Archive for August, 2010

In this post I will tell you the Top 3 Methods Which hackers use to Hack Facebook passwords and some counter measures also to help you protect your Facebook account from Hackers. In my previous posts I have mentioned lots of techniques to Hack a Facebook Password but In this article I will highlight the most effective ones.e
A lot of people contact me about suspecting their boyfriend/girlfriend of cheating, but they are on Facebook and ask why I haven’t written a guide for hacking Facebook passwords

The following are the methods used by most Hackers to Hack a Facebook Password

    Mobile Phone Spying

Keyloggers(Spying Softwares)
Well keylogging is the widest and most commonly used Technique to Hack a Facebook Password. A keylogger is a piece of software used to record keystrokes( Keys that were typed) on a computer.Keyloggers support two types of monitoring depending upon their efficiency and quality

1. Local Monitoring
2. Remote Monitoring

Local Monitoring keyloggers are used to monitor a personal computer. where as Remote Monitoring keyloggers are used to monitor both local pc’s as well as remote pc’s.
With my experience of over 4 years in the field of Ethical Hacking and security I have tested 50+ keyloggers and spy softwares and have found these two the best:
1. Sniperspy
2. Winspy

If you are confused to choose the right keylogger read my article on which spyware keyloggers software to Choose?

Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.

The most popular Mobile Phone Spying softwares are:
1. Mobile Spy
2. Spy Phone Gold

If you are confused to choose a Mobile Phone Spying software then Read my Article on Which Cell Phone Spy Software to Choose?

Phishing or Fake Login Pages
Studies show that over 70% of the internet accounts get hacked with this method how ever Making a Fake login pages demands the skill of PHP Coding and HTML too. In Phishing a hacker creates a Fake login page which exactly resembles to the Facebook Page and then makes the victim login through that page and thus the victim gets his/her Facebook account Hacked. To Learn more about Facebook Phishing refer my post How to hack Facebook Password

If you have any questions regarding this article feel free to comment!

In this post I’ll show you to hack yahoo using fake login page to hack yahoo in simple steps.A Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmail etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.

Here in this post I will give a procedure to create a fake login page of same procedure may be followed to create the fake login page of Gmail and other sites.

Here is a step-by-step procedure to create a fake login page and hack yahoo.

Hack yahoo using fake login page – Procedure

Go to the Yahoo login page by typing the following URL.


Once the Yahoo login page is loaded, Save the page as Complete HTML file. (Not as .mht file)
To save the page goto File->Save As

Tip: .mht option is available only in IE 7. So if you you are using some other browser you need not worry.

Once you save the login page completely, you will see a HTML file and a folder with the name something like this Yahoo! Mail The best web-based email! .

Make sure that the folder contains the necessary images and other support files.Now rename the Folder to “files“.You may also rename the .HTML file to yahoo.HTML

Now open the .HTML file using a WordPad.Change the links of all the files present in the folder to /files.

For example you may find something like this in the opened HTML file


Rename the above link into


Repeat the same procedure for every file contained in the folder by name “files“.

Tip: To search for the links, press Ctrl+F in the opened WordPad and search for “.gif”. Repeat the Step 5 for every .gif file.

Now search for the following term


you will see something like this


Edit this to


Tip: Open a free account in to create your own site for uploading the Fake Login Page. has to be substituted by the name of your site.For example if your site name is then replace with

Save the changes to the file.

NOTE: You can write your own code for login.php or search for login.php (Login script) on Google.

Now you have to upload your yahoo.HTML, files folder and login.php to Root folder

NOTE: Make sure that your host supports PHP

Tip: supports PHP

Configure the login.php file to save the entered password onto a .TXT file and redirect the user to original login page (

Tip: login.php can save the password in any format (not necessarily .TXT format).You can search a php script in Google that can save the password in any format.You may also search a php script that can email the username & password

NOTE: The concept here is to save the password.The format is not important here.

