Tech Byte
5.1K subscribers
254 photos
3 videos
87 files
192 links
Tech tricks, news, hacking tutorials and dark web guides.

Admin : @anonyguy
Download Telegram
PAYPAL RECEIVING PROBLEM + SOLUTIONS



Everyone who uses PayPal will eventually come to a time where they can’t accept payments from their customers. However, this is quite rare if the receiving PayPal account is in perfect standing.

First thing to make sure you have a good account is to turn your account into a Business type account. This is easy and doesn’t require anything to upgrade from personal/ Premier. However, there are pros and cons in everything. With a business account, PayPal will ask you about the nature of your business, some invoices, your business income etc. But let me tell you, once your account has been limited and you provided all the information they need, this account can receive a lot of cash and can delay chargebacks, PayPal protects people who use them in their business. For example, www.gyft.com is a big gift card site. When people try to dispute, most of the time they win because they are big and established financial institution.

If your business account has a credit/ debit card linked to it, this how to optimize your account to receive payments from credit/ debit cards:

Login to your account
Click on profile
Click on My Selling Tools on the left side of the screen
Look for the option called “Web Preference” and then click update
You can see a feature called “PaypPal Account Optional” make sure it’s ON!
Save
NOTE: In some countries, even with a Business account, PayPal will require your customers to pay using PayPal account. To confirm this, please contact PayPal support team.



If your customers can’t send payment to your account even though your account is in perfect standing, the problem is on their side now: THE CARD YOU ENTERED CANNOT BE USED FOR THIS PAYMENT/ WE CAN’T SEND YOUR PAYMENT RIGHT NOW

The card used has exceeded PayPal’s guest checkout limit which is $4000
The card used has exceeded PayPal’s guest checkout limit of 15 times
The card used for the payment is attached to a PayPal account
The card has been previously used on a fraudulent transaction in PayPal
The payment was done on blacklisted IP in PayPal
The card has insufficient funds
The card’s bank has restricted it to make a payment on PayPal
The card’s bank has restricted the card to be used on online purchases
The card has been reported as lost/stolen
The card’s bank requires further verification and authorization to proceed on the final payment
The email address used raises red flags in PayPal
@TECHByte
Hello people

Beware of some people selling fake software who demand to have wire transfer,WU software/transfer,paypal,Facebook etc...
There is no software like that which make you rich in just few clicks.
They are scammers and fake people
Stay away
Admin
@anonyguy
Paypal account with 0$ but verified by credit card with email access for sale by $20
@anonyguy
Forwarded from RL channels
Probably something unimportant
I finally played Dream League Soccer 2018 and beat my opponent 10-0, I had nothing better to do so I made avideo about it.

https://youtu.be/foAtYJHty9U
UNDERSTANDING HOW EBAY AND PAYPAL DETECT YOUR CREATION OF MULTIPLE ACCOUNTS

eBay is able to link your accounts based on Your IP Address, Web browser as well as Flash cookies, and Private Account Information. Both EBay and PayPal store temporary Internet files on your computer every time you login to your account. That is why it is important to clear your cookies and a temporary Internet file is a must prior to accessing your account.

Additionally, the information that you provide when setting up your eBay or PayPal account such as personal information, bank account number, phone number, etc., will flag your account.



Deleting Your Browser and Flash Cookies

We recommend that you delete your browser cookies and flash objects before proceeding from here. If you’re not sure how to delete your cookies or flash objects, please type “deleting browser cookies” and “flash-cookies” in any search engine.

What exactly are Flash Cookies? – A data file created by a Web site you visit or a Flash application you run that is stored in your computer. Officially called a “local shared object” (LSO), it functions like a regular browser cookie (see cookie) to personalize the user’s experience, except that a Flash cookie can hold up to 100KB instead of 4KB. Clearing cookies in the Web browser does not clear Flash cookies. Flash cookies are managed and cleared via Flash Player Settings activated from the browser at Adobe’s support site (www.adobe.com/support/flashplayer).



