Portable Development Environment

I have always wanted to carry only the essentially needed applications and software tools, something light enough that would allow me to continue to work on any other computer apart from mine, taking into consideration operating systems, storage capacity and speed which is the data read/write transfer rate and the computer resources specifications.

I carried out some experiments to see how far a 4 Gb pen drive can go, and the software tools I used were:-

  1. Android SDK android-sdk_r18-windows.zip to build android apps on the go
  2. Eclipse eclipse-jee-indigo-SR2-win32.zip to facilitate android apps development
  3. JDK jdk-7u4 a backup location in case a local JDK is not up to date
  4. TCP View TCPView V3.05 to free and release local ports to be use by pen drive applications specifically Apache and MySql
  5. XAMPP XAMPP USB Lite 1.7.7 comes with Apache server and Mysql database for web application development and testing


Fig 1: Pen drive with the portable applications

Mobile application development

Android portable development under Linux and windows experience, the experience proved to be slow due to the fact that I am using a USB 2.0 pen drive as opposed to USB 3.0, which has a lower data read/write transfer rate than USB 3.0 either way it proved to not be efficient but effective enough to build small applications on the go such as seen below I manage to develop an xylophone application.


Fig 2: xylophone application


Fig 3: xylophone application


Fig 4: xylophone application


Fig 5: xylophone application


Fig 6: xylophone application


Fig 7: xylophone application

Web Application development

The experience proved to be highly fruit full, as seen below both Apache and MySql database are running. In htdocs, three website are open my site, my online store, my cart. These are all web applications.

  1. My site a skeletal structure of a static website, more like a template awaiting contents and rearrangement for finalization/personalization
  2. My online store, a free and open source store application that incorporates MySql database for storage of descripting of items and customer data
  3. My cart, a free and open source java script cart application with no database incorporated where payment is customizable via Google wallet or Pay pal


Fig 8: XAMPP control panel


Fig 9: My Site website template


Fig 10: Pay pal payment

I have been tackling a to do list, in preparation to accumulate specifically FOSS (free and open source software)  for the only most highly efficient and effective tools and techniques for rapid software development, that would only require a business to invest on services with minimum annual expenditure leaving room for more profit and offer competitive prices to customers.

The things I would recommend:-

  1. For portable development of highly aggressive IDEs that consume a lot of resources, try to not use a USB 2.0 since the data read/write transfer rate would be time consuming, in the timing being you can experiment on USB 3.0
  2. when installing local applications such as integrated development environments and servers try not to install them as window services hence there would be no need for port conflicts when switching to use portable applications on your pen drive


Thank You.

Posted in Uncategorized | 2 Comments

Password Retriever

Make your own application to retrieve passwords from your system, If you are like me I have different passwords for everything, categorized according to sensitivity and level, hence I usually have to mentally generate a 4-16 character password by using the site name, purpose and date, hence once in awhile I do tend to forget when I last visited a site hence the date gets mixed up and there goes I have to either think for awhile or just reset the password.

Collect the below applications and depending on your preferences you can either put them in a folder or on the main drive, my way is to put them in a separate folder and change its attribute to hidden.


Fig 1: Required executable applications

After you have downloaded and extract the applications into a folder you will need to create a batch file that would point and execute the applications within the hidden folder, a launch.bat sounds more meaningful.


Fig 2: Setting up a batch launch file

By doing so this would allow you to be in the position to add more tools to your launch.bat to be executed. From above:-

“start Documents\mspass.exe” this line will start the mspass.exe as the name suggests this is a Messenger Password retriever.

“/stext Documents\mspass.txt” this line will save text to Documents\mspass.txt

That’s it, you can run the application by executing the batch file, in the case where you want to install the application into a pen drive and automate the process, you will have to create the auto run file so that batch file gets executed every time a pen drive is inserted into a PC.


Fig 3: Setting up an autorun file

The Action will be prompted to the user to either accept or dismiss to retrieve passwords or you can have your own message. After the completion of the three steps you can enhance and convert your batch file to exe file.

