follow

help me to improve quality

donate

Pages

Friday 23 September 2016

how to setup google analytics tracking code in youtube


What if you could track web analytics data associated with your YouTube account just like any other website? By connecting your Google Analytics and YouTube accounts, you can tap into a rich vein of data to get in-depth information about your channel's performance on a Google Analytics dashboard. As long you have a branded YouTube channel, it's easy to set up. Here's a quick walkthrough to get you started.

Quick note: You can integrate your YouTube account with an existing web property, but I recommend creating a new web property for two reasons: 1) YouTube visits will be added to your current web property's visitors, potentially skewing analysis; 2) if you track goals, conversions, or events, integrating your YouTube channel will water down these stats. In my mind, it's easier to combine data sources rather than having to separate them later.
follow this step:- 

step 1=Sign in to your Google Analytics account from https://www.google.com/analytics/.

step 2=Navigate to the Admin section (located at the top right corner of the home page).
From the management page, open the Property drop-down menu (the middle column).

step 3=Click the Create new property option at the bottom of the menu.

step 4=Fill out the appropriate fields.
In the Website URL field, enter your YouTube channel's URL. (EG: www.youtube.com/c/pctrickscybersecuritytest)

step 5=Click the Get Tracking ID button.

step 6=Copy the tracking ID that is displayed at the top of the page.

step 7=go to channel and ckick on video maneger,then you will see "channel" at left hand side.

step 8=then go to "advanced" and just add your tracking id as shown in video.


some info about Tracking ID and property number:-The tracking ID (2) is a string like UA-000000-01. It must be included in your tracking code to tell Analytics which account and property to send data to. It's automatically included in the JavaScript snippet for websites, but also needs to be included in other tracking technologies like the SDKs and the Measurement Protocol, for Analytics to work. The first set of numbers (000000, in the example above) refers to your account number, and the second set (-01) refers to the specific property number (3) associated with the account. The tracking ID is in large font on the Tracking Info page. You can also to see the entire string in the first few lines of the tracking code JavaScript snippet.

Friday 16 September 2016

malwares and its types



hello every one,
in this post,i will talk about malware.
in this post,i will tell you about strengh,and ability of malware,
and what malware can do.
i am writing this post because i think if you do not know power and capacity of nasty malware then you cant protect your self from malware,

so what is malware?


malware means molecious software,
molecious software is software which is specifically designed to  damage your computer.
in this post i will explain all different kind of malwares.
so without wasting any time lets get started


1)what is virus?


virus is one kind of molecious software,which can destroy your software and hardware both,

it have ability to damage your operating system,your application,and it can also destroy your hard-drive and mother board,and it can also stil
your data.
but there is few weakens of virus
1-it will not harm you unless you run that virus or 
click on that virus. 
2-if i made any virus for windows operating system
then it will not work in android ,ios and other 
operating software

what is macro virus?

it is virus which is made by using macro language.A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. A typical effect is the undesired insertion of some comic text at certain points when writing a line. A macro virus is often spread as an e-mail virus. A well-known example in March, 1999 was the Melissa virus virus.


2)what is worm?



A worm is one kind of molecious software which is similar to a virus by design and it is considered to be a sub-class of a virus.


Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.that means it can harm you even if you do not run it.that is the main difference between virus and worm

 A worm takes advantage of file or information and transport features on your system, which allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself , creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. 
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. 


3)what is Trojan Horse?


The Trojan Horse, at first glance it will appear to be useful software but it will actually damage your computer if you install it or run on your computer.you will normally find trojans in the form of free pc games and pc tuners,etc...
Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. 

When a Trojan is activated on your computer, the results can vary. 
Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. 
Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, and it possibly allows confidential or personal information to be compromised.but Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.





4)what is rootkit ?


The word rootkit comes from the days when it was mainly used in a Linux environment.  Root is the term for administrative access, and kit is a term for programs that operate to the admin level and execute programs at that level.  In this way rootkits can allow someone to operate functions on a computer at the administrator level,so it can easily access logs and monitor user activity, and more.

Rootkits aren’t always malware – they can be used for good and legitimate purposes.  However, when your computer becomes infected with a rootkit it’s generally a bad thing.

