Archives

0

MAKE A RADIO STATION FROM YOUR HOME COMPUTER { free easy steps }

Matovu George William
HOW TO SETUP YOUR OWN INTERNET AUDIO/VIDEO STREAM
Willsjojo Incorp # Revised
There are any number of streaming systems or services you could use, such as SHOUTcast,
Live365, or Real Server, along with many others, but these are either very complicated to set
up, require listeners to install special software, or have additional charges involved.
I recommend setting up a station using Windows Media Encoder rather than one of the other
systems for several reasons;
1. Windows Media Encoder and its transmission is free
2. Windows Media Encoder is simple to set up
3. A Windows Media station can be received by just about any computer running Windows
(and most Macs too, with the correct free plug-in)
4. All of the other systems I have looked at, require the listener to install proprietory players
to hear your station, some of which force 3rd party advertisements onto your listeners
NOTICE: Sept 15, 2010. Microsoft is replaced Windows Media Encoder with a new
program called Microsoft Expression Encoder. As far as I can tell, Expression Encoder
can not be used to stream media directly from your computer like Media Encoder. A live
stream output of Expression Encoder must be fed through a Windows Media Server.
The Media Server component is now free but it will only run on a Windows 2010 Server
platform.
As of today, the link below in #5 will download Media Encoder from Microsoft, but I do
not know how long the older encoder will be available. Get it while you can. If this link
fails, you can try searching Goggle for wmencoder.exe, you might find a working link
somewhere.
You can use Expression Encoder to create content, for streaming or simple http
download, however, local streaming is not included. I am still investigating Expression
Encoder as I get the time and will update this page when I learn more. But that may be
a few months.


What you will need:
1. A high speed Internet connection.
2. An understanding of how to program your router to forward ports.
3. A source for your music.
CD player, MP3 player, computer, microphone, or even a radio tuned to your favorite
station.
4. A computer running Windows Media Encoder to stream your music.
See below for minimum requirements.
5. Windows Media Encoder version 9.
This is a free program. Download the encoder from Microsoft's website and install it.
6. You will be using Unicast streaming, as most home users cannot transmit Multicast
streams. If you don't understand that, don't worry about it, it's not important for the
beginner, but the following block contains a brief explanation.

Unicast vs Multicast
Unicast

In a Unicast environment, your server must have a dedicated stream to each individual listener or viewer.
Using Windows Media, the best audio stream is 148k per listener. The best quality video stream is 1,128k
(1.2 megs) per viewer.
To Unicast a 37k audio stream to say 100 people, your upstream bandwidth would need to be about
3,700k or 3.7 megabits per second. To Unicast a highest quality video stream on Windows Media to 100
people, your upstream bandwidth would need to exceed approximately 1,200 megabits or 1.2 gigabits per
second, and of course you would need server(s) to deal with that kind of output.
Multicast
I have no actual experience in setting up a Multicast environment, but the basic concept is your server
outputs a single stream which is then split by the routers along the line between you and your listeners or
viewers. All these routers, including your local router and across the Internet, must be configured to
accommodate Multicasting.
At the current state of the Internet, only high end router equipment can be configured for outgoing
Multicasting and you pay a premium to your Internet provider for such services. I don't believe this is a
service you are likely to have available in a home environment for some time to come. That's what
streaming media hosting services are for. You push a single stream to their servers and they deal with the
configuration, bandwidth, and complicated stuff, for a price $$$$.

