Thursday, July 24, 2008

Make Money with Your Website

There are several lists with “ways to make money with a website” on the Internet, but none of them seem to be complete.

Notice that ways to make money with a website are different from ways to make more money from it. Methods to increase your traffic or click-through rate will help you make more money, but they do not represent a method of making money per se.

For example, one could suggest that blending AdSense ads with the content is a way to make money from a website. In reality it’s not; it’s just a way to make more money by improving your ad click-through rate. The real monetization method behind it is a PPC ad network.

The list is divided into direct and indirect methods, and examples and links are provided for each point. Enjoy!

Direct Methods

1. PPC Advertising Networks

Google AdSense is the most popular option under this category, but there are also others. Basically you need to sign up with the network and paste some code snippets on your website. The network will then serve contextual ads (either text or images) relevant to your website, and you will earn a certain amount of money for every click.

The profitability of PPC advertising depends on the general traffic levels of the website and, most importantly, on the click-through rate (CTR) and cost per click (CPC). The CTR depends on the design of the website. Ads placed abode the fold or blended with content, for instance, tend to get higher CTRs. The CPC, on the other hand, depends on the nice of the website. Mortgages, financial products and college education are examples of profitable niches (clicks worth a couple of dollars are not rare), while tech-related topics tend to receive a smaller CPC (sometimes as low as a couple of cents per click).

The source of the traffic can also affect the overall CTR rate. Organic traffic (the one that comes from search engines) tends to perform well because these visitors were already looking for something, and they tend to click on ads more often. Social media traffic, on the other hand, presents terribly low CTRs because these visitors are tech-savvy and they just ignore ads.

List of popular CPC advertising networks:

2. CPM Advertising Networks

CPM advertising networks behave pretty much as PPC networks, except that you get paid according to the number of impressions (i.e., page views) that the ads displayed on your site will generate. CPM stands for Cost per Mille, and it refers to the cost for 1,000 impressions.

A blog that generates 100,000 page views monthly displaying an advertising banner with a $1 CPM, therefore, will earn $100 monthly.

CPM rates vary with the network, the position of the ad and the format. The better the network, the higher the CPM rate (because they have access to more advertisers). The closer you put the ad to the top of the page, the higher the CPM. The bigger the format (in terms of pixels), the higher the CPM.

You can get as low as $0,10 and as high as $10 per 1,000 impressions (more in some special cases). CPM advertising tends to work well on websites with a high page views per visitor ratio (e.g., online forums, magazines and so on).

List of popular CPM advertising networks:

3. Direct Banner Advertising

Selling your own advertising space is one of the most lucrative monetization methods. First and foremost because it enables you to cut out the middleman commissions and to determine your own rates. The most popular banner formats on the web are the 728×90 leaderboard, the 120×600 skyscraper, the 300×250 rectangle and the 125×125 button.

The downside of direct banner advertising is that you need to have a big audience to get qualified advertisers, and you will need to spend time managing the sales process, the banners and the payments.

Related links:

4. Text Link Ads

After Google declared that sites selling text links without the nofollow tag would be penalized, this monetization method became less popular.

Many website owners are still using text links to monetize their sites, though, some using the nofollow tag and some not.

The advantage of this method is that it is not intrusive. One can sell text links directly through his website or use specialized networks like Text-Link-Ads and Text-Link-Brokers to automate the process.

Text link marketplaces and networks:

5. Affiliate Marketing

Affiliate marketing is a very popular practice on the Internet. Under this system you have a merchant that is willing to let other people (the affiliates) sell directly or indirectly its products and services, in exchange for a commission. Sometimes this type of advertising is also called CPA (cost per action) or CPL (cost per lead) based.

Affiliates can send potential customers to the merchant using several tools, from banners to text links and product reviews.

In order to find suitable affiliate programs you can turn to individual companies and publishers like Dreamhost and SEOBook, or join affiliate marketplaces and networks.

List of popular affiliate marketplaces and networks:

6. Monetization Widgets

The latest trend on the web are widgets that let you monetize your website. Examples include Widgetbucks and SmartLinks. Some of these services operate under a PPC scheme, others behave like text link ads, others yet leverage affiliate links.

Their main differentiator, however, is the fact that they work as web widgets, making it easier for the user to plug and play the service on its website.

List of companies that provide monetization widgets:

7. Sponsored Reviews

PayPerPost pioneered this model, with much controversy on the beginning (related to the fact that they did not require disclosure on paid posts). Soon other companies followed, most notably Sponsored Reviews and ReviewMe, refining the process and expanding the paid blogging model.

Joining one of these sponsored reviews marketplaces will give you the opportunity to write sponsored posts on a wide range of topics. Not all bloggers are willing to get paid to write about a specific product or website (because it might compromise the editorial credibility), but the ones who do are making good money out of it.

If your blog has a big audience you could also offer sponsored reviews directly, cutting off the commissions of the middleman.

List of sponsored reviews and paid blogging networks:

8. RSS Feed Ads

With the quick adoption of the RSS technology by millions of Internet users, website owners are starting to find ways to monetize this new content distribution channel.

Feedburber already has its own publisher network, and you can sign-up to start displaying CPM based advertising on your feed footer. Bidvertiser recently introduced a RSS feed ad option as well, with a PPC scheme.

Finally, some blogs are also opting to sell banners or sponsored messages on their feed directly. John Chow and Marketing Pilgrim are two examples.

Related links:

9. Sponsors for Single Columns or Events

If you website has specific columns or events (e.g., a weekly podcast, an interview series, a monthly survey, a special project) you could find companies to sponsor them individually.

This method increases the monetization options for website owner, while giving advertisers the possibility to target a more specific audience and with a reduced commitment.

Mashable illustrates the case well. They have several advertising options on the site, including the possibility to sponsor specific columns and articles, including the “Daily Poll” and the “Web 2.0 Invites.”

Problogger also runs group writing projects occasionally, and before proceeding he publicly announce the project asking for sponsors.

10.Premium Content

Some websites and blogs give away part of their content for free, and charge for access to the premium content and exclusive tools.

SEOMoz is a good example. They have a very popular blog that gives advice and information on wide range of SEO related topics. On top of that visitors can decide to become premium members. It costs $48 monthly and it grants them access to guides, tools and other exclusive material.

11. Private Forums

While the Internet is populated with free forums, there is also the possibility to create a private one where members need to pay a single or recurring fee to join.

SEO Blackhat
charges $100 monthly from its members, and they have thousands of them. Obviously in order to charge such a price for a forum membership you need to provide real value for the members (e.g., secret techniques, tools, and so on).

Performancing also launched a private forum recently, focused on the networking aspect. It is called The Hive, and the monthly cost is $10.

These are just two examples. There are many possibilities to create a private and profitable forum, you just need to find an appealing angle that will make it worth for the members.

List of popular forum software:

12. Job Boards

All the popular blogs are trying to leverage job boards to make some extra income. Guy Kawasaki, ReadWriteWeb, Problogger… you name it.

Needless to say that in order to create an active and profitable job board you need first to have a blog focused on a specific niche, and a decent amount traffic.

The advantage of this method is that it is passive. Once you have the structure in place, the job listings will come naturally, and you can charge anywhere from $10 up to $100 for each.

List of popular job board software:

13. Marketplaces

Sitepoint is the online marketplace by excellence. Some websites and blogs, however, are trying to replicate that model on a smaller scale.

Depending on your niche, a market place that allows your visitors to buy, sell and trade products could work well. Over the time you could start charging a small fee for new product listings.

The problem with this method is that there are no standard software on the web, so you would need to hire a coder to get a marketplace integrated into your website.

You can see an example of a marketplaces being used on EasyWordpress and on Mashable.

14. Paid Surveys and Polls

There are services that will pay you money to run a small survey or poll on your website. The most popular one is called Vizu Answers.

Basically you need to sign up with them, and select the kind of polls that you want to run your site. Most of these services operate under a CPM model.

15. Selling or Renting Internal Pages

Million Dollar Wiki made this concept popular, but it was being used on the web for a long time around (check Pagerank10.co.uk for instance).

These websites sell for a single fee or rent for a recurring fee internal pages on their domain. Usually they have either high Pagerak or high traffic, so that people purchasing a page will be able to benefit in some way.

Implementing this method on a small blog would be difficult, but the concept is interesting and could be explored further.

16. Highlighted Posts from Sponsors

Techmeme probably pioneered this idea, but somehow it has not spread to other websites. The tech news aggregator displays editorial posts on the left column, and on the sidebar they have a section titled “Techmeme Sponsor Posts.”

On that section posts from the blog of the advertisers get highlighted, sending qualified traffic their way. Considering that the monthly cost for one spot is $5000 and that they have around 6 sponsors at any given time, it must be working well.

17. Donations

Placing a “Donate” link or button on a website can be an efficient way to earn money, especially if your blog is on a niche where readers learn and gain value from your content.

Personal development and productivity blogs, for instance, tend to perform well with donation based systems (one good example being Steve Pavlina).

A small variation of this method appeared sometime ago with the Buy Me a Beer plugin. This WordPress plugin enables you to insert a customized message at the bottom of each article, asking the readers to chip in for a beer or coffee.

18. In-text Adverting

In-text adverting networks like Kontera and Vibrant Media will place sponsored links inside your text. These links come with a double underline to differentiate them from normal links, and once the user rolls the mouse over the link the advertising will pop. Should the user click on it the site owner will make some money.

Some people make good money with this method, but others refrain from using it due to its intrusiveness. It is also interesting to note that very few mainstream websites have experimented with in-text advertising.

19. Pop-ups and Pop-unders

Pop-ups are a common yet annoying form of advertising on the Internet. If you are just trying to make a much money as possible from your website, you could experiment with them.

If you are trying to grow the traffic and generate loyal visitors, however, you probably should stay away from them. Just consider the hundreds of pop-up blockers out there: there is a reason why they are so popular.

Ad networks that use pop-ups:

20. Audio Ads

Also called PPP (Pay Per Play), this advertising method was introduce by Net Audio Ads. the concept is pretty simple: play a small audio advertising (usually 5 seconds) every time a visitor enters into your website. The user should not be able to stop it, creating a 100% conversion rate based on unique visitors.

The company is still rolling tests, but some users are reporting to get from a $4 to a $6 CPM. Regardless of the pay rate, though, this is a very intrusive form of advertising, so think twice before using it.

21. Selling the Website

Selling your website could be your last resource, but it has the potential to generate a big sum of money in a short period of time.

Market places on online forums like DigitalPoint and Sitepoint are always active with website buyers and sellers. Keep in mind that they most used parameter to determine the value of a website is the monthly revenue that it generates, multiplied by a certain number (the multiplier can be anything from 5 to 30, depending on the expectations of the seller, on the quality of the site, on the niche and other factors).

Some people also make money trading and flipping websites. They either create them from scratch or buy existing ones, and after some revamping they sell them for a profit.

Related links:

Indirect Methods

22. Selling an Ebook

Perhaps one of the oldest money making strategies on the web, using a website to promote a related ebook is a very efficient way to generate revenue.

You could either structure the website around the book itself, like SEOBook.com, or launch the ebook based on the success of the website, like FreelanceSwitch did we the book How to be a Rockstar Freelancer.

Related links:

23. Selling a Hardcover Book

Many authors and journalists leverage their blogs or websites to sell copies of hardcover books. Examples include Guy Kawasaki, Seth Godin and Malcolm Gladwell.

While most of these people were already renowned authors before they created their website, one could also follow the other way around. Lorelle VanFossen did exactly that with her Blogging Tips book. First she built her authority on the subject via her blog, and afterwards she published the book.

List of self publishing and publishing services:

24. Selling Templates or WordPress Themes

As more and more people decide to get an online presence, website templates and WordPress themes become hotter and hotter.

On this segment you have mainstream websites like TemplateMonster, as well as individual designers who decide to promote and sell their work independently.

Brian Gardner and Unique Blog Designs are two examples of websites that make money with the sales of premium and custom WordPress themes.

25. Offering Consulting and Related Services

Depending on your niche, you could make money by offering consulting and related services. If you are also the author of your blog, the articles and information that you will share will build your profile and possibly certify your expertise on that niche, making it easier to gain customers.

Chris Garrett used a similar strategy. First he created a highly influential blog on the blogging and new media niche, and afterwards he started offering consulting services to clients with related problems and needs.

26. Creating an Email List or Newsletter

Email lists and newsletters represent one of the most powerful marketing and money making tools on the Internet. They offer incredible conversion rates, and the possibility to call people to action in a very efficient way.

Creating a big list is a difficult task though, so if you have a popular website you could leverage it to increase the number of subscribers on your list.

Yaro Starak is a famous Internet marketer, and if you visit his blog you will notice that right on top he has a section encouraging visitors to subscribe to his email newsletter. Yaro generates five figures in revenues each month from his email newsletters, proving that this method works.

List of software to manage email newsletters:

27. Mentoring programs

People are willing to pay for someone or something that will teach them and give them knowledge (as opposed to mere information). Education is one of the biggest industries in the world, and the online landscape behaves in a similar way.

Creating a mentoring program related to the niche of your website could be very profitable if you manage to structure and promote it adequately. There is a wide range of media and tools that you can use to deliver the information, from text articles to audio and video lessons.

Brian Clark leveraged the success of Copyblogger to launch a mentoring program teaching people how to build membership and how to sell content online. The program is titled Teaching Sells, and it costs $97 monthly. Sounds expensive, but they have over 1,000 members.

28. Creating a conference around the website

If your website takes off and becomes an authority on its niche, you could create a conference around it. Depending on the size of your audience, the event could attract thousands of people, and you could make money directly from conference passes and sponsors.

Search Engine Land, for instance, created a series of conferences that visit several cities on the United States and on other countries as well. The conferences are called Search Marketing Expo, and the tickets and passes cost thousands of dollars.

source :- bloggershelp

Friday, July 11, 2008

VistaBootPRO dual boot vista and xp

Manage





System Boot Loader





Manage BCD Entries





Registry Settings




Settings






Restore







Advanced






Dual Boot Trouble Shooting Guide / Vista Running


This is a short add on guide for trouble shooting your dual boot with Vista running and XP installed.

Software required for this guide: VistaBootPro

Below is how to locate the ntldr, NTDETECT, and boot.ini while in Vista.
1. Open My Computer
2. Click on "Organize" and then click on "Folder and Search Options"
3. Then click on the "View" tab
4. In the list under "Advanced Settings" you need to find "Hide protected operating system files" and uncheck it and then click "Ok"

5. Once back into My Computer open your XP (or Vista) drive and you will now see more "protected" files
6. Select the three files in question and right click and then select "Copy"
7. Go back and open your Vista (or XP) drive and right click and then select paste

VistaBootPRO v.3.1 Method
8. Open VistaBootPRO and go to the "System Bootloader" screen
9. Select to "Reinstall the Vista Bootloader" and then click on Install Bootloader
End v.3.1

VistaBootPRO v.3.3 Method
8. Open VistaBootPRO and go to the "System Bootloader" screen
9. Select "Windows Vista Bootloader"
10. Select "All Drives"

Note: Before continuing quit any I/O sensitive applications.

11. Select Force Install and then click on "Install Bootloader"
End v.3.3

10. Once done exit VistaBootPRO and reboot your system


Drive letters were not included due to the different configurations.





If it is still not booting then your boot.ini can be incorrect. Below is a typical boot.ini.


[boot loader]
timeout=30
default=multi(0)disk(0)rdisk(1)partition(1)\WINDOWS
[operating systems]
multi(0)disk(0)rdisk(1)partition(1)\WINDOWS="Microsoft Windows XP Professional" /NOEXECUTE=OPTIN /FASTDETECT


The major components of the boot.ini are rdisk(#) and partition(#). Do not change disk(#) unless you are running SCSI drives. When you open Disk Manager, you will see your hard drives listed a Disk 0, Disk 1 and so on depending on how many hard drives you have. The boot.ini rdisk(#) should point to the disk with XP on it associated with the Disk Manager. The boot.ini partition(#) should point to the partition XP is on. The first section of a hard drive is partition 1 and so on. Remember; rdisk(#) can have a 0 such as rdisk(0). On the other hand, partition(#) will always have a 1 or greater. Below you will see my hard drive configuration.





Folks, the basic principle is that all the boot system files for both operating system need to be on the drive/partition tagged "System" in Disk Management (right click My Computer or Computer>Manage). The boot system files for Vista are the folder Boot (and contents) and bootmgr and for XP NTDETECT.COM, ntldr and boot.ini. Boot.ini needs to be pointing to the correct drive/partition. It doesn't hurt to have all these files on both operating system root drive/partitions as this has been known to fix the issue for some or other reason.

Once you have those all on the "System" drive/partition you can Install the Vista bootloader from the System Bootloader page of VistaBootPRO, or run Diagnostics from the Diagnostics menu item and then go to the Manage OS Entries page and if the entries there don't look right and don't work when you reboot and test them, then either the boot.ini is incorrect or the drive letter assigned to the entries is incorrect.

Do not change the drive letters in Computer or Disk Management as that will more than likely cause your systme to be unbootable for that OS.

You can also run a Startup repair by booting to the Vista DVD and selecting Repair my computer at the Install now setup screen.

If all else fails then try to rebuild the BCD by running these commands from the command prompt after booting to the Vista DVD and selecting the command prompt at the same place you would run a startup repair:

Bootrec.exe /RebuildBcd

The /RebuildBcd option scans all disks for installations that are compatible with Windows Vista. Additionally, this option lets you select the installations that you want to add to the BCD store. Use this option when you must completely rebuild the BCD.

Note If rebuilding the BCD does not resolve the startup issue, you can export and delete the BCD, and then run this option again. By doing this, you make sure that the BCD is completely rebuilt. To do this, type the following commands at the command prompt:

• bcdedit /export C:\BCD_Backup
• c:
• cd boot
• attrib bcd -s -h -r
• ren c:\boot\bcd bcd.old
• bootrec /RebuildBcd




Unplugged XP Drive for Vista Setup: Can't Dual Boot to XP


So…you unplugged your Windows XP hard drive before Windows Vista setup, so that you didn’t fubar your XP installation. Both XP and Vista boot fine when you change the boot drive order in the BIOS, effectively changing the Windows system drive each time, but that gets a bit tiresome.

Windows XP needs the following files to be on the system drive for it to be able to boot;

boot.ini
NTDETECT.COM
ntldr

and Windows Vista needs these files to be on the system drive for it to be able to boot;

Boot (folder and contents, most importantly the BCD store)
bootmgr

To sort this out, follow the steps below:

1. Plug both drives in and set the Windows XP drive to be the boot drive in the BIOS. This will make it the system drive and although it doesn’t really matter whether the XP or Vista drive is the system drive, it tends to be easier to manage and control booting, from Windows XP.

2. Open Disk Management (right click My Computer>Manage) and go to Disk Management to check that your XP drive is your system drive, although the fact that you were able to boot to XP should already confirm that.

3. Open Windows Explorer and make sure you set Folder Options in Control Panel to be able to see hidden files and files and unhide protected operating system files. You’ll find folder options in the same place in Vista if you select Classic View for Control Panel.

4. Copy the folder Boot and the file bootmgr from your Vista installation drive and paste it to your XP installation drive.


Disk Management
Files to be copied




Files copied




5. Download and install VistaBootPRO and then open it to the Bootloader tab. Select “Reinstall the Vista bootloader” and press Apply.

