Tuesday, February 2, 2016

SEO - Web Site Domain

When you start thinking of doing a business through internet, the first thing that you think about is your website domain name. Before you choose a domain name, you should consider the following:
  • Who would be your target audience?
  • What you intend to sell to them. Is it a tangible item or just text content?
  • What will make your business idea unique or different from everything else that is already avilable in the market?
Many people think it is important to have keywords in a domain. Keywords in the domain name are usually important, but it usually can be done while keeping the domain name short, memorable, and free of hyphens.
Using keywords in your domain name gives you a strong competitive advantage over your competitors. Having your keywords in your domain name can increase click-through-rates on search engine listings and paid ads as well as make it easier to use your keywords in get keyword rich descriptive inbound links.
Avoid buying long and confusing domain names. Many people separate the words in their domain names using either dashes or hyphens. In the past, the domain name itself was a significant ranking factor but now search engines have advanced features and it is not a very significant factor anymore.
Keep two to three words in your domain name that will be easy to memorize. Some of the most notable websites do a great job of branding by creating their own word. Few examples are eBay, Yahoo!, Expedia, Slashdot, Fark, Wikipedia, Google, etc.
You should be able to say it over the telephone once, and the other person should know how to spell it, and they should be able to guess what you sell.

Guru Mantra

Finally, you should be able to answer the following questions:
  • Why do you want to build your website?
  • Why should people buy off your site and not from other site?
  • What makes you different from others?
  • Who are your target audience and what do you intend to sell?
  • List 5 to 10 websites that you think are amazing. Now think why they are amazing.
  • Create 5 different domain names. Make at least 1 of them funny. Tell them to half a dozen people and see which ones are the most memorable. You will get more honest feedback if the people do not know you well.
  • Buy your domain name that is catchy, memorable, and relevant to your business.

SEO - Tactics & Methods

SEO techniques are classified into two broad categories:
  • White Hat SEO - Techniques that search engines recommend as part of a good design.
  • Black Hat SEO - Techniques that search engines do not approve and attempt to minimize the effect of. These techniques are also known as spamdexing.

White Hat SEO

An SEO tactic is considered as White Hat if it has the following features:
  • It conforms to the search engine's guidelines.
  • It does not involve in any deception.
  • It ensures that the content a search engine indexes, and subsequently ranks, is the same content a user will see.
  • It ensures that a web page content should have been created for the users and not just for the search engines.
  • It ensures good quality of the web pages.
  • It ensures availability of useful content on the web pages.
Always follow a White Hat SEO tactic and do not try to fool your site visitors. Be honest and you will definitely get something more.

Black Hat or Spamdexing

An SEO tactic, is considered as Black Hat or Spamdexing if it has the following features:
  • Attempting ranking improvements that are disapproved by the search engines and/or involve deception.
  • Redirecting users from a page that is built for search engines to one that is more human friendly.
  • Redirecting users to a page that was different from the page the search engine ranked.
  • Serving one version of a page to search engine spiders/bots and another version to human visitors. This is called Cloaking SEO tactic.
  • Using hidden or invisible text or with the page background color, using a tiny font size or hiding them within the HTML code such as "no frame" sections.
  • Repeating keywords in the metatags, and using keywords that are unrelated to the website content. This is called metatag stuffing.
  • Calculated placement of keywords within a page to raise the keyword count, variety, and density of the page. This is called keyword stuffing.
  • Creating low-quality web pages that contain very little content but are instead stuffed with very similar keywords and phrases. These pages are called Doorway or Gateway Pages.
  • Mirror websites by hosting multiple websites - all with conceptually similar content but using different URLs.
  • Creating a rogue copy of a popular website which shows contents similar to the original to a web crawler, but redirects web surfers to unrelated or malicious websites. This is called page hijacking.
Always stay away from any of the above Black Hat tactics to improve the rank of your site. Search engines are smart enough to identify all the above properties of your site and ultimately you are not going to get anything.

SEO - What is SEO?

