You might have noticed a great volume of sites you never heard of coming to your site apart from Search Engine URL’s. Some of those URL’s are filmhill.com and vampirestat.com. These kind of URL‘s are SPAM. The SPAM site is referring your site but they are not persons, they’re BOTS. These bots are visiting your site just for fun. These bots don’t read your posts or anything. They’re just a pile of robots.... [READ MORE]
Posts marked with "Posts" in posts
NimBuzz Official Website hacked by Iranian Hackers
Just now. Nimbuzz main site nimbuzz.com was hacked by someone identified as Sourena. The hacker defaced the main site to this <p> </div> <div style="text-align: left;"> As a proof he saved a mirror at <a href="http://zone-h.com/mirror/id/19693441" style="font-weight: bold;" >Zone-H</a>. The <b>Nimbuzz</b> website can’t be accessed right now. Google Chrome gives an error "<b>Oops! Google Chrome could not connect to nimbuzz.com</b>" </div> <div style="text-align: left;"> </div> <div style="text-align: left;"> <b>Nimbuzz </b>is one of the popular chat clients in <b>PC </b>and mobile phones.... [READ MORE]
How to make your Windows 8 PC speak out Time at Every Hour
Thanks for this useful information by NextOfWindows This small tutorial will make your PC speak out the time every hour. This will help especially if you’re a programer. Because programmers usually lose track of time. Most Programmers don’t use a Windows OS. But there are some ! This tutorial is for those people. Create a file named time.vbs containing these code : Dim speaks, speech <div style="text-align: left;"> <span style="background-color: white;"><span style="font-family: inherit; line-height: 25px; text-align: center;">speaks = "It is " & hour(time) & " O’clock"</span></span> </div> <p> <span style="font-family: inherit;"><span style="background-color: white;"></span></span> </p> <div style="text-align: left;"> <span style="background-color: white;"><span style="font-family: inherit; line-height: 25px; text-align: center;">Set speech = CreateObject("sapi.... [READ MORE]
Login with Google OAuth without using Google PHP Library
Google PHP Library is very hard to use and is very long. It wasted a lot of my time. So I decided to do it manually. I created a new library for Google OAuth in PHP. Download Demo It is very simple to use and you don’t have to worry about a thing. FAQ How to get a client Id and Client Secret ? 1) Go to https://code.google.com/apis/console and create a new project.... [READ MORE]
List of Google OAuth Scopes
Here is the list of Google OAuth Scopes. It can be used for different purposes. Adsense Management <td class="secondary"> https://www.googleapis.com/auth/adsense </td> </tr> <tr class="op-menutrstitem op-menuchecktrstitem multiple" val="https://www.googleapis.com/auth/gan"> <td style="margin-right: 20px;"> Google Affitrate Network </td> <td class="secondary"> https://www.googleapis.com/auth/gan </td> </tr> <tr class="op-menutrstitem op-menuchecktrstitem multiple" val="https://www.googleapis.com/auth/analytics.readonly"> <td style="margin-right: 20px;"> Analytics </td> <td class="secondary"> https://www.googleapis.com/auth/analytics.readonly </td> </tr> <tr class="op-menutrstitem op-menuchecktrstitem multiple" val="https://www.googleapis.com/auth/books"> <td style="margin-right: 20px;"> Google Books </td> <td class="secondary"> https://www.googleapis.com/auth/books </td> </tr> <tr class="op-menutrstitem op-menuchecktrstitem multiple" val="https://www.... [READ MORE]
How to display errors in a PHP file ?
When you code PHP some errors might have happened. But you won’t know that and the program don’t work. You can use PHP‘s error_reporting function to display errors. Here’s how to do it: Create a file named errors.php in the folder where the file with errors exist. Open the errors.php file in text editor and paste these codes in the file: error_reporting(E_ALL); ini_set("display_errors", 1); include("filename.php"); ?> Replace filename.php with the name of the file that has errors.... [READ MORE]
jQuery .live function removed in V 1.9. What is the best replacement for .live function ?
As of jQuery version 1.9, the .live function has been removed which means it is no longer available to use. Instead of this function you can use .on function which also has the same function as .live. Both of them attach an event handler for all elements which match the current selector, now and in the future. Since .live has been removed you can use .on function. Here’s how we should do it. Replace .... [READ MORE]
How to make sure that a CSS file will load on your site using PHP
This is a simple trick. Most of the web developers worry that the Stylesheet file will not load completely. This happens if your CSS file’s size is too large. The fail in complete loading of the file mostly happens to users who are using slower connections like me. The page will look disgusting if the CSS file don’t load. To avoid the file not getting loaded you can do this simple trick using PHP.... [READ MORE]
Subins Update 1.2
Subins has been updated to 1.2. The new changes have been made on Subins and is updated today. The sites that affected the changes are: Contents <ul class="toc_list"> <li> <a href="#subins-chat"><span class="toc_number toc_depth_1">1</span> Subins Chat</a> </li> <li> <a href="#accounts"><span class="toc_number toc_depth_1">2</span> Accounts</a> </li> <li> <a href="#subins"><span class="toc_number toc_depth_1">3</span> Subins</a> </li> <li> <a href="#friendshood"><span class="toc_number toc_depth_1">4</span> Friendshood</a> </li> <li> <a href="#subins-get"><span class="toc_number toc_depth_1">5</span> Subins GET</a> </li> </ul> Subins Chat In Subins Chat the design has been changed.... [READ MORE]
What is SQL Injection and how to make your PHP site free from SQL Injection hacking
SQL Injection (SQLi) is a very dangerous thing that a hacker can do to your site. This happens mostly in SQL queries. Let me make you understand this in a simple way. Suppose you’re SQL query code is this: $user=$_GET[‘user’]; $sql=mysql_query("SELECT * FROM users WHERE user='".$user."‘"); It’s a normal code. BUT it is a very easy method for hacker to easily destroy your database. The user ID is getting from a GET request. If the file’s name (where the request is going) is user.... [READ MORE]