Jan 21, 2014

Wibiya Alternative : AdMedia Launches Social Browser Toolbar FooterRoll

AdMedia invites Wibiya publishers to try FooterRoll, a social browser toolbar designed to engage website visitors, increase social interaction, and generate revenue.

AdMedia, a performance-based advertising network, today announced that it will be offering its FooterRoll social browser toolbar to Wibiya publishers who are looking for alternatives. Following the news that Wibiya will be putting an end to its services, AdMedia is inviting Wibiya’s more than 150,000 users to sign up for FooterRoll, so they can continue to engage visitors and earn revenue from their site.

“With the news that Wibiya is discontinuing its services, we understand that publishers are likely feeling confused about what to do next,” said AdMedia COO Avi N, Bibi. “That’s why we’re more than happy to step up and provide publishers with an alternative as well as a smooth transition process.”

Bibi added that the AdMedia support staff is ready to assist Wibiya users in setting up FooterRoll on their websites and they’re inviting all publishers to look into the service.

AdMedia is inviting Wibiya’s more than 150,000 users to sign up for FooterRoll, so they can continue to engage visitors and earn revenue from their site

What FooterRoll Does

Similar to Wibiya, FooterRoll is a toolbar that sits at the bottom of a publisher’s website. It contains various social engagement buttons to make it easy for visitors to check out the publisher’s social media pages, as well as share content via Facebook, Twitter, Google+, and more.

FooterRoll also contains a built-in search box to enable users to conduct searches without leaving the website. This provides visitors with the convenience of quick and easy web searches, which keeps users on the site and lowers the publisher’s bounce rates at the same time.

In addition, the FooterRoll toolbar is fully customizable, and gives publishers full control over how it looks and behaves, as well as the buttons and features to be included on their website.

No coding is required to get FooterRoll up and running. Enabling the toolbar can be done simply by pasting a snippet of JavaScript onto the website.

“The toolbar was designed with publishers and regular users in mind. It’s incredibly user-friendly and easy to set-up. Should publishers have any trouble whatsoever, they can simply contact AdMedia and our reps will address any questions or concerns that they may have,” mentioned Bibi.

Monetization Opportunities

Publishers can also use FooterRoll to earn more revenue. At the left-most part of the bar is an expandable area that shows sponsored messages, and publishers get to decide whether ads are displayed automatically or if they require users to mouse-over the toolbar. Furthermore, FooterRoll operates at a CPM model which guarantees revenue every time an ad is seen.

“The CPM model along with the fact that publishers have full control over how ads are displayed, make FooterRoll a great tool for site owners. Publishers love the fact that the tool has a ton of features that let them monetize their traffic more effectively,” mentioned Bibi.

Publishers can get started with FooterRoll by visiting http://www.footerroll.com

About AdMedia

A performance based advertising network, AdMedia has been providing Advertisers and Affiliates with marketing solutions since 2007. AdMedia connects advertisers to consumers across many channels, including industry leading email, domain, social and search networks. More than 60,000 advertisers utilize the AdMedia network to advance their offers. A privately held company headquartered in Burbank, AdMedia has domestic offices throughout the state of California. Connect with AdMedia on the web at http://www.admedia.com, on Facebook at facebook.com/AdMediaCommunity and on Twitter at Twitter.com/Ad_Media.

Wibiya : The end of life

Wibiya — an Israeli company founded in 2008 — was conspicuously absent from both $1.4 billion Conduit’s communications when it was splitting into two in July, and its reverse takeover of Perion in September. At the time of the Wibiya acquisition in 2011, we reported that its toolbars were on around 120,000 sites, reaching some 200 million unique users. Those numbers have grown, but not by much: It’s now used by some 150,000 publishers reaching some 285 million uniques.

Wibiya provides a free, powerful solution that allows publishers to integrate popular web applications directly into their websites via a fully customizable website toolbar.

The Wibiya Bar integrates a variety of free apps, social plugins, games, video & image galleries, and much more, enabling publishers to increase page views, boost user engagement, and promote their content.

Wibiya also gives publishers the power to manage their bar’s performance in real time through the Wibiya user dashboard.