Reinstall the Vista booloader




6. Now go to the Manage OS Entries tab and select “Add new operating system entry”and make sure you select “Windows Legacy”, give the entry a name like “Windows XP”, select the drive letter you have ntldr on as the drive letter and press Apply (This drive letter must also be your system drive which is set to boot in the BIOS). You can now choose which entry you want to be the default to which the system will boot by default.

Add new XP entry





Reboot and choose which Operating System you want to boot to.



source

http://www.vistabootpro.org/

How to Shutdown your Windows Vista Computer at a particular time.

ere are a few ways in which you can make your Windows Computer shutdown (or Restart) at a particular time. This can prove to be especially useful at times !

1) First, as was mentioned elsewhere on this site, you can create a shortcut, programmed to shutdown after a particular period of time as follows:
Right click on an empty area on your desktop.
Select New > Shortcut.
In the first box of the Create Shortcut Wizard, type
Shutdown -s -t 3600
Click Next. Name the shortcut : Shutdown, and click Finish.
Then select an appropriate icon for it !
Here 3600 is 3600 sec's or 60 min's or 1 hr. You can change the figure to what you wish. After the specified period of time the Computer will automatically initiate a shutdown without a warning.

2) Alternatively, Open Run and type:
at 21:30 shutdown -s
A black window will pop up and disappear.
A warning dialog box will then appear and your PC will start shutdown. Do note that the timings have to be mentioned in the 24 hr format here.
3) Using the Windows Vista Task Scheduler also offers a way to shutdown your computer at particular times.
Click Start > All Program > Accessories > SystemTools > Task Scheduler.
On the RHS, in the Actions column, click on Create Basic Task.
Give it a name like Shutdown and some add a Description too.
Click Next. Here select the Trigger. Lets say you want it to shutdown just One time, then select that option and click Next. It will ask you for the date and the time. Click Next.
In the Actions section, select Start a program. Click Next.
Here under Program/script, type:
C:\Windows\System32\shutdown.exe
and under Add arguments, type:
/s
Click Next.

You will now be presented with a Summary. Click Finish. Your Vista will now shutdown at the pre configured time.
4) You can also use a bat file for achieving this. To create a .bat file, copy paste the following in a notepad:
@echo off
title Scheduled Shutdown Batch
color A
echo Enter Time To Shutdown (Use 24 hr format, eg 21:35)
set /p stime=
cls
at %stime% ""shutdown -s -t 00"" >nul
echo Your PC Will Auto Shutdown At %stime%
echo Press Any Key To Exit
pause >nul
exit
Then in the Notepad, from the File menu on top LHS, select Save As. Save the file as Shutdown.bat
When you click the Shutdown.bat, a black box will appear, asking you to fill in the time you want the computer to shutdown. Type the time in the 24 hr format, separating the hr from the minutes by a ':' and hit enter. Thats it, your computer will shutdown at the desired time ! If you wish, you can download the ready-to-use .bat file from here.
If you wish to display a message, you can also add
-c "desired message" at the end of the shutdown command.
Like, for example:
shutdown -s -t 60 -c "Enough gaming buddy-Time to sleep"
You can also use this command to schedule your PC's Restart using the following code instead:
shutdown -r -t 60 -c "Restarting Computer" . Thanks Jerin.
5) Finally, the easiest way, is to download this freeware WinOFF. It is an utility designed to schedule the shut down of Windows computers, with several shut down modes and is fully configurable.
Some of its features are: Scheduled shut downs, either at a set time (e.g. 12:30 PM) or after a period of time (e.g. 1 hour and 25 minutes); Perform a shut down when the CPU becomes idle; Several types of shut down (shut down, restart, close session, power off, administrative shut down/restart, suspend, hibernate and lock computer, etc, etc. Worth a checkout !
pre configured time.

Thursday, July 10, 2008

List of Rundll32 shortcut commands for Windows Vista.

To Create Desktop Shortcuts : Rt click on desktop > New > Shortcut. In the first box of the Create Shortcut Wizard, copy-paste the desired command. Then Click Next. Give the Shortcut a Name. Finally, select an appropriate icon for it.

List goes here :-

Add/Remove Programs
RunDll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,0

Content Advisor
RunDll32.exe msrating.dll,RatingSetupUI

Control Panel
RunDll32.exe shell32.dll,Control_RunDLL

Delete Temporary Internet Files:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 8

Delete Cookies:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 2

Delete History:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 1

Delete Form Data:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 16

Delete Passwords:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 32

Delete All:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 255

Delete All + files and settings stored by Add-ons:
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 4351

Date and Time Properties
RunDll32.exe shell32.dll,Control_RunDLL timedate.cpl

Display Settings
RunDll32.exe shell32.dll,Control_RunDLL access.cpl,,3

Device Manager
RunDll32.exe devmgr.dll DeviceManager_Execute

Folder Options - General
RunDll32.exe shell32.dll,Options_RunDLL 0

Folder Options - File Types
RunDll32.exe shell32.dll,Control_Options 2

Folder Options - Search
RunDll32.exe shell32.dll,Options_RunDLL 2

Folder Options - View
RunDll32.exe shell32.dll,Options_RunDLL 7

Forgotten Password Wizard
RunDll32.exe keymgr.dll,PRShowSaveWizardExW

Hibernate
RunDll32.exe powrprof.dll,SetSuspendState

Internet Explorer’s Internet Properties dialog box.
Rundll32 Shell32.dll,ConBring up trol_RunDLL Inetcpl.cpl,,6

Keyboard Properties
RunDll32.exe shell32.dll,Control_RunDLL main.cpl @1

Lock Screen
RunDll32.exe user32.dll,LockWorkStation

Mouse Button - Swap left button to function as right
Rundll32 User32.dll,SwapMouseButton

Mouse Properties Dialog Box
Rundll32 Shell32.dll,Control_RunDLL main.cpl @0,0

Map Network Drive Wizard
Rundll32 Shell32.dll,SHHelpShortcuts_RunDLL Connect

Network Connections
RunDll32.exe shell32.dll,Control_RunDLL ncpa.cpl

Organize IE Favourites
Rundll32.exe shdocvw.dll,DoOrganizeFavDlg

Open With Dialog Box
Rundll32 Shell32.dll,OpenAs_RunDLL Any_File-name.ext

Printer User Interface
Rundll32 Printui.dll,PrintUIEntry /?

