• ADD CAPTION HERE

  • ADD CAPTION HERE

  • Helper Blogger

Wednesday, August 27, 2014

I am visiting multiple sites and Solving Captchas. Why Bitcoins are not transferring in my account ?

I am visiting multiple sites and Solving Captchas. Why Bitcoins are not transferring in my account ?

coinbox.me

This is the snap of coinbox.me. Some sites are associated with coinbox.me. In this pic as it shows that when a user reached 0.00005500 then it will send it to your Bitcoin Address.


This is the snap of bitchest.me. Some sites are associated with bitchest.me. In this pic as it shows that when a user reached 100% then it will send it to your Bitcoin Address.
2:08 AMMuhammad Arsalan SiddiquiBitcoin

Bitcoins Buy & Sell

Bitcoins Buy & Sell Site for Pakistan

Site#1

Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#2

Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#3

Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#4

Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#5

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#6

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#7

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#8

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#9

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#10

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#11

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#12

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#13

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#14

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#15

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#16

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#17

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5:

Bitcoins Buy& Sell for Other Counteries

Site#1

Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#2

Server#1: http://cur.lv/9rwcq https://www.bitstamp.net/
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#3

Server#1: http://cur.lv/9rwcw https://www.kraken.com/
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#4

Server#1: http://cur.lv/9rwd2 https://www.bitfinex.com/
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#5

Server#1: http://cur.lv/9rwdj https://btc-e.com/
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#6

Server#1: http://cur.lv/9rwdt https://justcoin.com/en/
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#7

Server#1: http://cur.lv/9rwe9 https://btcchina.com/
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#8

Server#1: http://cur.lv/9rweq https://campbx.com/
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#9

Server#1: http://cur.lv/9rwev https://www.cryptsy.com/
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#10

Server#1: http://cur.lv/9rwf8 http://bter.com/
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#11

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#12

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#13

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#14

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#15

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#16

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#17

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#18

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#19

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#20

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#21

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#22

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#23

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#24

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#25

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#26

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#27

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#28

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#29

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 

Site#30

Server#1: 
Server#2: 
Server#3: 
Server#4: 
Server#5: 
2:06 AMMuhammad Arsalan SiddiquiBitcoin

Bitcoin Wallets

Desktop Wallet

1. Bitcoin Core
  • Available for Windows (32 bit & 64 bit).(11 MB & 12 MB)
  • Windows Zip format. (61 MB)
  • Mac OS X. (13 MB)
  • Linux (tgz). (36 MB)
  • Ubuntu (PPA) (5 MB)
Verify Release Signature: http://cur.lv/9owg1 or  http://adf.ly/mTP8w
Get the Source Code: http://cur.lv/9owhd or http://adf.ly/mTPYS
Show version history: http://cur.lv/9owhy or http://adf.ly/mTPq3

2. Multi Bit
  • Window (8 MB)
  • Mac OS X (7.2 MB)
  • Linux/Unix (7.6 MB)
3.Hive
  • Mac
4. Armory
  • Windows
  • Mac
  • Linux
  • Ubuntu
5. Electrum
  • Mac
  • Windows
  • Linux
  • Android

Mobile Walletts

1. Bitcoin Wallet
  • Android
2. Mycelium Wallet
  • Android

Web Wallets

1. Blockchain.info

2.BitGo

3. Green Address

4. Coinbase

5. Coinkite
2:05 AMMuhammad Arsalan SiddiquiBitcoin

Top 5 Security Tips To Protect Your Computer From USB Viruses

With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.

1.Block USB Viruses

Invest in an excellent anti-virus program that has built in USB virus scan and remover. These anti-USB virus scan programs not only protect your computer from USB Autorun viruses but can also clean worms, Trojans and viruses in your USB memory sticks.You can try anti-virus programs for USB virus such as USB Virus Scan, USB Drive Antivirus and so on.

2.Disable Your Computer’s Autorun Feature


When you plug in a USB drive stick into your system, the Autorun feature initiates automatically. If your USB contains any virus programs, it’ll use the Autorun feature to infect your computer. To protect your computer, disable the Autorun feature.You can disable the Autorun feature via the Control Panel.
Alternatively, you can use antivirus software to disable and enable the Autorun feature whenever you want. Additionally, these USB blocking softwares allowsystem administrators to specify which removable storage drives users can access.