The Wibiya business enabled publishers to integrate toolbars on their websites that let users do things like share links on social networks; translate pages into different languages; or offer free apps, games and video galleries — all in the name of getting users to spend more time on the site.

Both Wibiya letters, to customers and to employees, are below.


Dear employees,

As you know, the decision to separate the company reflects a newly focused objective for Conduit – including a shift in product strategy – which has implications beyond Client Connect. One of those is that maintaining Wibiya as a free-standing business no longer fits where we are headed.

We acquired Wibiya as a complementary solution for our toolbar business; they delivered publisher solutions within a site, while our toolbars did that outside the site. Now that the toolbar business is no longer a focus, it’s clear that Wibiya, as a business unit, lacks a strategic role for us.

However, there is great technology, human experience and capabilities within Wibiya, and we’re in the process of integrating many of these into the existing Conduit businesses. This will enable us to use much of Wibiya’s technology and skills in our existing and planned products. Wibiya is comprised of a strong team of talented individuals from various disciplines and we look forward to finding them exciting positions within Conduit.

We will carefully and thoughtfully wind the brand down between now and the end of this year, as part of our overall preparation for life after the separation.

This decision has not been easy for Wibiya’s founders or myself but as always Dror, Daniel and Avi are true leaders and product visionaries and understand the current situation and where we’re headed. They will remain with us to ensure the process is successful and I personally intend to remain close to them, in active dialogue, as they figure out their plans.

I want to personally thank the Wibiya founders and employees for their contribution to Conduit and look forward to seeing their future efforts come to fruition, whether within Conduit or elsewhere.

Ronen
In October 2013 Counduit announced that it will be shutting down Wibiya at the end of 2013.

Jan 20, 2014

TamoSoft CommView for WiFi 7.0.743

“CommView for WiFi is a powerful wireless network monitor and analyzer for 802.11 a/b/g/n networks. Loaded with many user-friendly features, CommView for WiFi combines performance and flexibility with an ease of use unmatched in the industry.”

CommView for WiFi captures every packet on the air to display important information such as the list of access points and stations, per-node and per-channel statistics, signal strength, a list of packets and network connections, protocol distribution charts, etc. By providing this information, CommView for WiFi can help you view and examine packets, pinpoint network problems, and troubleshoot software and hardware.

CommView for WiFi includes a VoIP module for in-depth analysis, recording, and playback of SIP and H.323 voice communications.

Packets can be decrypted utilizing user-defined WEP or WPA-PSK keys and are decoded down to the lowest layer. With over 70 supported protocols, this network analyzer allows you to see every detail of a captured packet using a convenient tree-like structure to display protocol layers and packet headers. Additionally, the product provides an open interface for plugging in custom decoding modules.

A number of case studies describe real-world applications of CommView for WiFi in business, government, and education sectors.

CommView for WiFi is a comprehensive and affordable tool for wireless LAN administrators, security professionals, network programmers, or anyone who wants to have a full picture of the WLAN traffic. This application runs on Windows XP / Vista/ 7 / 8 or Windows Server 2003 / 2008 / 2012 (both 32- and 64-bit versions) and requires a compatible wireless network adapter. To view the list of the adapters that have been tested and are compatible with CommView for WiFi, click on the link below:

SUPPORTED ADAPTERS

If your wireless card is not on the list, please click here for the technical information, or take advantage of our special offer and get a compatible adapter free of charge!

What you can do with CommView for WiFi
  • Scan the air for WiFi stations and access points.
  • Capture 802.11a, 802.11b, 802.11g, and 802.11n WLAN traffic.
  • Specify WEP or WPA keys to decrypt encrypted packets.
  • View detailed per-node and per-channel statistics.
  • View detailed IP connections statistics: IP addresses, ports, sessions, etc.
  • Reconstruct TCP sessions.
  • Configure alarms that can notify you about important events, such as suspicious packets, high bandwidth utilization, unknown addresses, rogue access points, etc.
  • View protocol “pie” charts.
  • Monitor bandwidth utilization.
  • Browse captured and decoded packets in real time.
  • Search for strings or hex data in captured packet contents.
  • Log individual or all packets to files.
  • Load and view capture files offline.
  • Import and export packets in Sniffer®, EtherPeek™, AiroPeek™, Observer®, NetMon, Tcpdump, hex, and text formats.
  • Export any IP address to SmartWhois for quick, easy IP lookup.
  • Capture data from multiple channels simultaneously using several USB adapters.
  • Capture A-MPDU and A-MSDU packets.
  • Simulate access points.
  • And much more!
Who needs CommView for WiFi
  • WLAN administrators.
  • Security professionals.
  • Home users who are interested in monitoring their WLAN traffic.
  • Programmers developing software for wireless networks.
ENJOY this FULL Software TamoSoft CommView for WiFi 7.0.743 with Working Keygen.

