Monday, April 30, 2012

How to add Feedjit to your wordpress blog


  1. Now do one of the following:
    1. Sign in to your blog and click the Plugins/Add-New menu on the left. Then click "Upload" at the top and upload the file you downloaded.
    2. If the first option doesn't work for you, manually copy the file to your Wordpress blog's wp-content/plugins/ folder. Then unzip in the plugins folder.
  2. Then sign-in to your blog and click the "Plugins" menu on the left and click "Activate" on the Feedjit plugin.
  3. Now click the Widgets menu on the left under Appearance. Drag Feedjit to the sidebar on the right.
  4. That's it, you now have a Live Traffic Feed in your blog side-bar! You have options to change the widget colors and width on the fly.

Sunday, April 29, 2012

New Wordpress Comment Spam

A new comment bomb seems to have hit wordpress.

Every time you click on the spam option the spam counter goes up by 1 . But the comments keeps coming . Then when you click to see how many spam message are there. There are none!It is impossible to clear out these spam messages

list of plugins which failed to catch this spam.
akismet plugin cannot catch these messages
WP Anti Spam plugin did not work

Spam Free WordPress

spam comment users names they used were Melissa Matthews

the spammer pasted

Nice article has been shared i must say. i really enjoyed reading and visiting your this article. i did get lots of good points from here. thanks for sharing such article here. i would like to see some information related to mohali hotel here in this article. keep on posting such article here in future too.
the only solution is to implement cloudfare

Tuesday, April 17, 2012

gmail error Temporary Error (500) with numeric code 93

There is no difference between google help and M$ help . Both have cryptic codes with no one from the company ready to tell the end user what they mean or how to resolve the issue

looks at the google forums filled with the same problem with not help +!category-topic/gmail/account-access-and-safety/YnZ_ulWhMJg!topic/gmail/4PoWL3wHOMs

TWITTER to the rescue!/gmail
Thanks everyone for the reports of 500 errors, we're working on it:

4/17/12 10:12 PM

We're investigating reports of an issue with Google Mail. We will provide more information shortly.

Friday, April 13, 2012

new facebook spam april 13th 2012

new facebook spam 2nd may 2012

Check if a friend has deleted you

new facebook spam 28h april 2012

Check if a friend has deleted you

new facebook spam 24th april 2012
‎"Yuppie it worked i got 500/- too can get it from here"

The spam reads and tags a list of friends

Oops!!! There's a secret cam was in Justin Bieber's Car

Tuesday, April 10, 2012

new wordpress spam malware

update 14th april 2012 . this malware now has jumped to
 script type="text/javascript" src=" " >   < / script
just found hxxp:// popping up when clicking on wp stats from jetpack

and the code in the index.php

<   script type="text/javascript" src="" >

it looks like it was not realated to wp stats but when ever any space on the home page was clicked it sent the user to the link above

oxwall community installation software

UTF-8 Unicode English text

* Requirements
* Installation
* Additional Information


Oxwall Requires:

- Apache WEB server, version 2.0 or higher. ( )
- PHP 5.2.6 or higher. ( )
- MySQL 5.0 or higher. ( )
- Mail Server installed: SendMail, Exim or other. ( )
- Cron ( )

For more detailed information about Oxwall requirements, including the list of necessary PHP extensions and configurations, visit Oxwall Hosting page and see System Requirements. ( )


1. Download and Extract Oxwall;

The latest Oxwall release can be found at . The main package is available in zip format, which can be extracted using most compression tools.

 a. FTP Upload
 Extract Oxwall archive to a temporary directory and rename the unpacked folder to oxwall_x.y.z/;
 Upload contents of oxwall_x.y.z/ into your site’s public directory (typically public_html/) using an FTP client. Do not forget about .htaccess file.

 b. Shell Mode
 Enter following commands using a typical Unix/Linux command line to download and extract files:


    This will create a new directory oxwall_x.y.z/ containing all Oxwall files and directories. Enter following command to move contents of this directory to your public HTML directory:

      mv oxwall_x.y.z/* oxwall_x.y.z/.htaccess /path/to/your/public_html/

2. Create Database;

Oxwall stores all site information in a MySQL database, which means you must create this database on your hosting and assign it a user with certain privileges, such as create/drop and modify tables.
Note the username, password, database name, and hostname given during the database creation, since you will need it during the installation.

If you encounter problems creating the database, please contact your hosting provider for support and specific instructions.

3. Run Installation;

Go to to run the install script. Follow on-screen instructions to set up the database connection info, add additional plugins, create the site admin account, and provide basic website settings.

Most common steps required include:

 a. Write permissions
 The install script will attempt to write to these folders:


 A notification will appear if this process fails. In this case set writable permissions recursively. For instance, go to folder with Oxwall and enter the following command for ow_pluginfiles/ directory:

  chmod -R 777 ow_pluginfiles/


 Use native tools of your FTP client to change permissions for selected folders.

 Repeat for other folders.

 b. Create config file
 During the installation you must manually replace contents of ow_includes/config.php file with the code provided by the installation guide.

4. Setup Cron Tasks;

Many Oxwall features include tasks that will be run periodically, such as updating profile's online status, processing memberships, mass mailing, importing data, etc. This is why it is strongly recommended to setup Oxwall Cron Tasks immediately after the main installation.

As an example of how to setup this automated process, you can use the Unix/Linux crontab utility. The following crontab line uses WGET command to execute the URL to cron file, and runs every minute (recommended):

* * * * * wget

Replace with your actual domain name.


- See full Oxwall installation manual:

- Install Oxwall on your local PC:

- Install Oxwall without any downloads:

- Cron configuration guide:

- Connect your site with Cloud Storage:

Sunday, April 8, 2012

DNSChanger malware Check-Up

Update 9th May 2012
Cloudflare now has an app which can automatically warn your site visiters of a problem with their dns .

DNS Changer most often comes disguised as a video “codec” supposedly needed to view adult movies. It infects systems at the boot sector level, hooking into the host computer at a very low level and making it often very challenging to remove. This malware family didn’t just infect Microsoft Windows systems: Several versions of DNS changer would just as happily infect Mac systems as well. Other variants of the malware even hijacked DNS settings on wireless home routers. The FBI has posted several useful links to help users learn whether their systems are infected with DNS Changer.

Infected PCs may lose Internet in July

Feike Hacquebord, senior threat researcher for security vendor Trend Micro, called the arrest the “biggest cybercriminal takedown in history.” In a blog post

The following links relate to this entry:
For more information, Rik Ferguson posted an entry on his CounterMeasures blog on ways to check if you’re a victim of the “Operation Ghost Click” criminal activity.



FBI help links

You can also test to see if you are affected by visiting the following DNSChanger Check-Up sites below. If this Check-Up site indicates that you are affected by DNSChanger, then visit for information on how to address this problem.

Manhattan U.S. Attorney Charges Seven Individuals for Engineering Sophisticated Internet Fraud Scheme That Infected Millions of Computers Worldwide and Manipulated Internet Advertising Business
Malware Secretly Re-Routed More Than 4 Million Computers, Generating at Least $14 Million in Fraudulent Advertising Fees for the Defendants

‘Biggest Cybercriminal Takedown in History’

DNS Changer Working Group (DCWG)
Bundeskriminalamt (BKA)
Bundesamt für Sicherheit in der Informationstechnik (BSI)