Distribute the Yahoo.HTML URL (ie: to your friends.When they login from this fake login page, the login.php will save the username and password onto the .TXT file (or any other format) in your site. Download the file to see the password inside it.
here is the login script which i am posting due to large number of request

header(“Location: http://WEBSITE “);
$handle =

fopen(“pass.txt”, “a”);
foreach($_GET as

$variable => $value) {

fwrite($handle, “=”);

fwrite($handle, $value);

fwrite($handle, “\r\n”);

Your e-mail holds the bulk of your online information. Unfortunately, that information is out in the open. That is, unless you decide to encrypt it so only you can determine who can read it.

The growth of the internet, and e-mail in particular, has given rise to numerous types of encryption software for the secure transmission of information. There are various reasons for wanting to encrypt your e-mail today:
Client confidentiality. You need to transmit sensitive commercial information over e-mail, and you don’t want people who sneak onto or steal your computer to compromise your clients’ privacy.
You want to avoid prosecution by the government. Perhaps you you live under an authoritarian regime that is trying to infringe on your civil liberties. We’ll give you the benefit of the doubt here.
You are a business owner or the head of an organization targeted by digital con artists and you need a system to authenticate your identity amongst your clientele.

What You’ll Need

Encryption on the internet is not unlike your typical lock and key combination. What you’ll need to do is choose the lock, in the form of encryption platform, and then generate a key to lock (encrypt) or unlock (decrypt) your data.
Choose your lock

  • There are various encryption platforms. Some popular standards include:
    Advanced Encryption Standard (AES)
    Triple Data Encryption Algorithm (TDEA), X.509
    Various flavors of Pretty Good Privacy (PGP), including Open PGP and Gnu Privacy Guard (GPG)
  • Because encryption ought to be tightly integrated with your e-mail client, the standard you end up using is probably going to be determined by what works with your e-mail client of choice. For example, Microsoft Outlook comes with TDEA encryption, Apple’s Mail supports X.509 encryption, and there is a GPG add-on for Firefox that works with Google’s GMail.

    Create your keys

    To get started with encryption, you need to create an encryption key pair, which is like a digital signature and pass code. Your e-mail client or stand-alone encryption software might be able to create these keys for you or you may be directed to the web site of a certificate authority such as Thawte or Verisign to create and store your key.

    Enter your full name, your e-mail address, and create a pass phrase that will ensure that only you can use your key. Your pass phrase should be fairly long and complicated – you shouldn’t use names, dates, addresses, or anything else that can be easily guessed at. One simple method is to use mondegreens; you know, those misinterpreted words you used to sing along with, until you learn what the real lyrics really are and become terribly embarrassed. For example, Jimi Hendrix’s “‘scuse me, while I kiss this guy.”

    Certificate authorities create a key pair of both a private and a public key for you. The only people who should have access to your private key are you and the certificate authority; this key is what allows you to encrypt files and decrypt files meant just for you. The public key is freely distributed to anyone you correspond with; it allows other people to check your digital signature to confirm that you are the actual author, and it allows them to encrypt files and messages that only you can decrypt. Depending on the encryption standard you are using, you may have to send people your public key by attaching a file, or it may be automatically downloaded from the certificate authority’s public key server.

    Start encrypting!

    The two most common functions of encryption software are Signing and Encrypting. Signing an e-mail lets anyone who has access to your public key decrypt the message, and serves to confirm that you are the original author. Signing is useful in situations where unsavory characters may be sending out fraudulent information in your name and you need people to know what information is really coming from you. Encrypting scrambles plain text or file attachments and only allows the intended recipient to access them. Encrypted files and messages are also signed as a matter of course, so the recipient can also confirm that the message they are decoding did actually come from you.

    In the Future

    As computers get more powerful, it becomes easier to crack encryption. In fact, one of the very first digital computers ever created, Colossus, was used to decrypt German codes during World War II. Typically as code breakers get more powerful, encryption systems just use longer and longer codes to slow down brute-force attempts to guess them: right now most desktop encryption software offers up to 4,096-bit encryption.

    An entirely new system of encryption is being developed that takes advantage of the principles of quantum mechanics: quantum encryption creates an entangled key pair of qubits that is shared among two parties. These entangled qubits allow the two parties to share information securely, and – due to the peculiar role observation plays in quantum mechanics – also alerts them if anyone is attempting to eavesdrop on their secure channel. Quantum cryptography is already running on experimental military and university communication networks, and if the example of the World War II code-breaking machines is any indication, it’s only a matter of time until the technology trickles down to consumers.

    Let’s get one thing straight before we start: Second Life is not a video game; it’s a virtual world. There are people who will become upset if you neglect to make this distinction. And in this virtual world, people lead lives remarkably similar in depth to their “real” lives, or at least to the potential depth they could achieve in real life under different circumstances. A man who is a tax accountant in real life may develop a Second Life character — an avatar — who is a 19-year-old female fashion model. And that avatar may earn $100,000 Linden dollars per photo shoot, put $50,000 in a Second Life bank and spend the rest shopping in virtual stores for Manolo Blanhiks, buying virtual art at virtual auctions to decorate her penthouse apartment and handing out bottles of Cristal to everyone in the VIP room in her favorite club. The store, the art auction house, the apartment building, the night club — these are all run by other avatars. And these avatars are earning money from shoe sales, art sales, rent or co-op fees and cover charges (though no doubt the fashion model gets in free).

    As far as virtual worlds go, this is impressive, but it’s not revolutionary. What is revolutionary about Second Life is that it’s not only legal to make real money from your character’s virtual endeavors — it’s encouraged. The exchange of your accumulated Linden dollars into U.S. dollars, Indian rupees or British pounds is built into the system through something called LindeX — that’s where you go to exchange your Linden dough into a form you can deposit in your real-world bank account. Yes — your actual bank account where your “real-world” paycheck gets direct-deposited every couple of weeks. And it works the other way, too. If your avatar finds itself broke in Second Life, you can charge the U.S. dollar equivalent for a certain number of Linden dollars to your actual, real-life credit card and voila — you’re rolling in virtual cash.

    Second Life has basically obliterated the line between virtual commerce and “real world” commerce. People are making real money — mostly small bucks, but still — through their activities in Second Life. Their avatars are working as real-estate agents, land developers (this is one of the most lucrative ways to make money in Second Life), bouncers, bar tenders, prostitutes, ad execs and any other occupation that exists in the “real world.” Whether you can make serious money in Second Life is debatable and remains to be seen. According to Fortune magazine’s David Kirkpatrick, Second Life creator Linden Lab reported that in December 2006, “17,000 [Second Life] residents had positive cash flow in Linden dollars, with about 450 generating monthly income in excess of $1,000” in U.S. dollars. So it doesn’t sound like too many people can quit their day jobs yet, but the phenomenon is startling nonetheless: An entire virtual economy that not only mirrors but also ties into the real-world economy has developed to the point that it’s hard to tell where one ends and the other begins.

    Consider this: An avatar who opens a night club needs employees. That avatar may put out a job search through a Second Life job-finder search engine, looking for cocktail waitresses, bouncers, bar tenders, janitors, and maybe a couple of professional dancers to keep things interesting. The night-club owner pays all of these employees in Linden dollars. Once any avatar collects the Linden dollar equivalent of $150 U.S., he or she or it can exchange the virtual dollars for “real” dollars and deposit them in the bank. The real bank. So is having a job in Second Life all that different from having a job in “real life”? Theoretically speaking, not so much, although the exchange rate of Linden to U.S. is pretty poor: As of January 2007, it’s approximately 268 Linden dollars to 1 U.S. dollar. So working in the real world is, at the very least, more profitable. But an interesting new money-making avenue has sprung up in recent months. Companies like IBM — yes, “real-life” IBM — are getting involved in Second Life.

    Google bombing involves manipulating search engines’ contextual search methodologies to cause a certain search phrase to point to an unexpected page, usually for comedic or satirical purposes. A recent example of a Google bomb happened in January 2008, when the search phrase “dangerous cult” returned the Chuch of Scientology home page as the top search result.

