30 Nov 2015

Avoid Google Adsense Main Violations



"Google Ad Sense is the best ways to monetized your blog. You need to do more than just getting your blog or Website ready before you apply for Google Ad Sense. You also need to Follow the rules. Even Small mistake put you at risk of being banned. Here are some of the most common Google Ad-Sense violations that can get you banned."


Ads on Pages with Little Content:

Make sure you your Google Ad Sense ads are being displayed. Do not let ads run on 404 error pages, “Thank youpages, “unsubscribe” pages, or any other pages with very little content. Google Ad Sense considers this deception as visitors may believe the ads is the content.

Using  Google Ad Sense with Banned Content:

Many types of content that cannot be used with Google Ad Sense. The list of band content for Google Ad Sense publishers are:

  1. Content advocating against a person, organization, or group
  2. Content related to hacking or cracking
  3. Weapon or violence-related content
  4. Promoting prescription medications
  5. Counterfeit merchandise
  6. Excessive profanity
  7. Copyright material
  8. Adult content
  9. Illegal acts
  10. Gambling

If any page on your blog discusses or promotes any of these banned topics and you have Google Ad Sense ads anywhere on your blog or website or blogger you are violating the rules.

Content in an Unsupported Language:

Google Ad Sense program supports several languages. If you have a non-English blog, make sure you do not have content in a language that is not supported when you run Google Ad Sense ads.

Clicking Your Own Ads:

While this is certainly the most rule you should not break it’s surprising how many bloggers click on their own ads. Under no circumstances should you click your own ads, employ tricks like logging in with a different IP address to click ads, or getting friends to click ads for you. If you want to visit a destination page, use the Google Ad Sense Publisher Toolbar to test click ads without violating any rules.


Cpyrighted Material:

There are many ways to violate your Google Ad Sense agreement with copyrighted material Make sure there are no copyrighted music, videos, images, or content on your website. This rule is often violated by bloggers who use copyrighted images for their posts by using Google Images search and bloggers who post duplicate content.

Inciting Ad Clicks:

Make sure you are not Duplicate users or trying to incite ad clicks by asking people to click ads or attempting to draw the eye to the ads.

Sharing Earnings:

Avoid discussing your Google Ad Sense earnings in detail with other people. Earnings online do not share other stats like your CPM or CTR.

23 Oct 2015

how to download VU lectures on youtube easy way

If you are problem to download vu lectures on youtube then you open the "hiload.org" in new tab and then


hiload.org-----> youtube----> search your code in search bar then press enter.


For example : CS101_Lecture01, MTH101_Lecture01, ENG101_Lecture01, etc


list of video will be appear on your screen interface.


Select your download lecture for example "CS101_Lecture01"



1- for direct save you click 1. video direct save on your browser.if you close the browser during the downlaoding . you will be lost your video.
2- copy the link URL paste to add URL download manager.in the download manager if you PC will be shutdown suddenly to will not lost you video. you can resume you video there.
3- for next video download click on 3 . or follow the uper process








  1.  for direct save you click 1. video direct save on your browser.if you close the browser during the downlaoding .
  2. copy the link URL paste to add URL download manager.in the download manager if you PC will be shutdown suddenly to will not lost you video. you can resume you video there. 
  3. for next video download click on 3 . or follow the uper process


  1. copy the link URL paste to add URL download manager.in the download manager if you PC will be shutdown suddenly to will not lost you video. you can resume you video there. 



14 Oct 2015

Top Wifi Hacking Tools And Ways


In today's world everyone wants to access the internet through the WiFi for high speed.WiFi hacking was done before on Linux distribution now it can be done on the windows too.Today we brought you top 5 WiFi hacking tools which will help in hacking the WiFi using the windows and Linux.




1. NET CUT (windows)

This driver package and install the upgrade under Windows 32-bit and 64-bit is .tested both. Net-cut network will disconnect any WiFi device. There's a device on the same network connection to the Internet for the Android application use is WiFi kill. WiFi connection on your device and get the entire network.


2. NET STUMBLER (windows)

Net-stumbler also known as network stumbler ,this is a windows based tool can easily find wireless signals being broadcast within range .