3.Update Your Device Driver


Keeping your USB device driver updated is a good way to ensure greater stability for your USB drives. While this won’t help eradicate USB viruses, USB device drivers are constantly updated to block viruses and deliver timely warnings. You can update your USB device drive from your Windows Computer Management feature in the Control Panel.

4.Use USB Firewall Software


USB firewalls prevent Windows OS from processing malicious programs when a virus infected portable USB device is opened. USB firewalls monitor only your USB devices, and not your CD and DVD drives. By using USB firewalls, you’ll be enabling a basic level of protection from the autorun.inf viruses that spread from portable USB devices.

5.Always Safely Remove USB Devices

Viruses are sometimes created via damaged documents. If you are transferring a set of files to your USB drive, make sure the transfer is complete before you eject the device. Always use the Safely Remove Hardware feature of Windows OS. This is because partially transferred or damaged files can in turn corrupt other files on your USB drive.
1:39 AMMuhammad Arsalan Siddiqui

Garmr – Automate Web Application Security Tests

Garmr is a tool to inspect the responses from websites for basic security requirements. It includes a set of core test cases implemented in corechecks that are derived from the Mozilla Secure Coding Guidelines which can be found here:

https://wiki.mozilla.org/WebAppSec/Secure_Coding_Guidelines

The purpose of this page is to establish a concise and consistent approach to secure application development of Mozilla web applications and web services. The information provided here will be focused towards web based applications; however, the concepts can be universally applied to applications to implement sound security controls and design.

It’s a useful tool, combined with others to automate web application security tests to a decent, fairly comprehensive baseline. It was built to be part of a Continuous Integration process by the Mozilla WebQA team, but could easily be adopted by other teams and used in a similar way – it ouputs a JUnit style XML report that can be consumed by other tools such as Jenkins.


More info:
https://github.com/mozilla/Garmr





WiFi software Acrylic WiFi Free v2.0 - Real-time WLAN information and network analysis



The main improvements of the new Acrylic WiFi software release are as follows:
Acrylic Free WiFi program incorporates information about the maximum speeds supported by the WiFi access point.
Fixed install and uninstall issues with NDIS capture driver under x64
Enhanced NDIS driver to avoid packet loss under heavy network capture with monitor mode.
Enhanced Wireshark integration for better performance and fixed radiotap header issues


Fixed compatibility with Windows Vista.
Added additional Visual studio dependencies.
Fixed issues when requesting trial licenses for Acrylic WiFi professional.
New exception handler module to detect Acrylic bugs.
Execute Acrylic as user: Acrylic can be installed and executed as user, without administrator rights. Note that without admin privileges monitor mode won’t be available
Added additional software tooltips.
Added social network buttons to share information about Acrylic WiFi software with all your friends and followers .
Improved graphical interface and usability.
Acrylic WiFi Free starts with data capture automatically once the program is executed.





Monitoring Android Traffic with Wireshark


The ubiquity and convenience of smartphones has been a real boon for getting information on the go. I love being able to jump on a Wi-Fi hotspot, catch up on my mail, check my banking balance or read the latest tech news—all without having to bring along or boot up a laptop. Now that mobile development is mainstream, most of this access is done via specialized apps, instead of via a Web browser.




How Browser Cookies Work

Most Internet users are familiar with the term “Cookie” but only a few know what exactly it is and the purpose it serves. This article will help you understand the working of different types of browser cookies in a simple and easy to follow manner.

To begin with, a cookie (also known as browser cookieInternet cookie,web cookie or HTTP cookie) is a small piece of data that websites store on your hard disk in the form of a text file. Cookies allow websites to store specific information helpful to remember each visitor uniquely. A cookie is set when the user visits a particular website for the first time. Thereafter, each time the user loads the website the browser sends the cookie back to the web server so that it can keep track of the user’s previous activity.

Purpose of Browser Cookies:

The following are some of the common purposes served by cookies:
  • Enable automatic user log-in thereby eliminating the need for a password input
  • Enhance user experience by storing user preferences so that the site can look different for each visitor
  • Keep track of items in the shopping cart
  • Record user’s activity such as browsing history, click patterns, page visits and so on

Types of Browser Cookies:


Session Cookie

Since web pages have no memories, a visitor navigating to a different page on the same website is treated as an entirely new visitor. This is where session cookies come in handy. It makes it possible for the website to keep track of the user from page to page so that user specific information such as shopping cart data, account details and other preferences are not lost during navigation.
A session cookie is stored in the temporary memory while the user is on the website. If no expiry date is specified during its creation, session cookies are normally deleted by the browsers upon closure.