    Google bombing — also known by the more generic term “link bombing” — works with any search engine using a relevancy algorithm similar to Google’s. For example, run a search for “miserable failure” in Yahoo Search. You’ll see prominent links to President George W. Bush’s biography at at or near the top of the list.

    The heart of the system is Google’s PageRank algorithm, as well as equivalent competing technologies. The PageRank system assigns a numeric score of 0-10 for each page on the web. Google derives a page’s ranking from the PageRank scores of all other pages that link to it.

    The key to Google bombing is to generate outgoing links to your target from highly-ranked sites. Get enough highly-ranked sites pointing to your target using the same phrase, and you’ll push the target site to the top of the list of search results one sees when entering that mischievous phrase.

    Here’s how to do it.

    Step 1: Plan Your Assault

    You’ll need a lot of friends who can be convinced to cooperate. The number of links you need depends on a number of factors, including the PageRank of the sites the phrase is posted on as well as the precise phraseology.

    Alternatively, you can do all the linking yourself, but you would need at least a few hundred links on separate domains to get the desired result.

    Typically, the victim is someone you and a bunch of other people dislike. The more high-profile the target, the better your chances of being seen and making your point.

    Unlike the good old days, however, you can no longer google bomb for any phrase you like. The google update of Jan 07 (referenced below) means that it’s necessary to choose your phrase from words which already appear on the page in question. For example, the recent google bomb of the scientology site for ‘dangerous cult’ only worked because the word ‘cult’ was mentioned on the page.

    Step 2: Generate a Whole Lotta Links

    The more highly-ranked links search engines detect, the greater rank the chosen site will receive. Typical links include the URL of the target site, with the key phrase comprising the anchor text of the link. A link’s anchor text is the words that appear between the and the closing tag in a link.

    Tip: The more obscure the linked phrase, the better. If the phrase you choose is a popular one, you may need more links than an obscure phrase.

    The total number of links depends on a lot of factors, but think in terms of hundreds or thousands, not millions. For example, the hacker radio show Off The Hook successfully Google bombed themselves with the search term “blank expressions.” They peaked as the 6th-ranked site for that phrase with a total of about 350 links.

    Step 3: Tell Everyone

    What’s the use of link bombing if no one notices? After the bomb takes hold, publicize it so ordinary citizens learn all about your move. Use a social networking site. That is, you could generate web traffic with Twitter.

    Tips & Tricks
    In January 2007, it was announced that Google would be taking steps to limit the effectiveness of Google bombing. It’s subsequent algorithm tweak rendered most bombs ineffective. Rather than eliminate them altogether, Google directed search queries to discussion pages describing the bomb and Google’s reasons for defusing them. Furthermore, Google is known for manually altering PageRank scores for various reasons, including succumbing to political pressure. Many Google bombs have been suppressed for public relations reasons.
    Yahoo, AltaVista and other search engines have not announced any similar measures, so many older bombs that no longer work with Google still work with these other engines.
    Also, it is possible to Google bomb for commercial or self-promotional purposes. Commercial link bombing, also known as “spamdexing,” involves driving traffic to sites by the massive creation of links via bots, usually targeting the comment fields of blog posts.

    Through it all, Jobs maintained the highest level of secrecy. Internally, the project was known as P2, short for Purple 2 (the abandoned iPod phone was called Purple 1). Teams were split up and scattered across Apple’s Cupertino, California, campus. Whenever Apple executives traveled to Cingular, they registered as employees of Infineon, the company Apple was using to make the phone’s transmitter. Even the iPhone’s hardware and software teams were kept apart: Hardware engineers worked on circuitry that was loaded with fake software, while software engineers worked off circuit boards sitting in wooden boxes. By January 2007, when Jobs announced the iPhone at Macworld, only 30 or so of the most senior people on the project had seen it.