Minimum configuration to capture and broadcast audio:
266 MHz processor, such as an Intel Pentium with MMX, Windows XP or Windows 2000, 64
MB of RAM. Supported sound card.
Keep in mind that these are the MINIMUM computer requirements. If your computer only meets
the minimum requirements, don't expect this computer to be able to do anything else.
Recommended configuration can also capture video:
866 MHz processor or higher, such as an Intel Pentium III or AMD Athlon, Windows XP, 128
MB of RAM or higher. Supported audio-capture device.
If you are going to use a computer running Windows Media Player as your source, don't use the
same computer to stream your station as the one playing your music. It won't work, unless you
have a very powerful late model computer which isn't doing much else. Media Encoder will not
run smoothly and you will get some most peculiar results, such as sputtering, sound speed
fluctuations, dropouts, and more. While the results are quite entertaining for a minute or two, it is
unusable as a webcast station. I learned this the hard way. I spent a lot of time setting everything
up and then had to start over again.
Now comes the more complicated part
You will need to select a port that your listeners can connect through. It has to be a port that your
Internet provider does not block and that isn't being forwarded elsewhere on your network. I use
port 444 because of some port conflict issues with my setup, but since the default port for
Windows Media Player is 1755, this would be a better one for you to start with.
Chose the streams you want to make available. There are three major points to consider when
choosing the stream speeds you want to offer.
  •  What quality you want your listeners to have available
  • What your upstream bandwidth is
  • The fact that each listener will occupy the fastest stream you are offering which their
Internet connection will allow
The higher the stream speed you offer, the better the quality of your music or webcam image.
However there is a trade off. If you are net casting from your home, your upstream speed is
probably limited, and the higher your stream speed, the fewer simultaneous listeners you can
have.
For example, let's say you have a DSL connection which is advertised as 250k upstream
bandwidth. Remember, this is your maximum upstream bandwidth, only obtained under ideal
conditions. Much of the time your bandwidth will be less. Also, remember that you are going to
have to use part of that bandwidth for yourself, such as for sending e-mail.
Now, if you were to choose the 135K stream and you get 2 listeners who connect at the same
time, they will occupy 270k - that's already over your bandwidth. With only 2 connections, your
listeners will hear audio dropouts, or even connection timeouts, especially while your e-mail is
being uploaded.
For a music station I recommend that you choose multiple bit rates, include 11, 15, 19, and 24
(see #9 in the next section). The 11 and 15 k stream will give dial-up users a connection even if
they are experiencing very slow speeds. If you have a really fast connection, add a 37 bit rate
stream. The 37 bit rate is as good as an FM radio station so there is really no need for anything
faster for just audio. Video is another matter and will occupy much more bandwidth. For a
web-cam, your choices on the low end will be more limited. Start with the 28k and 43k bit rates
and see how they look, then go from there. I have a 2mbit upstream connection, so I can support
about 28 simultaneous connections at the 37kbts speed.

Now for the fun part!
1. Program your router to forward your selected port to your server computer
(and open any firewalls if necessary)
2. Plug your player output (headphone or speaker jack) into the AUX input of the streaming
server computer (usually a blue jack)
3. Start Media Encoder
4. Choose "Broadcast a live event"
5. Uncheck the video device (unless you are setting up a webcam stream)
6. Chose your sound card from the audio select list (and camera if using a webcam)
7. Select "Pull from the encoder"
8. Enter the port you picked above
9. Choose the stream rates you want to make available to your listeners
10. Do not select "Archive"
11. Enter a Title, Author and other information for your station
12. Click "Finish"
13. Begin playing your music
14. Click the "Start Encoding" button on the server
Your station should now be online for net casting
Listening to your station
Instruct your listeners to open Windows media player, press Ctrl U, and enter the following
URL;
mms://62.24.111.242:444/ (notice that says mms:// not http://)
62.24.111.242 is your current IP address. Change 444 to the port you have chosen to use. If you
are using the default port (1755) then you can leave off the last colon and the port number. Your
IP address probably changes every few days so you will need to modify this file each time you
use it. See next section on Dynamic DNS for how to use a dynamic DNS service to be able to
use a name rather then your IP address.
(This is VERY important)
If you have a website where you want to put a link to your station, you will need to create what is
called a .wvx file. This is a simple ascii file which can be created in Windows Notepad using a
wvx extension. The file will contain the following text.
<ASX VERSION="3.0">
<ENTRY>
<REF HREF="mms://62.24.111.242:444" />
</ENTRY>
</ASX>
Substitute the port number you chose instead of my 444. You can leave the port number off if
you are using the default port.
Name the file somthing.wvx
place the file on your website and create a link on your page to that file, not to the source music.
Simply making a link to your station in a web page will not work with newer media players and
some web browsers. Some older browsers may work but not the newest ones. You MUST link to
this wvx file, not directly to your stream. The wvx file has to link to the stream.
Now, your friends can listen to your own personal Internet radio station, or watch you on your
streaming webcam.
DNS or your changing IP address
Because your IP address probably changes frequently, you may want to sign up for a Dynamic
DNS service so you don't have to give your listeners a new IP address each time they connect.
See my Dynamic DNS page in my webcam review section for more info.
Number of listeners
By default, Windows Media Encoder is limited to 5 simultaneous connections. You can modify
this number by editing the Windows Registry. This is rather technical and if you are not familiar
with the Registry I don't recommend you try this without help from someone who knows
computers. Most people's Internet connection could have bandwidth problems with more than 5
listeners anyway.
Click on Start > Run then type in regedit and click OK.
Now search for the following key;
HKEY_CLASSES_ROOT\Software\Microsoft\Windows Media Tools\Encoder\MaxClientConnections\
The default is 5. You can change that to whatever number you want to allow to connect, but
remember the restrictions on your bandwidth.
Advanced setups
If you don't know what command lines or batch files are, then this section is not for you.
The problem with the above process, using the graphical interface, is that the stream will not start
on its own. You can save the profile and place it in your startup group, and the program will
start, but not the stream. You have to manually click "Start Encoding" to make it work. However,
there is a command line version which can be used if you want an unattended station to start
automatically when Windows starts up.
You need to create a Windows Media Encoder Profile. Once you have configured the encoder as
described above, click on File, Save, and save the profile to a location of your choosing using
whatever name you want. (Note: if you add or remove an audio or video device from your
computer the profile may not work correctly because the device numbers may change. If so, you
will need to go through the settings process again and resave the profile.)
Now you need to create a batch file which will start the command line process. It would make
the process easer if you save both your profile and batch files in the Windows Media Encoder
folder. C:\Program Files\Windows Media Components\Encoder\
Your batch file should look like the following...
cscript.exe wmcmd.vbs –wme My_profile_file.wme -duration 9000000
Here's what all that means. Note: you will need to include the path to where the program and
files are located in the batch file.
  • cscript.exe wmcmd.vbs = the commands that makes this work
  • wme My_profile_file.wme = the path and name of your profile
  •  -duration 9000000 = number of seconds to run before terminating the broadcast
Place a shortcut to this batch file into your Windows startup group.
Now that you are ready to go = don’t forget to like my page www.facebook.com/willsjojoincorp

