Showing posts with label Tools. Show all posts
Showing posts with label Tools. Show all posts

Wednesday, 19 December 2018

Usefull Tools For A Hacker


* __0trace__    1.5    A hop enumeration tool    http://jon.oberheide.org/0trace/
* __3proxy__    0.7.1.1    Tiny free proxy server.    http://3proxy.ru/
* __3proxy-win32__    0.7.1.1    Tiny free proxy server.    http://3proxy.ru/
* __42zip    42__    Recursive Zip archive bomb.    http://blog.fefe.de/?ts=b6cea88d
* __acccheck__    0.2.1    A password dictionary attack tool that targets windows authentication via the SMB protocol.    http://labs.portcullis.co.uk/tools/acccheck/
* __ace    1.10__    Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface    http://ucsniff.sourceforge.net/ace.html
* __admid-pack 0.1__    ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.    http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
* __adminpagefinder    0.1__    This python script looks for a large amount of possible administrative interfaces on a given site.    http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html
* __admsnmp    0.1__    ADM SNMP audit scanner.
* __aesfix    1.0.1__    A tool to find AES key in RAM    http://citp.princeton.edu/memory/code/
* __aeskeyfind    1.0__    A tool to find AES key in RAM    http://citp.princeton.edu/memory/code/
* __aespipe    2.4c__    Reads data from stdin and outputs encrypted or decrypted results to stdout.    http://loop-aes.sourceforge.net/aespipe/
* __afflib    3.7.3__    An extensible open format for the storage of disk images and related forensic information.    http://www.afflib.org
* __afpfs-ng    0.8.1__    A client for the Apple Filing Protocol (AFP)    http://alexthepuffin.googlepages.com/
* __against    0.2__    A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.    http://nullsecurity.net/tools/cracker.html
* __aiengine    339.58dfb85__    A packet inspection engine with capabilities of learning without any human intervention.    https://bitbucket.org/camp0/aiengine/
* __aimage    3.2.5__    A program to create aff-images.    http://www.afflib.org
* __air    2.0.0__    A GUI front-end to dd/dc3dd designed for easily creating forensic images.    http://air-imager.sourceforge.net/
* __airflood    0.1__    A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.    http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html
* __airgraph-ng    2371__ Graphing tool for the aircrack suite    http://www.aircrack-ng.org
* __airoscript    45.0a122ee__    A script to simplify the use of aircrack-ng tools.    http://midnightresearch.com/projects/wicrawl/
* __airpwn    1.4__    A tool for generic packet injection on an 802.11 network.    http://airpwn.sourceforge.net
* __allthevhosts 1.0__    A vhost discovery tool that scrapes various web applications    http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/
* __american-fuzzy-lop    0.89b__    A practical, instrumentation-driven fuzzer for binary formats.    https://code.google.com/p/american-fuzzy-lop/
* __androguard    1.9__    Reverse engineering, Malware and goodware analysis of Android applications and more.    https://code.google.com/p/androguard/
* __androick    5.35048d7__    A python tool to help in forensics analysis on android.    https://github.com/Flo354/Androick
* __android-apktool    1.5.2__    A tool for reengineering Android apk files.    http://forum.xda-developers.com/showthread.php?t=1755243
* __android-ndk    r9c__    Android C/C++ developer kit.    http://developer.android.com/sdk/ndk/index.html
* __android-sdk-platform-tools    r19__    Platform-Tools for Google Android SDK (adb and fastboot)    http://developer.android.com/sdk/index.html
* __android-sdk    r22.3__    Google Android SDK    http://developer.android.com/sdk/index.html
* __android-udev-rules    8340.db8ef4a__    Android udev rules.    https://github.com/bbqlinux/android-udev-rules
* __androidsniffer    0.1__    A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.    http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html
* __anontwi    1.0__    A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com.    http://anontwi.sourceforge.net/
* __aphopper    0.3__    AP Hopper is a program that automatically hops between access points of different wireless networks.    http://aphopper.sourceforge.net/
* __apnbf    0.1__    A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.    http://www.c0decafe.de/
* __arachni    1.0.6__    A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.    https://www.arachni-scanner.com
* __arduino    1.0.5__    Arduino SDK (includes patched avrdude and librxtx)    http://arduino.cc/en/Main/Software
* __argus    3.0.8__    Network monitoring tool with flow control.    http://qosient.com/argus/
* __argus-clients    3.0.8__    Network monitoring client for Argus.    http://qosient.com/argus/
* __armitage    141120__    A graphical cyber attack management tool for Metasploit.    http://www.fastandeasyhacking.com/
* __arp-scan    1.9__    A tool that uses ARP to discover and fingerprint IP hosts on the local network    http://www.nta-monitor.com/tools/arp-scan/
* __arpalert    2.0.12__    Monitor ARP changes in ethernet networks    http://www.arpalert.org/
* __arpantispoofer    1.0.1.32__    A utility to detect and resist BIDIRECTIONAL ARP spoofing. It can anti-spoof for not only the local host, but also other hosts in the same subnet. It is also a handy helper for gateways which don't work well with ARP.    http://arpantispoofer.sourceforge.net/
