How not to Get Banned from AdSense

‘It’s your job as an AdSense publisher to keep your nose clean. Keeping your nose clean means:

* If you notice suspicious clicks, report it.
* If you accidentally click your own ads (it happens), report it.
* If your site is suddenly featured on Slashdot, Digg, or some other high-traffic site, report it.
* If you know something (press release, review, etc.) is going to send a lot of traffic your way, report it.
* If you’re in doubt about anything, report it.’



1. Don’t click on your own Google ads - I suspect this is the most common reason people are banned. You can’t click your own ads for any reason. If you want to see where an ad leads to type in the URL from the ad or use the AdSense Preview tool (if you’re an IE user)
2. Don’t ask others to click on Google ads - I regularly see people doing this - especially when they first put ads on their blogs. Be very careful about what you do say about your ads. Sometimes even an indirect comment or a ‘hint’ can be construed as encouraging people to click ads - it’s just not worth it.
3. Don’t employ pop-up prompts or automatic software installations - I’ve been interested to see a number of publishers doing this lately by putting pop ups with ads in them on their pages or putting popups directly next to ads to draw the eye to them. Neither method is within the AdSense TOS.
4. Be aware of how your site is promoted - Another reason I’ve seen publishers banned for is sending traffic to their site that is not ‘good’ traffic. Paid to surf programs are one example of bad traffic which you can get in trouble for. These days Google has impression based ads as well as CPC ones and if you’re driving thousands of visitors to a site that is not legitimate traffic you’ll get in trouble. When in doubt about whether to go with a traffic generating system you should check with AdSense first.
5. Don’t place Google ads on sites that contain prohibited content - Family friendly content is the way AdSense likes to go. This means you can’t put ads on gambling sites, sites with adult content or with profanity (to name just a few things they prohibit). Get a full list of what you should avoid in their policies.
6. Respect Google trademarks - Google writes - ‘Framing or mimicking Google pages is strictly prohibited by our Guidelines for Use of Google Brand Features.’
7. Don’t tamper with the AdSense code - Unless you have permission you shouldn’t change the core AdSense code. Some publishers have agreements with Google to do this but if you’re a normal publisher you are not allowed to make such changes. Again - if in doubt contact the AdSense team.
8. Provide a positive user experience - Again Google puts it best - ‘Sites that contain excessive pop-ups, use sneaky redirects to obtain traffic, or otherwise attempt to interfere with normal web navigation aren’t permitted in the AdSense network.’
9. Provide a good environment for advertisers - AdSense juggles the expectations and value it offers to three groups - ‘publishers’, ‘viewers of ads’ and ‘advertisers’. As publishers we tend to lose site of the rest of the equation, especially the advertisers - but ultimately unless they are getting value for money they won’t advertise and the whole system falls down. In short Google will ban you if they feel you’re doing anything to trick your readers into clicking ads (ie ripping off advertisers).
10. Be responsive - If AdSense tells you to jump - you say ‘how high?’ If you get an email from AdSense it’s important to reply (if they ask for a response) and to comply with what they ask you to do (or to politely explain your situation. I find that in most of my interactions with the AdSense team that they genuinely want you to do well as a publisher as it means that they do well also. While you might sometimes feel like you’re talking to a machine (their stock standard emails can be annoying) if you persist in emailing them you generally end up talking to a human and find that they are willing to listen and help you find a solution to any issues you’re having.
Forums are the one of the best way who wants to make money online. Making Money online with forums is easy and interesting. if you are new and don't want to make a blog or website but have a huge knowledge of technically skill or writing skill then you can make money online with forums. Yes it is possible check out some of the below given revenue sharing forums.

Meaning of Forum: - A public meeting or assembly for open discussion. Forums are used to discuss many things of our life whether it technically or it is personal on a large scale of gathering and anybody can participate in these discussions.

Meaning of Revenue sharing Forums: - where you can make money with your affiliate links or affiliate advertisement display. These kind of forums or sites gives a option to add your affiliate links in profile and they show advertisement using your code when someone visit your discussion or work on a sharing percentage.