NOTE: As this information is 100% helped you as I know it will, please send me a reference on
jojokenya@yahoo.com OR simply post in my Facebook group 
0

Download Facebook or Youtube Videos Without Any Tools

Matovu George William
Well this this tutorial is not only for facebook or youtube instead it can be used for any video streaming website like metacafe,dailymotion,veoh or yahoo videos.There are websites on the internet that will convert your video link into a download link but it has the following drawback
  • If you already watched the whole video and then you decide to download it to your computer it will take double time becuase you already have spent time watching it and now have to spend time downloading it to your hardrive.
  • Moreover, the download speeds are very slow and its very irritating to download the whole video again.
But if you have already played the whole video on the site then there is no need to waste the time on downloading it again.We simply have to locate the cache folder of the browser as when the video is streamed it is automatically saved in the cache folder and just have to copy paste the video file from cache folder to your desired location in your computer.
Before reading this tutorial make sure that you have unchecked the hide files and folders
Here is the step by step tutorial with screenshots on how you can locate the cache folder for various browsers in various operating systems


Google Chrome;
windows Vista and Windows 7;

If you use google chrome in windows vista or windows 7 then here is the location of the cache folder
C:\Users\USER_NAME\AppData\Local\Google\Chrome\UserData\Default\Cache
C, being the system root. If you are not sure about the system root you can replace C: with %systemroot%.
Also donot forget to replace USER_NAME to your windows username

Windows Xp Users;

In windows Xp the google chrome cache folder can be found at
C:\Documents and Settings\USER_NAME\Local Settings\Application Data\Google\Chrome

Mozilla Firefox;
Windows 7 and Windows Vista;

The temporary cache folder can be located at
C:\Users\USER_NAME \AppData\Roaming\Mozilla\Firefox\Profiles

Window Xp Users;

The temporary cache folder can be located at
C:\Documents and Settings\USER_NAME \Local Settings\Application Data
  
Internet Explorer;

In case of Internet Explorer you need to go to Tools>Internet Options and then in Genreal tab click on Settings button






















A new window will popup in front of you now click on View Files button.






















How To Find Your Video In Cache Folder
Once you have found the cache folder of your browser the next thing you have to do is locate your video file.To do this arrange the files of the folder according to their size because video files are usually large in size.Open the largest files with Vlc player.Once you have found your video just copy it to your desired location.
Note:There are usually Some data files with names like data_1 in cache folder.Donot open them with Vlc open the rest of the files with Vlc and you will easily find your video.

Note:Make sure that you replace the USER_NAME with your windows username in the above addresses

=============================== ENJOY ==================================
3

How To Send Anonymous Mails

Matovu George William
This is 100% working trick to send fake or anonymous emails.It has been tested on gmail and yahoo.By using this Anonymous email trick you would be able to send emails from any email id like ykmuseveni@statehouse.gov.ug or mark@microsoft.com or any other email id.This is called email spoofing.The recipient will see that the email came from mark@microsoft.com but instead it would be sent by you.This trick is a complete fun and easy to implement.
For this trick we will be using a relay server.A relay server is a SMTP server that is trusted by google and other email server.If you have any paid hosting then you can send unlimited emails from your hosting but in case of free servers they donot give you permissions for sending emails.In this trick I will tell you how to send these fake or anonymous email from free hosting.
Here is the tutorial with screenshots for Trick On How To Send Anonymous Mail

1.Goto to X10 hosting and register for free hosting.

Note:During signup you should note down  the URL that has been highlighted with red color
2.Download this script.Click Here To Download
3.Extract this with winrar or winzip.
4.Login into your x10 hosting account Cpanel.
5.Click on filemanager and Upload all the three files in your server.













