If you are writing blog posts and actually copying content from other sites – you’ll not be doing any good (if not bad) to your blog from SEO perspective. The math is simple – if the content is not yours – do not put it in your website.
Now the question is how are you going to get unique contents? Simple – write your content yourself. To make sure your content is not matching that with someone else’s – you may check your content with Plagiarism checker. While there are standalone system for plagiarism check – there is a plugin for WordPress – which does it right from the wordpress editor. Moreover, it is FREE.
However, if you are not working with WordPress and would like to use something like this – here is a link where you can do so: http://smallseotools.com/plagiarism-checker/
If you are a tech savvy person – you probably know how phishing works. However, this time attackers tried to use optical illusion to trap people into a new phishing scam targeting the GMail users. Here’s how it looks like:
Scammers attach an image which looks like it is an attachment. When you click on it – it takes you to the scammers destination – to the phishing link. And if you ignore the login URL – you are DONE!!
The phishing login page has been tricked as well to look like it is from Google. So even the most savviest person may fall for the trick. Here is how the phishing page URL will look like:
Img credit: The Hacker News
So, next time you are forwarded to any login page – double – triple check.
YOU WANT TO KNOW THE WINDOWS SERIAL KEY – WHICH WAS USED TO ACTIVATE YOUR WINDOWS.
You may be planning to re-install the windows. You may have lost the key.
You may be selling your computer and buying a new one – but want to retain your copy of windows.
No Worries. You can retrieve your key from the computer. In this case you’ll need a running windows to get the key.
Copy and paste the following into a Notepad, save the text file and rename the file to “productkey.vbs”:
Set WshShell = CreateObject("WScript.Shell")
MsgBox ConvertToKey(WshShell.RegRead("HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId"))
Const KeyOffset = 52
i = 28
Chars = "BCDFGHJKMPQRTVWXY2346789"
Cur = 0
x = 14
Cur = Cur * 256
Cur = Key(x + KeyOffset) + Cur
Key(x + KeyOffset) = (Cur \ 24) And 255
Cur = Cur Mod 24
x = x -1
Loop While x >= 0
i = i -1
KeyOutput = Mid(Chars, Cur + 1, 1) & KeyOutput
If (((29 - i) Mod 6) = 0) And (i <> -1) Then
i = i -1
KeyOutput = "-" & KeyOutput
Loop While i >= 0
ConvertToKey = KeyOutput
Now run the file “productkey.vbs”. You should see something like this:
Internet connected Linux servers are always vulnerable to exploitation by the hackers/intruders. One of their common attack is through SSH. By default SSH servers are configured to listen to port 22 for SSH connection. Changing the port to something else will definitely add an additional measure in securing the server.
How to Change Default SSH port 22 to something else:
Connect to your server via SSH (your ssh port is still 22) as the root user.
Run this command: # vi /etc/ssh/sshd_config
Find out this line: # port 22
Delete the hash “#” sign from the beginning of the line and change the port to something else. Note down this new port very carefully. You’ll need to use this port for the SSH connection from the next login.
Save the file and exit.
Restart the SSH service by executing this command: # service sshd restart
Now disconnect and try reconnecting with the new SSH port. Make sure you memorize the new port number or note it down somewhere.
People all around the globe are posting their photos with cool effects applied through a cool application named Prisma. The app was initially released for IOS – which means iPhone users were the ones to use it. Well – although late but Android users can use the app too.
You may find it hard finding the real Prisma app (By Prisma Labs, Inc.) in Google play – as there are a lot of fake Prisma apps there. Here is the official download link of Prisma: https://goo.gl/JqAoUC
While everybody is busy getting their website more and more exposed to the search engines (SEO) – you might want to restrict search engines to crawl your website.
You may have your own development website or may have your company’s web based HR system – which you don’t want to expose to the world. Search Engines will find your website if you do not restrict them. If you want to restrict the complete website just upload a file named “robot.txt” in the root folder and add the following line in it:
User-agent: * Disallow: /
If you want to restrict a specific part (files in a specific directory) – add the following line:
User-agent: * Disallow: /yourdirectory
If you want a certain Search Engine to be restrcited – (for example Google): add the following line:
User-agent: googlebot Disallow: /yourdirectory
Some of the other Search Engine Bots are as follows:
You might need to wipe off the command history that you’ve executed in your linux system for various reason. Normally when logged into the bash / SSH terminal – if the Up Arrow key is pressed – previously executed commands are shown. To completely delete the history type the following command: