Friday, August 26, 2011

How to add Adsense below post titles for Blogspot

How to Add Adsense Below Post Titles in Blogspot Blogs


Google Adsense is the most popular ad network on the planet. A lot of Blogger users also use it. It's an endless discussion where to place these ads on your blog for maximum exposure. The best ad places are around the header or above the posts or below the post titles. You can easily add adsense in your sidebar as a gadget. But Blogger doesn't allows us to directly place the ads below post titles. The ads below post titles have proven to be one of the most successful money making positions. So, what are you waiting for? Follow this tutorial to add your Adsense ads below post titles.

Please Note: I'm assuming that you're using the new Adsense interface.


Steps!

  1. Log in to your Google Adsense account by going to https://www.google.com/adsense/
  2. Go to My ads tab and open Ad units from the left side by expanding Content link.[View Screenshot for Help]
  3. Click new ad unit to create a new ad.[View Screenshot for Help]
  4. Select the size, type and color of your ad. For best results chose either 300x250 medium or 336x250 large rectangle.[View Screenshot for Help]
  5. Give your ad a remember-able name and ad a custom channel to track the ad performance. If you don't know anything about channels then leave that option.
  6. After filling required information, click save and get code button at the bottom of the page.[View Screenshot for Help]
  7. A pop-up window will appear with the ad code. Copy that code.[View Screenshot for Help]
  8. Before pasting the ad code in Blogger, we must make it compatible with Blogger format. So go tohttp://www.hacktrix.com/adsense-code-converter/ paste the ad code and convert it. You'll find the converted ad code in the bottom box there. Copy the converted ad code.
  9. Open your Blogger account and go to Design then Edit HTML tab and check Expand Widget Templates option.
  10. Press Ctrl + f & find you'll see some code like this:
  11.     
  12. Paste the converted ad code just before the above code. The result would look something like this:
  13.   
  14. Click the PREVIEW button to see the result. Thought you might not see ads below post titles instantly because sometimes Adsense ads take some time to display.
  15. After that save your template by clicking the SAVE TEMPLATE button.

Tip: Make Ads Appear Only on Post Pages


Usually, users don't like to see too many ads on a single page. So, we can hide the ads under post titles on main page. These ads will appear only when users will click the post title and go to the post page. To do that follow the steps above but after step 8 you have the converted ad code. Ad some more code in that converted code so that it should look like this:
 

What I did here is that I've added an if condition to make the ads appear only on post pages. After that, follow the steps above to complete the tutorial.

The new BlackBerry Torch

iPhone 5 Concept Features

How to track and wipe Android phone with Remote Phone Lock & Track Application

Free Android tracking app

Remote Phone Lock&Track is a very complete all round free Android security app that lets you track where your phone is at all times (using Wifi and GPS), this can be your own phone if it is lost or stolen or your partner or children’s phone to know where they are, in order to use the tracking capabilities you will need to install a second app, also free, called Phone Location Viewer.

Remote Phone Lock&Track app

Remote Phone Lock&Track app

After installing the Remote Lock&Track app the first thing you should do is to password protect it to make sure that nobody can change the settings, if anyone enters a password the app will show a fake SMS application hiding its tracking capabilities (paid for feature), be aware that tracking someone down without their knowledge is illegal nearly everywhere.

If your Android phone goes missing you can send it a predefined SMS command to either locate where the phone is, securely wipe Android internal memory, or just wipe the phone SD memory card data. You can limit the number of times someone attempts to guess the password to unlock the phone, once they have failed the password a determined number of times Android will wipe itself. The English interface of this app is functional but crowded with bulky orthographic mistakes.

Visit Remote Phone Lock&Track Android Market


Hardware firewall vs Software firewall

Software firewall basics

Software firewalls are most suitable for home users not running a network, they are installed in the operating system and only protect that particular machine, a software firewall will screen requests going in and out of the computer and determine whether the request between the client and the source is valid by looking at the predefined rules and verify the interaction.

For a software firewall to be effective, its configuration rules will need to be set up properly. One of the main differences between software firewalls and hardware firewalls is that software firewalls restrict Internet access by application and hardware firewalls work looking at the port and URL address.

Software firewall advantages:

  • Cheaper than a hardware firewall
  • Easier to configure than hardware firewalls
  • You can install a software firewall on a laptop and take it with you
  • Software firewalls application filtering makes them flexible
BitDefender Internet Security firewall

BitDefender Internet Security firewall

Software firewall disadvantages:

  • They don’t protect a whole network needing one copy for each computer
  • Software firewalls consume more CPU and memory resources than hardware firewalls
  • Software firewalls have less configuration options than hardware firewalls

Hardware firewall basics

A hardware firewalls is a device placed in between your computer and the Internet, they are harder to configure than software firewalls, the high end broadband routers can come with an embedded hardware firewall inside, these are targeted at the home user and much easier to set up than a proper hardware firewall for businesses.