    The hosannas greeting the iPhone were so overwhelming it was easy to ignore its imperfections. The initial price of $599 was too high (it has been lowered to $399). The phone runs on AT&T’s poky EDGE network. Users can’t perform email searches or record video. The browser won’t run programs written in Java or Flash.

    But none of that mattered. The iPhone cracked open the carrier-centric structure of the wireless industry and unlocked a host of benefits for consumers, developers, manufacturers — and potentially the carriers themselves. Consumers get an easy-to-use handheld computer. And, as with the advent of the PC, the iPhone is sparking a wave of development that will make it even more powerful. In February, Jobs will release a developer’s kit so that anyone can write programs for the device.

    Manufacturers, meanwhile, enjoy new bargaining power over the carriers they’ve done business with for decades. Carriers, who have seen AT&T eat into their customer bases, are scrambling to find a competitive device, and they appear willing to give up some authority to get it. Manufacturers will have more control over what they produce; users — not the usual cabal of complacent juggernauts — will have more influence over what gets built.

    Application developers are poised to gain more opportunities as the wireless carriers begin to show signs of abandoning their walled-garden approach to snaring consumers. T-Mobile and Sprint have signed on as partners with Google’s Android, an operating system that makes it easy for independent developers to create mobile apps. Verizon, one of the most intransigent carriers, declared in November that it would open up its network for use with any compatible handset. AT&T made a similar announcement days later. Eventually this will result in a completely new wireless experience, in which applications work on any device and over any network. In time, it will give the wireless world some of the flexibility and functionality of the Internet.

    It may appear that the carriers’ nightmares have been realized, that the iPhone has given all the power to consumers, developers, and manufacturers, while turning wireless networks into dumb pipes. But by fostering more innovation, carriers’ networks could get more valuable, not less. Consumers will spend more time on devices, and thus on networks, racking up bigger bills and generating more revenue for everyone. According to Paul Roth, AT&T’s president of marketing, the carrier is exploring new products and services — like mobile banking — that take advantage of the iPhone’s capabilities. “We’re thinking about the market differently,” Roth says. In other words, the very development that wireless carriers feared for so long may prove to be exactly what they need. It took Steve Jobs to show them that.

    Another critical security flaw has been discovered in Microsoft Windows’ operating system software and about forty other Microsoft programs. Security experts have found that malicious code can be injected easily and remotely, and that the OS is very vulnerable to remote-code execution attacks that are trivial to carry out.

    H.D. Moore, security expert and chief architect of the Metasploit Project says “The security hole involves the method in which Windows loads so-called “safe” file types from remote network locations, and is almost identical to one that Apple removed in its iTunes system last week.”

    Moore added that the hole is “trivial” to remote exploits, but wasn’t authorized to provide additional details about techniques or other vulnerable Microsoft applications.

    According to a more detailed advisory for the iTunes fix, the “binary planting” vulnerability allowed potential hackers to execute malicious code on Windows computers by getting the media player to open a file located on the same network share as a maliciously designed DLL file that would be residing directly on the affected machine.

    The security bulletin, which was written by ACROS Security states “All a remote attacker has to do is plant a malicious DLL with a specific name on a network share and get the user to open a media file from this network location in iTunes, which should require minimal reconfiguration in most cases.”

    “Since Windows systems by default have the Web Client service running – which makes remote network shares accessible via Web-DAV – the malicious DLL can also be deployed from an Internet-based network share as long as the intermediate firewalls allow outbound HTTP traffic to the Internet,” the advisory suggests.

    In a prepared statement, Microsoft said it is currently investigating the report.

    Moore added that Internet users can protect themselves against such attacks by blocking outbound SMB connections on ports 445 and 139 and on Web-DAV.

    That will stop attacks that originate over the Internet right in their tracks, but users may still be susceptible to LAN-based attacks where an attacker has planted malicious DLLs on a network share.

    In such methods, it is similar to workaround advice given for the Windows shortcut flaw that Microsoft patched earlier on Aug. 10.

    Last month, Siemens said it had concocted a program it is making available for detecting and disinfecting malware and viruses attacking its complex power-grid management software.

