custom search

live forex charts

powered by Forex Goer

Monday, December 29, 2008

The Cab - Whisper War 2008


Songs:
1. One Of Those Nights (Album Version) 3:48
2. Bounce (Album Version) 3:34
3. I'll Run (Album Version) 3:46
4. High Hopes In Velvet (Album Version) 3:22
5. That '70s Song (Album Version) 3:33
6. Take My Hand (Album Version) 3:27
7. Risky Business (Album Version) 3:35
8. I'm A Wonder (Album Version) 3:33
9. Zzzzz (Album Version) 3:38
10. Vegas Skies (Album Version) 4:37
11. Can You Keep A Secret? (Album Version) 3:50
12. This City Is Contagious (Album Version) 3:36
Download Linkz:
(Choose one)
Link checked on Mon Nov 10, 2008 1:39 am.

Forgetting Sarah Marshall m-HD UNCUT m-HD AUDIO 5.1 Ch 400MB


Burn After Reading R5 300MB


Monday, December 22, 2008

AdSense tips

AdSense tips

adsense tips
adsense tips (part 2)
adsense tips (part 3)
adsense ontology

Google AdSense is a pay-per-click (PPC) program that can give you advertising revenue from each page on your website with a minimal investment in time and no additional resources.

AdSense delivers relevant ads that are targeted to the content people find on your site.

In many advertising networks and websites, including AdSense, the advertiser is charged for advertising their ad only when a user clicks on their ad. How much they pay (for that click) is called their Cost Per Click or CPC.

Here you will find some simple and effective AdSense tips that will increase your revenue. If you haven't already joined AdSense program, you should sign up first.

Now it's time to show you some tips and tricks that will optimize your AdSense ads.


Top 15 AdSense tips
AdSense Tip #1: Find your keywords


Before serving ads on a web page, check its keyword density. A free and advanced tool for finding the most prominent keywords in a page can be found here: SEO Density Analyzer. Copy the most important keywords to a text file ([web page name]-adsense-keywords.txt).
AdSense Tip #2: Improve your keywords


Get keyword suggestions from Overture Search Inventory and from Google AdWords Sandbox. Get new keywords that can help you improve your ad relevance. Enter the keywords from [web page name]-adsense-keywords.txt and save the suggestions to [web page name]-adsense-suggestions.txt.
AdSense Tip #3: Keep your website focused on a theme


Use the keyword suggestions to enhance your web pages and to build theme-based content. And also try to get your keywords into the anchor text of your incoming links as much as possible. Don't forget that Google AdSense is keyword-targeted advertising: Google AdSense bases its advert topics on your websites content, this means that content-rich websites of a popular topic should attract a large amount of ads.
AdSense Tip #4: Write a new page every day


One of the best tips is to add a new page to your web site every day. The more content you have, the more visitors you will get. Put an Adsense unit on each and every content page of your site. But where? You will find more about that from the next AdSense tips.
AdSense Tip #5: Choose the right AdSense format


Wider formats are successful because the ads are compact, easy to read and are complementary to the content. The top three AdSense formats are:
336x280 large rectangle
300x250 medium rectangle
160x600 wide skyscraper

Another successful format is the 468x15 horizontal ad links, that can be placed under your navigation bar.
More AdSense Tips


AdSense Tip #6: Color tips
AdSense Tip #7: Position tips
AdSense Tip #8: Increase the number of ads
AdSense Tip #9: Preview Google ads
AdSense Tip #10: What not to do
Plus: official Google AdSense tips
Read these tips in the second part of AdSense tips.
If you are unemployed, retired or simply want to earn extra money then joining Paid To Click program is a nice way to earn good income. In this squidoo lens I'll show you how to earn $200 per day with paid to click (PTC) programs.Great thing about it is that you don't require any special skill. All you need is a computer with internet access and a strong desire to earn good money!!!

Learn To Earn $200 Per Day With Paid To Click (PTC) Programs

What are Paid To Click (PTC) Programs?

These are programs where advertisers pays you to click or view or surf their advertisements. PTC is the most popular internet income opportunity at present and will be more popular in the future.

What does one needs to do?

You watch the advertisements for 30 seconds and get paid for it.

What is the earning potential?

$200.00 per day or more!!! Let me explain you about the earning potential. The explanation is as follows:-

Let's say you have joined 20 PTC programs then those 20 PTC programs will have an average of 5-10 advertisements for you to view per day.

And most PTC will pay you $0.01 per ad you view. Let us suppose that on an average you get to view 5 ads per programs.

Therefore 20 PTC programs x 5 ads = 100 ads.

So you will be getting 100 x $0.01= $1.00/day. In a month you can make $30 on your own. I know it's not enough but that's a guaranteed extra income for you!

So where is the $200/day income?

On PTC websites, there is another system to generate income for the members which is called referral system. Wherein, most PTC sites will pay you 100% of your referral earnings!