6.Now type site name that you created during signup.
7.Now click on Sendmail.php














8.Now enter the fields and send anonymous emails!!





















WARNING: ALL THE INFORMATION PROVIDED IN THIS POST ARE FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR ANY MISUSE.
0

How to make Multiple Email ID’s From Single Gmail Account

Matovu George William
If you have a gmail ID then you can create and use multiple email ID’s with the single gmail ID .So, there is no need to create different email accounts for registering multiple times on a single website.Suppose ,I want to create two accounts on abc.com then I have to use different email id’s for each account but with this method I will be able to register on any site multiple times with single email account.I have tested this trick on gmail account but have not tried it on Yahoo or Hotmail.So the Requirement for this trick to work is
  • You should have a gmail account
Here is the step by step tutorial on Trick To Use Multiple Email ID’s From Single Gmail Account


The basic idea behind this trick is that websites treat email Id with .(dots) or +(Plus) to different whereas gmail considers them same.
If I have an email id willsjojo@gmail.com then all the messages delivered to the email addresses such as willsjojo1@gmail.com or willsjojo2@gmail.com will be delivered to inbox of willsjojo@gmail.com whereas the websites treat these email id’s as a different email id’s.So by varying the postion of .(dots) or +(plus) sign you can create multiple accounts on any website.

So, there is no need to manage multiple email accounts for multiple  website accounts .

ENJOY THE TRICK GUYS
0

USE YOUR MODILE PHONE TO SPY

Matovu George William
Many softwares on Internet which claims that they can help you spy using your Mobile phone and some of the softwares are real worth their money but most of them are useless.Certainly you will feel cheated when they fail on delivering their promises.But what if you can spy with your cellphone without spending any money on softwares.This trick can be used to spy/listen the conversation going in a room without the knowledge of the other person.Using this trick you can check whether your baby is crying or not when you are not in the room.For using this trick you will need the following things.
1.Mobile handset
2.Set of Headphones
Lets begin the step by step tutorial on how to spy using your mobile phone.

1.Plug in your headset/earphone into your mobile phone.
2.Now go to settings of your mobile phone and find the setting for auto answer and activate it.
3.Now turn off the ringtone/volume of your mobile phone also make sure that the vibration is also turned off.
5.Also make sure that the lights of your phone are turned off or place it in such a place where its lights cannot be noticed.
4.Place the mobile phone in some hidden place and make sure that voices of the room can be easily heard through this mobile phone.
5.Now whenever you want to check what is going in the room just dial the mobile number with some other phone.
6.Your phone will be picked automatically and you can hear clearly what’s happening in the room.
0

How to make Special Advanced Google Searchs

Matovu George William
Here Are The List Of Google Hacks With Their Usability
Type these searches in google
  • link:url
This will give the list of sites that links to a particular site.
Example:
link:www.download.com
It will give the list of all sites linking to www.download.com
  • related:url
This search will give you all sites related to the url you have entered in the above query.
  • site:domain
This will show all the pages of the Domain you enter in the above query
  • allinurl:search term
This will show only those results in whose url your search term will appear exactly.
  • Inurl:search term
This is similar to the query allinurl but it will search only the first word of search term in url and the rest of the words will be searched in the page.
  • allintitle:search term
This will show only those sites which have your search term in the tittle of website.
  • Intitle:search term
This will show only those sites which have your first word of search term in tittle and the rest of the words in their page.
  • spell:search term
This will check your search term for spelling mistakes and automatically perform search in google with correct words
  • stocks:search term
This will show all the results with your your query in the stock index
  • filetype:extension  search term
This is one of the most useful queries.It will provide you only those sites which provides a document of your extension type and having your search term in it.
Example:
Filetype:doc mother
It will show all doc files in which the mother word is used.This type of search is extremely useful for finding presentations(ppt or pptx) and e books(pdf)
  • phone:number
This search query will show you the name and address of the number you have entered in the above search.
0

USE VLC MEDIA PLAYER TO CONVERT VIDEOS

Matovu George William
  • Open your VLC  player
  • Click on Media and select Convert / Save (Ctrl+R ) option.
  • In new popup window under the Files tab click on Add button to select files that have to be converted.
 
  • You can also add subtitles which will be hardcoded to the converted file.To add subtitles check the Use a subtitle option.
  • Click on the browse button to give the path of the subtitles file and select the alignment and font size options.
  • Now Click on Convert/Save button this will open another window.
  • Select the Destination File and Profile( Conversion Format ).
















  • Click on the start button to begin conversion.
This trick will come real handy if you don’t have any Video Converter installed in your system.