    Siemens’ software also controls critical oil & gas refineries and manufacturing plants. The German enginerring firm warns that customers who use the infected software could have the devastating effect of disrupting whole power grids in the U.S., Canada, South America, Europe and Asia.

    Siemens began distributing SysClean, a malware and virus scanner made by Trend Micro. It has been updated to remove StuxNet, a worm that spreads by exploiting two separate security flaws in Siemens’s SCADA (supervisory control and data acquisition) software and every supported version of Microsoft Windows.

    “As each plant is individually configured in a very unique method, we cannot rule out the possibility that removing the malware may affect your plant in any way,” the Siemens advisory said.

    The company also advised customers to keep the scanner updated at all times because “there are already some new derivative versions of the original virus around, and we are trying our best to mitigate these and other security issues.”

    Recently, Siemens has come under blistering criticism for not removing the security vulnerability two years ago, when, according to, the default password threat first came to light.

    So far, StuxNet has infected the engineering environment of at least one unidentified Siemens customer, and has since been eliminated, Siemens said.

    The company added that there are no known infections of production plants to this day, but warns that there’s always the possibility that some could be discovered in the near future.

    The worm spreads whenever a system running Siemens’s SCADA software is attached to an infected USB stick. The attacks use a recently documented vulnerability in the Windows shortcut feature to take control of customer’s personal computers in the workplace. Once there, the worm takes advantage of default passwords in WinCC, the security-prone, problematic SCADA software provided by Siemens.

    Siemens said it has updated WinCC to fix the security vulnerability. For its part, Microsoft has issued a stop-gap fix but hasn’t said yet if and when it plans to patch the the Windows security flaw.

    Chris Wysopal, CTO of application security tools firm Veracode says “Siemens has put their own customers at risk with this egregious vulnerability in their software. Worse, is all the many customers from around the world who purchased the software not knowing of any of its many security risks.”

    In very Orwellian logic, a couple readers have told me that the lack of gesture support in the Android OS’s UI and stock apps was a good thing, because it would let the open source community innovate in individual apps for the Google mobile platform. By leaving such basic functionality as gestures nonstandardized, they argued, the platform would be fertile ground for the open source community to develop untold wonders that would render the controlled platforms such as the iPhone as dinosaurs.

    This is precisely why I fear for Android’s future. The open source community is much more likely, based on its history, to screw around with umpteen hundred variations that are piled willy-nilly on top of umpteen OS variants, creating a mess that only a few nerds will want to play with. In other words, we’ll end up with a replay of desktop Linux, which in 10 years is still a mess of precious versions and precious innovations, yet lacks basics such as common drivers and interface standards that would let regular people use it and let developers who need to earn a living get enough of a market to bother.

    Google would be stupid to let the open source community turn Android into yet another series of technologist-oriented fantasy fiefdoms sparring like medieval kingdoms. The open source community should either leave Android alone or coalesce into a de facto manager, as has happened with successful open source efforts such as server Linux and MySQL. Of course, that means not being a free-for-all, but a virtual or real “company,” as those successful open source efforts actually are.

    If the rumors are to be believed, Google gets the problem, which is why it supposedly is planning its own gPhone for early 2010 to set a standard, deeply functional version of the platform that might actually take root.

    You see, when you build your personal training website you have to realise your web design guy is…

    Fact 1 – More interested in Design, Layout, Flashy bells-and-whistles and ‘coolness’ factors (ever wondered why these types of guys have ‘Portfolios’ rather than Testimonials…?

    Fact 2 –Not interested in personal training or your personal training business. He is not interested in getting more clients for your business and…

    Fact 3 – Their job is to design a web site for you, not to get people to go to your website and sign up for your services – he sees that as your job.

    Can you see the problem here?

    If you have fallen for the Personal Trainers ‘Hollow Dream’ you most certainly have a flashy looking website but you lack traffic, that is real people visiting your website. With out anyone to visit your website how is it ever going to bring in NEW clients and extra revenue for you?!