Is it very confusing?
Let me explain it as follows:-

Let's say you have 10 referrals for each PTC.

Therefore 20 PTC x 10 referrals = 200 referrals

These 200 referrals, also clicks ads just like you everyday. They also click 100 ads and earn $1.00/day

As their referrer/upline, you earn 100% (in most PTC) of their total earnings.

NOW, let's calculate your potential earnings?

200 referrals x $1.00 = $200.00/day

This is how you can earn $200 everyday.

Unbelievable!? Well, this big earning is very much possible. Just be patient and concentrate on your goal.

But are there just 200 people you can refer? In reality there are millions of people looking forward to join PTC to earn money on line. How big is the chance you get thousands from them, or even more?

How does the referral system work?

You can refer your neighbors, your friends, internet friends, family, strangers, and anybody who knows how to use the internet. Just ask them to sign up using your referral link that looks like the referral link as shown below.

http://isabelmarco.com/?r=sekhar_yeluduti

(The referral link sample above is my referral link for Isabelmarco (a PTC program). Your personal referral link can be found at your own account on each PTC that you will join).

Please note that when somebody signs up or joins a PTC using your link he/she will be counted as one of your referrals.

How does one receive his earnings at PTC?

You can claim your earnings using ALERTPAY, PAYPAL, or E-GOLD. (If you are new to PTC, please register a FREE Alertpay account first because most PTC pays its members via Alertpay)

What are Paypal, Alertpay and E-gold?

They are all Major Payment Processors that Most of PTC use to pay its members. You will also need to register a FREE account at the 3 payment processors mentioned above in order for you to get paid.

All you need to succeed in PTC is patience and an hour of your day. 200 referrals will not register or join in just 1 day. I know that. It will take months or even years. Always remember, There is no such thing as Easy Money.You have to work for it. But.. Is this work hard for you? I don't think so....

How can one get started?

STEP ONE: Make your very own email address if you don't have one.

STEP TWO: Register at ALERTPAY, PAYPAL, or E-GOLD


Click Here To Open A Paypal Account

Click Here To Open An Alertpay Account

Click Here To Open An E-gold Account


STEP THREE: Register a FREE account at all Recommended PTC Programs mentioned below under JOIN THE PTC. (Make a list of your Paid to Click Programs, so you won't forget the PTC you had already joined)

STEP FOUR: Log in to your account and Start earning cash by clicking/viewing/surfing advertisments (use Internet Explorer or Firefox browser in viewing ads. Most PTC are compatible with Internet Explorer and Firefox)

STEP FIVE: Make the Clicking and Viewing of ads a daily habit (1-2 hours per day)

STEP SIX: Refer others to join under you.. Make your own advertisements, blogs, articles like this one. AND BE PATIENT!!! Just keep on clicking.

STEP SEVEN: Cashout your Money when you reach the Minimum Payout

STEP EIGHT: ENJOY your earnings!!!

Remember joining 20 active PTC sites can make you earn bigger and faster! Start smart and get paid!!! Start Clicking Today! Earn $200 per day with paid to click (PTC) programs!

Note:-Please register for FREE using my links below and start clicking daily. These are the links to most reliable and regularly paying PTC programs.

Thank you and Good Luck!!

lick this link:
$6.00 Welcome Survey After Free Registration!


Get Paid $1 to $25 per Survey
Get Paid $1.25 per Friend that Sings Up.
Get Paid $6.00 per on your Welcome Survey.

100% WORKING AND FREE.

How to get money ?

We currently have Three Payment methods.

Option (1) includes United States Postal Service (USPS) and is Free, this option generally takes 4-6 weeks for delivery. Option (1) is available to anybody in the U.S.

Options (2 and 3) include the use of Paypal (www.Paypal.com) or (www.AlertPay.com) and is an electronic payment, this option generally takes 3-5 business days for delivery. Option (2 and 3) have a ($25) Expedited Service Charge and is taken directly from your A.W.Surveys account with us. The Expedited Service Charge is for the faster delivery time (3-5 days compared to 4-6 weeks).

If you are ready for a payment, click the Redeem Money button and you will be presented with the above options.

These are currently the only to payment options A.W.Surveys supports. We are however exploring other payment options. 

How to refer a Friend?

Please go to the Refer Friends tab and you will be provided with a link to give to your friends. Once they visit this link and sign up for a Free account you will be credited for the referral. You may also use our Banner images with link code to post on a website.

Earn Online for free

Earn Online for free


Golden rules: Be patient. Because "patience" is the key to success in online
marketing. Be optimistic. As long as the programs are FREE. Why not give it a try. You have nothing to lose here.


N.B. If you are really serious of earning here in the internet. You must join atleast 10 online programs like this.. please give me private message if you are interested in joining other trusted programs like this. Thank you. Contact me for earning money online without investment for free .There are several other methods too for earning money online .if you are intrested please message i will share with you.