ENJOY !!!!!!!!!
0

$200000 GRAND PRIZE FOR THE BLUE HAT HACKERS CONTEST

Matovu George William

WHAT IS THE CONTEST?
The inaugural Microsoft BlueHat Prize contest challenges security researchers to design a novel runtime mitigation technology designed to prevent the exploitation of memory safety vulnerabilities. The solution considered to be the most innovative by the Microsoft BlueHat Prize board will be presented the grand prize of US $200,000. Important information:
  • Entries will be accepted and must be received by email to bluehatprize@microsoft.com between August 3rd 2011 to midnight Pacific Time on April 1st 2012.
  • The winning entry will be announced at Black Hat USA 2012.
  • For full details, see rules and regulations.
Prize
First prize: $200,000 (USD)
Second prize: $50,000 (USD)
Third prize: MSDN Universal subscription valued at $10,000 (USD)
More Details here


"We want to make it more costly and difficult for criminals to exploit vulnerabilities," said Katie Moussouris, a senior security strategist lead at Microsoft, in a news conference today. "We want to inspire researchers to focus their expertise on defensive security technologies."  "Overall, it seemed to us that to take an approach to block entire classes was the best way to engage with the research community and protect customers," said Moussouris.



1

Nokia SIM Unlock with Code Calculator

Matovu George William
This is very useful, if you have bought a new Nokia mobile phone, locked to a provider, and wish to use a SIM-card from another provider.    
Here is how it works: Start by downloading a program, that generate a code to enter on your mobile phone.
It supports;    DOWNLOAD HERE













If your phone is NOT on the list, take a look in the unlock forum

Currently BB5 Phones, this includes N-series (Nokia N70, Nokia N71, Nokia N72, Nokia N73, Nokia N80, Nokia N800, Nokia N90, Nokia N91, Nokia N93i, Nokia N95), Nokia 6630 and Nokia 6680, cannot be unlocked by any way except requesting the code from your provider.
As soon as there's a solution or any news, it will be published here or you can find help in the unlock forum
 Guide:
1)Unzip the file and start the program named Code Calculator 5.4.exe
2)Take the SIM-card out, and find the phones IMEI code (the phones serial number), by enter the code IMEI: *#06# on the phone. It's important that the SIM card IS NOT in the phone, during the following steps!!
3)Enter the IMEI code in the program4) Choose Your country
5)Choose the provider, from which your phone is locked to.
6)Choose type:
Type 5:
Nokia 3650
Nokia 3600
Nokia 7650
Nokia N-Gage
  Type 7:
Nokia 6650
Nokia 7600
  Type 2:
All others...
7)Generate the code by clicking on Calculate
8) codes will appear in the blue field in the program. You will use the last code
9)Now you have to enter the whole code on your phone

The code has the following format: , where the X's are numbers.
1 - Enter "#"
2 - Enter "*" three times to write "p"
3 - Enter "*" four times to write "w"
4 - Enter "*" twice to write "+"
5 - Enter the 15 numbers
6 - Enter "*" twice to write "+"
7 - Enter "7"
8 - Enter "#"
Your Nokia phone is now unlocked.

JUST JOIN US HERE IN CASE YOU FAIL TO DO IT YOUR SELF

0

Microsoft confims to fund Blue Hat hacking competition

Matovu George William
As any Jedi knight knows, the temptation to turn to the Dark Side is difficult to resist. The same can be true for White Hat hackers, malware fighters who discover vulnerabilities in software.
The black market prices for those kinds of security flaws are tantalising to ethical hackers. Microsoft wants to temper those temptations though, and has announced a contest that offers more than $250,000 in prizes for developing better solutions to counter security threats.
Microsoft's "BlueHat Prize," announced by the company at the Black Hat security conference, offers a grand prize of $200,000, a runner-up purse of $50,000 and a third-place award of a one-year subscription to MSDN Universal to security researchers who design the most effective ways to prevent the use of memory safety vulnerabilities.
Those kinds of vulnerabilities can create problems like buffer overflows that can be exploited by miscreants to compromise computers.
“As the risk of criminal attacks on private and government computer systems continues to increase, Microsoft recognises the need to stimulate research in the area of defensive computer security technology," said Matt Thomlinson, Microsoft’s General Manager of Trustworthy Computing Group.
“Our interest is to promote a focus on developing innovative solutions rather than discovering individual issues," Thomlinson continued. "We believe the BlueHat Prize can catalyse defensive efforts to help mitigate entire classes of attacks."

Top experts needed

In offering the prize, Microsoft hopes to attract the world's top experts to focus their "little grey cells" on a major security problem. “Microsoft wants to encourage more security experts to think about ways to reduce threats to computing devices," observed Katie Moussouris, senior security strategist lead for the Microsoft Security Response Center.
“We’re looking to collaborate with others to build solutions to tough industry problems," she added. "We believe the BlueHat Prize will encourage the world’s most talented researchers and academics to tackle key security challenges and offer them a chance to impact the world."

