Multi-Level Marketing, YMCMB (Young Money Cash Money Billionaires)


Have you ever imagined what your purpose in life is? What can make you stand out among others? And what you can do while you are young? People have different motivations, mindset and plans in life and this might be ways how they want to be and what can help meet their dreams. But do you think life can be easy as 1, 2, and 3? Still there are a lot of chances and opportunities for others but if you do the right things, today, well possibilities is that you can able to fulfill this kind of dreams you want  to have while you are young.

What is MLM stands for? (Based on Wiki) “Multi-level marketing (MLM) is a marketing strategy in which the sales force is compensated not only for sales they generate, but also for the sales of the other salespeople that they recruit. This recruited sales force is referred to as the participant’s “down line”, and can offer multiple levels of compensation.” For others, MLM includes pyramiding selling, network marketing and referral marketing.

Way back then on my college days, I still remembered how my Professor discussed to me some issues about this kind of business. Well I guess he’s not that interested with this and he hate how this kind of business works. It’s not that I’m already against with what he said but there are cases on which some multilevel marketing are scam based on how those up lines represent their business. Once they already gained their quota, they will just simply closed the company and leave their down lines below. That’s why you really cannot get all those who you recruit and joined on your team since this issues already exist and still existing now.

The best way to avoid this kind of process is to choose right people and know the business background to make sure you are stable on the business you will be committed to. I was into this kind of business while I’m still in college and while continue learning the system, there I learned a lot of strategies and techniques how you can meet the goal you want to set. There were down times I became part of some MLM which I quit right away because I’m still not sure and I’m afraid if didn’t reach the quota. So I stop joining MLM and just pursue my studies and when I graduated there I started to work as an employee in a telecom company. I never imagined my life to be back again doing this kind of MLM since there are some of my friends still sending me messages about this business. Until it reaches to the point I want to have an extra business.

My mom don’t want me to be part of this kind of business but when I read feedback and reviews of other MLM’s I still go through their positive comments. I never told my mom that day when I joined again into this kind of MLM. I get multiple accounts and go to other places doing business transactions with my up lines. There I started to post some photos through social sites, so my mom started to notice this and asked me more about how the business works. She was amazed, so she didn’t control me anymore since it’s my own money I already used to join on that business.

Now, I still continue this business and do share my experience to others. Becoming an entrepreneur, being part of MLM or Network marketing isn’t about taking advantage of your friends and relatives. Only a few years ago, network marketing meant retailing to, and sponsoring people from, your “warm list” of prospects. Although sharing the products or services and the opportunity with people you know is still the basic foundation of the business, today we see more people using advanced marketing techniques such as the Internet, conference calling and other long-distance sponsoring techniques to extend their network across the country.

Using other social media, since technology already evolves, it’s easy to recruit and share your business to others whether they are local or international. This also way you can help others while you are already earning. It is not that only you who earns but also others and their sooner down lines. With network marketing, there are no big capital requirements, no geographical limitations, no minimum quotas required and no special education or skills needed. Network marketing is a low-overhead, home-based business that can actually offer many of the tax advantages associated with owning your own business. Network marketing is a people-to-people business that can significantly expand your circle of friends. It’s a business that enables you to travel and have fun as well as enjoy the lifestyle that extra income can offer.

So I will ask you now, today, are you ready for this kind of MLM, network marketing business? This can be part time or full-time depends on your choice. If yes? Then I will already wealth come you and share to you this kind of “3-Easy Steps” that can change your life being an entrepreneur while you are still young.

(Send me a private message on Facebook, http://www.facebook.com/ohitsmerivera or make a comment here instead on this post). POWER!

 

Jail breaking iOS 7.x!


I used to be an apple user since 2008. That was the time when iPhone3G start. Then on the following years, iPhone 4 and continuous iPhone makers continue to upgrade its chips inside. I remembered how I started to jailbreak my iPhone 3G. There I watched video tutorials online to know more geek stuff on iPhone jail breaking.