3. AIR CRACKING (Linux tool)

AIR CRACKING WiFi it famous for hacking WiFi password cracking tool that helps is one.The Packet Sniffer, wireless network detector, WEP and WPA / WPA2-PSK cracker and includes analysis tool for wireless LAN's.


4. KISMET (Linux tool)

Kismet is an 802.11 layer 2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT. Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, anti cloaking) hidden networks, and inferring the presence of non beaconing networks via data traffic.


5. SWS SCANNER

it is specially designed to make a whole war driving process a lot easier.it can also manage many tasks related with wireless networking.


Top 9 Facebook Hacking Techniques And Ways

Facebook is one of the most used social networking site with million users, as a reason if which it has become the number 1 target of hackers have, I have written a couple of post related to facebook hacking here. I mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2015, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the Top 9 Facebook Profile Hacking Techniques .


1. Facebook Phishing


Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims “Email Address” and “Password” is stored in to a text file, The hacker then downloads the text file and gets his hands on the victims credentials.




2. Keylogging 


Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.



3. Stealers


Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are softwares specially designed to capture the saved passwords stored in the victim's browser, Stealers once FOOD can be extremely powerful.



4. Session Hijacking


In a session hijacking attack, connection for a hacker to access victims' accounts on a Web site used to authenticate a user uses the browser cookie stole the victims: an HTTP fees If you are accessing your session hijacking can often be very dangerous, session hijacking is widely used LAN.


5. Sidejacking With Firesheep

The attacker and the victim is on the same WiFi network, but it is still popular now a days, attacks were common in late 2010 Sidejacking, Firesheep side jacking widely used to attack, Firesheep works. HTTP session hijacking attacks as a side jacking another name, but it is targeted by the WiFi users.


6. Mobile Phone Hacking

Millions of Facebook users through their mobile phone to access Facebook. The hacker then perhaps his / her Facebook account can access the victims can access the mobile phone. A cell phone is used to monitor many of them are mobile software.


7. DNS Spoofing 

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.

8. USB Hacking 

If an attacker has physical access to your computer, they just automatically store passwords in the browser program with a function to extract a USB is inserted, you also get access to the link below which can be read by the attack is posted on

9. Man In the Middle Attacks


The victim and the attacker on the LAN and are on a switch based network, a hacker client and server W / B can place himself or he, ARP poisoning capture all traffic because of the default gateway can act as gateways to the other name for the man in the middle attacks, a very broad topic and is beyond the scope of this article.


10.Botnets


Botnets are not commonly used for hacking facebook accounts, because of it’s high setup costs, They are used to
carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is 
same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the 
compromised computer.  Some of the most popular botnets include Spyeye and Zeus.


10 Oct 2015

Low level languages




"In computer science, a low-level programming language is a programming language that provides little or no abstraction from a computer's instruction set architecture commands in the language map closely to processor instructions. Generally this refers to either machine code or assembly language".

Low level languages must be written for a specific processor architecture and cannot be written or taught in isolation without referencing the processor for which it was written. Unlike higher level languages, using an educational assembly language needs a representation of a processor. Assembly is the most helpful programming language to use for learning about fundamental computer processor operation.

Little Man Computer (LMC) is an instructional model of a simple von Neumann architecture computer with all basic features of modern computers. It can be programmed in machine code (usually decimal). It is based on the concept of having a little man locked in a small room. At one end of the room are 100 mailboxes or (memory), each capable of holding a three digit instruction or data. At the other end of the room are two mailboxes labeled INBOX and OUTBOX which receive and emit data. In the middle of the room is a work area with a simple two function (add and subtract) calculator called the Accumulator and a resettable counter called the Program Counter. The Program Counter is similar to what a doorperson uses to keep track of how many people have entered a facility it can count up 1, or it can be reset to 0. As specified by the von Neumann architecture, memory contains both instructions and data. The user loads data into the mailboxes and then signals the little man to begin execution.



Next Byte Codes (NBC) is a simple language with assembly language syntax that is used to program Lego Mindstorms NXT programmable bricks. The command line compiler emits NXT compatible machine code, and supports Windows, Mac OS X and Linux.


Little Computer 3 (LC-3), is an assembly language with a simplified instruction set, but can be used to write moderately complex assembly programs and is a theoretically viable target for C compilers. It is simpler than x86 assembly but has many features similar to those in more complex languages. These features make it useful for teaching basic programming and computer architecture to beginning college computer science and computer engineering students, which is its most common use.