The origin of the concept

According to Microsoft, it got the idea for the BlueHat prize from a previously launched security information sharing programme. That initiative, the Microsoft Active Protections Program, allows Microsoft to share information with security vendors around the world so they can release protection technologies to their customers much faster. The success of that project got Microsoft thinking about mounting a similar effort for the security research community.
One vendor with praise for BlueHat was Adobe, a company that's no stranger to software with vulnerabilities. “The Microsoft BlueHat Prize announced at Black Hat is an exciting new initiative and a great example of encouraging community collaboration in the defense against those with malicious intent," observed Adobe's Senior Director for Product Security and Privacy Brad Arkin.
“This call for entries promises to stimulate research activity within the broader security community on how to mitigate entire classes of attacks, rather than thinking about software security as a challenge best addressed one bug at a time," he continued. "This research has the potential to lower costs for third party developers and increase the level of security assurance for end users."
Here are the official rules and guidelines for the competition.
Contest submissions will be accepted until Sunday, April 1, 2012, Microsoft said. A panel of Microsoft security engineers will judge submissions based on the following criteria: Practicality and functionality (30 percent), robustness including how easy it would be to bypass the proposed solution (30 percent) and impact (40 percent).
The winners will be announced at the Black Hat conference in 2012.
1

TYPES OF WEBSERVER SOFTWARE

Matovu George William

Apache web server - the HTTP web server

Free and the most popular web server in the world developed by the Apache Software Foundation. Apache web server is an open source software and can be installed and made to work on almost all operating systems including Linux, Unix, Windows, FreeBSD, Mac OS X and more. About 60% of the web server machines run the Apache web server - Refer Web server usage statistics from Netcraft.
Apache Web Server

Apache Tomcat

The Apache Tomcat has been developed to support servlets and JSP scripts. Though it can serve as a standalone server, Tomcat is generally used along with the popular Apache HTTP web server or any other web server. Apache Tomcat is free and open source and can run on different operating systems like Linux, Unix, Windows, Mac OS X, Free BSD.
Apache Tomcat
  
Microsoft's Internet Information Services (IIS) Windows Server

IIS Windows Web Server has been developed by the software giant, Microsoft. It offers higher levels of performance and security than its predecessors. It also comes with a good support from the company and is the second most popular server on the web.
Microsoft IIS Windows Web Server

 Nginx web server
Free open source popular web server including IMAP/POP3 proxy server. Hosting about 7.5% of all domains worldwide, Nginx is known for its high performance, stability, simple configuration and low resource usage. This web server doesn't use threads to handle requests rather a much more scalable event-driven architecture which uses small and predictable amounts of memory under load.
Nginx web server

lighttpd

ighttpd, pronounced "lighty" (don't ask me why), is a free web server distributed with the FreeBSD operating system. This open source web server is fast, secure and consumes much less CPU power. Lighttpd can also run on Windows, Mac OS X, Linux and Solaris operating systems.
lighttpd web server

Jigsaw

Jigsaw (W3C's Server) comes from the World Wide Web Consortium. It is open source and free and can run on various platforms like Linux, Unix, Windows, Mac OS X Free BSD etc. Jigsaw has been written in Java and can run CGI scripts and PHP programs.
The Jigsaw web server software from W3C


Klone

Klone, from KoanLogic Srl, includes a web server and an SDK for creating static and dynamic web sites. It is a web application development framework especially for embedded systems and appliances. No additional components are required when using Klone; thus, one can do away with an HTTP/S server or the active pages engine (PHP, Perl, ASP).
Klone web server

Abyss web server

Abyss compact web server runs on all popular platforms - Windows, Mac OS X, Linux and FreeBSD. The personal edition is (X1) 100% free while the professional Abyss Web Server X2 has a small price tag of $60. Supports HTTP/1.1, secure connections, CGI/FastCGI, custom error pages, password protection and much more. The server also has an automatic antihacking system and a multiligual remote web management interface.
Abyss web server

Oracle Web Tier

Includes two web server options with reverse proxy and caching solutions that lead to quick serving of web pages and easy handling of even the most demanding http traffic. The iPlanet Web Server, for example, is a high-performance server with enhanced security and mutithreaded architechture that scales well on modern 64-bit multiprocessors.
Oracle Web Tier
  
X5 (Xitami) web server
The cross-platform X5 from iMatrix Corporation is the latest generation web server using the company's own multithreading technology (Base2) that makes it scalable to multi cores. As per the iMatrix, X5 can handle thousands of connections without difficulty and thus is useful for long polling in which connections from clients remain open for extended durations.
X5 (formerly Xitami) web server