List of Best Make Money Online Forums:-

1. DigitalPoint.com – Top of all web forums a great place for webmasters and for new comer in the money making world.
2. SeoChat.com – A complete solution for SEO (Search Engine optimization) questions. Seochat is covered all about SEO for blogging world with millions of intelligent skilled peoples.
3. WebMasterWorld.com – Covering all topics about the Google adsense. Provides information on optimization of Adsense and helps to increase money.
4. SitePoint.com – Everything covered for Internet and web related topics.
5. SearchEngineWatch.com – This forum is covering all topics about the search engine Google and provides discussions for making best of SEO tips.
6. V7n.com – Make a good design of your blog/website get help from professional designers.
7. HtmlForums.com – Learn html, programming, graphics, e-commerce and more about web designing online.
8. Ozzu.com – Get professional advice for your hosting and maintaining a blog or website.
9. WebTalkForums.com – After web development we come to web promotion. This forum gives a handsome ideas and professional individuals who give tons of tips.
10. Devshed.com – Let’s test your programming skills or learn programming and development forum online for any kind of programming languages.
Here Is another Google Adsense "Optimization Essentials" series video, which lets us know about the dressing & color coding of our blogs and websites ad display. As in their last week's video they forced on displaying larger units of adsense for maximum eye catching display to the visitor. This time they advised to take care of color coding of our adsense code that it matches to the color of our blog/website.






Adsense, Adsense Optimisation, Earn Money
- 1:07 AM - 0 comments
Inside AdSense: Optimisation Essentials (Part II)-Better Diplay Earn Money More & More
Here Is another Google Adsense "Optimization Essentials" series video, which lets us know about the dressing & color coding of our blogs and websites ad display. As in their last week's video they forced on displaying larger units of adsense for maximum eye catching display to the visitor. This time they advised to take care of color coding of our adsense code that it matches to the color of our blog/website.



Three most important tips for designing our adsense code for our blog
* Using colors must be blended with blog's background color
* Border less Ads bring more Clicks than the Ads with Border
* Change or rotate colors & location of ads on the Page
* Save sets of frequently-used colors as a palette.

These are the most important three Tips that can generate a high click than other we are using before optimization.

http://adsense.blogspot.com/2008/11/opttimisation-essentials-part-ii.html


Summary of tutorial: I) Presentation of the problem. => The variables containing strings II)Security .
    => Explanation
=> Numeric variables
.Method 1
.Method 2


--------------------------------------------------------------------


I) Presentation of the problem.
___________________________

There are two types of SQL injection:

* Injection into the variables that contain strings;
* Injection into numeric variables.

These are two very different types and to avoid them, it will act
differently for each of these types.

######################
The variables containing strings:
######################

Imagine a PHP script that fetches the age of a member according to its
nickname. This nickname has gone from one page to another via the URL
(by $ _GET what: p). This script should look like this:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
...
$pseudo = $_GET['pseudo'];
$requete = mysql_query("SELECT age FROM membres WHERE pseudo='$pseudo'");
...
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


Well keep you well, this script is a big SQL injection vulnerability.
Suffice it to a bad boy putting in place the username in the URL a query
like this:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
' UNION SELECT password FROM membres WHERE id=1
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


It is to arrive to show (just an example), for example the password for
the member with the id 1. I will not explain in detail the operation for
fear that someone is not nice to walk around. Well, so let us go to the
security:).

II) Security .
_______________

To secure this type of injection is simple. You use the function
mysql_real_escape_string ().

######################
Uh ... It does what it?
######################

This feature adds the "\" character to the following characters:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
NULL, \ x00, \ n, \ r, \, ', "and \ X1A
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

######################
And what's the point?
######################

As you have noticed in previous injection, the attacker uses the quote
(to close the 'around $ nick): if she is prevented from doing that, the
bad boy will only have to look elsewhere . This means that if one
applies a mysql_real_escape_string () to the variable name like this ...