* __arpoison    0.6__    The UNIX arp cache update utility    http://www.arpoison.net
* __arpon    2.7__    A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.    http://arpon.sourceforge.net/
* __arpwner    26.f300fdf__    GUI-based python tool for arp posioning and dns poisoning attacks.    https://github.com/ntrippar/ARPwner
* __artillery    1.0.2__    A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system    https://www.trustedsec.com/downloads/artillery/
* __asleap    2.2__    Actively recover LEAP/PPTP passwords.    http://www.willhackforsushi.com/Asleap.html
* __asp-audit    2BETA__    An ASP fingerprinting tool and vulnerability scanner.    http://seclists.org/basics/2006/Sep/128
* __athena-ssl-scanner    0.5.2__    a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers.    http://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html
* __atstaketools    0.1__    This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics.    http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html
* __auto-xor-decryptor    3.6a1f8f7__    Automatic XOR decryptor tool.    http://www.blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/
* __autopsy    2.24__    A GUI for The Sleuth Kit.    http://www.sleuthkit.org/autopsy
* __azazel    10.401e3aa__    A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.    https://github.com/chokepoint/azazel
* __b2sum    20140114__    BLAKE2 file hash sum check. Computes the BLAKE2 (BLAKE2b or -s, -bp, -sp) cryptographic hash of a given file.    https://blake2.net/
* __backcookie    44.cbf5b8b__    Small backdoor using cookie.    https://github.com/mrjopino/backcookie
* __backdoor-factory    98.89d87b2__    Patch win32/64 binaries with shellcode.    https://github.com/secretsquirrel/the-backdoor-factory
* __backfuzz    36.8e54ed6__    A network protocol fuzzing toolkit.    https://github.com/localh0t/backfuzz
* __balbuzard    65.546c5dcf629c__    A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc).    https://bitbucket.org/decalage/balbuzard/
* __bamf-framework    35.30d2b4b__    A modular framework designed to be a platform to launch attacks against botnets.    https://github.com/bwall/BAMF
* __basedomainname    0.1__    Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.    http://www.morningstarsecurity.com/research
* __batman-adv    2013.4.0__    batman kernel module, (included upstream since .38)    http://www.open-mesh.net/
* __bbqsql    1.2__    SQL injection exploitation tool.    https://github.com/neohapsis/bbqsql
* __bdfproxy    38.43e83e4__    Patch Binaries via MITM: BackdoorFactory + mitmProxy    https://github.com/secretsquirrel/BDFProxy
* __bed    0.5__    Collection of scripts to test for buffer overflows, format string vulnerabilities.    http://www.aldeid.com/wiki/Bed
* __beef    0.4.5.0.181.g80a9f8e__    The Browser Exploitation Framework that focuses on the web browser    http://beefproject.com/
* __beholder    0.8.9__    A wireless intrusion detection tool that looks for anomalies in a wifi environment.    http://www.beholderwireless.org/
* __beleth    36.0963699__    A Multi-threaded Dictionary based SSH cracker.    https://github.com/chokepoint/Beleth
* __bfbtester    2.0.1__    Performs checks of single and multiple argument command line overflows and environment variable overflows    http://sourceforge.net/projects/bfbtester/
* __bgp-md5crack    0.1__    RFC2385 password cracker    http://www.c0decafe.de/
* __bing-ip2hosts    0.4__    Enumerates all hostnames which Bing has indexed for a specific IP address.    http://www.morningstarsecurity.com/research/bing-ip2hosts
* __bing-lfi-rfi    0.1__    This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities.    http://packetstormsecurity.com/files/121590/Bing-LFI-RFI-Scanner.html
* __binwalk    2.0.1__    A tool for searching a given binary image for embedded files.    http://binwalk.org
* __binwally    3.ca092a7__    Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).    https://github.com/bmaia/binwally
* __bios_memimage    1.2__    A tool to dump RAM contents to disk (aka cold boot attack).    http://citp.princeton.edu/memory/code/
* __birp    60.1d7c49f__    A tool that will assist in the security assessment of mainframe applications served over TN3270.    https://github.com/sensepost/birp
* __bittwist    2.0__    A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic.    http://bittwist.sourceforge.net/
* __bkhive    1.1.1__    Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive.    http://sourceforge.net/projects/ophcrack
* __blackarch-menus    0.2__    BlackArch specific XDG-compliant menu    http://www.blackarch.org/
* __blackhash    0.2__    Creates a filter from system hashes    http://16s.us/blackhash/
* __bletchley    0.0.1__    A collection of practical application cryptanalysis tools.    https://code.google.com/p/bletchley/
* __blindelephant    7__    A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations    http://blindelephant.sourceforge.net/
* __blindsql    1.0__    Set of bash scripts for blind SQL injection attacks    http://www.enye-sec.org/programas.html
* __bluebox-ng    66.4a73bb4__    A GPL VoIP/UC vulnerability scanner.    https://github.com/jesusprubio/bluebox-ng
* __bluebugger    0.1__    An implementation of the bluebug technique which was discovered by Martin Herfurt.    http://packetstormsecurity.com/files/54024/bluebugger.1.tar.gz.html