How To Change, Renew, and Release Your IP Addresses

To see your own IP Address, please visit http://www.whatismyipaddress.com

What exactly is an IP Address? (Internet Protocol address) The address of a device attached to an IP network (TCP/IP network). Every client, server and network device is assigned an IP address, and every IP packet traversing an IP network contains a source IP address and a destination IP address.

Remember, EBay always saves your IP address each time you login to your eBay or PayPal account so make sure you don’t accidentally login with a suspended IP address. We recommend contacting your Internet provider to make certain you own a dynamic IP address or changing your IP address. For those of you that have a cable modem, and are directly connected without the use of a network or router you must release your IP address.

Also, keep a log of your IP Address and always verify your IP address at http://www.whatismyipaddress.combefore you sign in to your EBay/PayPal Accounts.



Instructions for changing your IP address please visit

http://whatismyipaddress.com/change-ip



Instructions on how to renew and release your IP address please visit

http://www.cs.cmu.edu/~help/networking/IP_renew.html
To All my Muslim subscribes.....
Ramadan Kareem 😊
Forwarded from RL channels
Welcome to the @RLchannels!

If you want to get free downloads of the best games, movies and TV shows, then you've come to the right place. Click the links below to get the best of what the entertainment industry has to offer!

🎬HD & Mobile Movies

🎮Android apps, mobile and PC games

📽TV Shows & Episodes

💻Hacking Tutorials & Tech Guides

🔞Adult & Porn Videos, Strictly 18+📛

💰Earn Money Online💵

Feedback
Forwarded from Tech Byte
Free Bitcoin Game

Wanna get free bitcoin? It's easy. Just download and play this game and win free bitcoin. Build the biggest blockchain and get up to 40000 satoshi. Withdraw the balance directly to your bitcoin wallet immediately after you reach 20000 satoshi.

Download through this link to get up to 15% more rewards: http://www.bitcoingameapps.com/track.php?ref=4063091
ENJOY YOUR AIRTEL FREE BROWSING !!! ;) :)
--------------------------------------------------------------------------
.
Just have a try ....
.
Step 1: For this you have to download Opera Handler.(It's better to download
it from your phone)
.
Step 2: Install the Handler. (opera handlers for java,android and symbian)
.
Step 3: After installing open it, there you will find a "settings"option.
Open it and change the proxy type to REALHOST and the proxy server to a valid proxy
address*.
.
Step 4: Save these settings from Handler menu, and enjoy ......
.
* Some of the Valid Proxy Address for Airtel are listed below:
.
203. 200. 118. 92 (No spaces in-between)
.
10. 5. 45. 107 (No spaces in-between)
.
100. 1. 200. 99 (No spaces in-between)
.
202. 056. 231. 117 (No spaces in-between)
Notes: Make sure you do not edited the remaining options of the handler menu.
Try any one of the proxy servers listed above.
.
See you again.@anonyguy
5 Useful eBay Inventory Management Tips At present, eBay has over 150 million active customers. If you are not selling your products on eBay, even being an eCommerce retailer, then you should list your product on eBay as soon as possible. Inventory management is one of the biggest problems faced by many e-retailers as a there are many chances of errors in the inventory of eCommerce stores. The eBay inventory management tips provided in this write-up can help you to manage your eBay inventory more efficiently.
Keep your prices relevant. The prices at eBay usually fluctuate as it is an auction site. These fluctuations usually change the selling prices of the products in your inventory significantly. If you do not price your products relevantly along with keeping an eye on the prices of similar products of other brands then you can lose potential customers and hence your revenue.
Understand seller policies of eBay. For an e-retailer it is also crucial to read and understand the policies set by eBay for sellers as some of them can affect your inventory management negatively. For instance, if you are considered top Seller then if your listed products go out of stock or you oversell them then your title can be canceled. While listing and describing your products you should be extremely careful as complaints and negative reviews are seriously considered by Bay. It can withhold your payments if you have any issue with any of your customers.
Pack your products. You should use product bundling feature of eBay to bundle your slow-moving products with your products having better saleability. It will help you to sell them more frequently. Moreover, if your inventory is overcrowded then bundling multiple items can make it more easily manageable.
Use inventory management software. Initially, you can manage your inventories manually or through Excel spreadsheet while starting to sell your products online. But it becomes hard to manage inventories and provide quality services to the customers as your business increases. In such condition, you can use inventory management software options instead of manual or similar options to avoid the risk of errors and mistakes. You can find a right software solution for you on https://www.jazva.com/.
Avoid stocking overly. Your eBay inventory management can easier if you maintain your stock up to right level. It should neither be too small to lose your customers nor too high to be deprived of your capital which can be invested in some better things. If you overstock then you will have to pay storage charges for storing them which will also reduce your revenue.
Forwarded from RL channels
Get Ksh 300 ($3) bonus for free when you sign up, bet and win real money, withdraw from as low as $1.