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
...
$pseudo = mysql_real_escape_string($_GET['pseudo']);
$requete = mysql_query("SELECT age FROM membres WHERE pseudo='$pseudo'");
...
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

The application is completely secure.
Explanation

######################
Injection hacker to recall:
######################

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
' UNION SELECT password FROM membres WHERE id=1
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Well if we apply mysql_real_escape_string () to the variable $ name used
in the query is what will the injection:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
\' UNION SELECT password FROM membres WHERE id=1
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

This means that we do not even come out of assessments around $ nick in
the request because the \ has been added. There is another function
somewhat similar to mysql_real_escape_string () is addslashes (), why
not have used? Well recently, a security hole was discovered on this if
it is used on a PHP 4.3.9 installation with magic_quotes_gpc enabled.

######################
Numeric variables:
######################

This type of injection is less known than the previous one, making it
more frequent, and it starts as just now with an example. This time, it
displays the age of a member according to its id, and by passing it by a
form ($ _POST) to change:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
...
$id = $_POST['id'];
$requete = mysql_query("SELECT age FROM membres WHERE id=$id");
...
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


mysql_real_escape_string () would be nothing here, since if an attacker
wants to inject SQL code, it will not need to use quotes, because the
variable $ id is not surrounded by quotes. Simple example of
exploitation:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
2 UNION SELECT password FROM membres WHERE id=1
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

This injection did exactly the same as the previous one, except that
here, to avoid it, there are two solutions:

* Change the contents of the variable so it contains only numbers;
* Check if the variable actually contains a number before using it in a query.

##########
Method 1:
##########

We'll use a function , intval () This function returns regardless of the
contents of a variable its numerical value. For example:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
$variable = '1e10'; // $variable vaut '1e10'
$valeur_numerique = intval($variable); // $valeur_numerique vaut 1
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Now back to our sheep:

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
$id = intval($_POST['id']);
$requete = mysql_query("SELECT age FROM membres WHERE id=$id");
}
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

That is: you can stop there and is more than enough, but I recommend you
continue to find another method, or you have air beast if you find this
method on a code that is not yours without understand it.

############
Méthode 2:
###########

Here we use a function that returns TRUE when a variable contains only
numbers and FALSE if it is not the case this function is is_numeric (),
we will use it in a condition that checks whether is_numeric ( ) returns
TRUE well.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
$id = $_POST['id'];
if (is_numeric($id))
{
$requete = mysql_query("SELECT age FROM membres WHERE id=$id");
}
else
{
echo "Trying to hack me ? MOTHA FUCKAH xD";
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

##################################################################
What is the best, depending intval () and is_numeric ()?
##################################################################

Well I will say that they are both equally effective, they are equal.
But I prefer inval () since with is_numeric () write more code, and if
the variable does not contain only numbers, the request is canceled (in
principle, but of course you can run the same query by choosing an
default value for the variable used). Well that's it! You know all about
securing your applications. If you apply these methods, there is
absolutely no risk of having a fault type SQL injection on its website
(or PHP).
Firefox Reported Attack Site this is the massage when some times by chance we upload some kind of malware on our blog or site. Firefox Reported Attack Site is a latest feature in Firefox Internet browser. If they detect any malware installed on our site or blog, Firefox starts giving a warning like image shown in below picture. Malware is somewhat hidden we actually don't know from where it comes. May be it comes from some kind of plug-in or any java script.



What to Do To solve this Warning?

In this case you have to follow the instructions given by Google about Malware and hacked sites.



Many of The new bloggers are not familer with Twitter. They don't know about the twitter, What Is The Use Of Twitter and how to use it. First of all I want to define Twitter. " Twitter is a Micro-Blogging Service That allows us to send updates about our selfs,about our life,about our around and also about out blogs/websites updates and services to our followers and friends. This is Text-Based Service which allows us to send posts of upto 140 characters in length.Many of the famous bloggers use it to send their updated. We can use it as chatting as by replying to all the followers with @(their name). The Message we send on this service is know as tweet.

The Twitter site's fundamental question is "what are you doing?" This is simple to understand that send a message to all of your friends that what are you doing right now. Tell them that you are using internet just for surfing, Playing Games, listening to Music Or Found Something Speacial on internet Just twitt It to them.In countries all around the world, people follow the sources most relevant to them and access information via Twitter as it happens—from breaking world news to updates from friend.

So Hope All of The New Bloggers Now Understands The Micro Blogging Concept Twitter. Please Don't Forget To leave Your Valuable Comments.If Possible Than Follow Me At my Twitter Profile for Updates.
Approx 95% people on web are just surfing for their entertainment, Browsing News Websites, Online Papers, Searching For MP3 Songs, Big Electronic, Auto & Other Companies When Launching Their New Products. Many of them Spend hours to search the all things on web but they Don't Know that while surfing or writing they can Earn Money from Online.

What it is Possible?? These are Words of My One Friend when I Told Him about Google Adsense. He surprised and Jumped from His chair and asked me to tell him everything. Then I Described Him About The affiliate programs running on internet. There are many programs that pay only for our surfing on internet.

For Google Adsense We need a website, forum or a blog. After getting a website, forum or blog we can apply for the ad sense On Google’s Google Adsense Website.

If you have a good skill in writing great articles then you will get soon a huge amount of visitors on your web page or blog. Once you get surprised visitors then you are started getting Income.

what is Google Adsense???
Google adsense is an Affiliate Program for the web masters, Bloggers to earn money online with their writing skills. Once you applied for the Google adsense they will provide you an ad codes that you have to apply on your web pages. And whenever user will click on these ads you will get the commission of the same from Google.

Why Do I use Google Adsense???
Google Adsense is free to join easy to use and more of it you will have fun to blog or make your own website. As if you are reading this than I can bet that you will defiantly Interested In earning Online.

To Join Google Adsense Visit On Google Adsense

SEO means Search Engine optimization. SEO is major part of Blog/website designing. In other words we can say SEO is a process in which we make it most visible to Search engines to receive higher amount of organic traffic. A search engine optimized website can reap huge rewards for your website and your business.

Why SEO | Search engine optimization is important.

I tried to share some point here given below about SEO importance in Search Engine

1. We all search on major search engines like Google, Yahoo, Bing or MSN for collecting information about blogs/websites or Articles
2. We visit only first 1 to 5 sites on the search engine's first page and it is a rare chance to go beyond these numbers. That means if we have listed in these 5 numbers than here is a more chance to get highest traffic through search engine.
3. Seo is better than pay per Click Advertisement. Means SEO take only our time and research only one time while we are going to post an article but PPC takes every time somebody clicks on them.
4. All over the world internet users looking on internet through search engine for latest information and they are getting accurate information on their searched topics.
5. Top search engine ranking is a non-stop advertising campaign. That means coming of more & more visitors to your Blog/Websites.

To Why thinking for PPC go and do best SEO (Search Engine optimization) your Blog/website and Receive tons of traffic and make lots of Money online.

Do you have noticed a new change to my blog. I have blogger tool bar installed on my blog. Which have lots of features like Blog search, Web search, Translation, Recent Posts, Random Post, and Feed Button, Share This ,Twitter and latest notifications from my social networking like twitter ,face book? This tool bar is free of cost and a simple little java script.3

How to create your Own Blogger Tool Bar.















Features that Wibiya Provides

Create a Facebook Community

* Create a blog community using Facebook Connect
* Real profiles of real people
* Track your community growth as readers invite their friends
* Communicate with your community and learn what they like

Increase Page Views

* Gain traffic from Facebook through your members news feed
* Engage readers and raise page views with applications such as post navigator and blog search
* Track your traffic growth through simple analytics tools

Communicate With Your Readers

* Share your tweets with your readers in real time
* Send short alerts to your readers with each entry to your blog
* Direct channel to your Facebook community members

Power Tools

* Discover a growing range of applications to enrich your readers experience
* Full tracking and management system for each application and effectiveness to your blog
* Add and remove applications in just one click

Get your blogger tool bar now and enjoy the difference in your blogging experience.



what is SEO? SEO (Full Form Search Engine Optimization) is a process in which we optimize our blog/website to receive maximum Number of traffic from search engines. Search Engine Optimization (SEO) must be at the top level of our web publishing priority list. Search Engine Optimization (SEO) is one of the key parts of Internet Marketing. This is one tool that if used correctly will guaranty the best results with the search engines.