Tuesday, 16 October 2018

Google Ads manager account (MCC) hacks your Chrome browser and shares your personal data

Suddenly i realized a funny bug/feature of current stable Chrome 69.0.3497.100 (Official Build) (64-bit) and Google Ads manager account:


  1. If there are some people logging into one after one from own Chrome into MCC,
  2. If syncing of personal data in their Chrome is ON,
  3. If no one of them has a syncing passphrase...


then:

the user, who currently logs in into MCC, gets all personal data (bookmarks, passwords - yes, passwords!) into the own Chrome of the user, who was logged in into MCC previously.

Monday, 27 August 2018

Testing structured data of the current URL with one click

test structured data with one click
Any SEO know about benefits of structured data. Google offers a special structured data testing tool to test the existence and quality of the structured data on the certain URL.

But what, if you want to test some URLs? Copy URL, switch the tab, go to the Google Structured Data Testing Tool, paste URL, press Enter. And again, and again...? Annoying!

I've coded a solution for this kind of routine task.
Read full article »

Monday, 28 May 2018

What's wrong with image dimensions?

Yes, what's wrong? I say you - pretty much is wrong. I've completed a kind of little study for our firm about how well is image optimization in times of mobile first. You know what! I was disgusted twice:
  1. roughly 85% images are oversized - this is not a dark secret, we are used to this in the meanwhile,
  2. roughly 20% images are oversized in terms of dimensions: it means 20% of original images are higher than their displaying dimensions.
Read further: study setup, detailed results, toolchain and scripts
Read full article »

Tuesday, 13 March 2018

Free Download Cheat Engine

About Cheat Engine

Cheat Engine is an open source tool designed to help you with modifying single player games running under window so you can make them harder or easier depending on your preference(e.g: Find that 100hp is too easy, try playing a game with a max of 1 HP), but also contains other usefull tools to help debugging games and even normal applications, and helps you protect your system by letting you inspect memory modifications by backdoors and even contains some ways to unhide them from conventional means.

It comes with a memory scanner to quickly scan for variables used within a game and allow you to change them, but it also comes with a debugger, disassembler, assembler, speedhack, trainer maker, direct 3D manipulation tools, system inspection tools and more.