via SoftwareCW

Jan 19, 2014

How to Crack a WPA2-PSK Password on Windows 7

Not a big question (?) mark! It's very common question on the internet to "How to hack a Facebook account password" and "how to hack a WiFi password". Even if you search on YouTube you will find a lots of tutorial to How to hack a WiFi password using backtrack. However, backtrack OS is not most handy OS for normal users. yesterday my one Facebook friend Lovito Tsuqu Kiho ask me to how to hack WiFi using commview using aircrack-ng.

Today I am going to show you how to a crack a WPA2-PSK password with windows machine.

Software Requirement for this Lab :

1. CommView for Wifi (Download)

2. Elcomsoft Wireless Security Auditor (Download)

Presently i am connected with my own wifi network VirusFnD and i want to hack the password of Ultimate that is secured with WPA2-PSKencryption.


First you need to be able to capture the Wpa2, four-way handsake with CommView.

Open commView and click on the Start option


Then click on the capture option to start the capture


Now it will show you all the list of available AP, Then click on the Tools > Select the Node Reassoication option ( if the Node Rassociation is not working , alternative option is by using WiFi Alfa card ).


Next select your target AP in the Send a deauthentication request from this AP option. It will show you all available client option.


Continue, click on the Send Now option to send the packet for 4-way authentication. wait for some time so it will capture the packet.


After that, click on the Save option and choose your file format Commview Capture Files (*.ncf)


You have just captured the packets, work is done.

Now open Elcomsoft Wireless Security Auditor to crack your wifi password.

Click on the Import Data tab > select the Import CommViewLog option.


Then it will show you information about AP and Multiple Handshake selection information. Click on Ok.


Now click on the Start attack option and select the Dictionary Attack option. However you have other attack options are also available.


Next, wait within minutes it will found your password and it will show you the password.


Congratulations! you are now connected.


Enjoy Wifi Hacking with Windows machine.

source rumyittips.com

How-To Install VirtualBox on Windows 7

First and foremost headed to download.virtualbox.org/virtualbox/‎ and download the suitable version you need, once the VirtualBox download is finish then you are ready to fire up the .exe file for the installation.


The setup is straight forward just follow the screenshot provided, click next  until your are done and finished.






Congratulations ! You have just install VirtualBox in your PC, now you can start creating your virtual machines such as Windows PC and Linux,  likewise the embedded virtual routers.

Turn your PC or Android Device into a Mosquito Killer device

Knowledge is infinity! I really couldn't imagine how life was so beautiful with the technology today. Have you ever heard that you can use PC as a Mosquito device? Now I am going to show you how to turn a PC into a Mosquito Killer device.


You can turn your PC into Mosquito Killer device with the help of “Anti Mosquito” software. “Anti Mosquito” software produce mosquito repellent ultra sound and mosquitoes drive away from your computer area. The sound range which is this program produce beyond the audible range of humans. Therefore you can’t hear this sound.

You have nothing to do any extra work to achieve this work. You just download the “ Anti mosquito” Software from the below download link and install it.


You need to be just click on the Activate option to activate this option.

On Android Smartphone

In Google Play, search for Mosquito Killer and install it.

The ultrasonic Mosquito repellent application emit a very unique high frequency sound (ultra sound) that most mosquitoes find distasteful and prevents you from getting bitten by mosquitoes.

For those that said that mosquitoes are sitting on their speaker is because, only pregnant female mosquito bites and uses blood to feed their babys as they need proteins to be able to develop. Ultrasound that this app uses tries to reproduce male sound and pregnant females are avoiding males but non pregnant are attracted by the sound, but they do not drink blood. Both males and females are using natural bio food like fruits and herbs.