After reading many blogs/websites about the SEO I have come here to write down some SEO Tips for Beginners that can help to generate a huge amount of traffic from search engines.

1. Page Title: - First process of using best relevant keywords in the title tag of web page. Title is the thing that tells our reads everything about the article

2. Keywords: - make a high end research on best targeted keywords that fits into your article. Keywords are the main element for optimizing for search. These keywords will define you web pages to the search engines and therefore must be targeted, very high searched and as less competitive as possible.

3. Description tag of Website/Blog: - An attractive and effective description tag plays a real role in Optimization. Try to make it keywords rich with key phrases, but also make sure it is making meaning when read. Don’t just stuff it with all your keywords, but use it to make descriptive sentences.

4. Meta Tag: - Meta tags give instruction to search engine crawlers that what our blog/site is about and helps them to send relevant and the quality traffic to our blog/websites.

5. Original Content: - Don't be a Copy cat. Read, write, Read and publish. Write original content. Write impressive and useful content for your visitors and readers, but make it keywords rich and with high density. Don't just copy and paste into your web page if You like some one's article then try to write in your words, give some lines from those articles and don't forget to provide a back link to original article.

6. Back Link:- Back link with most searched keywords provide a lots of help to our blog's search engine ranking.

7. Social Bookmarking:- Invite lots of readers by using social bookmarking in various social bookmarking sites.

8. SEO for Images: - Try to use relevant Image with your Article and optimize them with Alt Tag.

9. Pin Your Blog: - Use pinging services to inform search engines that you have written or updated your blog/website with new content.

10. Visit Blogging In Web 2.0 Beta:- LOL visit To my Blog regularly to read out some more ideas about the blogging

Five Best Linux Distributions

There are many, many linux distributions, and a lot of unique reasons to like them. Read on to see which open-source inspired our readers to provide our biggest response to date. we asked not only which distribution was your favorite, but a note on why, with the hope that readers new to Linux would learn a thing or two. You responded in force. This was the most popular Hive Five to date, with over 800 votes and many helpful comments.


While not quite as simple to install as some of the other distributions on the list, openSUSE is quite user friendly. This distribution includes YaST (Yet another Setup Tool) to make installing applications a breeze. The user interface also gets a boost from Slab, a polished Windows Vista-like start menu. openSUSE puts an emphasis on hardware support and ease of use, making typically troublesome tasks like setting up a multi-monitor system less awkward. OpenSUSE is also part of the SMOLT driver project—when you install it, you can opt in to participate in a hardware survey to help continue the growth of Linux and foster support for new hardware.


Ubuntu / Debian / Linux Mint

Purists might complain that we've opted to group Ubuntu, Debian, and Linux Mint together, but compared to the other top nominees, they have more in common than not. Ubuntu is based on Debian, and Linux Mint in turn on Ubuntu. That said, they have distinctive appeals. Ubuntu currently has the largest share of the Linux user base, thanks in large part to a user-friendly installation, a desktop designed to accomodate first-timers, and a rigorous new released schedule. Ubuntu also comes bundled with an extensive set of open-source software to cover the needs of first-time switchers, but also includes only truly in its default installation, winning fans on both sides of the open-source aisle. Debian may not come pre-packed with as many applications, but users can easily retrieve over 25,000 applications from Debian, third-party repositories, and sites like GetDeb.net. Linux Mint shares much of its lineage with Ubuntu, but aims for a clean, green-themed, mostly new look. The distribution has a strong focus on immediate functionality, with a largers driver set included at first installation. It also includes Mint Tools, a set of configuration apps and wizards that strive to make configuring and managing Linux as painless as possible.


Fedora

If you're looking for an influential endorsement for a Linux distribution, you won't find one much better than being the distribution of choice for Linus Torvalds, the father of Linux. Fedora came into being in 2003 as a spin-off of Red Hat Linux's free personal distribution, when the latter was discontinued. Although technically a younger distribution, it's a seasoned and solid Linux release with a strong corporate backing and user following. Fedora comes in a variety of "spins," tailored with different apps and functionality, so you can get more of what you want without having to hunt it all down.