Making Money with Affiliate Marketing Business


Making Money with Affiliate Marketing Business

Ever since the Internet arrived, everything became so easy. It really accumulates your time and effort. With a couple of clicks from the Internet, you will gather information about anything, buy a product, and even make money. No need for office space and practically zero expenses. Don't be contented with the classic ways of making money. Why not make money online? Try joining an affiliate marketing network and earn a lot of money.Think no more. You can work with the time you prefer. No need to wake up early in the morning, no need to wear business suit everyday. You can work anywhere as if you're having a vacation. You just have to bring laptop or iBook and spend the day out. Relax and watch the money filling your account. That's possible! Many people are doing this on a regular basis.Of course, there's a little work and learning involved, but affiliate marketing has changed over the past couple of years. No need to worry about learning web design and making your own website because others can do it for you. No need to learn marketing on your own because you are given advice, tips and hints from marketing gurus that will help you in your own niche market and rake in the cash. People who run affiliate marketing networks are ready to help you. They'll be happy to see you successful like them. It's a win-win situation. Both will benefit and earn the money you all deserve.Making money with affiliate programs is almost a must for any webmaster that been around for some time or at least adding a few Google or Yahoo text links advertisements to your web site. And many have thought about opening a blog in addition to their old web sites. Opportunities are all around you! All you have to do is to go out and grab them as fast as you can! Most of the people who want to earn money this way end up making some cash, probably enough to cover their web site's expenses. If they have designed the web site themselves, that is. Make no mistake here - you can make money online with web sites, even with very personal blogs, but it's going to take a lot of working and tweaking to get to the point where you attract a highly targeted audience to your web site. So how do you find a good affiliate program? How do you know if it's going to earn you money or if it's going to be a total waste of money and time? Is it better to opt for a PPC program or settle for sales commissions?Today it's a little bit different. A lot of people join affiliate programs because they've bought a product and they like it so much that they believe that product has the potential to be a worldwide success story. So why not join the business? Finding a high quality product that you genuinely like to use and are eager to promote is the best way to make money online - that's for sure. But how does this relate to your personal web site? Would you be able to make money online adding affiliate ads to your existing web site? Would your visitors be interested in clicking the "Order Now" button? For the large majority of web sites, the answer is "No". People have come to believe that text link ads are normal on a web site, and so much so that they simply ignore them.

Affiliate Marketing Tips And Tricks

Affiliate Marketing Tips And Tricks

One of the best ways to work from home, and be successful with a home business program is to get involved with affiliate marketing. Indeed, simply by getting involved with an affiliate marketing program, you can become successful in your own home business, or within the businesses of others. There are some important things to remember about affiliate marketing, so that you can be sure to have the success from home that you are looking for. First of all, it is important to understand what affiliate marketing truly is. You can take advantage of affiliate marketing by being part of what they are doing – which is providing rewards for many different affiliates for each customer that is brought into the company by the marketing efforts. This means that the harder you work with affiliate marketing opportunities, the more that you are going to profit in the end. Therefore, one of the biggest affiliate marketing tips to remember is that you are going to get as much out of the situation as you put into it. When it comes to your own home business, if it is affiliate marketing or similarly based, you want to be sure that you are putting as much into the program as you would like to get out of it. The best what to have success from home is to work hard to set up your affiliate marketing situation, and then sit back to reap the profits. There are several other things that you should be involved with if you are interested in affiliate marketing. First of all, you should be able to work with other types of internet marketing methods, such as search engine optimization, search engine marketing, and email marketing. These, together, form the best way for you to be able to make money from home and truly be in control of your own home business. Remember, with affiliate marketing, you will need to work hard to bring traffic to the sites. Whatever the program is that you choose to be with, you'll be given instructions on how to do this. Once you have done your part, you'll find that the money is simply streaming in for you, and you can truly be on the path to financial freedom. All in all, working with affiliate marketing can be one of the most valuable home business decisions that you are going to make. It can be a way for you to find financial freedom by deciding your own interest level, creating your own momentum, and truly forming your own home business through affiliate marketing. If you are interested in it, you will be interested in finally being able to be financially free.

