Sunday, December 25, 2011

Things Google Should Do: Recommendations From a Blackhat

There’s been quite a few posts by Aaron lately about the things Google is doing wrong, so I figured I’d help Google out and give my boys running the most dominant tech company on Earth a couple of ideas on some things I’d love to do. Who am I? I’m just an anonymous blackhat with too many ideas. You see, I lack the scale and lobbyist army to pull off giant game-changing feats, so rather than just waste a fantasy.



Sell illegal drugs. There’s a reason people sell drugs: money, and lots of it. Rather than do the usual narcotics though, I think Google could specialize in flinging massive amounts of pharmaceutical grade contraband…you know, the kind of stuff you need to see three doctors, a pharmacist, and a priest for. And the best part is, if they continually sidestepped large pharma companies by pushing the product via misspellings of the brand name drugs, they could get away with it for like 5 years. No one would ever know! Oh, they did that? Yikes, the DOJ? Ok, moving on.

I’ll just chalk that up to them getting pinched for selling a legitimate product, a big brand turf war if you will. If that’s the case, Google should invest in figuring out all the top ecommerce KWs and give the list away to oversees peddlers of counterfeit goods. It isn’t drugs, but that Gucci knock-off at close to Gucci prices sure has a good margin on it when you’re artificially inflating CPC bids with phony quality score demotions. They should get right on that. Man, I am behind the curve again! Don’t worry G-men, I’ll wink and nod while you “aggressively” crack down on these searches that take less than 5 seconds to find.

Well, ok. They sold drugs and fake goods already. I suppose they could always profit from their Adwords customers multiple ways by interrupting the landing page destination process a few percentage points of the time and…I GOT IT…they could somehow use their ridiculously ubiquitous toolbar base to provide a “feature” that invites the end user to compare the price of the product the advertiser worked so hard to attract and paid Google directly for. Man these guys are good…er…bad. I’m getting jealous here. This is like Goldman Sachs execs in the extreme north 1% making a ton of money advising a client like Greece (the Adwords customer in this case) and then actively profit in the demise of that client by shorting its bonds (by using Google Related to earn that secondary revenue stream). HAHAHA. Oh man, the only way they could have done that any more beautifully is if the recommended pages were somehow funded by Google Ventures and crammed full of Adsense and Viglink.
Speaking of toolbars, I don’t think they are leveraging that toolbar install base enough. Yeah yeah, it is a browser extension or plug-in technically, and is governed by a fairly narrow permissible use TOS. But still, wouldn’t it be cool if they used it to hijack an install process onto various OS? That way they could push out all sorts of malware, spyware, and adware and maybe even circumvent the OS itself to push people into Chrome OS. Holy crap, that’s so awesome – take that Apple!
Come on, like Apple is a saint. We were all thinking of doing it. An OS is nothing though; what really turned Apple around as a company is its iPhone. If Google could have gotten advanced knowledge of its development behind a string of NDAs and a maybe a seat on Apple’s board in order to quickly produce a near identical product; that would be something. Oh. My. Schmidt. What’s even classier is refuting a dead man’s words and calling his final dying passion a lie. Siri, get me a lawyer. LOL
Eric Schmidt and the crew do make awesome spies; I can’t compete with that. I’m concerned that they aren’t spying enough though. Hey, wouldn’t it be swell if Google used those fancy street map cars that take naked pictures of me in the front yard and do something really special? I’m thinking grab EVERYTHING within signal range; the best way to make sure someone is using Google is to grab their router login, hack the logs, and check. My friends, I am in awe of your blackhatishness. Nmap is pretty cool huh G-men? Did you install some warez bots too while you’re in there?
Warez and crackz shouldn’t be scoffed at. Lots of traffic volume from China and Eastern Europe are from people looking for these things. Who cares if its illegal; if the first 6 things listed didn’t stop my law-skirting buddies at Google, I don’t think silly little copyright laws should slow them down.
And nothing should slow down the progress of making our kids literate, for a nice cut of the profits of course. The way I see it, Google is good at getting other peoples’ content; what if they just took all the books in the world and copied them? I bet the authors wouldn’t even blink an eye, since they just want their works discovered anyhow. Wahhh, you stole something I worked on for 3 years and put it on the web for “free” until ads are wrapped around it and I’m completely cut out of the process. Wahhh.
If the author’s guild didn’t even put a chink in the armor, Google’s Wolfram and Hart trained biz dev team may as well get more aggressive. Clearly no one has the teeth to make them obey any sort of law. Killing search dissenters is probably a little early in the game plan (table that for 2014), so why not just kill business models instead. Coupons? Nuke Groupon by launching your own product that uses Adwords data from Groupon’s campaign to fuel offer intelligence. That isn’t good enough though; what if they took a huge information repository, flat out scraped it, served it up as their own, and then penalized the guys they took it for with a duplicate content penalty. Wow man that’d be hilarious. Well, Matt Cutts did say roughly 40% of the DMCA complaints are phony. That’s probably just the case. ;)
DMCA got me thinking. All us SEOs are saying video is the next big wave of spam, so what Google really needs to do is pirate the video web in order to get ahead of the curve. Well then, surf’s up.
Killing is probably still out and coveting other people’s oxen seems kind of low margin, so maybe they could just steal some more stuff. Scraping has been done to death, but maybe they could steal software from others, sell it as their own, and hope they don’t notice. Too bad you got caught, but then ‘oracle’ does sort of imply they could see it happening in advance.