Besides these tools it also comes with extensive scripting support which will allow experienced developers to create their own applications with easy and share them with other people






Click Link below to download Cheat Engine:

Download Cheat Engine Free








http://www.cheatengine.org/aboutce.php

Monday, 5 March 2018

Screaming Frog 9.0 exports screenshots, original and rendered HTML code

If rendering Javascript and storing/rendering HTML options are activated, you are able to export screenshots of rendered URLs, as like as their original and rendered HTML code:

Export screenshots and source code of crawled urls in Screaming Frog 9.0

Screaming Frog 9.0 renders websites with Chrome 60

The new but not obvious thing in Screaming Frog 9.0 is the rendering engine. You should know - it isn't Chrome 41 (41.0.2272.118), which is used by Google's web rendering service (WRS). With it Screaming Frog can't render websites to 100% as Googlebot. But approximately identically to ;)

It is rather Chrome 60 (60.0.3112.113). This Chrome version was choosen by Screaming Frog developers as more stable AND with fewest rendering differences to the Chrome 41. You can compare both versions more detailedly at https://caniuse.com/#compare=chrome+41,chrome+60.

According to Screaming Frog support Chrome 60 version was selected due to working stability with the spider engine at scale, rather than because of rendering issues.

You can see the current Chrome version in the debug window:

Screaming Frog 9.0 uses Chrome 60 as rendering engine. Information about Chrome version is placed in the debug window.

Wednesday, 4 October 2017

How to disable Excel preview in Windows Explorer on Windows 7 and Windows 10.

Preview of Excel tables, specially of bigger size, can go pretty hard on the system performance. Some ressources recommend to use setting of Windows Explorer - but on this way one can only disable ALL previews.

With any file extention there is a Preview Handler associated. To disable only Excel previews, but to keep all other, which aren't so performance hungry, like previews of images or PDFs, one should edit (better as delete) one key in Windows registry.


  • Start registry editor with regedit: Start → Run → regedit
  • Find under HKEY_CLASSES_ROOT\.xlsx\ShellEx\ the key called {8895b1c6-b41f-4c1c-a562-0d564250836f}
  • Edit it (i don't recommend to delete it), like on screenshot:

How to disable Excel preview in Windows Explorer under Window7 / Windows10

  • Close regedit,
  • Restart Windows Explorer: (Start → Run → Type cmd →Enter → Type taskkill /f /im explorer.exe → Enter → Type explorer.exe → Enter)
  • Enjoy (tested on Windows7 and Windows10)

Friday, 11 August 2017

Three perfect image optimizers for SEO

What is this - a perfect image optimization tool for SEO?

best image optimizing tools for seo
For me the perfect image optimization tool must have following features:
  • This image optimizer is not a kind of hipster online tool, but the old good installable software,
  • This image optimizer is free - not a kind of shity shareware, which means it would be free, but indeed isn't,
  • User can setup an optimization level,
  • The tool must do batch image compression - real SEO ninjas don't have much time,
  • This image optimizer must, no - it MUST understand nested folders and
  • it MUST be able to save optimized images in the same nested folder/subfolder structure,
  • This tool, again, MUST be able to save optimized images without to change the file type,
  • This tool should be able to resize images saving the width/height ratio.
  • And, of course, it must do its compression job well ;)
Do i want too much? No, i believe, it isn't too much.

I will not explain, why image compression is substantially important for your website's rankings. Just one sentence: images are the most heaviest static asset type on ANY website. Do you still don't want to compress them? No prob, just as you wish. But why are you still here?

For non-ignoramuses among us: yes, such tools actually exist - they aren't just a subject of SEO fable tales. I know even three tools, which are able to accomplish every single task i listed above. Want to know more? Let's go →
Read full article »

Friday, 4 August 2017

HowTo guide: filter Search Console for multiple values at once

Setting of multiple filters in the Google Search Console is possible!

how to setup multiple filters in search console

Yes, against different answers of some experts in the Google product forum, like here or there. The possibility to set multiple filters is extremely useful and works into both directions - you can include or exclude multiple keywords, urls, traffic sources - anything, what you want.