Use this link to get the bonus:
https://goo.gl/5yUnLN
C# programming from problem Analysis To Program Design C+11 has arrived: thoroughly master it, with the definitive new guide.C++ Programming Language, Fourth Edition! The brand-new edition of the world's most trusted and widely read guide to C++, it has been comprehensively updated for the long-awaited C++11 standard. Extensively rewritten to present the C++11 language, standard library, and key design techniques as an integrated whole, Stroustrup thoroughly addresses changes that make C++11 feel like a whole new language, offering definitive guidance for leveraging its improvements in performance, reliability, and clarity. C++ programmers around the world recognize Bjarne Stoustrup as the go-to expert for the absolutely authoritative and exceptionally useful information they need to write outstanding C++ programs. Now, as C++11 compilers arrive and development organizations migrate to the new standard, they know exactly where to turn once more: Stoustrup's C++ Programming Language Page=1345
Format Book-Soft Copy
Retail price=$79.99
Our price=$31.25
You Save=$48.74 contact @anonyguy
On April 5, 2018, the Securities and Exchange Commission charged Saverio Barbera with tipping his brother and father with material nonpublic information about an upcoming corporate acquisition.

The SEC’s complaint, filed in the United States District Court for the Eastern District of New York, alleges that, in 2014, Saverio Barbera (“Barbera”), learned that Owens & Minor, Inc., a Virginia-based healthcare logistics company, was going to acquire all of the outstanding shares of Medical Action Industries, Inc. (“Medical Action”), a Brentwood, New York, medical products supplier. According to the complaint, Saverio Barbera then told his father and brother that they should purchase Medical Action stock in advance of the acquisition so that they could profit from the deal. The SEC alleges that Saverio Barbera obtained the information that he tipped to his father and brother from his close friend, the Chief Executive Officer and a member of the Board of Directors of Medical Action. According to the SEC’s complaint, soon after receiving this tip and less than a week before the public announcement of the deal, Saverio Barbera’s father and brother purchased a combined total of 22,000 shares of Medical Action common stock, which they then sold at a profit following the deal’s announcement. The SEC alleges that, as a result of their trading, Saverio Barbera’s father and brother realized combined trading profits of approximately $145,000.