The Best Way To Generate Free Targeted Website Traffic

The Best Way To Generate Free Targeted Website Traffic-If you have a website or you promote someone else's' website as an affiliate, you need to drive traffic to it.Without traffic, you won't get visitors. And without visitors, you won't make money, sales, get subscribers, etc. What good is a website without any traffic? And if the site is getting traffic, what good is it if it's not targeted traffic?There are many ways to drive traffic to your site, both free and paid. But we are not going to talk about paid traffic right now. That is a totally different topic and could take hours to cover.So, back to free traffic. Some ways of getting free traffic to your site is by Search Engine Optimization, surfing for traffic, or getting it passively.SEO takes time and a lot of work. When you join sites that are surf for traffic sites, you have to look at other members' sites in order to earn advertising credits for your site to be displayed when another member is surfing. The only problem with this is that although the traffic is free, it is not targeted. Everyone who is a member only surfs for the credit and very rarely even looks at the site, they just minimize their window on their PC and multi-task. So, the traffic is crap and worthless.Now, let's talk about the best way to get free targeted traffic. It's called Instant Buzz. Instant Buzz is a service that gives you advertising credits as you surf the web like you normally would. What you do is download the toolbar for free, it only takes a minute. Then, you set up your ads in the members area. And bam, you ads are being displayed on other members' tool bars as they surf.You can also put Instant Buzz ads in emails that you send to your friends. These are called mail space ads. And your ad will get displayed in other members' emails. The last thing you can do is put a hyperspace ad on your website which will help you refer other members. When you refer other members, you will also get a percentage of the credits they earn which will go towards your ad credits.If someone likes your ad and is interested in what it says, then they click on it and end up on whatever site it was that you were promoting. Now that's targeted traffic! And it was free.So make sure you visit the link in the resource box to start driving targeted and quality traffic to your website today. It will only take you a couple of minutes to start bringing visitors to your site.Chris C.What if instead of hunting people down until they begged you to stop... pre-qualified prospects actually sought you out and asked you what you do and how you do it? www.TheNetworkRenegade.c

Forex Affiliate Program Tips

Forex Affiliate Program Tips

When you do an affiliate online, there are so many factors you have to consider, such as which market to target, where you place your affiliate links on your website, and how you can earn the most cash out of it and so forth. If you make a mistake on which field you are doing your affiliate at and the choice of placing the banners or links, you will never earn a dime. The Forex affiliate programs are the great market among many others since it is a growing and high ROI field available.If you are considering PPC, or Pay Per Click affiliates on your websites or blogs, Forex is not right for you. The PPC's work the best when you are targetting to the niche keywords. The keywords with long phrases like "dog training services best" might work well for PPC and can make you some reasonable amount of cash in the long run, however, if you are aiming for a solid prodcuts or services field on website or blog creations, Forex works great.I would advise not to use PPC too much with the affiliate banners and links on your website. Just stick with one or two links of Forex, and make some pages explaining why Forex is a great way to invest your money, its features, and the comparisons and reviews of each Forex company. You can learn all of them online of you can just join them yourself. Just surf the web and you will find so many sources from which you are able to gather any information necessary to making your website as professional as possible. If you are not a technical person, I would suggest to make some blogs first to get going rather than attempting to make a website yourself that is not enhanced with SEO.The Forex affiliate programs are great in the sense that its rate of commissions are fairly high. If you have any experience with the basic affiliate, you know that some affiliate programs only pay the low rate commissions to you. For instance, if you join eBay Partner or Amazon Associates programs, you will be amazed how low the rates are. On the contrary, if you join any Forex programs, you can see that you will actually earn high reate of commission money in return. If you were to spend your precious time, you always have to take the ROI into account. The time you spend to making websites and blogs should be proportional to the money you earn in return. If you think what you are earning right now is fair, I would not say anything, but if you are not satisfied, I would recommend joining a Forex affiliate program. Also, if you decide that Forex is not for you but you would like to earn money with PPC, the program below will turn your internet business upside down. Take a look at the pitch page youself and see it for yourself.

Thursday, November 13, 2008

Location

Location
The tests you’re performing dictate where you must run them from. Your goal
is to hack your systems from locations where malicious hackers can access
the systems. You can’t predict whether you’ll be attacked by a hacker from
outside or inside your network, so cover all your bases. Combine external
(public Internet) tests and internal (private network) tests.
You can perform some tests, such as password cracking and network-infrastructure
assessments, from the comfort of your office — inside the network.
But it may be better to have a true outsider perform other tests on routers,
firewalls, and public Web applications.
For your external hacks that require network connectivity, you may have to
go off-site (a good excuse to work from home) or use an external proxy server.
Better yet, if you can assign an available public IP address to your computer,
plug into the network on the outside of the firewall for a hacker’s-eye view of
your systems. Internal tests are easy because you need only physical access
to the building and the network.
Reacting to major exploits that you find
Determine ahead of time whether you’ll stop or keep going when you find a
critical security hole. Your manager or your customer may not ask you to,
but I think it’s best to keep going to see what else you can discover. I’m not
saying to keep hacking until the end of time or until you crash all your systems.
Simply pursue the path you’re going down until you can’t hack it any
longer (pun intended).
Silly assumptions
You’ve heard what you make of yourself when you assume things. Even so,
you must make assumptions when you hack your systems. Here are some
examples of those assumptions:
Computers, networks, and people are available when you’re testing.
You have all the proper hacking tools.
The hacking tools you’re using won’t crash your systems.
Your hacking tools actually work.
You know all the risks of your tests.
You should document all assumptions and have management or your customer
sign off on them as part of your overall approval process.
36 Part I: Building the Foundation for Ethical Hacking
Selecting Tools
The required security-assessment tools (hacking tools) depend on the tests
you’re running. You can perform some ethical hacking tests with a pair of
sneakers, a telephone, and a basic workstation on the network. However,
comprehensive testing is easier with hacking tools.
Not only do you need an arsenal of tools, but you should also use the right
tool for the task:
If you’re cracking passwords, a general port scanner such as SuperScan
or Nmap may not do the trick. For this task, you need a tool such as LC4,
John the Ripper, or pwdump.
If you’re attempting an in-depth analysis of a Web application, a Webapplication
assessment tool (such as Nikto or WebInspect) is more
appropriate than a network analyzer such as Ethereal.
If you’re not sure what tools to use, fear not. Throughout this book, I introduce
a wide variety of tools — both free and commercial — that you can use
to accomplish your tasks.
You can choose among hundreds, if not thousands, of tools for ethical
hacking — everything from your own words and actions to software-based
vulnerability-assessment programs to hardware-based network analyzers.
Here’s a rundown of some of my favorite commercial, freeware, and opensource
security tools:
@stake L0phtcrack (now called LC4)
Ethereal
Foundstone SuperScan
Qualys QualysGuard
GFI LANguard Network Security Scanner
John the Ripper
Network Stumbler
Nessus
Nikto
Nmap
Pwdump2
SPI Dynamics WebInspect
THC-RUT
ToneLoc