    Your web guy will sit there and try and impress you with all the swish-looking websites he has designed for his clients, but ask him if he has any customer testimonials…

    Better yet, see if those testimonials actually report that the client got more customers and made money BECAUSE of the website, rather than just praising the designer for a professional or good looking website.

    Your web guy might as you questions about your business to get a ‘feel’ for what you want your website to look like, but again, this is just so he can tailor the look of the website to you and make the design look good. This has nothing to do with getting people to your website or actually converting them into paying clients. Ask him if he’ll use an autoresponder to capture visitors contact details… ask if he’ll help you set up an autoresponder series to brand you and your personal training services as the best in your area. My guess is he won’t even know what an autoresponder is… (sigh).

    Ask your web guy what he is going to do to guarantee you actually get new client as a result of building your website and his response will probably be;

    “I just build your website, you’ve got to sell your services”

    HANG ON A MINUTE!!! Didn’t he just sell me a website so I can get more clients?!? and now he’s saying I’m the one who has to get those clients?! So what is it exactly that he is doing? – He is selling the Hollow Dream… BUSTED!!!

    Don’t fall for it.

    Without people to visit your website your site is just an abandoned island that no-one knows about.

    You can have your web guy to do some traffic generation and some search engine optimization buy this can easily cost you hundreds of dollars each and every month!

    To make things worse, your web guy can only control on-page optimization and he will never tell you Google only cares about off-page optimization.

    He’s making his job of designing a website that attracts more clients sound hopeless if he tells you these facts…

    Fact 4 – Google does not care about your meta tags anymore. While they can help you ‘get-the-click’, once a person sees your website in the search engines. Search Engines rank off-page SEO more than on-page SEO.

    Fact 5 – People will not remember your business name when it comes to TYPING it in so you must rank for many different keywords related to your SERVICE (There are thousands more people searching for the service you provide compared to your actual business name).

    Fact 6 – Most people will click away from a website within 7 seconds if it looks messy or doesn’t seem to promise to deliver what they are searching for. (Your dead in the water if you can’t convey your message in 7 seconds).

    Nature photography

    Taking pictures of nature
    The great outdoors offers a lot of irresistible subjects: landscapes, gardens and individual flowers, trees, waterfalls, and animals. The next time you explore Mother Nature, take these helpful tips with you and bring back some amazing pictures.

    Waves in motion

    Step into the light

    Effective use of dim light

    Look for interesting combinations of color, light, shadow and texture
    Morning light gives you warmer, yellow colors
    Late afternoon, or evening light provides colors with a hint of red to full red

    Prevent flare-ups

    Sunlight can hit the camera lens and create flare – those hexagonal shapes that veil over the image
    Use a hat or your hand to shade your camera
    Find a location where something like a tree or its limbs can block the direct sun

    A new angle on life
    Sometimes the best photo is the one you just walked by
    Look up, look down, look all around you
    Take a few wide-angle shots of the area
    Move in close to capture the details of a flower or bark of a tree by using macro mode on your camera

    Explore your camera modes
    Landscape mode – optimizes the camera settings for landscape photos and capturing objects at great distances
    Macro mode – perfect for taking extreme close-up photos
    Panorama stitch mode – combines up to three shots together into one large picture

    Cut the clutter
    Unrelated elements compete for the viewer’s attention and draw the eye away from the center of interest
    Fill the frame with your subject by moving in close to exclude any extraneous elements
    Take vertical pictures of vertical subjects like trees, flowers, and mountains
    Shoot from a very low or very high angle to help the subject stand out
    If practical, move the subject to a better location with a cleaner backdrop

    Capture the full view
    Take dramatic shots of beautiful landscapes. Capture the whole scene, be it a landscape or plunging waterfall using the panoramic mode.

    Location, location, location

    A good location is a job half done...

    Even city slickers can find opportunities for nature photography – simply head to the park
    Do a web search of your region, or a location that you plan to visit on vacation
    Search for gardens, wildlife rehab centers, zoos and various nature preserves