You know what…Google is doing way better than I ever could, mainly because being a blackhat mostly means doing boring things like buying links, not engaging in the kinds of criminal activities listed above. Kudos my dark arts brethren; you’ve taken this to a level that would leave me behind bars, and yet you STILL have people believing you are the stand against all that is evil. You truly are masters of deception; here, I have new logo for you.


Source

Tuesday, December 6, 2011

Instant SEO Analysis Tips

Usually Managers assign a task to check SEO status of a site and they will come back in 10 to 15 mints for the response. Is it possible to check SEO status of a site in 15 mints? I hope, Most of the SEO's will say No. However i would say YES.

SEO's might face the same problem while attending an interview, interviewers might ask you to analyze a site for 5 mints and requests to explain positive and negative factors of the site. There is a possibility to check all these factors with the help of few free tools.
Following are the list of respective factors which needs to be analyzed for a quick review:
Basic SEO Factors for Instant Analysis:
Domain Extension
Page Loading Time
Page Rank
Alexa Rank
Google, Bing & Yahoo Indexed Pages and Back Links
Domain Age
Canonical Redirection
Title & Meta Tags
Header Tags
Image Tags
Xml sitemap
Html sitemap
Robots.txt
Google analytics account
Google webmaster tools account

Each above factor will be explained in-detail in upcoming posts.


Source

Sunday, December 4, 2011

Get Google official SEO Guide for begineers

This book covers around a dozen common areas that webmasters might consider optimizing. We felt that these areas (like improving title and description meta tags, URL structure, site navigation, content creation, anchor text, and more) would apply to webmasters of all experience levels and sites of all sizes and types. Throughout the guide, we also worked in many illustrations, pitfalls to avoid, and links to other resources that help expand our explanation of the topics. We plan on updating the guide at regular intervals with new optimization suggestions and to keep the technical advice current.

Download Google SEO Guide

Friday, December 2, 2011

Shutdown the Computer Connected to LAN

Friend have a awesome trick you can use in your school, colleges and office to shutdown the computer which are in LAN network just follow the few steps:



You need admin right or access to connect to the LAN.

Open command prompt(c:\windows\system32\cmd.exe) or type "cmd" in start->Run

Now type “shutdown –i” (without quotes) or for more help you can use "shutdown /?" (without quotes)

Dilogue box will display

Add the computers which you make target

Now you have to choose the action(shutdown-restart-logoff).

Then set the time.

and then click ok work will start.

Monday, November 28, 2011

SMS Spoofing through BackTrack OS 5

Mobile communication is now everywhere, mobile hacking is seems to be difficult and a normal user, student and ethical hacker usually don't go towards the mobile hacking field. Mobile hacking is so general word and it contains hacking attack from physical layer to application layer of OSI model. Spoofing attack is not a new attack and you must have heard about IP spoofing, DNS spoofing and SMS spoofing.

In spoofing attack an attacker make himself a source or desire address. As previously discussed DNS spoofing by using Ettercap, this time we will discuss SMS spoofing by Social engineering toolkit on backtrack 5.
What Is SMS Spoofing?
Short message service (SMS) is now available on mobile phones, I, You and everyone using SMS for the communication. SMS spoofing means to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text/ another number. (Wikipedia).
I will discuss most of the theorical aspect here like how to perform SMS spoofing? How SMS spoofing work? And so many question.
SMS Spoofing Tutorial

Social engineering toolkit contain a SMS spoofing attack vector that can used to perform SMS spoofing. Requirement for tutorial:

Operating system (Backtrack 5 for this tutorial)
SET (Social engineering toolkit)
A Brain (important)

So I will use backtrack 5 to perform SMS spoofing however you can use Ubuntu, Gnacktrack, Backbox and other Linux or other OS.

1st step:

On the SET menu select number 7 that is SMS spoofing attack vector

2nd step:

On the second step “1. Perform a SMS Spoofing Attack”
On the third choose what you want to do a Mass SMS spoofing or a single in this case I select 1.
On the fourth you need to enter the number of the receiver, make sure to enter with country code.
On the next step 1. Pre-Defined Template
On this step you need to choose the templates (choose what you want)
If you have a android emulator that wonderful but you can use some paid services. So its up to you select and than send your message.