Printer Management Folder.
Rundll32 Shell32.dll,SHHelpShortcuts_RunDLL PrintersFolder

Power Options
RunDll32.exe Shell32.dll,Control_RunDLL powercfg.cpl

Process Idle Tasks
rundll32.exe advapi32.dll,ProcessIdleTasks

Regional and Language Options
Rundll32 Shell32.dll,Control_RunDLL Intl.cpl,,0

Stored Usernames and Passwords
RunDll32.exe keymgr.dll,KRShowKeyMgr

Safely Remove Hardware Dialog Box
Rundll32 Shell32.dll,Control_RunDLL HotPlug.dll

Sound Properties Dialog Box
Rundll32 Shell32.dll,Control_RunDLL Mmsys.cpl,,0

System Properties Box
Rundll32 Shell32.dll,Control_RunDLL Sysdm.cpl,,3

System Properties - Advanced
RunDll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,4

System Properties: Automatic Updates
RunDll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,5

Taskbar Properties
RunDll32.exe shell32.dll,Options_RunDLL 1

User Accounts
RunDll32.exe shell32.dll,Control_RunDLL nusrmgr.cpl

Unplug/Eject Hardware
RunDll32.exe shell32.dll,Control_RunDLL hotplug.dll

Windows Security Center
RunDll32.exe shell32.dll,Control_RunDLL wscui.cpl

Windows - About
RunDll32.exe SHELL32.DLL,ShellAboutW

Windows Fonts Installation Folder
Rundll32 Shell32.dll,SHHelpShortcuts_RunDLL FontsFolder

Windows Firewall
RunDll32.exe shell32.dll,Control_RunDLL firewall.cpl

Wireless Network Setup
RunDll32.exe shell32.dll,Control_RunDLL NetSetup.cpl,@0,WNSW

Speed up your Torrents

First go to Options>Preferences>Network
1. Under ‘Port used for incomming connections‘ enter any port number. It is best to use a port number above 10000. I use 45682.
2. Randomize port each time µtorrent starts: UNCHECKED
I leave this unchecked because I have a router. If you do not have a router or a firewall, and want extra security,check this option.
3. Enable UPnP port mapping (Windows Xp or later only): UNCHECKED
I leave this unchecked because I have experienced it slowing down speeds. It is not needed if you manually port forward.
4. Add µtorrent to Windows Firewall exceptions (Windows XP SP2 or later only): UNCHECKED (do this only if you have windows firewall disabled)
5. Global Maximum upload rate (kb/s): [0: unlimited]: 22 (for 256k connection)
6. Protocol Encryption: ENABLED
I would recommend everyone to enable this. This can help increase speeds with many ISPs.
7. Allow incoming Legacy Connections: CHECKED

Options>Preferences>Torrents
1. Global Maximum Number of Connections: 130 (for 256k connection)
This number should not be set too low or the number of connections made to your torrents will be limited. Setting it too high may cause too much bandwidth to be used and can cause slowdowns.
2. Maximum Number of connected peers per torrent: 70 (for 256k connection)
If you see that the peers connected to a specific torrent are exactly this number, or very close, increase this number to improve speeds.
3. Number of upload slots per torrent: 3 (for 256k connection)
This depends on how much you want to upload to other users. Do not set too low or it may affect download speeds.
4. Use additional upload slots if upload speed <90%: CHECKED
5. Maximum number of active torrents: 2 (for 256k connection)
6. Maximum number of active downloads: 1 (for 256k connection)

Monday, July 7, 2008

IPod Diagnostic Mode Tutorial


IPod Diagnostic Mode Tutorial - The funniest videos clips are here

How To Modify the Windows XP boot screen



Windows XP Boot.ini Modify - video powered by Metacafe

A quick visual tutorial on how to change the boot screen dialogue on any Windows XP machine. Great for messing wtih friends.

Fire Fox 3 easter egg, Welcome Humans!

IN fire fox 3 type

about:robots

in the address bar.


check it out !!!!

How to Get Your RAMBack From Firefox 3!

Let me start out by saying, if you haven’t already downloaded Firefox 3, then you definitely should. Although the Firefox team did fix the major memory leaks issues that haunted earlier versions, Firefox 3 with all the plugins, enhanced bookmarking system could still be a memory hog.

Tools Needed:

1. Firefox

Now that you have your tools ready, you can follow those next steps after the jump.

Step 1: After downloading and installing Firefox visit the following page to download the RAMBack plugin / add-on. Click on the “Add to Firefox” button. You will be prompted with the screenshot below. Click “Install Now“.

Step 2: Now restart your browser to complete the installation.

Step 3: After restarting your browser check under tools, you’ll see a the new “Clear Caches“, just right below “Clear Private Data…“.

Step 4: Does it work? I can say it works to a degree, and I assume this add-on / plugin will be very helpful especially if you have your browser open for long hours.

Before Clearing Caches //

After Clearing Caches //

That’s it. Let me know if it works for you, or if you know about any other plugins / add-ons that do a better job.

How to move your mouse cursor without mouse?

You can control your mouse pointer with keyboard keys in all windows versions. When your mouse stops working, you can enable this keyboard feature to complete your important work. This keyboard mouse can performs all tasks same like a normal mouse.

Follow the given steps to activate the keyboard mouse:

To edit this feature, first you should log onto your computer with administrative rights.

To activate this feature, press Alt+Shift+NumLock keys at once and you will receive a small MouseKey box.

To keep MouseKeys on, click on Ok button or click on cancel button to cancel MouseKeys box.

Click on Settings button, if you want to adjust the mouse cursor detail settings.

Here a new dialog box will appear with the title “Settings for MouseKeys", now you can manage all mouse settings for example mouse cursor speed, acceleration and some other features.

Now using Numeric keypad, you can move your mouse pointer. The controls are:

  • 1,2,3,4,6,7,8 and 9 keys are used to move the mouse cursor into different directions.

  • Key 5 is used as mouse click button.

  • Insert key used to hold down mouse button.

  • + Sign used to double click on any object.

  • Delete button used to release the mouse.

  • Click on NumLock button to disable this keyboard mouse feature.

How to Make Money via Working at Home

Make Money Online, Fast and From Home: Money Making Mommy
Work at home jobs for moms. Ways to make money online and other work at home ... Subscribe: Money Making Mommy FREE Weekly JOB Newsletter - Work at home ...
www.moneymakingmommy.com/

Make Money Online | Make Money At Home
Make money online. Make money at home. The best of everything you need to make money working at home. Make money articles, ideas, opportunities, free make ...
www.team-schuman.com/

Work At Home! Work From Home Jobs! Home Business! Make Money At ...
Work At Home. Work From Home Jobs. Free Advertising! Free Contests! Make Money At Home Now! Increase Your Income!
www.money-at-home.com/

Money-From-Home.com
Another exciting way to make money from home in your own work at home business if you've ever dreamed of having your own making money opportunity as a work ...
www.moneyfromhome.com/

Work at Home Based Business - How To Make Money Online!
Downloadable training manual teaches you how to work at home on your computer and earn extra income by mastering Internet affiliate programs.
www.work-at-home-net-guides.com/

Removing Add/Remove Programs Entries From RegEdit

Generally we use Add/Remove programs option in Control Panel to remove any unwanted program from our computer. Normally this may be due to poorly designed uninstaller with this program. That is why some programs may not be removed properly and a reference to this program remains in the computer registry. This reference in registry may be creating problems to run your computer smoothly. Here you need to delete this reference to edit your computer registry using RegEdit editor.