Specific tests

Specific tests
You may have been charged with performing a general penetration test, or you
may want to perform specific tests, such as cracking passwords or war-dialing
into a network. Or you might be performing a social-engineering test or assessing
the Windows operating systems on the network. However you’re testing,
you may want to conceal the specifics of the testing to keep what you’re doing
covert or to protect your methodologies. In fact, your manager or customer
may not want the details. Either way, document and make known at a high level
what you’re doing. This can help eliminate any potential miscommunication
and keep you out of hot water.
A good way to provide evidence of what was tested, when it was tested, and
more is to enable logging on the systems you’re testing.
34 Part I: Building the Foundation for Ethical Hacking
Sometimes, you may know the general tests that you’re performing, but if you’re
using automated tools, it may be next to impossible to understand completely
every test you’re performing. This is especially true if the software you’re using
receives real-time vulnerability-testing updates from the vendor every time you
run it. The potential for frequent updates underscores the importance of reading
the documentation and readme files that come with the tools you’re using.
I have experienced surprising vulnerability updates in the past. I was performing
an automated assessment on a customer’s Web site — the same test I had
just performed the previous week. The customer and I had scheduled the test
date and time in advance. What I didn’t know is that the software vendor made
some changes to its Web form submission tests, and I flooded the customer’s
Web application, creating a DoS condition.
Luckily, this DoS condition occurred after business hours and didn’t affect
the customer’s operations. However, the customer’s Web application was
coded to generate an alert e-mail for every form submission. The application
developer and company’s president received 4,000 e-mails in their inboxes
within about 10 minutes — ouch! I was lucky that the president was techsavvy
and understood the situation. It’s important to have a contingency plan
in case a situation like this occurs.
Blind versus knowledge assessments
It may be good to have some knowledge of the systems you’re testing, but it’s
not required. However, a basic understanding of the systems you’re hacking
can protect you and others. Obtaining this knowledge shouldn’t be difficult if
you’re hacking your own in-house systems. If you’re hacking a customer’s
systems, you may have to dig a little deeper into how the systems work so
you know what’s what. That’s how I’ve always done it. In fact, I’ve never had
a customer ask for a fully blind assessment. Most people are scared of these
assessments. This doesn’t mean that blind assessments aren’t valuable. The
type of assessment you carry out depends on your specific needs.
The best approach is to plan on unlimited attacks, wherein any test is possible.
The bad guys aren’t hacking your systems within a limited scope, so why
should you?
Consider whether the tests should be undetected. This isn’t required but
should be considered, especially for social-engineering and physical security
tests. I outline specific tests for those subjects in Chapter 5 and Chapter 6.
A false sense of vigilance can be created if too many insiders know about your
testing which can end up negating the hard work you’re putting into this.
This doesn’t mean you shouldn’t tell anyone. Always have a main point of
contact within the organization — preferably someone with decision-making
authority — that both you and all employees can contact if and when something
goes wrong.