Source

Tuesday, August 16, 2011

How to translate Hacker's language (1)

1 -> i or l
3 -> e
4 -> a
7 -> t
9 -> g
0 -> o
$ -> s
| -> i or l
|\| -> n
|\/| -> m
s -> z
z -> s
f -> ph
ph -> f
x -> ck
ck -> x

Friday, April 1, 2011

To store your data up to 10GB on Online Website

Goto www.4shared.com
Make a ID and then upload your data upto 10GB.

Tuesday, January 11, 2011

Unblock Facebook!!!!!!!!

Now it is eato unblock facebook in Schools & Colleges
and here is the solution to unblock or unlock facebook & to bypass those stupid firewalls .

All you have to do is go to websites like

http:// hidemyass.com or http:// proxeasy.com

& enter whatever website you would want to unblock & BANG…. Facebook is unblocked & you can use the facebook with full features

Now if your network administrator is smart enough he will catch you when he sees a proxy website in your browsing history.

So lets bypass their smartness now.

Go to http://translate.google.com

now enter http://www.facebook.com in the large box on the left hand side, the box should look like the image shown below.



Click on the image to enlarge it.
in a few seconds you will see a link in the right hand side that says http://www.facebook.com

Click on that link.

Now it will take you the next page as shown below.




Click anywhere on the facebook logo or the text that says “go to facebook.com”

The entire facebook.com website will open without any problem. & Your network administrator will keep thinking you were browsing some foriegn website with a translator.

Enjoy & share the love if you like it.

Install Windows 7/Vista from USB Drive

Follow this page:

http://www.intowindows.com/how-to-install-windows-7vista-from-usb-drive-detailed-100-working-guide/

Install Windows XP in 15 Minutes

This tip will be very helpful for those who frequently install windows xp operating system

1. Boot through Windows XP CD.

2. After all the files are completely loaded, you get the option to select the partition. Select "c".
3. Now Format the partition, whether it is normal or quick with NTFS or FAT
4. Once the formatting is completed, All the setup files required for installation are copied. Restart your system by pressing Enter.
Now, here begins the Simple trick to save 10-15 minutes.
5. After rebooting, you get a screen where it takes 40 minutes to complete or finalize the OS installation.
6. Now, Press SHIFT + F10 Key -> This opens command prompt.
7. Enter "Taskmgr" at the command prompt window. This will open Task Manager.
8. Click the Process Tab, here we find a process called Setup.exe -> Right Click on Setup.exe -> Set Priority -> Select High or Above Normal. Initially it will be Normal.

Thats it, no more work to do. Relax ur self and see how fast the installation process completes

Hidden Control Panel items in Windows Vista and 7

How to Hide / Show Specific Control Panel Applets / Icons in Windows?
Microsoft has disabled some items in Control Panel in Windows Vista and 7 for no reason. Really, those hidden items are useful and might be very important for some users but for some unknown reason, those are hidden by default.
Today in this tutorial, we'll tell you how to enable those hidden items in Control Panel so that you can access them whenever you want.
1. Type regedit in RUN or Startmenu Search box and press Enter. It'll open Registry Editor.
2. Now go to following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Control Panel\don't load
3. The above mentioned key contains some .CPL entries in right-side pane which makes them hidden in Control Panel.

4. You can simply delete the "don't load" key and all hidden items will be enabled in Control Panel.
PS: Windows 7 users! Please read NOTE 1, NOTE 2 given at the end
before deleting the key.
NOTE 1: If you delete the whole "don't load" key in Windows 7, you might get some duplicate items in Control Panel e.g., you'll get 2 Keyboard, 2 Mouse, 2 Sound entries in Control Panel. To fix this issue, don't delete the whole key, instead only delete following entries from right-side pane:

hdwwiz.cpl
appwiz.cpl
ncpa.cpl
sysdm.cpl
desk.cpl
joy.cpl
Firewall.cpl
collab.cpl
irprops.cpl
tabletpc.cpl
bthprops.cpl
infocardcpl.cpl
NOTE 2: Windows Vista allows you to delete the registry key but Windows 7 will not allow you. You'll need to take permission on the key before deleting it. You can use following simple steps to take permission:
Right-click on the "don't load" key and select "Permissions...".
It'll open a dialog box, Click on "Advanced" button.
It'll open another dialog box, Go to "Owner" tab.
Select your Username from the list and click on "Apply" button and then OK.
Again click on OK button in the first dialog box.
Now again right-click on the same key and select "Permissions...".
Select your Username in the list and check the "Allow" option for "Full Control".
Click on Apply button and then OK.

To create folder lock without any software.

Just follow the following instructions
Open notepad
Copy this to notepad:

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==Type_your_password goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End



type the password in place of "Type your password" in the file
and then save as lock.bat
Now click on lock.bat file it will make a foler with name Loker then copy your data in this folder and then agin click on lock.bat it will hide.
if you want to see your data then again open lock.bat file and type your password then it will show your data.