Rootkits are one of the most difficult types of infections to remove.  The rootkit itself is not harmful, however they are used to hide malicious software: worms, bots, etc.  Rootkits normally activate themselves before the operating system boots up, and than it enables the attacker to gain control of the infected computer in very critical ways. that is the main reason to give "boot time scanner feature"in antivirus softwares. However, these days rootkits are mostly used to install mask malware.  A rootkit can hide on a computer for years before being detected.


5)what is ransomware?


i think, it is the most dangerous malware,because same ransomware can infect all operating system because it is one kind of java-script,that means if your operating system supports java-script then ransomware can easily harm you and as far as i know almost all operating system supports java-script including apple ios,android , windows and Linux.

Ransomware is a kind of intelligent malware, but unlike other malware that merely corrupt your data,and delete files or does some other suspicious behavior,but this malware can locks your entire system, files and apps, and then it demands money from you, if you want to unlock your data.

and I said that, it is intelligent malware because this malware helps directly the attacker to earn money. Other kinds of malwares, like viruses, trojan horses etc, merely corrupt the system or steal some sensitive data, but rarely result in some monetary benefit to the attacker (unless the malware steals some sensitive information like credit card numbers etc).

Types of Ransomware

Ransomwares are normally classified into two types, encrypting ransomware and non-encrypting ransomware.

Encrypting ransomware are those who encrypt the files, programs etc of your system and demand a money to un-encrypt them. Usually encryption is done using a strong hashing algorithm that can take several thousands of years for a normal desktop PC to break them. So the only way that the user gets back his files is by giving the money and obtaining the unlock key. This is the most harmful ransomware for its attacking mechanism.

Another type of ransomware is the non-encrypting one. This one doesn’t encrypt your files, but rather blocks access to them and shows irritating messages when you try to access them. This is a less harmful ransomware and the user can easily get rid of them by taking backup of important files and installing the operating system again.


6)what is adware?


Adware is a form of software that downloads or displays unwanted ads when you are online,and it collects marketing data and other information without your knowledge and  it redirects search requests to certain advertising websites.and it can also change homepage of your browser. 

that means,basically it is the programs that are designed to display advertisements on your computer, and redirect your search requests to advertising websites, and collect marketing-type data about you – for example, the types of websites that you visit – so that customized advertises can be displayed.



7)what is spyware?


spyware is one kind of malware which is used to spy on you.it can also collect your browsing data.and all of your browsing data for example visited website,password and history are saved in form of cookies files in your computer and if any hacker will get those cookie files then hacker can easily get some info about you and then that hacker can use that info against you.

Spyware is a type of malware that is installed on a computer without your knowledge in order to collect your private information. Spyware is often hidden from you in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. Spyware can also negatively affect a computer’s performance by installing additional software, redirecting web browser searches, changing computer settings, reducing connection speeds, changing the homepage or even completely disrupting network connection ability etc... Spyware can also be used as a type of adware, where the software delivers  pop-up ads in addition to tracking user behavior. Typically, spyware is installed when a you installs a piece of free software that hacker actually wanted.and When the desired software is installed, the spyware will  start collecting data from your activities. 

you can also be tricked into installing the spyware through a Trojan horse as well as it pretending to be a free piece of security software. 


8)what is Keylogger?Why is it so           Dangerous?



All of you have heard about viruses and malware – but not many of you knows exactly what a keylogger is and why you should do everything possible to protect yourself from this.

actually keylogger is one kind of spyware.
A keylogger is a piece of software — or a hardware device — that logs every key you press on your keyboard.that means ,it can record everything which you type in your keyboard. and It can capture personal messages, passwords, credit card numbers, and everything else you type.

Keyloggers are usually installed by malware programs in order to get your personal information and credit card details.

How a Keylogger Would Get On Your Computer

Many times you can get infected when you download files from the internet. You have heard about “free and cracked” software – that is actually cracked editions of commercially available software.

When you download cracked or pirated software or music – there is a good chance that the software can include malware that installs itself at the same time in the background without your knowledge.