Zeus web server
The Zeus web server runs on Linux and Free BSD operating systems among others. It has been developed by Zeus technology Ltd. And is known for its speed, reliability, security and flexibility. The web server is used on some of the busiest web sites of the world including Ebay. Zeus web server is not free and costs more than a thousand pounds.
Zeus Technology Ltd. - Zeus web server

For further information, refer Web server comparison on Wikipedia
1

5 KEY WAYS TO MAKE MONEY FROM YOUR DOMESTIC COMPUTER

Matovu George William

Making money from your blog or website is easier said than done, with many sites making very little. The main reason is that bloggers and website owners are not making the most of the dozens of revenue opportunities that exist today.
A few weeks ago I attended a conference where a leading blogger was asked how blogs should make money. His reply was "start with Google Adsense and once you have built up a decent size audience sell display ads and sponsorship".
It is this blinkered thinking which is stopping many bloggers and content website owners from realising the commercial potential of their sites. There are actually dozens of ways of making money from a good content website.
Here are over 30 ways that I have come across.

Advertising

  • Text Ads – short text ads automatically displayed on a page based on the context of the content. Google AdSense dominates the market.
  • Display Ads – Banner and button ads displayed at the top or to the side of content
  • Video Ads – Short video ads embedded into a page. They can be auto-play (annoying!) or be clicked to play. There is usually an example on the Yahoo.com home page
  • In-Content Ads – Ads that are linked to keywords within articles. Learn more at inLinks.com 
  • Classifieds – User submitted classified ads. Craigslist is the gorilla, but lots of content websites have niche classifieds. Take a look at RockyMountainNews.com Classifieds 
  • Jobs Board – Paid job listings. A good example is Smashing Magazine Jobs 
  • Pre-roll/post-roll video ads – Short ads at the beginning and end of video clips. Being trialled by YouTube
  • Paid Reviews – charge companies or individuals to review their book, product or service. Learn more at ReviewMe 
  • Pay Per Post – offer to write posts mentioning a product, company or service for a fee. Can be unethical if commercial interest not declared. Learn more at PayPerPost
  • Advertorial – Allow customers to publish their own articles promoting their products or services for a fee. Make sure you clearly mark articles as advertorial to maintain your independence and integrity. Example: Rackspace Advertorial
  • Sponsorship – Charge for sponsorship for all or part of your website. Usually fixed price agreements for a fixed period of time
  • Directory Listings – create a directory and charge suppliers to be listed, or list every supplier and charge for an enhanced listing. Example: an enhanced directory listing on a financial advisors website

Affiliate Marketing

  • Commissions for Actions – you get paid every time an action is completed e.g. email newsletter sign up, trial sign-up, survey completed, etc. For example you can get paid a commission every time a free copy of the Firefox browser is downloaded. Sign up for a Google AdSense account
  • Commissions for Sales – you get paid a fixed commission or percentage share of sales value. Learn from Commission Junction 
  • Lead Generation – generate leads on the website and sell them to prospects. Learn from Approved Index
  • Commission For Events Promotion – promote events in your industry in exchange for a commission on ticket sales. Approach any event organiser

Ecommerce

  • Digital Product Sales – sell products that can be downloaded over the internet. They can include ebooks, research, software, reports, music, video clips, etc. Go to Clickbank.com to see dozens of downloadable products 
  • Physical Product Sales – stock, sell and ship your own products. For example CannotStopSmoking.com sells electric cigarettes
  • Dropship Sales – sell products that are stocked and shipped by the manufacturer or wholesaler. To learn more have a read of this Wikipedia Dropshipping entry 
  • Pay Per View – sell one-off access to service. Take a look at The Geological Society for an example 
  • Pay Per Article – sell one-off articles. A good example is on the RSC Journal website
  • Auction Sales – auction products or services from your site
  • Marketplace – match buyers and sellers and facilitate payment.Take a look at EditAvenue.com, a marketplace for editors
  • Merchandise – If you have a popular site with a loyal audience you can sell branded merchandise. Try using CafePress 
  • Photo and Video Sales - you can sell images and videos direct from your site or through services like FotoMoto

Subscription

  • Paid Membership Access to Premium Content – subscription for month, quarter or year to get access to member-only content and resources e.g. HerbMentor.com
  • Premium Membership to Upgrade Free Services – provide an enhanced service to paid members. This can be on a forum, information website, social network, etc. For example DNForum.com has a premium membership
  • Subscription to a Webservice – enable people to subscribe to a service. Take a look at Ancestory.com to see a service that charges for access to research data. 
  • Subscription to an Online Course – enable people to subscribe to an online course with modules being delivered every week or month e.g. SEOBook.com
  • Subscription to Archive Material -  After a fixed time period archive content, then sell subscriptions to this archived data. MarketingSherpa publishes all their articles for free for one week, after which time customers have to subscribe to their archive 
  • Subscription to a Podcast – Create a regular high quality podcast and sell it for a monthly subscription. For a directory of paid-for Podcasts go to Premiumcast.com