Arch Linux

Arch Linux is a lightweight Linux distribution which strives to "Keep It Simple". It's definitely not a Linux distribution for novices, as it installs with just a bash command prompt and no GUI desktop—the screenshot here shows Arch Linux with a basic KDE desktop installed. You get a pretty lean, spartan system at first, but it can be quickly built onto using the Pacman package manager. There's an extensive list comparing Arch to other distributions in the distro's wiki, and it's definitely worth a look if you're trying to decide whether Arch is for you.


Gentoo

Gentoo Linux starts you off with even less than Arch, as you essentially build your system from scratch during the initial install. Sure, you can download a totally pre-packed version and even a live CD, but the traditional way to install Gentoo is to compile a unique configuration specific to your hardware and software needs right from the start. There are tons of choices and options during installation, but they're pretty clearly explained. Some readers noted that, although they started with other distributions of Linux, it wasn't until they started using Gentoo that they really got their hands dirty and learned how Linux really runs.

Michael Jackson's "ghost"


Today's Big Blog, raises an interesting question: did the ghost of Michael Jackson moonwalk past cameras during a live feed last week on CNN? Some folks say they see Jacko in a shadow that passes a Neverland doorway in a YouTube video clip.

The clip comes from an episode of "Larry King Live," where a reporter tours the hall outside of Michael Jackson's bedroom. Something appears to float by the end of the hallway. Is it a poltergeist? Is it a shadow? Is it, as my editor scoffed, a passing car?

Decide


Singer Michael Jackson dies at 50

http://bougies.files.wordpress.com/2009/03/039_30399michael-jackson-posters.jpg

Michael Jackson had been due to play 50 concert dates in the UK this summer

Pop star Michael Jackson has died in Los Angeles, aged 50.

Paramedics were called to the singer's Beverly Hills home at about midday on Thursday after he stopped breathing.

He was pronounced dead two hours later at the UCLA medical centre. Jackson's brother, Jermaine, said he was believed to have suffered a cardiac arrest.

Jackson, who had a history of health problems, had been due to stage a series of comeback concerts in the UK, beginning on 13 July.

Speaking on behalf of the Jackson family, Jermaine said doctors had tried to resuscitate the star for more than an hour without success.

Jermaine Jackson on his brother's sudden death

He added: "The family request that the media please respect our privacy during this tough time."

"And Allah be with you Michael always. I love you."

TV footage showed the star's body flown from UCLA to the LA County Coroner's office where a post-mortem is expected to take place on Friday.

Concerns were raised last month when four of Jackson's planned comeback concerts were postponed, but organisers insisted the dates had been moved due to the complexity of staging the show.

A spokeswoman for The Outside Organisation, which was organising the publicity for the shows, said she had no comment at this time.

Broadcaster Paul Gambaccini said: "I always doubted that he would have been able to go through that schedule, those concerts. It seemed to be too much of a demand on the unhealthy body of a 50 year old.


"I'm wondering that, as we find out details of his death, if perhaps the stress of preparing for those dates was a factor in his collapse.

"It was wishful thinking that at this stage of his life he could be Michael Jackson again."

Uri Geller, a close friend of the star, told BBC News it was "very, very sad".


Speaking outside New York's historic Apollo theatre, civil rights activist Rev Al Sharpton paid tribute to his friend.

"I knew him 35 years. When he had problems he would call me," he said.

"I feel like he was not treated fairly. I hope history will be more kind to him than some of the contemporary media."

Melanie Bromley, west coast bureau chief of Us Weekly magazine, told the BBC the scene in Los Angeles was one of "pandemonium".

"At the moment there is a period of disbelief. He was buying a home in the Holmby Hills area of Los Angeles and the scene outside the house is one of fans, reporters and TV cameras - it's absolute craziness.

"I feel this is the biggest celebrity story in a long time and has the potential to be the Princess Diana of popular culture."