How Keylogger works?

it runs hidden in the background,and it makes a note of each keystroke you type. and then later it scans through the saved file of all the keystrokes for certain types of text — for example, it could look for sequences of numbers that look like credit card numbers or website and email passwords and then it sends all information to hacker.


9)what is dialer malware?


Dialer Malware automatically inserts and modifies the numbers depending on the time of day, country or area code dialed.and It can dial specific numbers without your  knowledge and thus cause you fat telephone bills.

that means,Dialer is a piece of software which is designed to dial a telephone number automatically.

Automated dialers can store names and telephone numbers and enable to you easily contact people without remembering phone numbers, or be tracked by Caller ID.

Most automated dialers will retrieve contact information from other databases, such as your Microsoft Outlook Contacts list.

Some automated dialers will also dial a telephone number at regular intervals until a person answers the phone. When the person answers the telephone, the automated dialer will sound an alarm to let you know that the called party is on the line.

i think,These can be easily blocked with Call Blockers and Anti-Dialers.


10)what is browser hijacker?


A browser hijacker is a type of malware that is designed to change your browser's settings. and it can cause troubles such as

1)Your search is getting redirected to different websites
2)Your homepage or search engine is changed without your permission
3)Webpages loads slowly
4)You see multiple toolbars on your web browser which you did not installed
5)You get multiple pop-up alerts for advertisements etc...

from Where browser hijacker comes 


Many browser hijackings come from add-on software, also known as browser extensions, browser helper objects, or toolbars. Often, these items may improve your experience on a website by providing interactive content, such as animations. However, some add-on software can cause your computer to stop responding or display content that you don't want, such as pop-up ads.




11)what is scareware ?


scareware is one kind of malware which try to scare you.
normally this kind of software found in the form of pc tuners,pc cleaners,best free antivirus software,etc...
and they shows many errors and viruses in your computer even if everything is perfect in your computer and then when you click on fix all error or remove all viruses and then it shows you one pop up in which they ask you to buy their product.

The aim of scareware is quite simple.they just want to sell their useless software in order to make money.

In many respects scareware acts like a Trojan,

How Scareware Works?

There are 3 main ways in which scareware will trick you somehow –

1)Getting you to pay up – You buy the fake antivirus product, which is bad enough, but then the scammers take your credit card details too!

2)Zombie time – Many scareware programs will ensnare the victim machines into a botnet which can then be used for sending spam or engaging in DDoS attacks.

3)Identity theft – Scareware can install keystroke loggers and Trojans which will record what you do online and search your files for anything containing your private or financial information.



12)what is A Bootkit?


To understand what a bootkit is, we’ll first explain where the terminology comes from. A bootkit is a variant of a rootkit, a type of malware with the ability to conceal itself from your operating system and antivirus software. Rootkits are notoriously difficult to detect and remove. Each time you fire-up your system, the rootkit will grant an attacker continuous root level access to the system.

A rootkit can be installed for any number of reasons. Sometimes the rootkit will be used to install more malware, sometimes it will be used to create a “zombie” computer within a botnet, it can be used to steal encryption keys and passwords, or a combination of these and other attack vectors.
Boot-loader level (bootkit) rootkits replace or modify the legitimate boot loader with one of its attackers’ design, affecting the Master Boot Record, Volume Boot Record, or other boot sectors. This means that the infection can be loaded before the operating system, and thus can subvert any detect and destroy programs.
Their use is on the rise, and security experts have noted a number of attacks focused on monetary services, of which “Nemesis” is one of the most recently observed malware ecosystems.





Friday 9 September 2016

add subscribe button to all videos on youtube channel 2016


Have you started a new YouTube channel? Yes! It may be a great hurdle for you to increase the subscribers and people apply different tactics for increasing their subscribers list. You would be seen a clickable subscribe button or link on many videos on YouTube to encourage new subscribers. I also loved this method for increasing YouTube subscribers.