Determining What Systems to Hack

Determining What Systems to Hack
You probably don’t want — or need — to assess the security of all your systems
at the same time. This could be quite an undertaking and could lead to
problems. I’m not saying you shouldn’t eventually assess every computer and
application you have. I’m just suggesting that whenever possible, you should
break your ethical hacking projects into smaller chunks to make them more
manageable. You may decide which systems to test based on a high-level risk
analysis, answering questions such as:
What are your most critical systems? Which systems, if hacked, would
cause the most trouble or the greatest losses?
Which systems appear to be most vulnerable to attack?
Which systems are not documented, are rarely administered, or are the
ones you know the least about?
After you’ve established your overall goals, decide which systems to test.
This step helps you carefully define a scope for your ethical hacking so that
you not only establish everyone’s expectations up front, but also better estimate
the time and resources for the job.
The following list includes systems and applications that you may consider
performing your hacking tests on:
Routers
Firewalls
Network infrastructure as a whole
Wireless access points and bridges
Web, application, and database servers
E-mail and file/print servers
Workstations, laptops, and tablet PCs
Mobile devices (such as PDAs and cell phones) that store confidential
information
Client and server operating systems
Client and server applications, such as e-mail or other in-house systems
32 Part I: Building the Foundation for Ethical Hacking
What specific systems you should test depends on several factors. If you have
a small network, you can test everything from the get-go. You may consider
testing just public-facing hosts such as e-mail and Web servers and their
associated applications. The ethical hacking process is flexible. Base these
decisions on what makes the most business sense.
Start with the most vulnerable systems, and consider the following factors:
Where the computer or application resides on the network
Which operating system and application(s) it runs
The amount or type of critical information stored on it
If you’re hacking your own systems or a customer’s systems, a previous
security-risk assessment or vulnerability test may already have generated
this information. If so, that documentation may help identify systems for
more testing.
Ethical hacking goes a few steps beyond the higher-level information risk
assessments and vulnerability testing. As an ethical hacker, you first glean
information on all systems — including the organization as a whole — and
then further assess the systems that appear most vulnerable. I discuss the
ethical hacking methodology in more detail in Chapter 4.
Another factor to help you decide where to start is to assess the systems that
have the greatest visibility. For example, focusing on a database or file server
that stores customer or other critical information may make more sense — at
least initially — than concentrating on a firewall or Web server that hosts
marketing information about the company.
Creating Testing Standards
One miscommunication or slip-up can send your systems crashing during
your ethical hacking tests. No one wants that to happen. To prevent mishaps,
develop and document testing standards. These standards should include
When the tests are performed, along with the overall timeline
What tests are performed
How the tests are performed, and from where
How much knowledge of the systems you acquire in advance
What you do when a major vulnerability is discovered
This is a list of general best practices. You can apply more standards for your
situation.
Chapter 3: Developing Your Ethical Hacking Plan 33
Timing
You know they say that it’s “all in the timing.” This is especially true when
performing ethical hacking tests. Make sure that the tests you’re performing
minimize disruption to business processes, information systems, and people.
You want to avoid situations like miscommunicating the timing of tests and
causing a DoS attack against a high-traffic e-commerce site in the middle of
the day, or forcing yourself or others to perform password-cracking tests in
the middle of the night. It’s amazing what a 12-hour time difference can make!
Everyone in the project should agree on a detailed timeline before you begin.
This puts everyone on the same page and sets correct expectations.
Notify any Internet Service Providers (ISP) or Application Service Providers
(ASPs) involved before performing any tests across the Internet. This way,
ISPs and ASPs will be aware of the testing going on, which will minimize the
chance that they will block your traffic if they suspect malicious behavior
that shows up on their firewalls or Intrusion Detection Systems (IDSs).
The timeline should include specific short-term dates and times of each test,
the start and end dates, and any specific milestones in between. You can
develop and enter your timeline into a simple spreadsheet or Gantt chart, or
you can include the timeline as part of your initial customer proposal and
contract. For example, you could use a timeline similar to the following:
Test Performed Tester Start Time Projected End Time
War dial Tommy Tinker July 1, 6:00 a.m. July 1, 10:00 a.m.
Password cracking Amy Trusty July 2, 12:00 p.m. July 2, 5:00 p.m.
This timeline will keep things simple and provide a reference during testing.