Basic hardware firewalls use packet filtering, they scan packet headers to determine their source, origin and destination addresses, and whether the incoming traffic is related to an outgoing connection, such as a request for a website, this information is compared with the preset rules that determine whether the packet should be forwarded or blocked.

The most advanced hardware firewalls can do stateful packet inspection looking into the contents of the data packet and state of the connection allowing the firewall to make decisions about packets based on context as well as the defined rules.

Hardware firewall advantages:

  • A single hardware firewall can protect your entire network
  • They run on their own dedicated CPU and memory not taking away computer resources
  • Hardware firewalls can not be disabled by malware as easily as software firewalls can
  • A single hardware firewall can protect multiple computers not needing a license for each computer
  • Hardware firewalls still protect the computer when the operating system crashes
Hardware firewall WatchGuard XTM 2Series

Hardware firewall WatchGuard XTM 2Series

Hardware firewall disadvantages:

  • A single router firewall is considerably more expensive than a license for a single software firewall
  • Hardware firewalls are more difficult to configure than software firewalls
  • Hardware firewalls need physical space where to install it and cable layout
  • A hardware firewall protecting the whole network will affect multiple computers if it fails

What firewall to use?

The average home user will be well protected with a software firewall, they are easier to manage and much cheaper in price than a dedicated hardware firewall. Large corporations and schools with big networks will need a hardware firewall as they are more cost effective, representing good value for money when defending a large network of computers and not having to pay licensing fees.

When you use a firewall you still need antivirus and antispyware software installed in your computer, a firewall will protect you from intrusions while an antivirus protects you from malicious code running inside your computer.


Wednesday, August 24, 2011

How to encrypt your VoIP calls

Voice over IP calls are not secure

VoIP calls are transmitted over the Internet unencrypted, the data packets can easily be intercepted by a malicious hacker to record the calls and listening in, a simple packet sniffer like WireShark is all that it is needed to eavesdrop on a VoIP call, no high skills are involved.

How to encrypt VoIP calls

  1. Use Zfone to add encryption to your VoIP client: Zfone works on top of your unencrypted VoiP software watching for VoiP data packets going in and out of your computer, when it finds them it ciphers the packets encrypting the VoIP call, there is also a man-in-the-middle (MiTM) attack countermeasure by displaying a short authentication string for the user to verbally compare over the phone witht the other end, Zfone is open source software using the ZRTP protocol, there are no backdoors of any kind included.

    Before considering Zfone to secure your VoIP calls have into account that the software must be installed by both callers and Zfone does not work with Skype because Skype uses a closed source protocol not compliant with the standard VoIP protocol.

    Zphone VoIP encryption software

    Zfone VoIP encryption software

  2. Use a Virtual Private Network (VPN): A VPN like ibVPN can encrypt all of your internet traffic routing it through it’s encrypted OpeVPN tunnel, this will include all of your VoIP calls. Routing your VoIP calls through a VPN will slightly increase the bandwidth requirement and produce some CPU overhead.

    One benefit of using a VPN is that if your ISP or a corporate firewall is blocking VoIP calls using a VPN for VoIP will get around Internet filters, they won’t even know you are making a call, it will also get around state sponsored surveillance which is normally carried out at ISP level.

    Wiretapping VoIP password

    Wiretapping VoIP password

  3. Use VoiP software with built in encryption: Some VoIP clients like Skype have built-in encryption used to cipher VoIP data packets, if you adopt this solution to secure your phone calls, try to choose voice over IP software compatible with as many other VoIP clients as possible using open source encryption (not Skype) this will make it much harder to introduce a backdoor and it might not require the other end to have the same VoIP client installed for encryption to work.

    VoIP software using encryption: PhonerLite ; TiviPhone ; OctroTalk



Tq http://www.hacker10.com

How to Generate An SSL Certificate For Your Website

If you run a website which you need to serve via SSL, then this article is for you. The procedure for making your website SSL ready is quite simple. It involves -

  1. Generating a private key.
  2. Generating a Certificate Signing Request (CSR).
  3. Getting the CSR signed by a certificate authority - Verisign, Go Daddy, Thawt etc. (Be ready to shell out some money here).
  4. Uploading the private key, the CSR, and the certificate to your website.
  5. Configuring the SSL version of your site. And finally ...
  6. Enabling the SSL for your website.

