on a regularly basis, so they'll know which bank you use and which email account you use, whatever you view, they'll know about it, which means they'll know which fake pages to make to replace the real pages in your inactive tabs, you've now left yourself open to become a victim of tab napping.
How can you protect yourself against tab napping?  Here are five simple ways you can prevent yourself from falling victim: • Make sure you always check the URL in the browser address page is correct before you enter any login details. A fake tabbed page will have a different URL to the website you think you’re using.• Always check the URL has a secure https:// address even if you don’t have tabs open on the browser.• If the URL looks suspicious in any way, close the tab and reopen it by entering the correct URL again.• Avoid leaving tabs open which require you to type in secure login details. Don't open any tabs while doing online banking - open new windows instead (CTRL + N).
Download Tabnapping Script from Azkan website:
Note: Source link may be malicious, open as your own risk..

PRORAT HOW TO USE AND CONFIGURE FULL GUIDE






Requirements :


1. Prorat- Click here to download Trojan Prorat.
2. Hostname  -  Your IP address would probably be dynamic that it keeps changing everytime you disconnect and reconnect. You need a host name which always automatically keep pointing to your changing IP. Follow these steps -:



1. Log On to www.no-ip.com and register for an account.

2. Go to Hosts/Redirects -> Add Host and choose any free available hostname. Do not change any other option and simply click on Create Host.




3. Downloading and install their DNS update client available here http://www.no-ip.com/downloads.php Run it and enter your credentials. Update your host name and save it.

4. Lets check whether your IP has been associate with chosen host name or not. Go to command prompt and type 'ping yourhostname' (without quotes) , hopefully it should reply with your IP address.

Tutorial for configuring Trojan :


1. Open prorat.exe that you have downloaded.
2. Click on Create  and then Create ProRat Server





3.  Enter your host name in the ProRat Notification field as shown. Uncheck all other options.





4. Click on general settings Tab and have a look at server port,password, victim name. Remember these things.Check out and configure other options as per your need. You can bind server.exe with any genuine file, change its icon etc.





5. Finally click on create  server and now its ready to be sent to victim.  Once victim installs it, it would automatically disable antivirus/firewall



What after victim has run the server part ?
1.Click on ProConnective Tab and start listening to connections. Allow firewall if it asks you to open a port.
2.You will start listening to connections, I mean you will get a notification as shown when victim would be online.








This is for Education Purpose Only ..


Leave Thanks in comments if you like the post

Evil Twin attack

Evil Twin Attack is attack is frequently carried upon wireless access points with malicious intentions. This attack happens when...