Developing Your Ethical Hacking Plan

Getting Your Plan Approved
Getting approval for ethical hacking is critical. First, obtain project sponsorship.
This approval can come from your manager, an executive, a customer,
or yourself (if you’re the boss). Otherwise, your testing may be canceled suddenly,
or someone can deny authorizing the tests. There can even be legal
consequences for unauthorized hacking. Always make sure that what you’re
doing is known and visible — at least to the decision-makers. Chapter 20
outlines ten tips for getting upper management’s buy-in on your security
initiatives.
If you’re an independent consultant or have a business with a team of ethical
hackers, consider getting professional liability (also known as errors and
omissions) insurance from an agent who specializes in business insurance
coverage. This kind of insurance can be expensive, but it can be well worth it.
The authorization can be as simple as an internal memo from upper management
if you’re performing these tests on your own systems. If you’re performing
testing for a customer, you must have a signed contract in place, stating
the customer’s support and authorization. Get written approval as soon as
possible to ensure that your time and efforts are not wasted. This documentation
is your security if anyone questions what you’re doing.
Establishing Your Goals
Your ethical hacking plan needs goals. The main goal of ethical hacking is to
find vulnerabilities in your systems so you can make them more secure. You
can then take this a step further:
Define more specific goals. Align these goals with your business
objectives.
Create a specific schedule with start and end dates. These dates are
critical components of your overall plan.
Before you begin any ethical hacking, you absolutely, positively need everything
in writing and signed-off on.
Document everything, and involve upper management in this process. Your
best ally in your ethical hacking efforts is a manager who supports what
you’re doing.
The following questions can start the ball rolling:
Does ethical hacking support the mission of the business and its IT and
security departments?
What business goals are met by performing ethical hacking?
These goals may include the following:
• Prepping for the internationally accepted security framework of
ISO 17799 or a security seal such as SysTrust or WebTrust
• Meeting federal regulations
• Improving the company’s image
How will ethical hacking improve security, IT, and the general business?
What information are you protecting?
30 Part I: Building the Foundation for Ethical Hacking
This could be intellectual property, confidential customer information,
or private employee information.
How much money, time, and effort are you and your organization willing
to spend on ethical hacking?
What specific deliverables will there be?
Deliverables can include anything from high-level executive reports to
detailed technical reports and write-ups on what you tested along with
the outcomes of your tests. You can deliver specific information that is
gleaned during your testing, such as passwords and other confidential
information.
What specific outcomes do you want?
Desired outcomes include the justification for hiring or outsourcing security
personnel, increasing your security budget, or enhancing security
systems.
People within your organization may attempt to keep you from performing
your ethical hacking plans. The best antidote is education. Show how ethical
hacking helps support the business in everyone’s favor.
After you know your goals, document the steps to get there. For example, if
one goal is to develop a competitive advantage to keep existing customers
and attract new ones, determine the answers to these questions:
When will you start your ethical hacking?
Will your ethical hacking be blind, in which you know nothing about the
systems you’re testing, or a knowledge-based attack, in which you’re
given specific information about the systems you’re testing such as IP
addresses, hostnames, and even usernames and passwords?
Will this testing be technical in nature or involve physical security
assessments or even social engineering?
Will you be part of a larger ethical hacking team, often called a tiger team
or red team?
Will you notify your customers of what you’re doing? If so, how?
Customer notification is a critical issue. Many customers appreciate that
you’re taking steps to protect their information. Approach the testing in
a positive way. Don’t say, “We’re breaking into our systems to see what
information of yours is vulnerable to hackers.” Instead, you can say that
you’re assessing the overall security of your systems so the information
is as secure as possible from the bad guys.
How will you notify customers that the organization is taking steps to
enhance the security of their information?
What measurements can ensure that these efforts are paying off?

Maintaining Anonymity

Maintaining Anonymity
Smart hackers want to be as low-key as possible. Covering their tracks is a
priority. In fact, success often depends on it. They don’t want to raise suspicion
so they can come back and access the systems in the future. Hackers
often remain anonymous by using one of the following techniques:
Borrowed or stolen dial-up accounts from friends or previous employers
Public computers at libraries, schools, or kiosks at the local mall
Internet proxy servers or anonymizer services
Anonymous or disposable e-mail accounts from free e-mail services
Chapter 2: Cracking the Hacker Mindset 27
Open e-mail relays
Unsecured computers — also called zombies — at other organizations
Workstations or servers on the victim’s own network
If hackers use enough steppingstones for their attacks, they are hard to trace.

Planning and Performing Attacks

Planning and Performing Attacks
Hacking styles vary widely:
Some hackers prepare far in advance of a large attack. They gather
small bits of information and methodically carry out their hacks, as I
outline in Chapter 4. These hackers are more difficult to track.
Other hackers — usually, the inexperienced script kiddies — act
before they think things through. For example, such hackers may try to
telnet directly into an organization’s router without hiding their identities.
Other hackers may try to launch a DoS attack against a Microsoft
Exchange e-mail server without first determining what version of
Exchange is running or what patches are installed.
These are the guys who usually get caught.
Although the hacker underground is a community, many of the hackers —
especially the elite hackers — don’t share information with the crowd. Most
hackers do much of their work independently from other hackers. Hackers
who network with one another use private bulletin board systems (BBSs),
anonymous e-mail addresses, hacker Web sites, and Internet Relay Chat (IRC).
You can log on to many of these sites to see what hackers are doing.
Whatever approach they take, most malicious hackers prey on ignorance.
They know the following aspects of real-world security:
The majority of systems that hackers want to attack aren’t managed
properly. The computer systems aren’t properly patched, hardened, and
monitored as they should be. Hackers often can attack by flying below
the average radar of the firewalls, IDSs, and authentication systems.
26 Part I: Building the Foundation for Ethical Hacking
Hacking in the name of liberty
Many hackers exhibit behaviors that contradict
what they’re fighting for — that is, they fight for
civil liberties and want to be left alone, and at the
same time, they love prying into other people’s
business. Many hackers claim to be civil libertarians
supporting the principles of personal privacy
and freedom. However, they act in an
entirely different way by intruding on the privacy
and property of others. They often steal the
property and rights of others, yet are willing to
go to great lengths to get their own rights back
from anyone who tries to take them away.
The case against copyrighted materials and
the Recording Industry Association of America
(RIAA) is a classic example. Hackers have gone
to great lengths to prove a point, from defacing
the Web sites of organizations that support copyrights
to illegally sharing music by using otherwise
legal mediums such as Kazaa, Gnutella,
and Morpheus.
Most network and security administrators simply can’t keep up with the
deluge of new vulnerabilities.
Information systems grow more complex every year. This is yet another
reason why overburdened administrators find it difficult to know what’s
happening across the wire and on the hard drives of their systems.
Time is a hacker’s friend — and it always seems to be on the hacker’s side. By
attacking through computers rather than in person, hackers have more control
over when they can carry out their attacks.
Hack attacks can be carried out slowly, making them hard to detect.
They’re frequently carried out after typical business hours — often, in
the middle of the night. Defenses are often weaker at night — with less
physical security and less intrusion monitoring — when the typical network
administrator (or security guard) is sleeping.
If you want detailed information on how some hackers work or want to keep
up with the latest hacker methods, several magazines are worth checking out:
2600 — The Hacker Quarterly magazine (www.2600.com). I’ve found gobs
of great information in 2600.
PHRACK (www.phrack.org).
Computer Underground Digest (www.soci.niu.edu/~cudigest).
Also, check out Lance Spitzner’s Web site www.tracking-hackers.com for
some great information on using honeypots to track hacker behavior.
Hackers learn from their hacking mistakes. Every mistake moves them one
step closer to breaking into someone’s system. They use this wisdom when
carrying out future attacks.