Saverio Barbera has agreed to settle the SEC’s charges by paying a penalty of $289,650.72, an amount which is twice the trading profits of his father and brother. Without admitting or denying the SEC’s allegations, Saverio Barbera has also agreed to the entry of a final judgment that enjoins him from future violations of Section 10(b) of the Securities Exchange Act of 1934 and Rule 10b-5, thereunder. The settlement is subject to court approval.
Denial of Service Attacks– With this type of attack, the web server may crash or become unavailable to the legitimate users.
Domain Name System Hijacking – With this type of attacker, the DNS setting are changed to point to the attacker’s web server. All traffic that was supposed to be sent to the web server is redirected to the wrong one.
Sniffing– Unencrypted data sent over the network may be intercepted and used to gain unauthorised access to the web server.
Phishing– With this type of attack, the attack impersonates the websites and directs traffic to the fake website. Unsuspecting users may be tricked into submitting sensitive data such as login details, credit card numbers, etc.
Pharming– With this type of attack, the attacker compromises the Domain Name System (DNS) servers or on the user computer so that traffic is directed to a malicious site.
Defacement– With this type of attack, the attacker replaces the organisation's website with a different page that contains the hacker’s name, images and may include background music and messages.
INJECTION ATTACKS
Injection attacks occurs when there are flaws in your SQL Database, libraries, or even the operating system itself. When exceptions are not properly accounted for, say whether password checking isn’t rigorous enough- Hackers can use this to obtain access to confidential information by fooling the system. They might gain unauthorized access to private data such as social security numbers, credit card number or other financial data.Injection attacks like SQL injection could have surprisingly commands and methods to access vital databases. SQL uses very simple queries to obtain information requested by users, which makes for a relatively easy hack.
CROSS SITE SCRIPTING ATTACKS
Cross Site Scripting, also known as an XSS attack, occurs when an application, URL-“get request”, or file packet is sent to the web browser window bypassing the validation process. Once an XSS script is triggered, it’s deceptive property makes users believe that the compromised page of a specific website is legitimate even though it has been compromised.
For example, say a website has an XSS script in it, the user might see a popup window asking for their contact information and other sensitive data, even though the actually website may not have anything to do with it.
In another example, the hacker might run commands cause the user’s session ID to be sent to the attacker’s website, allowing the hacker to hijack the user’s current session. That is, he may then be able to use this cookie to make the browser think that he is actually his victim and get complete and unrestricted access to his account (A form of identity theft).
BROKEN AUTHENTICATION AND SESSION MANAGEMENT ATTACKS
If the user authentication system of your website is weak, hackers might be able to take full advantage. Authentication systems involve passwords, key management, session IDs, and cookies that can allow a hacker to access your account from any computer (as long as they are valid).
If a hacker exploits the authentication and session management system, they can assume the user’s identity. (This is similar to the last one – XSS) Ask yourself these questions to find out if a website is vulnerable to a broken authentication and session management attack:
►Are user credentials weak (e.g. stored using hashing or encryption)?
►Can credentials be guessed or overwritten through weak account management functions (e.g. account creation, change password, recover password, weak session IDs)?
►Are session IDs exposed in the URL (e.g. URL rewriting)?
►Are session IDs vulnerable to session fixation attacks?
►Do session IDs timeout and can users log out?
If you have your own website and if the answer to any of these questions is “yes”, your site could be vulnerable to a attack.
CLICKJACKING ATTACKS
Clickjacking, also called a UI Redress Attack, is when a hacker uses multiple opaque layers to trick a user into clicking the top layer without them knowing. What I mean by that is, the hacker is able to show his own content on a “naive” websit
e. Perhaps an adf . ly link and he could be earning easy money. Thus the attacker is “hijacking” clicks that are not meant for the actual page, but for a page where the attacker wants you to be.
Another example, using a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led the user to believe they are typing in the password for their bank account, but are actually typing into an invisible frame controlled by the attacker. The website might function normally for the unsuspecting user, but behind the scenes their vital information will be in the hands of the attacker.
DNS CACHE POISONING
DNS Cache Poisoning involves old cache data that you might think you no longer have on your computer, but is actually “toxic”. Also known as DNS Spoofing, hackers can identify vulnerabilities in a domain name system, which allows them to divert traffic from legit servers to a fake website and/or servers. This form of attack can be programmed to spread and replicate itself from one DNS server to another DNS, “poisoning” everything in it’s path.