Hope you like my post Turn your Computer or Android Device into a Mosquito Killer device, Please Share with others.

Set-up pfSense+Lusca-cache with multi-WAN

Version: pfsense 2.0-RC1 (built on Sat Feb 26 15:30:26 EST 2011)
ISO download: http://www.mediafire.com/?1a1mwiw1198dd66

NETWORK DIAGRAM


PFSENSE STEP BY STEP HOW-TO DUAL WAN

1.) Configure correctly your wan1 and wan2 interfaces (Static IP or DHCP) and Gateways.

WAN1 example:


WAN2 example:


Test your gateway (ping the router).

2.) Configure your DNS server in "General Setup" Tab

Example:


Some explanations:
  • Provider for WAN1 uses 2 DNS servers. I configure the correct gateway to reach theses DNS
  • Provider for WAN2 uses the gateway as DNS server (!). In this case, I didn’t configure the gateway to reach the DNS.
3.) Configure a "Gateway group" in "Routing" tab
Check the existing gateway (you may have one as “Default Gateway”)


As a monitor IP, I use the DNS servers of the providers.

Click on "Groups" and add one:
  • Choose Tier 1 and Tier 2 to prioritize a gateway (failover)
  • or, Choose the same priority (load-balancing)
In my opinion, "Packet Loss" is a good trigger.


Results:


4.) Set-up firewall rules

Set-up a "Floating" rule with the following parameter:


Explanations:
  • The floating rules apply on multiple interfaces,
  • Choose your WAN1 and WAN2 interfaces, and direction "out"
  • Choose "HTTP" as destination port
  • Specify the gateway with "MULTIWAN" (the most important thing!)
Result:


You can also create another rule (optional) to use MULTIWAN with other flows. Example on the LAN interface:


5.) Set-up manual Outbound NAT (AON option)
In "NAT" tab, you have to check "Manual Outbound NAT rule generation"


Then, add 2 mappings with WAN1 and WAN2 interfaces:
  • Protocol = any
  • Source = any
  • Destination = any
  • Translation = Interface address
6.) Configure correctly Squid Web Proxy (the tricky thing!)

I assume that you have installed Squid (Lusca-Cache) package. In my case, I also installed SquidGuard (filter) and LightSquid (reports).

In "Proxy server" tab / General settings, add the loopback interface:


I also use a "transparent proxy". I choose to activate this option, you must change the port for pfSense Web GUI (HTTPS instead of HTTP) in "Advanced" tab.

Then, you have to add a Custom Options on the bottom of the page:

Code:
tcp_outgoing_address 127.0.0.1;

Don’t forget to end with a semicolon.


7.) Test it!
  • Open your favorite Web Browser (Firefox) and go to " www.whatismyip.com ".
  • Unplug the "Tier 1 router" and reload the page.
Your IP address may change in case of failover.

D-Link DI-804HV Default Username Password

If you are looking for the D-Link DI-804HV default password? You probably have little reason to access your router on a regular basis so don't feel too bad if you've forgotten the DI-804HV default password.


However, when you're troubleshooting a network problem and need to get in to the device, the DI-804HV default password suddenly becomes very important.

For most versions of the D-Link DI-804HV, there is no default password. Just leave the password field blank if you're asked for a password when logging in to the DI-804HV.

In addition to the DI-804HV default password, you can also see the DI-804HV default username and DI-804HV default IP address in the table below.

Note: The D-Link DI-804HV default password may be different for certain hardware or firmware versions.

If I have that information, I'll include the exact DI-804HV version number along with the correct default password. You can usually find your D-Link DI-804HV version number on the bottom of the router.

Be sure to change the default router password on your DI-804HV to something more secure as soon as you're in. Then use a free password manager so you'll never forget your new DI-804HV password.
Help! The DI-804HV Default Password Doesn't Work!

At some point during the life of your particular D-Link DI-804HV, the default password, username, and/or IP address might have been changed.

In most cases, if the D-Link DI-804HV default IP address has been changed, the new IP address for the DI-804HV will be the same as the default gateway IP address configured for your network connection.