Why Hackers Hack

Why Hackers Hack
The main reason hackers hack is because they can! Okay, it goes a little deeper
than that. Hacking is a casual hobby for some hackers — they just hack to see
what they can and can’t break into, usually testing only their own systems.
These aren’t the folks I’m writing about here. I’m focusing on those hackers
who are obsessive and often have criminal intent.
Many hackers get a kick out of outsmarting corporate and government IT and
security administrators. They thrive on making headlines and being notorious
cyberoutlaws. Defeating an entity or possessing knowledge makes them feel
better about themselves. Many of these hackers feed off instant gratification.
They become obsessed with this feeling. Hackers can’t resist the adrenaline
rush they get when breaking into someone else’s systems. Often, the more
difficult the job is, the greater the thrill.
The knowledge that malicious hackers gain and the elevated ego that comes
with that knowledge are like an addiction and a way of life. Some hackers want
to make your life miserable, and others simply want to be seen or heard. Some
common hacker motives are revenge, basic bragging rights, curiosity, boredom,
challenge, vandalism, theft for financial gain, sabotage, blackmail, extortion, and
corporate espionage.
Hackers often promote individualism — or at least the decentralization of
information — because many believe that all information should be free.
They think cyberattacks are different from attacks in the real world. They
easily ignore or misunderstand their victims and the consequences of hacking.
24 Part I: Building the Foundation for Ethical Hacking
Many hackers say they don’t intend to harm or profit through their bad deeds,
which helps them justify their work. They often don’t look for tangible payoffs.
Just proving a point is often a good enough reward for them.
Many business owners and managers — even some network and security
administrators — believe that they don’t have anything that a hacker wants or
that hackers can’t do much damage if they break in. This couldn’t be further
from the truth. This kind of thinking helps support hackers and their objectives.
Hackers can compromise a seemingly unimportant system to access
the network and use it as a launching pad for attacks on other systems.
It’s worth repeating that hackers often hack because they can. Some hackers
go for high-profile systems, but hacking into anyone’s system helps them fit
into hacker circles. Hackers use the false sense of security that many people
have and go for almost any system they think they can compromise. They
know that electronic information can be in more than one place at the same
time. It’s tough to prove that hackers took the information and possess it.
Similarly, hackers know that a simple defaced Web page — however easily
attacked — is not good for business. The following Web sites show examples
of Web pages that have been defaced in the past few years:
www.2600.com/hacked_pages
www.onething.com/archive
Hacked sites like these can persuade management and other nonbelievers
that information threats and vulnerabilities should be addressed.
Hacking continues to get easier for several reasons:
Increasing use of networks and Internet connectivity
Anonymity provided by computer systems working over the Internet
Increasing number and availability of hacking tools
Computer-savvy children
Unlikelihood that hackers are investigated or prosecuted if caught
Although most hacker attacks go unnoticed or unreported, hackers who are
discovered are often not pursued or prosecuted. When they’re caught, hackers
often rationalize their services as being altruistic and a benefit to society:
They’re merely pointing out vulnerabilities before someone else does.
Regardless, if justice is ever served, it helps eliminate the “fame and glory”
reward system that hackers thrive on.
These criminal hackers are in the minority, so don’t think that you’re up
against millions of these villains. Many other hackers just love to tinker and

adsense links

Forex Chart - GBP/USD | Forex-Toolbar.Com