We will operate with filter settings through manipulation of urls. You'll need for this a good code editor - good means Notepad++, one magic plugin for it, and, surely, a bit of chutzpah - yeah, we'll do the big G, nothing less!
Read full article »

Saturday, 3 June 2017

Free online SEO tools for TF-IDF calculation

Free online tools for TF-IDF calculation
First of all: what's TF-IDF? In German this content parameter is called WDF / IDF, but the subject is the same:

TF-IDF, term frequency–inverse document frequency, is, explained in short, from rookie to rookie, the relation of term usage frequency in the given document to usage frequency of this term in all documents containing it.

This relation mirrors how relevant is the given document for the given term in the manifold of all documents containing this term.

TF-IDF is successor of keyword density. Some non-demented SEO geriatrics can remind, what means keyword density: number of term's usage in the text divided through the number of all words in the text multiplied with 100. This formula is in reality both most used and wrong.

Well, i'm not your Wiki, and if you're in the full legal age and not banned by Google, you would find fast everything you need to know about keyword density and TF-IDF. I just say: nowadays TF-IDF is nearly the single numeric parameter of content quality. But this article is about something other - i've promised to share some freebies, right?
Read full article »

Wednesday, 11 February 2015

SEOtools for Excel: solutions for loosing installation folder and disappeared ribbon

My installation of SEOTools for Excel on Windows7 x64 / Excel x32 didn't want to cooperate with me from the first step. As first Excel refuses to open seotools.xll properly - it thought always it would be a text file. Then, after try to install SEOTools x64 version as addin, it wasn't not visible in the ribbon at all, but doesn't want to be deinstalled. I was forced to delete it on the hard way. Then, on trying to install SEOTools x32 version, i was pretty near success: i got the strat splash screen from SEOTools, but then an error alert raised, The Ribbon/COM Add-in helper required by add-in SeoTools could not be registered. This is an unexpected error. Error message: Exception has been thrown by the target of an invocation. And nothing more.

After some investigations it becomes clear, that the problem is in the not corresponding versions of the machine (x64), Win7 (x64) and Excel 15 (x32). BTW. if you need to get to know, what is installed on your machine - here are all the places listed, where you get needful information about your hardware, OS and Excel.
Read full article »

Tuesday, 29 July 2014

40 secret keyword research tools to find the million dollar keyword

free keyword research tool
Some of the most popular keywords, which Google suggests, regarding keyword tools are "keyword research", "keyword spy", "keyword generator", "keyword finder", "keyword discovery", "keywords search" and "keywords for SEO". I decided to tell about some tools, which i use for certain aspects of keyword research. The keyword research tools i tell about have all in common, that they aren't well-known as e. g. Ãœbersuggest, but they accomplish exactly so good if not better the same tasks, as established commercial and free tools.

What are the main keyword research tasks a SEO and SEA use to do? The tasks are different (better optimizing, saving money, out-competing of competitor), but the primal goal of keyword research is always the same: to get more cheaper targeted traffic. A SEO is looking for keywords for optimized page or analyzes the competitor's landing page. A SEA is looking for keywords for an ad and for the landing page, or analyzes competitor's ad and landing page. Lets further look, which keyword research tools could be helping in this (only free tools and no affiliate links, promised:)
Read full article »

Friday, 25 July 2014

How to relaunch website avoiding main catches

How to relaunch website keeping ranking and position in SERP

seo-minded website relaunch
In the last time the most interest to the topic "how to relaunch website", as i shortly realized, rises in Germany, whereby i don't think, that this topic is indeed interesting only there.

Fact is: any website relaunch means losses. Losses of traffic, of ranking, of position in SERP, which are finally loss of money. I've seen losses of 4% and 40%, and there aren't the final numbers. The main objective of SEO is to minimize such negative impacts.

In short each website relaunch is a change of design and / or content structure. If content structure changes, with it comes definitely the change of URL structure. So we have generally 2 possible fields, where the new website version could meet a bad acceptance and following loss of traffic:
  • users could dislike the new design
  • search engines could become bitchy on indexing the new URL structure and some pages will be out of searcher's scope.
So how to act on relaunch to come out as a winner from the relaunch battle against our visitors and search engines? Look:
Read full article »