  • First go to Start button and open Run dialog box. Type here RegEdit and press Enter.

  • Now in editor Navigate to the given path

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall.

  • Here locate the entry created by your program with its name and select that entry from the list on the left panel and delete its key.

  • Close the Registry Editor and restart your computer, the program will be removed from your computer permanently.

How to Enable Folder Options and Registry Editor in Windows

Here is the tutor that helps to enable folder option when u are infected by a trojan. Check it below.

If Folder Options is disabled but Registry Editor is still working in your system, then you can enable Folder Options by

editing Windows Registry. Type regedit in RUN dialog box and press Enter. it’ll open Registry Editor, now go to following keys:

HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\Explorer
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\Explorer

In right-side pane, check whether a DWORD value named NoFolderOptions exists or not? If it exists, delete it.

But sometimes Registry Editor is also disabled. Whenever you try to open regedit, Windows will show following error message:

Registry Editor has been disabled by administrator.

Its a symptom of “RONTOKBRO” Trojan.

If its not a trojan problem and someone intentionally has disabled it in your system, then you can enable it again by following any of these methods:

1.Type gpedit.msc in RUN dialog box and goto:

User Configuration -> Administrative Templates -> System

in right-side pane, set “Prevent access to Registry editing tools” to either Not Configured or Disabled.

2. Just type following in RUN dialog box and press :

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f

Now after enabling Registry Editor, you can re-enable Folder Options from above option.

Thursday, July 3, 2008

10-Best-Security-Software-Tools-for-Linux

Linux is a hacker’s dream computer operating system. It supports tons of tools and utilities for cracking passwords, scanning network vulnerabilities, and detecting possible intrusions. I have here a collection of 10 of the best hacking and security software tools for Linux. Please always keep in mind that these tools are not meant to harm, but to protect.




1. John the Ripper


John the Ripper is a free password cracking software tool initially developed for the UNIX operating system. It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL and others.



2. Nmap


Nmap is my favorite network security scanner. It is used to discover computers and services on a computer network, thus creating a "map" of the network. Just like many simple port scanners, Nmap is capable of discovering passive services on a network despite the fact that such services aren't advertising themselves with a service discovery protocol. In addition Nmap may be able to determine various details about the remote computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that product, presence of some firewall techniques and, on a local area network, even vendor of the remote network card.


Nmap runs on Linux, Microsoft Windows, Solaris, and BSD (including Mac OS X), and also on AmigaOS. Linux is the most popular nmap platform and Windows the second most popular.



3. Nessus


Nessus is a comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems such as:


-Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.

-Misconfiguration (e.g. open mail relay, missing patches, etc).

-Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.

-Denials of service against the TCP/IP stack by using mangled packets


Nessus is the world's most popular vulnerability scanner, estimated to be used by over 75,000 organizations worldwide. It took first place in the 2000, 2003, and 2006 security tools survey from SecTools.Org.



4. chkrootkit


chkrootkit (Check Rootkit) is a common Unix-based program intended to help system administrators check their system for known rootkits. It is a shell script using common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures and for comparing a traversal of the /proc filesystem with the output of the ps (process status) command to look for discrepancies.


It can be used from a "rescue disc" (typically a Live CD) or it can optionally use an alternative directory from which to run all of its own commands. These techniques allow chkrootkit to trust the commands upon which it depend a bit more.


There are inherent limitations to the reliability of any program that attempts to detect compromises (such as rootkits and computer viruses). Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs or take other measures to evade detection by them.



5. Wireshark


Wireshark is a free packet sniffer computer application used for network troubleshooting, analysis, software and communications protocol development, and education. In June 2006, the project was renamed from Ethereal due to trademark issues.


The functionality Wireshark provides is very similar to tcpdump, but it has a GUI front-end, and many more information sorting and filtering options. It allows the user to see all traffic being passed over the network (usually an Ethernet network but support is being added for others) by putting the network interface into promiscuous mode.


Wireshark uses the cross-platform GTK+ widget toolkit, and is cross-platform, running on various computer operating systems including Linux, Mac OS X, and Microsoft Windows. Released under the terms of the GNU General Public License, Wireshark is free software.



6. netcat


netcat is a computer networking utility for reading from and writing to network connections on either TCP or UDP.


Netcat was voted the second most useful network security tool in a 2000 poll conducted by insecure.org on the nmap users mailing list. In 2003, it gained fourth place, a position it also held in the 2006 poll.


The original version of netcat is a UNIX program. Its author is known as *Hobbit*. He released version 1.1 in March of 1996.


Netcat is fully POSIX compatible and there exist several implementations, including a rewrite from scratch known as GNU netcat.



7. Kismet


Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b and 802.11g traffic.


Kismet is unlike most other wireless network detectors in that it works passively. This means that without sending any loggable packets, it is able to detect the presence of both wireless access points and wireless clients, and associate them with each other.


Kismet also includes basic wireless IDS features such as detecting active wireless sniffing programs including NetStumbler, as well as a number of wireless network attacks.



8. hping


hping is a free packet generator and analyzer for the TCP/IP protocol. Hping is one of the de facto tools for security auditing and testing of firewalls and networks, and was used to exploit the idle scan scanning technique (also invented by the hping author), and now implemented in the Nmap Security Scanner. The new version of hping, hping3, is scriptable using the Tcl language and implements an engine for string based, human readable description of TCP/IP packets, so that the programmer can write scripts related to low level TCP/IP packet manipulation and analysis in very short time.


Like most tools used in computer security, hping is useful to both system administrators and crackers (or script kiddies).



9. Snort


Snort is a free and open source Network Intrusion prevention system (NIPS) and network intrusion detection (NIDS) capable of performing packet logging and real-time traffic analysis on IP networks.


Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features. The software is mostly used for intrusion prevention purposes, by dropping attacks as they are taking place. Snort can be combined with other software such as SnortSnarf, sguil, OSSIM, and the Basic Analysis and Security Engine (BASE) to provide a visual representation of intrusion data. With patches for the Snort source from Bleeding Edge Threats, support for packet stream antivirus scanning with ClamAV and network abnormality with SPADE in network layers 3 and 4 is possible with historical observation.



10. tcpdump


tcpdump is a common computer network debugging tool that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.


In some Unix-like operating systems, a user must have superuser privileges to use tcpdump because the packet capturing mechanisms on those systems require elevated privileges. However, the -Z option may be used to drop privileges to a specific unprivileged user after capturing has been set up. In other Unix-like operating systems, the packet capturing mechanism can be configured to allow non-privileged users to use it; if that is done, superuser privileges are not required.


The user may optionally apply a BPF-based filter to limit the number of packets seen by tcpdump; this renders the output more usable on networks with a high volume of traffic.


RedHat: Critical: firefox security update

Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team.

Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

Mozilla Firefox is an open source Web browser.

Multiple flaws were found in the processing of malformed JavaScript
content. A web page containing such malicious content could cause Firefox
to crash or, potentially, execute arbitrary code as the user running
Firefox. (CVE-2008-2801, CVE-2008-2802, CVE-2008-2803)

Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Firefox to crash or,
potentially, execute arbitrary code as the user running Firefox.
(CVE-2008-2798, CVE-2008-2799, CVE-2008-2811)

Several flaws were found in the way malformed web content was displayed. A
web page containing specially-crafted content could potentially trick a
Firefox user into surrendering sensitive information. (CVE-2008-2800)

Two local file disclosure flaws were found in Firefox. A web page
containing malicious content could cause Firefox to reveal the contents of
a local file to a remote attacker. (CVE-2008-2805, CVE-2008-2810)

A flaw was found in the way a malformed .properties file was processed by
Firefox. A malicious extension could read uninitialized memory, possibly
leaking sensitive data to the extension. (CVE-2008-2807)

A flaw was found in the way Firefox escaped a listing of local file names.
If a user could be tricked into listing a local directory containing
malicious file names, arbitrary JavaScript could be run with the
permissions of the user running Firefox. (CVE-2008-2808)

A flaw was found in the way Firefox displayed information about self-signed
certificates. It was possible for a self-signed certificate to contain
multiple alternate name entries, which were not all displayed to the user,
allowing them to mistakenly extend trust to an unknown site.
(CVE-2008-2809)

All Mozilla Firefox users should upgrade to these updated packages, which
contain backported patches that correct these issues.


Package List:

Red Hat Enterprise Linux Desktop (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/devhelp-0.12-17.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/firefox-3.0-2.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9-1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/yelp-2.16.0-19.el5.src.rpm

i386:
devhelp-0.12-17.el5.i386.rpm
devhelp-debuginfo-0.12-17.el5.i386.rpm
firefox-3.0-2.el5.i386.rpm
firefox-debuginfo-3.0-2.el5.i386.rpm
xulrunner-1.9-1.el5.i386.rpm
xulrunner-debuginfo-1.9-1.el5.i386.rpm
yelp-2.16.0-19.el5.i386.rpm
yelp-debuginfo-2.16.0-19.el5.i386.rpm

x86_64:
devhelp-0.12-17.el5.i386.rpm
devhelp-0.12-17.el5.x86_64.rpm
devhelp-debuginfo-0.12-17.el5.i386.rpm
devhelp-debuginfo-0.12-17.el5.x86_64.rpm
firefox-3.0-2.el5.i386.rpm
firefox-3.0-2.el5.x86_64.rpm
firefox-debuginfo-3.0-2.el5.i386.rpm
firefox-debuginfo-3.0-2.el5.x86_64.rpm
xulrunner-1.9-1.el5.i386.rpm
xulrunner-1.9-1.el5.x86_64.rpm
xulrunner-debuginfo-1.9-1.el5.i386.rpm
xulrunner-debuginfo-1.9-1.el5.x86_64.rpm
yelp-2.16.0-19.el5.x86_64.rpm
yelp-debuginfo-2.16.0-19.el5.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/devhelp-0.12-17.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/xulrunner-1.9-1.el5.src.rpm

i386:
devhelp-debuginfo-0.12-17.el5.i386.rpm
devhelp-devel-0.12-17.el5.i386.rpm
xulrunner-debuginfo-1.9-1.el5.i386.rpm
xulrunner-devel-1.9-1.el5.i386.rpm
xulrunner-devel-unstable-1.9-1.el5.i386.rpm

x86_64:
devhelp-debuginfo-0.12-17.el5.i386.rpm
devhelp-debuginfo-0.12-17.el5.x86_64.rpm
devhelp-devel-0.12-17.el5.i386.rpm
devhelp-devel-0.12-17.el5.x86_64.rpm
xulrunner-debuginfo-1.9-1.el5.i386.rpm
xulrunner-debuginfo-1.9-1.el5.x86_64.rpm
xulrunner-devel-1.9-1.el5.i386.rpm
xulrunner-devel-1.9-1.el5.x86_64.rpm
xulrunner-devel-unstable-1.9-1.el5.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/devhelp-0.12-17.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/firefox-3.0-2.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/xulrunner-1.9-1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/yelp-2.16.0-19.el5.src.rpm

i386:
devhelp-0.12-17.el5.i386.rpm
devhelp-debuginfo-0.12-17.el5.i386.rpm
devhelp-devel-0.12-17.el5.i386.rpm
firefox-3.0-2.el5.i386.rpm
firefox-debuginfo-3.0-2.el5.i386.rpm
xulrunner-1.9-1.el5.i386.rpm
xulrunner-debuginfo-1.9-1.el5.i386.rpm
xulrunner-devel-1.9-1.el5.i386.rpm
xulrunner-devel-unstable-1.9-1.el5.i386.rpm
yelp-2.16.0-19.el5.i386.rpm
yelp-debuginfo-2.16.0-19.el5.i386.rpm

ia64:
devhelp-0.12-17.el5.ia64.rpm
devhelp-debuginfo-0.12-17.el5.ia64.rpm
devhelp-devel-0.12-17.el5.ia64.rpm
firefox-3.0-2.el5.ia64.rpm
firefox-debuginfo-3.0-2.el5.ia64.rpm
xulrunner-1.9-1.el5.ia64.rpm
xulrunner-debuginfo-1.9-1.el5.ia64.rpm
xulrunner-devel-1.9-1.el5.ia64.rpm
xulrunner-devel-unstable-1.9-1.el5.ia64.rpm
yelp-2.16.0-19.el5.ia64.rpm
yelp-debuginfo-2.16.0-19.el5.ia64.rpm