EO stands for Search Engine Optimization. SEO is all about optimizing a website for search engines. SEO is a technique for:
  • designing and developing a website to rank well in search engine results.
  • improving the volume and quality of traffic to a website from search engines.
  • marketing by understanding how search algorithms work, and what human visitors might search.
SEO is a subset of search engine marketing. SEO is also referred as SEO copyrighting, because most of the techniques that are used to promote sites in search engines, deal with text.
If you plan to do some basic SEO, it is essential that you understand how search engines work.

How Search Engine Works?

Search engines perform several activities in order to deliver search results.
  • Crawling - Process of fetching all the web pages linked to a website. This task is performed by a software, called a crawler or a spider (or Googlebot, in case of Google).
  • Indexing - Process of creating index for all the fetched web pages and keeping them into a giant database from where it can later be retrieved. Essentially, the process of indexing is identifying the words and expressions that best describe the page and assigning the page to particular keywords.
  • Processing - When a search request comes, the search engine processes it, i.e. it compares the search string in the search request with the indexed pages in the database.
  • Calculating Relevancy - It is likely that more than one page contains the search string, so the search engine starts calculating the relevancy of each of the pages in its index to the search string.
  • Retrieving Results - The last step in search engine activities is retrieving the best matched results. Basically, it is nothing more than simply displaying them in the browser.
Search engines such as Google and Yahoo! often update their relevancy algorithm dozens of times per month. When you see changes in your rankings it is due to an algorithmic shift or something else outside of your control.
Although the basic principle of operation of all search engines is the same, the minor differences between their relevancy algorithms lead to major changes in results relevancy.

What is SEO Copywriting?

SEO Copywriting is the technique of writing viewable text on a web page in such a way that it reads well for the surfer, and also targets specific search terms. Its purpose is to rank highly in the search engines for the targeted search terms.
Along with viewable text, SEO copywriting usually optimizes other on-page elements for the targeted search terms. These include the Title, Description, Keywords tags, headings, and alternative text.
The idea behind SEO copywriting is that search engines want genuine content pages and not additional pages often called "doorway pages" that are created for the sole purpose of achieving high rankings.

What is Search Engine Rank?

When you search any keyword using a search engine, it displays thousands of results found in its database. A page ranking is measured by the position of web pages displayed in the search engine results. If a search engine is putting your web page on the first position, then your web page rank will be number 1 and it will be assumed as the page with the highest rank.
SEO is the process of designing and developing a website to attain a high rank in search engine results.

What is On-Page and Off-page SEO?

Conceptually, there are two ways of optimization:
  • On-Page SEO - It includes providing good content, good keywords selection, putting keywords on correct places, giving appropriate title to every page, etc.
  • Off-Page SEO - It includes link building, increasing link popularity by submitting open directories, search engines, link exchange, etc.EO stands for Search Engine Optimization. SEO is all about optimizing a website for search engines. SEO is a technique for:
    • designing and developing a website to rank well in search engine results.
    • improving the volume and quality of traffic to a website from search engines.
    • marketing by understanding how search algorithms work, and what human visitors might search.
    SEO is a subset of search engine marketing. SEO is also referred as SEO copyrighting, because most of the techniques that are used to promote sites in search engines, deal with text.
    If you plan to do some basic SEO, it is essential that you understand how search engines work.

    How Search Engine Works?

    Search engines perform several activities in order to deliver search results.
    • Crawling - Process of fetching all the web pages linked to a website. This task is performed by a software, called a crawler or a spider (or Googlebot, in case of Google).
    • Indexing - Process of creating index for all the fetched web pages and keeping them into a giant database from where it can later be retrieved. Essentially, the process of indexing is identifying the words and expressions that best describe the page and assigning the page to particular keywords.
    • Processing - When a search request comes, the search engine processes it, i.e. it compares the search string in the search request with the indexed pages in the database.
    • Calculating Relevancy - It is likely that more than one page contains the search string, so the search engine starts calculating the relevancy of each of the pages in its index to the search string.
    • Retrieving Results - The last step in search engine activities is retrieving the best matched results. Basically, it is nothing more than simply displaying them in the browser.
    Search engines such as Google and Yahoo! often update their relevancy algorithm dozens of times per month. When you see changes in your rankings it is due to an algorithmic shift or something else outside of your control.
    Although the basic principle of operation of all search engines is the same, the minor differences between their relevancy algorithms lead to major changes in results relevancy.

    What is SEO Copywriting?

    SEO Copywriting is the technique of writing viewable text on a web page in such a way that it reads well for the surfer, and also targets specific search terms. Its purpose is to rank highly in the search engines for the targeted search terms.
    Along with viewable text, SEO copywriting usually optimizes other on-page elements for the targeted search terms. These include the Title, Description, Keywords tags, headings, and alternative text.
    The idea behind SEO copywriting is that search engines want genuine content pages and not additional pages often called "doorway pages" that are created for the sole purpose of achieving high rankings.

    What is Search Engine Rank?

    When you search any keyword using a search engine, it displays thousands of results found in its database. A page ranking is measured by the position of web pages displayed in the search engine results. If a search engine is putting your web page on the first position, then your web page rank will be number 1 and it will be assumed as the page with the highest rank.
    SEO is the process of designing and developing a website to attain a high rank in search engine results.

    What is On-Page and Off-page SEO?

    Conceptually, there are two ways of optimization:
    • On-Page SEO - It includes providing good content, good keywords selection, putting keywords on correct places, giving appropriate title to every page, etc.
    • Off-Page SEO - It includes link building, increasing link popularity by submitting open directories, search engines, link exchange, etc.

Monday, February 1, 2016

How to hack ISP for free Internet [Bypass login page]

Hello, In this particular post, I m gonna share with you an awesome trick to bypass your ISP login page and gain internet access for free. This trick is work on allWAN networks except Dial-up networks. Networks which uses a username and password to connect are known as PPPoE will not work with this trick because every client uses a different username and password. But it will work on Static IP and DHCP networks!

Required Software:

Netcut: This is a software which finds IPs and MAC or Physical addresses of the connected clients in your network. There are hundreds of users and sometimes thousands in a particular ISP. This software has a user-friendly interface which is quite easy for beginners.

Steps for Getting Free Internet!

  1. Download Netcut
  2. Install Netcut and run it.
  3. Now, you have to allow perhaps 10 seconds for the software to scan the connected clients and show their information.
  4. Now, as mention earlier that it will only work on DHCP and Static IP networks. You have to choose any one client and copy down it’s MAC Address and IP address in Notepad.
  5. Now we will have to change our computer’s Physical address and IP address. First of all, you have to go to Network and Sharing Center. Then click on Change Adapter Settings and right click on your adapter name and then click on Properties.
  6. Now click on Configure and move to Advanced tab. Then look forNetwork Address in the list, and then you will find that it is set to Not Present. Now tick or check Value and type the MAC address you copied from Netcut. This will restart your adapter, so wait 10 seconds until it reconnects properly.
  7. Now, it’s time to apply the IP we copied from Netcut. Now right click on your adapter name and click on Internet Protocol Version 4 (TCP/IPv4) and click on Properties. Now click on Use the following IP address.
    Fill the blanks like this:
    IP Address: Put the IP you got from Netcut.
    Subnet Mask: Use the same subnet mask you got from your ISP.
    Default Gateway: Use the same gateway IP you got from your ISP.
    To find the Subnet mask and Default gateway, you have to open upCommand Prompt and type this command: IPCONFIG and you will find the subnet mask and gateway.
Congrats: You now have a free internet connection!
Note: 
If one client is not working, use another!

How does it Work?


For example, you are trying to access Google but when you press enter, instead of going to Google, it will redirect you to the ISP login page or ISP Website. So when you change your MAC and IP addresses, you change your identity and you get access to the internet.
This trick can also speed up your internet. If the client you choose is from a big company and uses an internet package which has a greater speed, you will get the same speed as they get.
I think, this post will help you with getting free internet.