Participation /Events

  • Webinars – promote and sell webinars
  • Seminars/Workshops – promote and sell offline seminars and workshops
  • Mentoring – promote and sell mentoring which can be delivered over the internet, phone or face-to-face
  • Consultancy – promote and sell consultancy services 
  • Franchise – turn products or services into a franchise opportunity and sell franchise via your site. Take a look at Jack Humphrey's Directory Network Association 
  • Reseller – Create products that can be re-sold. They can be sold with your branding or you can allow resellers to rebrand
2

How Hackers Defeat Personal Firewalls

Matovu George William
Ever get annoyed cause you wanted to place a trojan or a virus somwhere and a firewall wouldnt let you? Well if this firewall is one of the commercially made and distributed types such as Norton personal firewall, or Blackice Defender, and most any other comercially available firewalls it is very simple to exploit it and put anything you want behind it. Most personal firewalls work by having a preset rules database that has a listing of trusted applications that it will allow access to and from your computer. A simple modification of a rogue application such as a trojan horse or virus will allow the rogue application to have trusted access to your system. The modification requires no programming knowledge and can be done by anyone very easily. All you have to do is rename the rogue application to a name that the personal firewall knows is a trusted application.
For example if I take BackOrifice, the stealth remote control application, and rename it iexplore.exe, most personal firewalls will allow it to run without complaint. The same is true for any other trojan horse or virus.
Kinda neat huh?
There is only one readily available firewall that I cant use this with and thats zonealarm from zonelabs. http://zonelabs.com/
BTW my handle is natas and I look forward to upcoming issues of your newsletter. I haven't been hacking maliciously for years now, actually since i got caught in highschool and lost my priviliges to use a computer till i was 18. Please visit my homepage if youd like http://www.geocities.com/mystykalsystym/natas.html.
In-depth Information on Personal Firewalls
0

LINKS AND WEBSITES THAT REAL HACKERS USE

Matovu George William
Free shell accounts:
Cryptography
If you are new to cryptography, you can make a good start by reading Crypto by Steven Levy. The book is fun read, tells about the lives of the people who made cryptographic discoveries, and along the way you know why the knapsack problem and many other fun and entertaining math problems are central to cryptography.
 Next, you may want to jump straight to the surprisingly easy and fun basic math. Modern cryptography is based upon decision problems, meaning problems that have an answer or either yes, no, or "I can't tell!!!" "Computers and Intractability: A Guide to the Theory of NP-Completeness" is brilliant, yet easy to read and understand.
Cool stuff
Online Manuals, Documents and Books  
Free Usenet Servers:
Miscellaneous Tools
0

WILLS GUIDE TO HARMLESS HACKING

Matovu George William
How can you find parts of Internet servers that are normally hidden from your browser?

Sometimes search engines like Yahoo or Google can do the hard work for us. For example if we give to Google: intitle:"Index of administrators.pwd" it will give us back some very interesting results.Now even better we can give: intitle:"Index of /etc/"If we use our imagination we can give intitle:"Index of /etc/group" and bingo!! There are many combinations we can think like: intitle:"Index of /cgi-bin/" or cgi-bin/etc or, or, or....!!

There are a number of web tutorials on how to use search engines to find computers that let your browser just walk in and look at and download almost anything, even things that aren't on their web sites. You can learn a great deal about how an Internet server works by using these techniques. In this Guide we go a few steps further than these tutorials. We also show what to do after finding interesting servers, and how to enjoy them without getting into trouble.
How to Find Hidden Music Files
Let's start with something fun and useful. You can get sued or infected by viruses by using a peer-to-peer file program to download music from other folks, home computers. However, there are many Internet servers that offer free, legal music. Here's a way to find even the most obscure of them, even find files that aren't listed on the web page associated with the download site. Most ftp servers (which offer downloads) keep everything in a directory called ftproot.
Try a Google search on inurl:ftproot. Here's one I found;.

Using a download site such as this is pretty good insurance against getting sued for music piracy. Although some sleazy web sites do offer pirated music files, they get shut down fast. In this case, by using the "Index of" search trick, you have found a way to view the web site that tells you the dates of its files. This site has clearly been in business a long time. This suggests it isn't a piracy site.
Most importantly, you can read the date of each individual music file. If it is before 2003, you can be pretty sure it isn't one of those fingerprinted files the RIAA is using to catch pirates. And if you swear off using peer-to-peer file sharing programs entirely, no one is going to be able to use these programs to snoop on your hard drive.
 
Copyright 2016 Strictly Technology
Strictly Technology Blog Theme by Wills Jojo Senior