Apple_gray_logo

Updates on iPhone3G stop on iOS 4.2.1 firmware but on the latest iPhone units, you can update the iOS firmware from 5 to its iOS7 and up. (This may vary on the iPhone units).

Since lot of tutorials about jail breaking an iPhone from those previous iOS firmware can be found in the internet, let me just share how to jailbreak iOS7 to its latest instead.

To proceed on this kind of process, make sure you have these available resources to be used on our jail breaking an iPhone. (Warning: Do this on your own risk!). I know this is illegal but this procedure will only for educational purposes. Blogger of this site is not intended for any harmful stuff.

1. Computer (PC, Desktop as long as it has an OS that will surely compatible for our jailbreak procedure).

– I used Windows OS when done jailbreaking my iPhone4.

2. Internet (In case it will need an updates for your setup).

– I used Wi-Fi to easy access through phone.

3. iPhone (iOS7 Firmware only applicable for iPhone 4 and up).

– Make sure the phone is on full charge to avoid phone battery interruption and the running iOS should be on iOS7.x

4. Working iPhone cable wire.

5. Installer (Working iTunes and evasi0n7).

evasi0n7-logo

– evasi0n7 will be the installer we will use to jailbreak iOS7 firmware. I tried other jailbreaking tools for this process but evasi0n7 was the one I’d tested and working.

– You can download evasi0n7 directly on my drop box:

https://db.tt/FzybhQON

(This is saved as an archived file, so when you’re done downloading this, just extract the file. No virus file is saved on this, so don’t worry).

If all the necessary things are in your PC already, then let’s start jailbreaking your iPhone.

To give you a fresh start what is this evasi0n7 all about and some instructions, here are the details:

(You can see this on this README.txt of the archived file).

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

evasi0n7 1.0 (c) 2013 @evad3rs

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

http://evasi0n.com/

DESCRIPTION:

– evasi0n7 1.0 is an untethered jailbreak for all iPhone, iPod touch, iPad and iPad mini models running iOS 7.0 through 7.0.4

SYSTEM REQUIREMENTS:

– MacOSX 10.5/10.6/10.7/10.8

– Windows (XP minimum)

SUPPORTED FIRMWARES:

– iOS 7.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.1beta1, 7.1beta2

INSTRUCTIONS:

– Backup your device using iTunes (or iCloud) before using evasi0n. If something breaks, you’ll always be able to recover your data.

– Those that use backup passwords in iTunes must disable them for now.  After doing so, iTunes makes a brand new backup.  Please wait for that backup to complete before proceeding!  Feel free to re-enable your backup password after jailbreaking.

– Please disable the lock passcode of your iOS device before using evasi0n. It can cause issues.

– Launch evasi0n, plug in your device, and click “Jailbreak”. Just sit back and observe its progress.  Watch for any steps you may be asked to perform.

– Avoid all iOS and iTunes related tasks until evasi0n are complete. Why not just enjoy a brief break from the computer to stretch your legs?

– If the process gets stuck somewhere, it’s safe to restart the program, reboot the device (if necessary by holding down Power and Home until it shuts down), and rerun the process.

FAQ:

If you have any questions regarding the jailbreak process or jailbreaking in general please go to the Jailbreak QA dedicated website: http://www.jailbreakqa.com or see their help page for evasi0n: http://www.jailbreakqa.com/pages/evasi0n-help or try /r/jailbreak on Reddit: http://reddit.com/r/jailbreak

CREDITS:

evasi0n is a production of @evad3rs. http://evad3rs.com

THANKS TO:

– @phoenixdev for his research

– @Surenix for evad3rs and evasi0n designs

– Hanene Samara for her work on evasi0n GUI

– @ollvm (o-llvm.org) for their support and the early version of Obfuscator-LLVM

To make it easy for us to do this kind of process let us be thankful and give credits to this site:

(http://www.iphonehacks.com/2013/12/jailbreak-iphone-ios-7-ios-7-0-4-evasi0n7.html).

Step 1: Download the latest version of evasion jailbreak, evasi0n7 from this link: (https://db.tt/FzybhQON) and save it in a folder named “evasi0n” on your desktop.

Step 2: Double click the downloaded file and extract the application to the evasi0n folder. Navigate to the evasion application and launch it.

Windows users: Please launch the application as an Administrator. Right Click on the evasion exe and select the “Run as Administrator” option.

Step 3: After launching evasi0n, you will be prompted to connect your iPhone.

Step 4: Please disable the passcode as the jailbreak may fail, if the passcode is enabled (Settings -> General -> Passcode Lock On -> Turn Passcode Off).

Step 5: After the passcode is disabled, connect your iPhone to the computer. Evasi0n should detect your iPhone and also mention the iOS firmware that is running on it. Click on the Jailbreak button.

evasi0n7-howto-iphone-1

Step 6: After clicking on the Jailbreak button the tool will give a progress update on the various stages of the jailbreak process such as:

  • Retrieving remote package
  • Uploading jailbreak data
  • Injecting evasion app (1/2)
  • Injecting evasion app (2/2)
  • Configuring system (1/2)
  • Configuring system (2/2)
  • Rebooting device

Please wait patiently while the jailbreaking process is running, don’t start iTunes or Xcode in the meanwhile.

Step 7: Once your iPhone is rebooted, you will get a message informing you to unlock your iPhone. Do not close the evasi0n application.

evasi0n7-howto-iphone-21

Step 8: Unlock your iPhone and then tap on the evasi0n 7 app (the one with the evasi0n 7 icon).

evasi0n7-howto-iphone-3

Step 9: When you launch the evasi0n app, the screen will go white and reboot again.

Step 10: The rest of the jailbreak process will now take place on your iPhone. After you iPhone reboots, you will see a large evasi0n logo with messages informing you on the status of the jailbreak process such as:

  • Reading kernel
  • Calculating offsets
  • Setting up packages
  • Setting up Cydia
  • Continuing with boot

Step 11: After it has rebooted, you’re done. It has been successfully jail broken and you should be able to find the Cydia icon on your iPhone’s home screen (it may not be on the first page so search for it to locate it).

evasi0n7-howto-iphone-4

Check out this video guide on how to jailbreak your iPhone with evasi0n7 if you have problems:

(http://www.youtube.com/watch?v=twtv1A4EuYg)

Please note if the process gets stuck in the middle, it’s safe to restart the process, hardware reset your iPhone (if necessary by holding down Hold and Home until it shuts down), and rerun the process.

Note: If you had upgraded to iOS 7.x using the OTA option or using iTunes and are having problems jailbreaking your iOS device with evasi0n, then try doing a full restore using iTunes and then try jailbreaking again to see if it works.

What web browser are you into?


Geek Lifestyle
Geek Lifestyle

It so good to be back again on blogging but I’m tired on blogging about emotional feelings and what I’m into now is about computer – me as being geek. Well, I do admit I’m a geek since then. “A geek inside of me” HA-HA how cool is that?

Been so nervous these past few days, maybe some stuff I’ve been thinking about all day long and someone whom really do passed by on my mind. HA-HA so sweet. LOL 🙂

But whatever is it, I still don’t have any idea why I’ve becoming so nervous even though I don’t drink too much coffee. I prefer to be more into chocolate and chocolate drinks. So after having those kinds of strange feelings, I realized what if I just post another article instead. Maybe my nervous I feel right now will just be easily fade away.

What I’m going to share now are about web browser and how you can tweak it to make it faster – as what they’d said and add some fun on it.

Safari
Safari

One of the best web browser I’m using since then from the start I’m still learning basic skills in computer is the “Internet Explorer”. I used it more often since it can handle ActiveX script and settings. It’s also the major web browser you’ll see if you’re going to install freshly Windows-based OS on your PC.Before it’s quite hard to make new tab on it especially on old windows OS like windows 98, 2000. But on how the Windows update its OS, they also update the bundle packages on it like IE. There were also times that when I make a new tab, a new colour of tab will also display. (I’m not sure if this is the reason my PC before keep on logging when I entered a lot of new tabs).