If you are using a Router

Hey guys, I got a huge number of questions on how to apply this on routers because routers have become a common device which almost 90% of the Internet users use. Well, I tried this and succeeded. Let’s see how you can do this on your Router.
I don’t know all the router’s interface but this option is known as MAC Clone. You can change your MAC address to the address you found on Netcut. Also change your router connection setting to Static IP if it’s set to DHCP. You have to set the IP as shown above. I hope that will help because it worked for me and I was enjoying the free internet with my family. ðŸ˜€

Sunday, January 31, 2016

How To Create A Super Secure Password To Defeat Hackers

create-strongest-password


Deciding a security-focused password is tougher that one might think. Even the most security conscious users commit the mistake of forming their passwords using personal information or other predictable combinations. Today, we bring to you an interesting infographic that tell you the tips to make the perfect password.
With the ever-increasing hacking attacks, the importance of a super strong password can’t be denied. In the year 2015, we saw an insane amount of hacking attacks that leaked people’s personal data and costed the multinationals millions. Throughout the year, we told you about various attacks and how to protect your digital life with simple precautionary steps.Just knowing about DDoS and SQL injectionattacks isn’t enough. At many occasions, even security experts commit the sin of using an easy password that makes the job of hackers easier. In this article, we are going to tell you about the basics of a strong password and how it can help you to secure your data.
When we are talking about a strong password, we mean passwords that about are 8 to 15 characters long. The passwords must seem gibberish to you (and others), consisting of upper and lower case characters, digits, and symbols.
You can try using made-up phrases and incomplete works in passwords. Avoid using dictionary words and keyword patterns. Changing the passwords regularly is also advised.
Today, we are bringing to you an eye-opening infographic from WhoIsHostingThis that tells you the best practices to make passwords.
Take a look:

how-create-super-stong-password

Networking Basics - IP address, netmasks and subnets

In this tutorial, we will cover some networking basics. We won't be hacking anything, but by the end of the tutorial you'll learn a lot of things which will be useful later, especially when you'll use nmap. Please note that it is advised that you go through wikipedia pages of all the concepts covered here since the discussion won't be exhaustive in any way.

IP address

An IP address is simply a 32 bit address that every device on any network (which uses IP/TCP protocol) must have. It is usually expressed in the decimal notation instead of binary because it is less tedious to write it that way. For example,
Decimal notation - 192.168.1.1
Binary  - 11000000.10101000.00000001.00000001
It is clear from the binary form that the IP is indeed 32 bits. It can range from 0.0.0.0 to 255.255.255.255 (for the binary all 0s and all 1s respectively) [A lot of time, the first octet usually goes upto 127 only. However, we aren't concerned with that here.]


Parts of an IP address

Now this IP address has 2 parts, the network address and host address. A lot of wireless routers keep the first 3 octets (8 bits, hence octets) for the network address and the last octet as host address. A very common configuration being 192.168.1.1 . Here, 192.168.1.0 is the network address and 0.0.0.1 is host address. I hope you can see that the host address can vary from 0.0.0.0 to0.0.0.255 (though usually 0 and 255 are reserved for the network and broadcast respectively).



Need for Netmasks

But different networks have different needs. The previous configuration lets you have a lot of different possible networks (the first 3 octets are for the network and can take different values, not just192.168.1.0) but only 256 (254 actually) hosts. Some networks may want more hosts (more than 255 hosts per network). This is why there is no "hardcoded" standard enforced on networks for the network and host addresses, and instead, they can specify their own configuration. The first 3 octets being network address and last octet being host address is common, but in no way mandatory. UsingNetmasks, we can have very versatile set of configurations, for each and every need.



Netmask

A netmask is used to divide the IP address in subnets. 
We'll start with a basic example. Suppose we want to define a netmask which configures our network like wireless router in the previous example. We want the first 3 octets to correspond to the network and next 1 octet for host address. 
Let's think of an operation which we can use to separate the network and host part of the IP address. For simple purposes, we could have just defined after which octet does the host part start [basically saying that anything after the third period(.) is host address]. While this is a simple solution, it is not very versatile. 
A more elegant and mathematical solution was proposed.



Netmask - Working

First I'll tell you the mathematical functionality of a netmask. Assume to be an IP address and to be a netmask. Then, 
A & M gives the Network address
A & (~M) gives the Host address.
Where,
is bitwise And
is bitwise Not (i.e. complement, 1s complement to be more precise)

So, basically a netmask is another 32 bit binary number (just like an IP address), but with the purpose of giving Host address and network address when the operation bitwise and is carried out on it (and it's complement) with A.



Example

You'll understand better with example.
A = 192.168.1.1 is you IP address
M = 255.255.255.0
We convert it  to binary, and then carry out the desired operations.


A   =    11000000.10101000.00000001.00000001  (192.168.1.1)
M   =    11111111.11111111.11111111.00000000  (255.255.255.0)
A&M =    11000000.10101000.00000001.00000000  (192.168.1.0)
A&M is network IP that we desired


A   =    11000000.10101000.00000001.00000001  (192.168.1.1)
~M  =    00000000.00000000.00000000.11111111  (0.0.0.255)
A&~M=    00000000.00000000.00000000.00000001  (0.0.0.1)
A&~M is host IP that we desired




Explanation

Basically, if you realize that 11111111 is 255 in decimal, then you can see that for the parts of the IP address that you want for networks, you set the subnet to 255, and for the ones you want for host, you set it to 0.
So, if you want to reserve 2 octets for networks and 2 for hosts, then the subnet will be-
M = 255.255.0.0
If you want 3 octets for host, then
M = 255.0.0.0
Hence, we can see that using netmasks we can achieve what we wanted, i.e. to define networks with whatever number of hosts we require. Now we go a bit further.


Subnets

Now suppose you want to divide your network into parts. It is the sub-networks that are known as subnets (it is correct to call them subnetwork as well). 
We'll jump right to it, consider the netmask M
M = 11111111.11111111.11111111.11000000
Now, the first 3 octets describe the network. But the 4th octet, which is supposed to be for the host, has the 2 most significant bits (i.e. leftmost bits) as 1. Thus, the 2 most significant (leftmost) bits of the 4th octet will show up when we carry out the bitwise AND operation. They will, thus, be a part of the network address. However, they belong to the host octet. Thus, these 2 bits, which belong to the host octet but show up in the network IP address divide the network into subnets. The 2 bits can represent 4 possible combinations, 00, 01, 10 and 11, and hence the network will have 4 subnets. 


Example of Subnetwork

Back to our previous "A",


A   =    11000000.10101000.00000001.xx000001  (192.168.1.1)
M   =    11111111.11111111.11111111.11000000  (255.255.255.192)
A&M =    11000000.10101000.00000001.xx000000  (192.168.1.0)


Earlier, irrespective of what was there in 4th octet of A, we would have got all 0s in 4th octet of A&M i.e. network address. This time we will get the 2 most significant bits in the network address. Four subnets will be formed depending on the value of xx (which can be 00,01,10 or 11). Now, we will see which subnet has which set of hosts.


Which subnet has which hosts

11000000.10101000.00000001.00000000
has hosts 192.168.1.0-63 (00000000 to 00111111)

11000000.10101000.00000001.01000000
has hosts 192.168.1.64-127 (01000000 to 01111111)

11000000.10101000.00000001.10000000
has host 192.168.1.128-191 (10000000 to 10111111)

11000000.10101000.00000001.11000000
has host 192.168.1.192-255 (11000000 to 11111111)

So the netmask M divided the network into 4 equal subnets with 64 hosts each. There are some subnets which are much more complicated and have their applications in certain specific areas. I recommend going through Wikipedia page on Subnetworks to get some more idea. I have covered enough and now you can understand Wikipedia;s content on the topic without any difficulty.


Some Special IPs

0.0.0.0 = All IPs on local machine. Anything hosted on this IP is available to all devices on the network.

127.0.0.1 = LocalHost, this loops back to the machine itself.

255.255.255.255 = Broadcast, anything sent to this IP is broadcasted (like radio is broadcasted to everyone) to all hosts on the network.


Finally

You see the notation in this pic?  
This way of representing subnets using /24, /25, /26, etc. is quite useful while doing vulnerability scans on networks (using nmap, etc.). /24 represents the netmask 255.255.255.0 , the first example we took of Wireless router. It is the most common configuration you'll use while doing nmap scan. The one we discussed later, in the subnets section, is /26. It has 4 subnetworks. /25has 2 subnets. /27 has 8. /31 has 128 subnets! In this subnet, only 2 host can be there per network, and it is used for 1 to 1 or point to point links. I hope the next time you have to deal with networks, you won't be having difficulties. There are topic like Multicast etc. which build up on this, and you can do further reading on them. That was all for this tutorial. Good luck.


Evil Twin attack

Evil Twin Attack is attack is frequently carried upon wireless access points with malicious intentions. This attack happens when...