In situations where the DI-804HV default password or DI-804HV default username has changed, you'll need to reset the D-Link DI-804HV to factory defaults. You can usually do that via a special button or sequence of actions.

The DI-804HV manual will have specific directions for performing a factory default reset. You can download the manual for the DI-804HV from D-Link Support.

Please let me know if any of the DI-804HV default login data below needs updated. For other questions about the DI-804HV default information on this page, see my Default Password FAQ.

Version
Default  Username
Default Password
Default IP
Privileges
All
admin
[none]
192.168.0.1
Administrator

DI-804HV Default Password & Other Default Login Data

TMNet : D-Link DSL-2640B Streamyx Subscriber Modem

The DSL-2640B wireless ADSL router is an affordable high-performance ADSL router for home and the small office. With integrated ADSL2+ supporting up to 24Mbps download speed, 802.11g wireless LAN, firewall protection, Quality of Service (QoS) and 4-port switch, this router provides all the essentials that a home or small office needs to establish a secure and high-speed remote link to the outside world.


This modem replaced a modem provided by TMNet my ISP (the second one from them) which had been providing the worst DSL experience I ever had. After a simple install, it worked perfectly, and I have not had a single loss of service or speed issue since.

Streamyx Internet Connection with D-Link DSL-2640B setup

Make sure your power,phoneline and Lan cable connected to modem
Open any browser (chrome,internet explorer,firefox)
Type 192.168.1.1 on the address bar then press enter

Type Username and Password (default both username and password is tmadmin if router provided by TM streamyx)


Go to Quick Setup, change ‘Protocol’ to PPPoE. ‘Leave Connection’ mode as ‘LLC’. Then key in your Streamyx ID n password. Hit ‘next’.

Change your network name (e.g John’s Network) in ‘SSID ‘and your wireless network password in ‘Network Key’. Hit ‘Next’.

Your almost there. Check all the settings before hit ‘Save/Apply’ and 'Logout'. Now you are ready to go.


The D-Link DSL-2640B uses Broadcom Chips BCM96338, you can explore on this command line interface (cli) thru telnet and ssh for more shell command available on this residential gateway.


Device Info, a summary of all information from Board ID,  Software version, Bootloader version and others. Don't be surprised this is identical with Innacomm W3400V Wireless Modem from hardware to software only the color that is being blended.


The Innacomm W3400V Wireless Modem is also TMNet Streamyx ADSL subscriber modem supplier by other contractor, all TMNet Streamyx modem have alomost same username and password.

Unlock myBRO DV235T Smart PLDT Firmware

I just want to share this article to all my guest readers who always come across to this resourceful tech blog about  the myBRO DV235T 4G WiMAX wireless modem broadband router that has builtin WiFi an indoor unit from Green Packet Technology Berhad Malaysia. The DV-235T CPE as we all know is only intended for Smart/PLDT WiMAX network because of its frequency assignment whereas Globe WiMAX and Wi-Tribe has higher frequency so there is no way to used it on other ISP.


Last December 2013 there were so many links and mirror of Green Packet DV235T stock firmware aka myBRO  have been leak, I am one of those eagerly wanted to have it on hand and even paid for the updates remotely just to be able to tweak this device I have on me. Without knowing that the Smart/PLDT customized firmware is even best for this 4G WiMAX wireless modem broadband router only unlocked this CPE to have the fullest administration just like the stock firmware (web_update_v2.10.14-g.1.0.4-gp.tar.gz) of Green Packet. The myBRO DV235T can be unlock using the command line interface (cli) just login with the default username and password via telnet or ssh.

Here's a few screenshot I have just grabbed from my Asus lappy, this will only proves that with the default Smart/PLDT customized firmware can be unlocked, tweaking this CPE is absolutely possible.





This is the most interesting part of myBRO DV235T, we always use the command line interface (cli) such as telnet or ssh to change the WAN MAC address of this 4G WiMAX wireless modem broadband router. As you can see below you can just input your valid credentials/account on the provided space and you are ready to go. Its hassle free if you are noob on the CLI.


This experiment is not to alter this device, bricking your own device is at your own responsibility. Enjoy your life while it last!