Right then, I discover Mozilla Firefox. What I loved about it is that you can add themes and customize it. Using Persona, you can change the background of your Mozilla Firefox and you can develop your own style that you can share also with others.

Mozilla Firefox
Mozilla Firefox

More about Mozilla Firefox is that, you can actually tweak its content using about:config command. I never knew this when I was in my secondary level until I get bored because of our internet so I decided to search how to make this Mozilla browser browse faster. There are a lot of results online about this but mostly of the site that I visited just to configure and tweak Mozilla Firefox are in these sites: (This will help you about this kind of Mozilla tweaking 🙂 )

  1. A handful of Firefox tweaks that will double your browser speed.
  2. Ultimate Collection of Best “about:config” Tweaks for Mozilla Firefox.
  3. The 12 Best Firefox About:Config Performance Tweaks.

Mozilla Firefox was part also of the web browser in LINUX like Ubuntu and RedHat. Since you can tweak it’s about:config and mostly hackers do tweaking their application for some hacking reasons.

Safari
Safari

Other web browsers that came on my way of searching and browsing online are the Safari and Opera.

I just tested them to see the difference of it to other web browsers like Internet Explorer and Mozilla Firefox.Safari is part of Mac and some LINUX special OS platform. It quite faster also but I haven’t got that chance to use it on daily browsing. It’s just that the environment and design of Safari web browser is like in 3D design. If you have bookmarks and history that you didn’t erase and clear cache yet – there’s a landscape design that will show to you your earlier history you access on the browser.

Opera web browser on the other hand, has multiple functionalities. You can also speed up the internet up to 16X if you want by just simply clicking the buttons on it. But of course, it will still be based on your internet speed. I’d tried it before using our DSL connection. I clicked the most speed and VIOLA! I had faster downloading speed streaming and watching movies online. But if you have slow speed internet access, better not to change some tweaking speed of it or else you’ll get much more slow downloading process.

Opera
Opera

When it comes to mobile, I do prefer to use Opera mini because it’s really faster than any other mobile web browser set on the phone. Even you’re not using Wi-Fi and just accessing using your mobile prepaid or post-paid, you can really browse faster using it. When it comes to videos or streaming – of course, it will still be based on how fast your internet connection is.

Lastly, the Google Chrome – I never heard this since I was in my secondary level. What I know is that, Google is a search engine. It’s usually the first address or link I used when I start to open a web browser. My friends just recommend it to me so I started to use it and compared to the other web browsers I used before. There are really different things to consider when it comes to beta, dev or the official released. Like Mozilla, if it’s still in beta version, you might still meet some bug issues and your browser will do crash and ask you if you want to send a report. This is also what happens if you used Google Chrome beta or dev version. So usually, I download the files which look like these: (Google Chrome 29.0.1547.76) or (Firefox 24.0).

Google Chrome
Google Chrome

Google Chrome is fast actually, you can play games online without any hassle on downloading its data. I just get bored of it when I tried to download files. On which also happens on other web browser, because when there are times you want to download something for about more than minutes or an hour, then suddenly your internet connection was cut, the remaining process will be interrupted and will be downloaded but failed. Unless you pause it like on Mozilla then re-continue it once you’re internet connection goes back to normal.

So when I’m downloading big amount of data online I’ll make sure my internet is securely accessible or there’s a torrent file and I can maximize it speed on torrent applications.

So what browser are you into? I created a poll survey that I hope you can also share some of your ideas with me. It’s nice to gather information for educational purposes. For others to learn and know also what they are up to.

Hacking: Helpful or Harmful?


Question MarkEvery action on which human or a person do has its own group whether you consider it good or not. Hacking as our topic also has different areas or levels. But from this point, from your own opinion, where can you consider hacking as an ethical or unethical? Do you consider hacking to be helpful or harmful?

Let us start analyzing these things first. On our earlier articles, those hackers who are aligned in the group of white hat hackers are considered to be ethical since they are the information and cyber security specialists who are well-versed in system examination, penetration testing, and many other network analysis approaches that guarantee the safety and integrity of many a company’s information system.