Musical icon

Tributes from the world of music and film have already flooded in from celebrities including Madonna, Arnold Schwarzenegger and ex-wife Lisa Marie Presley.




Large numbers of fans have also gathered outside Jackson's home and at the UCLA medical centre with lit candles to mourn the star while playing his greatest hits. Facebook groups have also been set up for fans to share their memories.

Paramedics were called to the singer's house in Bel Air at 1221 (1921GMT) following an emergency phone call.

They performed CPR on Jackson and rushed him to the UCLA medical centre.

A spokesman for the Los Angeles Police Department said the robbery and homicide team was investigating Jackson's death because of its "high profile", but there was no suggestion of foul play.

Jackson began his career as a child in family group The Jackson 5.


He then went on to achieve global fame as a solo artist with smash hits such as Billie Jean and Bad.

Thriller, released in 1982, is the biggest-selling album of all time, shifting 65m copies, according to the Guinness Book of World Records.

He scored seven UK number ones as a solo artist and won a total of 13 Grammy awards.

"For Michael to be taken away from us so suddenly at such a young age, I just don't have the words," said Quincy Jones, who produced Thriller, Bad and Off The Wall.

"He was the consummate entertainer and his contributions and legacy will be felt upon the world forever. I've lost my little brother today, and part of my soul has gone with him."

The singer had been dogged by controversy and money trouble in recent years, becoming a virtual recluse.

The star had three children, Michael Joseph Jackson Jr, Paris Michael Katherine Jackson and Prince Michael Jackson II.

He is survived by his mother, Katherine, father, Joseph and eight siblings - including Janet, Randy, Jermaine and La Toya Jackson.


Source BBC .

Top 10 Black Hat Hackers

[1] Jonathan James: James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, “I was just looking around, playing around. What was fun for me was a challenge to
see what I could pull off.” jonathan james

James’ major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive e-mails and capture employee usernames and passwords.

James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, “The software supported the International Space Station’s physical environment, including control of the temperature and humidity within the living space.” NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, “The code itself was crappy . . .certainly not worth $1.7 million like they claimed.”

Given the extent of his intrusions, if James, also known as “c0mrade,” had been an adult he likely would have served at least ten years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he’s learned his lesson and might start a computer security company.

[2] Adrian Lamo: Lamo’s claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the “homeless hacker,” he used Internet connections at Kinko’s, coffee shops and libraries to do his intrusions. In a profile article, “He Hacks by Day, Squats by Night,” Lamo reflects, “I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional.” adrian-lamo

Lamo’s intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do penetration testing, it’s legal. What Lamo did is not.

When he broke into The New York Times’ intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times’ LexisNexis account to research high-profile subject matter.

For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.

[3] Kevin Mitnick: A self-proclaimed “hacker poster boy,” Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as “the most wanted computer criminal in United States history.” His exploits were detailed in two movies: Freedom Downtime and Takedown. kevin mitnick

Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation’s computer network and stealing software.

Mitnick’s mischief got serious when he went on a two and a half year “coast-to-coast hacking spree.” The CNN article, “Legendary computer hacker released from prison,” explains that “he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system.” He then hacked into computer expert and fellow hacker Tsutomu Shimomura’s home computer, which led to his undoing.

Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.

[4] Kevin Poulsen: Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio’s KIIS-FM phone lines, which earned him a brand new Porsche, among other items. Law enforcement dubbed him “the Hannibal Lecter of computer crime.”

kevin puolson

Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.

His hacking specialty, however, revolved around telephones. Poulsen’s most famous hack, KIIS-FM, was accomplished by taking over all of the station’s phone lines. In a related feat, Poulsen also “reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency.” Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.

Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 sex offenders with MySpace profiles.

[5] obert Tappan Morris: Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act. morris

Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years’ probation, 400 hours of community service and a fined $10,500.

Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.