ScoutApp has a nice article that explains the above steps in detail. Check it out.

Tq http://linuxhelp.blogspot.com

Quick and easy E-mail encryption using Safester

Review email encryption software Safester

Safester is a free email encryption program using public and private key encryption DSA/Elgamal 2048 bits andAES 256 bits to secure your messages, the program is written using Java, it works in Windows, MAC OS and Linux.

In order to use Safester to send encrypted emails the receiver and the sender both will need to have the software installed, if the receiver doesn’t have an account when he receives an encrypted message a notification from Safester will be sent with an invitation to download the program.

After downloading and installing Safester you will need to create an account, this will create your public and private key encryption keys, the passphrase you use it is not stored in the servers and only known to you, there is no way for Safester to recover your passphrase they do not have access to it and there is no backdoor, you can set up a password recovery email system from inside your account if you want, this is optional.

E-mail encryption software Safester

E-mail encryption software Safester

All of the encrytion is carried out locally in your computer, communications with Safester servers are encrypted, in the unlikely event that someone manages to intercept the transmission you would still be protected because no data ever leaves the computer unencrypted, the messages you send and receive are archived encrypted in Safester servers in Switzerland. The free version of this email encryption service allows for a 20MB of email storage Inbox and email attachments have 512Kb maximum size, there are paid for plans for those who need personalized support, a bigger storage inbox and sending larger attachments.

I found the email client very lean in features, you can compose messages in HTML, there is a built-in spell checker for English and French, vacation auto-responder, proxy settings, address book and message folders, it is enough to get the job done but without bells and whistles.

One of Safester’s best features it is the ability of setting up double authentication using your smart phone and your passphrase to log into your email account, the One Time Authentication system works with the iPhone and Android.

Email encryption Safester advantages

  • Easy maintenance free email encryption for newbies (no learning required)
  • You can use any email address you like (Hotmail, Yahoo, etc)
  • Email client can restrict printing and forwarding of emails
  • Email client can be configured to send messages using a proxy

Email encryption Safester disadvantages

  • Both, sender and receiver need to have Safester installed
  • You are forced to use Safester’s own email client (which is very simple)
  • Your need to trust a third party with your security

Safester review conclusion

I you are a geeky person who knows how to use GPG/PGP to encrypt emails, you will be better off using your own software for email encryption (e.g. Enigmail), this way you will not have to rely on a third party to take care of your security and you will be able to use any email client you like for encryption without forcing others to download the same software you have installed.

OpenPGP email encryption program Safester

OpenPGP email encryption program Safester

If you have a company and do not have the time and resources to train your workers in email security and encryption, Safester is for you, anyone who knows how to send an email can use Safester, encryption could not get any easier, the great advantage Safester has over any other email encryption software it is simplicity and easy to use, Safester will save businesses money by not having to spend time on training staff.

Visit Safester homepage


Tq http://www.hacker10.com

Freeware programs for full disk encryption

Why use full disk encryption

If you encrypt your whole hard drive including your operating system you will not have to worry about wiping data, clearing the Internet browser cache, deleting temporary files and encrypting individual files, all you will have to worry about is choosing a strong passphrase that can not be broken using a brute force attack (trying dictionary words).

The only way to access a fully encrypted operating system is by getting access to the computer while it is switched on (decrytped), you will save lots of time if you decide to encrypt your full operating system, it is not difficult and there is free software for that. Windows Vista and 7 come with BitLocker Drive Encryption for full disk encryption but only the more expensive business high end editions do and it has been designed for businesses with few home user features.

Full disk encryption software without backdoor

Truecrypt (Free): It’s wizard driven menu will guide you through the whole encryption process, there are many algorithm choices, if you do not understand what they mean leave all of the default choices on, they are secure enough for everyone. Truecrypt can encrypt external devices, create virtual encrypted drives and create a hidden encrypted operating system, to be used if you are forced to give up the password.

You will find it easy to find support for Truecrypt at computer security forums and Usenet groups as it is one of the most used full disk encryption programs.

Truecrypt encryption algorithm

Truecrypt encryption algorithm

DiskCryptor (Free): Open source encryption software, it can encrypt partitions that have already data on them, it supports AES, Twofish and Serpent encryption algorithms, allows you to encrypt USB flash drives and external hard disks with automatic mounting, support for key files, option to place the boot loader on an external device.

DiskCryptor full disk encryption

DiskCryptor full disk encryption

kunkun-laptop .... ;)