In fact, in 2010, a DNS poisoning attack completely compromised the Great Firewall of China (GFC- Yes, it’s a thing) temporarily and censored certain content in the United States until the problem was fixed.
SOCIAL ENGINEERING ATTACKS
A social engineering attack is not technically a “hack”. When someone first finds out what exactly it is, they are surprised that it actually works. So was I, but indeed it does work.
It happens when you divulge private information in good faith, such as a credit card number, through common online interactions such as email, chat, social media sites, or virtually any website. The problem, of course, is that you’re not getting into what you think you’re getting into.
A classic example of a social engineering attack is the popular “Microsoft tech support” scam. This is when someone from a call center pretends to be a MS tech support member who says that your computer is slow and/or infected, and can be easily fixed – at a cost, of course. Considering that most computers are indeed quite slow and hang sometimes, this scam is quite well written. Of course, it need not be about money and most often it isn’t. Telling someone the name of your first pet might actually be giving them complete access to your account. Surprised? This is actually one of the most common security questions.
SYMLINKING – AN INSIDER ATTACK
A symlink (Symbolic Link) is basically a special file that “points to” a hard link on a mounted file system. A symlinking attack occurs when a hacker positions the symlink in such a way that the user or application that access the endpoint thinks they’re accessing the right file when they’re really not.(Read that again)
If the endpoint file is an output, the consequence of the symlink attack is that it could be modified instead of the file at the intended location. Modifications to the endpoint file could include appending, overwriting, corrupting, or even changing permissions.
Meaning, the user might be doing one thing, but another is actually happening. In different variations of a symlinking attack a hacker may be able to control the changes to a file, grant themselves advanced access, insert false information, expose sensitive information or corrupt and destroy vital system databases or application files.
CROSS SITE REQUEST FORGERY ATTACKS
A Cross Site Request Forgery Attack happens when a user is logged into a session (or account) and a hacker uses this opportunity to send them a forged HTTP request to collect their cookie information.
In most cases, the cookie remains valid as long as the user or the attacker stays logged into the account. This is why websites ask you to log out of your account when you’re finished and close the window after logging out – it will expire the session immediately.
In other cases, once the user’s browser session is compromised, the hacker can generate requests to the application that will not be able to differentiate between a valid user and a hacker. Another identity theft- the hacker confuses th
e server as to who he actually is.
REMOTE CODE EXECUTION ATTACKS
The most devastating in the whole list, a Remote Code Execution attack is a result of either server side or client side security weaknesses.
Vulnerable components may include libraries, remote directories on a server that haven’t been monitored, frameworks, and other software modules that run on the basis of authenticated user access. Applications that use these components are always under attack through things like scripts, malware, and small command lines that extract information.
In this attack, the hacker is basically able to get complete access to the website’s server itself. How is that so devastating? This gives him access to every bit and byte of information stored in the database(If the request is coming from the server itself, why would it be denied? That’s what it’s build for). He may also obtain access to the website’s actual code that the browser then shows the user.Meaning, he could totally wipe out the website, mess with the links and buttons, show his own stuff – Sky’s the limit. Plus there’s usually only one way to recover – Rebuild. But this also makes for quite a complicated attack, details of which aren’t suitable to be disclosed here.
DDOS ATTACK – DISTRIBUTED DENIAL OF SERVICE ATTACK
The most popular and most widely used,the DDoS attack (Distributed Denial of Services), is where a server or a machine’s services are made unavailable to its users.
The usual agenda of a DDoS campaign is to temporarily interrupt or completely take down a successfully running system.
The most common example of a DDoS attack could be sending tons of URL requests to a website or a webpage in a very small amount of time. This causes bottlenecking at the server side because the CPU simply runs out of resources.
Denial-of-service attacks are considered violations of the Internet Architecture Board’s Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers- DDoSing is highly illegal.
my my, it will take you a long way.
RedboxTV

Use this app to stream live TV stations from anywhere in world. You only need a stable 3G or 4G internet/WiFi connection. You can stream FIFA World Cup matches for free too if you'd like.