[6] Mass media claimed at the time he was a mathematician and had a degree in biochemistry from Saint Petersburg State Institute of Technology. levin2

According to the coverage, in 1994 Levin accessed the accounts of several large corporate customers of Citibank via their dial-up wire transfer service (Financial Institutions Citibank Cash Manager) and transferred funds to accounts set up by accomplices in Finland, the United States, the Netherlands, Germany and Israel.
In 2005 an alleged member of the former St. Petersburg hacker group, claiming to be one of the original Citibank penetrators, published under the name ArkanoiD a memorandum on popular Provider.net.ru website dedicated to telecom market.[1] According to him, Levin was not actually a scientist (mathematician, biologist or the like) but a kind of ordinary system administrator who managed to get hands on the ready data about how to penetrate in Citibank machines and then exploit them.

ArkanoiD emphasized all the communications were carried over X.25 network and the Internet was not involved. ArkanoiD’s group in 1994 found out Citibank systems were unprotected and it spent several weeks examining the structure of the bank’s USA-based networks remotely. Members of the group played around with systems’ tools (e.g. were installing and running games) and were unnoticed by the bank’s staff. Penetrators did not plan to conduct a robbery for their personal safety and stopped their activities at some time. Someone of them later handed over the crucial access data to Levin (reportedly for the stated $100).

[7] In human terms, it’s a case of a trusted, 11-year employee gone bad. Lloyd built the Novell NetWare computer network at Omega South and then blew it up with a software time bomb after he fell from corporate grace and was ultimately fired for performance and behavioral problems. Today, he faces a sentence of up to five years in prison. loyd

In a business sense, the loss of its key manufacturing programs cost Omega, which builds measurement and instrumentation devices for customers like NASA and the U.S. Navy, more than $10 million, dislodged its footing in the industry and eventually led to 80 layoffs.

The 1996 incident set off an intense investigation that brought together the U.S. Secret Service and one of the world’s top data recovery and forensics experts to piece together the evidence that would ultimately lead to Lloyd’s arrest and conviction

[8] The computer hacker known as “Mafiaboy,” who crippled several major Internet sites including CNN, arrives in court Thursday, Jan. 18, 2001 in Montreal, Canada. He pleaded guilty on Thursday to 55 charges of mischief. The trial of the 16-year-old Montrealer, who can not be identified under Canadian law, was set to begin Thursday on 66 charges relating to attacks last year on several major Web sites, as well as security breaches of other sites at institutions such as Yale and Harvard. mafia

[9] Mark Abene (born 1972), better known by his pseudonym Phiber Optik, is a computer security hacker from New York City. Phiber Optik was once a member of the Hacker Groups Legion of Doom and Masters of Deception. In 1994, he served a one-year prison sentence for conspiracy and unauthorized access to computer and telephone systems.

Phiber Optik was a high-profile hacker in the early 1990s, appearing in The New York Times, Harper’s, Esquire, in debates and on television. Phiber Optik is an important figure in the 1995 non-fiction book Masters of Deception — The Gang that Ruled CyberspaceAbene9_2005

[10] RoMeO : unknown un hacker , Caught at age of 10 on hacking his school computer that time he has leave but whos knw this kid will give big damage at time ,Not all hackers can boast of creating the virus that spread the fastest to computers the width and breadth of the globe 100,000 email accounts with his malicious source . Iran cyber-gang that reached . Under the cover of different alisases , he hacked day and night night and day lamo almost hacked arond 900 website , dont knw the numbers sites like NASA , CNN , GOV SITES sorry we dont have his any pic but got one alias which he always use as avatar

About me



Hi Salamwalikum ,

this is your friend Rezaali khan
degree student , webdeveloper , business man
.

Motive for making this site its just for being with friends and stay up to date pin-up appeal, but would certainly annoy the pants himself. i have never thought that site will build up in explode a reputation as a Himbo . im from very great family my dad name is shakhawat khan a carpets dealer to all ukrain , iran , africa he always being my idol on my life he is my hero . everyone is belong to my family is part towords my heart . so this become springboard to try everything i did all my life . i was very shy on my school days never had a gf and even talk with any girl this was realy decent image. but i was very mischeaf on my college days ''lol'' from there my life took step ahead on teen aged , a beauty of a women inspire me and i call's Flirt , Love Guru ''lol'' .Any way kept loving me :=))
top