Persistent Cookie

persistent cookie facilitates websites to track user settings and information when they visit the same website in the future. Unlike most session cookies, a persistent cookie does not get deleted upon browser closure. This makes it possible for the websites to easily authenticate users upon revisits without having to login again. In addition, persistent cookies help enhance user experience by storing their previous inputs such as language selection, themes and menu preferences.

Secure Cookie


secure cookie has a secure attribute enabled so that its content gets encrypted every time it moves between the web server and the browser. This cookie is used only in the HTTPS mode and thus offers protection against cookie theft.

Third-Party Cookie


Third-party cookies are those that originate from a website other than the one that you are currently using. For example, when you visit a websitewww.abc.com, all the cookies that come from this website are called first-party cookies. Suppose, if this website (www.abc.com) is running an advertisement on its page from a third party website www.xyz.com, then the cookie that originates from this website (www.xyz.com) is referred to as a third-party cookie.

Structure of a Cookie

A cookie is comprised of the following seven components:
  1. Name of the cookie
  2. Value/Content of the cookie
  3. Domain associated with the cookie
  4. Path for which the cookie is valid
  5. Attribute to specify whether the cookie requires a secure connection
  6. Attribute specifying whether the cookie can be accessed by a script
  7. Expiry information of the cookie
The following snapshot shows the contents of Google’s cookie stored on chrome browser:


Drawbacks of Cookies

Even though cookies make our lives easier on the Internet, they come with drawbacks as well. Some of the major ones are listed below:

  • Shared Machines: Most people share their computers with their friends and family. As a result, a cookie set during the usage of one user may not be appropriate for the other user using the same machine. For example, when a new user revisits a shopping website such as amazon.com, he/she will be presented with all the information belonging to the previous user such as order details, shipping address and other personal preferences. This may cause annoyance to the new user as he/she may be required to change all the preferences once again to match personal requirements. Additionally, the exposure of previous user’s preferences and settings to the new user may raise security issues.
  • Accidental Deletion: In many cases, cookies can get erased accidentally when you clear your browsing history or use a third party cookie cleaner program. When this happens all your stored settings and preference gets lost and the website treats you as a completely new user.
  • Privacy Issues

    Since cookies are capable of tracking a number of user specific information such as online behavior and personal preferences, they can be used to hamper the privacy of users. A website may use cookie information to display related advertising products based on your previous purchase. For example, Google often stores and uses your search keywords to display matching advertisements on all its partner network. Some sites are also known to have engaged in selling the cookie data to third parties which seriously hurts the privacy of individuals.
    1:19 AMMuhammad Arsalan Siddiqui

    PHP Secure Configuration Checker script


    Among the most tedious tasks of PHP security testing is the check for insecure PHP configuration. As a successor of our PHP Security Poster, we have created a script to help system administrators as well as security professionals to assess the state of php.ini and related topics as quickly and as thoroughly as possible. For later reference, the script is called "PHP Secure Configuration Checker" , or pcc.

    One single file for easy distribution: In respect to an update process and access restrictions, a single file can be handled easier than a whole web application monster.
    Simple tests for each security related ini entry: Testing php.ini on a live system is the main aspect of this project. Each entry is supposed to be checked or otherwise actively ignored.
    A few other tests: pcc is not restricted to php.ini checks. Other ideas can be implemented as well.

    Compatibility: PHP 5.4 is supposed to work. Older PHP versions are not supposed to be used in the wild anyway.
    NO complicated/overengineered code, e.g. no classes/interfaces, test-frameworks, libraries, ...: In most cases, a recommendation is based on a simple boolean decision, e.g. is it 1 or is it 0. The corresponding code is supposed to reflect this simplicity. Also, simple code leads to fewer programming errors.Novice factor: The result is supposed to help secure the PHP environment. There is no need to obfuscate, encrypt or hide the code. Even unexperienced developers or system administrators may take a glance at the code - free of charge.


    NO (or very few) dependencies: pcc is supposed to run in the most simplistic (yet still realistically sane) PHP environment. Writing files and loading bloated library code should be avoided.
    Safeguards: In order to prevent information disclosure, IP restrictions are implemented, as well as a lock-out mechanism based on the script's modification time.
    Suhosin: pcc checks the correct configuration of the Suhosin extension.