This subscribe button on YouTube is important because after publicly sharing video on YouTube, it is searchable by Youtubers on YouTube and search engines and if somebody visits your video via search and likes it, there is a possibility to click on that subscribe button on your video.
So, in this post I will tell you, how to add a clickable subscribe button or link to your YouTube videos. 

few rules to add channel icon:
-your image must be in the form of "GIF or png"
-image should not be bigger than 1Mb.
-for best result,use transparency and just one color.



follow steps which are given below to add it to your channel:

Step 1: Go to www,youtube.come and sign in to your account,and then simply click on channel icon which you will find at right corner.
step 2:then you will see "creator studio" ,so simply click on "creator studio" 
Step 2:and then  Click on Channel then Branding as shown in video
Step 3: Under Branding upload watermark  your photo or logo as shown in video
Step 4: Set when you want your logo to pop up,in this video i choose "entire video".because i want to show that subscription button in whole video.then save it.

That's it! It'll now appear on all of your YouTube videos!


Friday 2 September 2016

WhatsApp to Share Your Data with Facebook — You have less than 30 Days to Stop It

Nothing comes for Free, as "Free" is just a relative term used by companies to develop a strong user base and then use it for their own benefits.

The same has been done by the secure messaging app WhatsApp, which has now made it crystal clearthat the popular messaging service will begin sharing its users’ data with its parent company, Facebook.

However, WhatsApp is offering a partial opt-out for Facebook targeted ads and product related purposes, which I will let you know later in this article, but completely opting out of the data-sharing does not seem to be possible.

Let's know what the company has decided to do with your data.

Of course, Facebook is willing to use your data to sell more targeted advertisements.

WhatsApp introduced some significant changes to its privacy policy and T&Cs today which, if accepted once, gives it permission to connect users' Facebook accounts to WhatsApp accounts for the first time, giving Facebook more data about users for delivering more relevant ads on the social network.

The messaging service will also begin pushing users to share some of their account details, including phone numbers, with Facebook, allowing the social network to suggest phone contacts as friends.

When Facebook acquired WhatsApp for $19 Billion in 2014, users were worried about the company's commitment to protecting its users' privacy. But, WhatsApp reassured them that their privacy would not be compromised in any way.
"Respect for your privacy is coded into our DNA, and we built WhatsApp around the goal of knowing as little about you as possible," said WhatsApp co-founder Jan Koum in a blog postpublished at that time.
Now the WhatsApp users are feeling betrayed by the company's latest move.

However, you need not to worry about the contents of your WhatsApp messages, like words and images, as they are end-to-end encrypted, meaning that even the company cannot read them.

Ultimately, the two companies will be sharing, what they called, a limited amount of user data, which includes phone numbers and other information about users.


No Option to Completely Opt-Out of Data Sharing


If you think WhatsApp is more privacy conscious than Facebook’s Messenger, it is not anymore.

WhatsApp is offering a solution partially to opt out the data sharing, specifically for Facebook ad targeting and product-related purposes.

However, the company notes that data will still be shared "for other purposes such as improving infrastructure and delivery systems, understanding how our services or theirs are used, securing systems, and fighting spam, abuse, or infringement activities."

So, those who are thinking to opt out of the data-sharing entirely: There's no possible way to opt totally out.

Though one short solution is to stop using WhatsApp.

Here's How to opt -out of sharing data for Facebook ad-targeting purpose:

The company has outlined two ways to opt out of the exchange of information with Facebook on itsblog.

One way is for those users who have not yet agreed to the new terms of service and privacy policy, so before agreeing to the new terms, follow these simple steps:
  • When prompted to accept the updated T&Cs, tap Read to expand the full text.
  • A checkbox option at the bottom of the policy for sharing your data on Facebook will appear.
  • Untick this option before hitting Agree. This will let you opt out of the data-sharing.
The second option is for those who have already accepted the new T&Cs without unchecking the box to share their information with Facebook.

WhatsApp is also offering a thirty-day window for users to make the same choice via the settings page in the app. To exercise your opt-out in this scenario you need to follow these steps:
  • Go to Settings → Account → Share my account info in the WhatsApp app
  • Uncheck the box displayed there within 30 days, as after that this partial opt-out window will expire.
However, WhatsApp states Facebook will still receive your data in some situations.
After introducing end-to-end encryption, WhatsApp has become one of the most popular secure messaging apps, but this sudden shift in its privacy policy may force some users to switch to other secure apps like Telegram and Signal.