DLX is a reduced instruction set computer (RISC) processor architecture by the main designers of the MIPS and the Berkeley RISC designs, two benchmark examples of RISC design. DLX is essentially a cleaned up, simplified MIPS, with a simple 32-bit load/store architecture. It is widely used in college-level computer architecture courses.

MIX and MMIX are hypothetical computers used in Donald Knuth's monograph, The Art of Computer Programming (TAOCP). Paraphrasing Knuth: The MIX systems are computers intended to illustrate machine-level aspects of programming, so its machine language is simple, elegant, easy to learn. It also includes all the complexities needed for high performance in practice, so in principle it can be built and perhaps be competitive with some of the fast general-purpose computers. MIX is hybrid programmable in binary and decimal numbers; most programs written for it will work using either form. Software implementations for MIX and MMIX have been developed by Knuth and made freely available. Several versions of both emulators exist. MIX is a 1960s-style computer. It is superseded by MMIX, a newer modern computer architecture, a 64-bit RISC instruction set architecture (ISA). For MMIX, Knuth collaborated with the architects of the MIPS and Alpha ISAs.

8 Oct 2015

What Is Graphic Communication? importance of graphic communication


Graphic communication is the result of a long evolution of tools and techniques.
That evolution was greatly accelerated by the establishment of modern,
industrial societies—and graphic communication itself greatly contributed
to modern social and economic development, to the extent that today visual
communication is a readily identifiable force in the growth of both Western and
Eastern “postindustrial” information economies.
According to historical literature, graphic communication has taken as long
as 30,000 years to evolve (Meggs 1998). The role of the visual communicator—
and the function of communication—developed slowly: cave paintings
done between 15,000 and 10,000 B.C., the invention of writing with pictographs
in Mesopotamia (3100 B.C.), the invention of paper and Chinese relief
printing (second century A.D.), the rise of late medieval illuminated manuscripts
(eighth century A.D.), and the breakthrough of movable type in Europe (1450
A.D.) all contributed to that development. Investigation of communication
design over the last century reveals patterns of technological, economic, occupational,
spatial, and cultural development that can be attributed to the creation
of an information-driven economy and society that relies on communication
design and technology for stability and growth.
Although enhanced and changed by modern technology, including software
and computers, the basics of communication have essentially remained the
same through the millennia. Communication is a process that requires a sender
(the designer), a message (information or an effort to persuade), a medium (the
delivery platform), and a receiver of that message (the audience). Communication
comes in various forms and is delivered in various media, or platforms for communication
delivery. These media include all forms of printed paper or material
(books, magazines, newspapers, brochures, flyers, signage, and billboards), the
Internet, mobile phones and handheld devices, television, radio, CDs and DVDs,
videos, video games, and films. Media transmitted to mass audiences is called
mass media; it includes television, film, recordings, mobile technology, magazines,
books, the Internet, and radio. Conversely, a brochure, part of a collection of collateral
material, may only be seen by a few people.

10 Sept 2015

What is Assembly language?



A low-level symbolic code converted by an assembler.
Originally, machine code was the first and only way to program computers. Assembly language was the next type of language used, and thus is one of the oldest families of computer languages in use today. Many dialects and implementations are available, usually some for each computer processor architecture. It is very basic and termed a low level programming language. It is one of the more difficult languages to work with being untyped and rigid, but this is how computers work at low level. Several simplified dialects exist for education.

How to Learning Easy Ways and Path




Many educational programming languages position themselves inside a learning ways, which is a sequence of languages each designed to build on the others moving a student from easy to understand and entertaining environments to full professional environments. Some of the better known are presented below. Learning paths are structured frameworks that use a building-block approach to learning. Guided training for learning creative software and subjects. Each Learning Path is designed by industry professionals.

Easy Learning Ways, Learning Path, Different learn paths, learning style, learning preferences, learning styles definition, different methods of learning, how do people learn

7 Sept 2015

What is a Program?



A well-defined set of instructions given to the computer is called computer Program.A computer program is a sequence of instructions, written to perform a specified task on a computer. A computer requires programs to function, typically executing the program's instructions in a central processor.