ppc:
devhelp-0.12-17.el5.ppc.rpm
devhelp-debuginfo-0.12-17.el5.ppc.rpm
devhelp-devel-0.12-17.el5.ppc.rpm
firefox-3.0-2.el5.ppc.rpm
firefox-debuginfo-3.0-2.el5.ppc.rpm
xulrunner-1.9-1.el5.ppc.rpm
xulrunner-1.9-1.el5.ppc64.rpm
xulrunner-debuginfo-1.9-1.el5.ppc.rpm
xulrunner-debuginfo-1.9-1.el5.ppc64.rpm
xulrunner-devel-1.9-1.el5.ppc.rpm
xulrunner-devel-1.9-1.el5.ppc64.rpm
xulrunner-devel-unstable-1.9-1.el5.ppc.rpm
yelp-2.16.0-19.el5.ppc.rpm
yelp-debuginfo-2.16.0-19.el5.ppc.rpm

s390x:
devhelp-0.12-17.el5.s390.rpm
devhelp-0.12-17.el5.s390x.rpm
devhelp-debuginfo-0.12-17.el5.s390.rpm
devhelp-debuginfo-0.12-17.el5.s390x.rpm
devhelp-devel-0.12-17.el5.s390.rpm
devhelp-devel-0.12-17.el5.s390x.rpm
firefox-3.0-2.el5.s390.rpm
firefox-3.0-2.el5.s390x.rpm
firefox-debuginfo-3.0-2.el5.s390.rpm
firefox-debuginfo-3.0-2.el5.s390x.rpm
xulrunner-1.9-1.el5.s390.rpm
xulrunner-1.9-1.el5.s390x.rpm
xulrunner-debuginfo-1.9-1.el5.s390.rpm
xulrunner-debuginfo-1.9-1.el5.s390x.rpm
xulrunner-devel-1.9-1.el5.s390.rpm
xulrunner-devel-1.9-1.el5.s390x.rpm
xulrunner-devel-unstable-1.9-1.el5.s390x.rpm
yelp-2.16.0-19.el5.s390x.rpm
yelp-debuginfo-2.16.0-19.el5.s390x.rpm

x86_64:
devhelp-0.12-17.el5.i386.rpm
devhelp-0.12-17.el5.x86_64.rpm
devhelp-debuginfo-0.12-17.el5.i386.rpm
devhelp-debuginfo-0.12-17.el5.x86_64.rpm
devhelp-devel-0.12-17.el5.i386.rpm
devhelp-devel-0.12-17.el5.x86_64.rpm
firefox-3.0-2.el5.i386.rpm
firefox-3.0-2.el5.x86_64.rpm
firefox-debuginfo-3.0-2.el5.i386.rpm
firefox-debuginfo-3.0-2.el5.x86_64.rpm
xulrunner-1.9-1.el5.i386.rpm
xulrunner-1.9-1.el5.x86_64.rpm
xulrunner-debuginfo-1.9-1.el5.i386.rpm
xulrunner-debuginfo-1.9-1.el5.x86_64.rpm
xulrunner-devel-1.9-1.el5.i386.rpm
xulrunner-devel-1.9-1.el5.x86_64.rpm
xulrunner-devel-unstable-1.9-1.el5.x86_64.rpm
yelp-2.16.0-19.el5.x86_64.rpm
yelp-debuginfo-2.16.0-19.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

Older Versions Of Firefox, IE Put 45% Of All Internet Users At Risk

Firefox 2 is considered to be the most secure Web browser because 83.3% of its users worldwide are running the most current version.

Computer security researchers from ETH Zurich, Google, and IBM believe computer software would be more secure if, like a perishable food product, it were labeled with an expiration date.

In a newly published paper, Stefan Frei and Martin May of the Computer Engineering and Networks Laboratory at ETH Zurich, Thomas Dubendorfer of Google Switzerland, and Gunter Ollmann of IBM Internet Security Systems make this recommendation because they found that 637 million (45.2%) out of 1.4 billion Internet users worldwide are at risk from their failure to use the latest, most secure version of their chosen Internet browsers.

"Given the state of the software industry and the growing threat of exploitable vulnerabilities within all applications (not just Web browsers), we believe that the establishment of a 'best before' date for all new software releases could prove an invaluable means to educating the user to patch or 'refresh' their software applications," the paper says. "The same 'best before' date information could also be leveraged by Internet businesses to help evaluate or mitigate the risk of customers who are using out of date software and are consequently at a higher risk of having been compromised."

The issue of browser security matters more these days because more and more malware is targeting Web browser vulnerabilities. Remotely exploitable vulnerabilities have been on the rise since 2000 and accounted for 89.4% of vulnerabilities reported in 2007, according to the study, which claims that "[a] growing percentage of these remotely exploitable vulnerabilities are associated with Web browsers."

Among the various Web browsers studied -- Internet Explorer 7, Firefox 2, Safari 3, and Opera 9 -- Firefox 2 is the most secure, according to the study.

Firefox 2 is considered to be the most secure Web browser because 83.3% of its users worldwide are running the most current version. Second, third, and fourth places go to Apple Safari 3 (65.3% of users running the most current version), Opera 9 (56.1%), and Microsoft Internet Explorer 7 (47.6%).

"It is noteworthy that it has taken 19 months since the initial general availability of IE7 (public release October 2006) to reach 52.5% proliferation amongst users that navigate the Internet with Microsoft's Web browser," the paper says. "Meanwhile, 92.2% of Firefox users have migrated to FF2."

The paper also observes that within three months of the release of Apple's Safari 3 browser, 60% of users had upgraded, likely because of "Apple's controversial inclusion of the new Web browser in the auto-updates of other popular Apple software products." In March, Mozilla CEO John Lilly said Apple's decision to make its Safari Web browser available to Windows users by default "borders on malware distribution practices."

The researchers define the most secure Web browser as "the latest official public release of a vendor's Web browser at a given date." This definition, which excludes beta versions, assumes that the risk of encountering malware that could compromise one's browser is the same regardless of browser market share.

In reality, users of Internet Explorer (78.3% worldwide market share average between February and June 2008) will probably encounter more malware than users of Opera (0.8% worldwide market share during the same period). This is because malware writers tend to target exploit attempts at the widest possible audience.

However, browser brand doesn't tell the whole story since browsers rely on common technology like Adobe Flash, which has had, and continued to have, its share of vulnerabilities. Along similar lines, the study cites research by computer security firm Secunia that indicates some 21.7% of all QuickTime 7 installations are out of date. Thus, having the most current version of one's favorite Web browser may not help if one's other software is outdated.