Another one which is the antonym of this is the black hat hacker. Under this group, they are also known as crackers or dark-side hackers. Crackers break things and they are computer security hackers that break into computers and networks or also create computer viruses. This definition was all came from our previous blog post. When you joined this white hat hacker to black hat hacker, possible, this will become a gray hat hacker on which in the hacking community, a grey hat refers to a proficient and tech-savvy hacker who is ambivalent enough to sometimes use his program manipulating skills to act illegally in either good or ill will. Their intentions for hacking don’t usually delve into any of the traditional well intention or maliciously driven extremes; that is, they may or may not commit crimes from time to time during the course of their digital undertakings, so they’re not exclusively indulging on any one type of activity like their security-improving or network-destroying counterparts would.

So if you will define hacking and analyze it if this will be considered as helpful or harmful, these hackers falls into different areas.

While doing and preparing this new blog post, I asked some of my social media friends if hacking for them can be consider as helpful or harmful and why. So I started to put a survey and share it to them and some of their answers are:

1

2

Untitled

3

For this certain kind of reasons, still hacking is a form of an illegal action but if you have that ethical mind and consider the possible consequences that you may meet that is the only way you can answer if hacking is helpful in the way how you used it or harmful in some other way around.

Dare: Will you be a Hacker?


After discussing some of my post here about hacking, I have not given any ideas yet about how to hack and some tools to use when you are doing this kind of action. So before going to somewhere else that can lead to some destruction, no I don’t mean that thing. What I mean is that before going to any discussion, let me share you some of my adopted skills I also learned online, through video tutorials, web forums and other social media sites. I do not own any of this skills and I thank the web hacking community for sharing this ideas also to others who want to learn this kind of learning. I only use hacking as an ethical hacking and for good stuff. Yet sometimes for some reasons which are hard to explain.

backtrack_5_updated___wallpaper_by_yakhoo-d4dk0cz

If you are using Windows operating system or a Linux-based OS, or even both if you want, you can see a lot of applications online and some of them are in categorized. It can be for school purposes, system of your computer (i.e. antivirus, speed up your PC) and other application such as for games or just for own purpose to explore it and many more. One of my used applications when it comes to hacking is Back Track Linux.

Figure2_reference

wirelessIt is a Linux-based OS but the only difference of it when it comes to other usual Linux OS is that, it has a built-in hacking tools that you can use on different areas. Back Track Linux on which you can check its full meaning online has different versions. As of now, the latest version is the release 3. You can download the application on its website. But the one I’m using now is the release 1, the KDE type. Since the release 3, well I don’t know if it has a problem but I can’t configure my hacking tools correctly so I started to downgrade my version then all works fine after using the release 1. One of my favorite tools about it is the hacking of WiFi whether it is a WEP or WPA format. 

If you only know the commands since you will deal always on the terminal once you used it, you can start decoding the WiFi you want to get access to. Other tool of the Back Track Linux is getting the credentials of other users.

M63WY

Like yamasone of the applications you can use right away if you download the .sh file and all the working tools beside you.  Its purpose is to get the credentials of the IP address you are attacking to. Just make sure the firewall on the persons PC is enable. Because once the secured antivirus like Kaspersky is installed on it, it can deny all the access trying to control to your PC. This will enable you to see what credentials the user type and see the username and password. Knowing this kind of activities and tools like wireshark are things we learn from our previous subject, Information Security. Our professor always thought us that we only use this hacking for school purposes only and will not go beyond other illegal activities.

Windows-8vbWhile using this application, I can still access my Windows 8 Pro OS. The reason about this is that, I only use Oracle Virtual Box when I want to use my Back Track Linux. Just download the Back Track Linux OS, install it in your Virtual Box, run it, make sure you have all the working tools, the internet access and a WiFi connection then done. Watch and search different kind of utilities you want to use in Back Track, explore it and you can be a hacker. Not that pro hacker but at least you know what other hacking tools hacker used to hack. 

After sharing this, how can you consider yourself now? Do you want to start this activity right away and be hacker one day? As what Back Track Linux said that “the quieter you become, the more you are able to hear.”