Wednesday, 23 July 2014

How to bulk check pagerank of all internal pages

Although Google means, we shall in general never mind about pagerank (PR). But the substantial part of any OnPage SEO audit is to clarify, whether a site structure is built properly and spreads correctly the link juice. The sign of correct site structure is: important pages inherit PR, not important pages don't. That is the purpose of project-wide PR measuring. Surely, nobody expects to perform such measurements manually cause of eventual links amount - a tool for such mechanical turk's task is a must! I thought... Damn, the search for this tool is on of cases, when i've got demonstrated again, the internet is full of crap and how i hate some SEOs!
Read full article »

Monday, 21 July 2014

How to create bulleted lists in Google Plus posts

create bullets in Google Plus posts
Google Plus has only 3 documented formats: *bold*, _cursive_ and -strikethrough-. But it's a proven fact, that the one of the best arts to deliver information and to gain its visibility is to structure information into lists.

Good, with ordered lists it is no problem: you number each list line with bolded ascending numbers, *1. * etc. What is with unordered, bulleted lists? How to make bullets in Google Plus posts? For this purpose we utilize the computer's own capacity, namely the possibility to type and print unicode characters. This possibility is limited, but it is fully enough for creating bulleted lists in Google Plus posts. Other valuable usage of unicode characters is surely design of page titles, page descriptions, which are used in SERP as snippets, and ads texts. Designing of such text assets with unicode special characters gains their CTR enormously. About it at the end of article. Now lets create bulleted lists in Google Plus posts:
Read full article »

Friday, 27 June 2014

H for Header: part 1 of the HASCH OnPage SEO framework

Each website begins with the header. There are no minimal or required values inside of it: the header content fully depends from our goals and laziness:) Another cause for poor designed headers is a meaning, that Google doesn't understand meta tags or doesn't take meta tags as a ranking factor. Well, Google says, it understands just a little amount of available meta tags. Here is Google's statement about understanding of meta tags. But i say:
  • use not only meta tags, which Google definitely understands,
  • use meta tags extensively,
  • be redundant in meta tags using.
Why? Just because the web contains much more as only Google and you. There are very much bots and spiders in the internet, their goal is to parse web contents and to create different indexes. The parsing criteria could be a bunch of existing meta tags and the parsing results on their part could be parsed from Googlebot. So Google gets into its index the content from your meta tags, which Google means not to understand.

Good, now we are agreed about benefits of meta tags using. The main SEO point is utilizing header rules to give the searchbot so much information about our site as possible. Now i list meta tags one by one and give the correct syntax, some possible values, and my point of view of the practical SEO effects.
Read full article »

Friday, 23 May 2014

How to surf with US IP address (or IP of any specific country)

It is the common problem: preview of an affiliate offer, which isn't valid in your country. You will be redirected from the offer you want to another offer, which is valid for your country. But you must see it - cause you want decide whether to promote it or not.

The answer is clear: you must look the offer like somebody from a country where this offer is valid. The solution which firstly comes into mind and which i never got to work is to use free proxy. I have never finded any working free proxy. Never. Don't know why. But there are 2 really working tools, which are free and easy to setup and use. They work out of the box:
Read full article »

Friday, 25 April 2014

2 things i hate on Facebook Ad Manager and Power Editor

HATE! HATE!! HATE!!!
facebook ad manager
  1. You can't, under no circumstances, change the ad target url! You create an ad with website conversions objective. You create a bunch of them, the whole ad set with many different targeting options. Then you want just copy this ad set and point it to another target url. And you can't! You must click on EACH ad, then create a similar ad - only so you will be able to change ad target url.
  2. If you want hide your affiliate urls, this works ONLY if you create your ads each one new from scratch! If you create an ad with shorten url as target, then create similar ad and input as target url your next shorten url - you mean it would work? NO, damn! Facebook is smart enough to show in the ad body the original url. And it is funny enough to show the SHORTEN url, if you run with the mouse over the opriginal url. Is it not stupid?

Saturday, 5 April 2014

Shortest URL Shortener ever!

As the title said, http://v.gd is the shortest URL shortener i ever seen (and it can techically exist). I find this service super comfortable and decided to make it even more comfortabler and share the results: restartless Firefox add-on and bookmarklet.

5.04.2014 UPDATE: my Firefox addon "Shortest URL Shortener ever" was even fully approved and now available for download at https://addons.mozilla.org/de/firefox/addon/shortest-url-shortener/ Download and enjoy!
Read full article »