  1. The applications is labeled as a hack tool since all passwords are considered to be secret and only to be know by the owner, retrieving peoples passwords without their consent is illegal and a crime
  2. To protect one self from such auto run applications is to disable the auto run feature in windows go to Start window > Default Programs > Change Auto Play Setting  and then deselect use auto play for all media and devices. This will inhibit plugged in devices to your PC to auto play


Thank You.

Posted in Security | Leave a comment


Since I had the interest of building my own NAS (Network Attached Storage) for personal use I ventured into something along the easy to install and carry that said platform on a pen drive leaving the rest of the hardware resources intact.

Most of the instruction online might not really give a fruitful result, since different platforms have slightly different installation processes, so I came up with my own way that made the whole process a breeze, it is wise to note as quoted from m0n0.ch you have to play around with the security within Vista and Win 7.

My version of the installation is

  1. Download physdiskwrite.exe and FreeNAS.img (Your version of choice)
  2. Insert the above software’s in the same directory a good example would be C:\
  3. Attach your pen drive to the computer (128MB is sufficient for NAS 7 anything higher is a waste)
  4. Disable User Account Control (UAC) right click command prompt (CMD) and run as administrator
  5. Change directory to where the file resides
  6. Any attempt to write to the disk will fail hence you will need to have a clean build of your pen drive run diskpart to remove the current partition

Follow the steps


Fig 1: Searching physical drives

Step1: Change directory to where the software resides
>cd c:\\


Fig 2: Start diskpart utility

Step 2: Start diskpart to be in the position to remove partition within your pen drive


Fig 3: Successful cleaning drive and ready to install

Step 3: Depending on the number of drives attached to your computer, you will need list disk so as to know how many are attached and what is the number assigned to the pen drive you want to install FreeNAS, for my case is 1, select the disk then clean it to remove the partitions.
>list disk
>select disk 1


Fig 4: Select the disk to write the img file

Step 4: After you are done, exit diskpart and run the physdiskwrite program and include the name of the file to write, as seen in the screenshots above.
>physdiskwrite FreeNas.img


Fig 5: Writing in progress

The writing process begins.


Fig 6: Process completed

Above the writing process is complete, since I am in no position to offer screenshots for the GUI of FreeNAS unless I take a photo with my camera, I will retrieve some GUI images from the web until I do.


Fig 7: FreeNAS version 6

Version 6 screenshot, convert any old hardware to home servers without spending at all, the minimum requirements for version 7 which is mostly for home use, of which I have installed on my pen drive requires 400MB Disk (64MB Flash)  and 256MB RAM.


Fig 8: FreeNAS version 8

Version 8 screenshot, this is mostly for organizational use and minimum requirements are for UFS only is 2GB Disk Space and 4GB RAM.

I am currently using a network attached storage server NSA221 and accessing it over one of my DynDNS accounts of which later on I am planning to change my CNAME records from my domain name www.alkathirikhalid.com to point to the media servers package services such as blog, public folder, login portal, etc…

Currently I have incorporated Google Apps For individuals and small teams into my domain name.


Thank you.

Posted in Desktop Developement | Leave a comment

Android Market

There is a great market potential for Apps developers in Android market but the down side is that not all the countries are supported merchants yet, hence merchants in a given region have the freedom and flexibility to publish and sell their apps while others will just have to wait, there is a backdoor for this in the mean time and that is to use a credit card registered to a trusted friend or family in one of those regions.


Fig 1: Supported locations for merchants as of October 2011

In the mean time exploring, developing and publishing minor apps.


Fig 2: Android Developer Console

I have been developing apps for android 2.1 update 1 so as to allow my apps to be available to as many android versions as possible, backward compatibility won’t be an issue. To add on that Android market automatically assigns apps to the respective devices according to the Android version they are running on.


Fig 3: Total active installs of my Text to Speech application

As an observation the platform gap isn’t that huge in terms of percentage but once you calculate that in terms of figures it is obvious that 17.3% is still quite a huge number, as seen above it is wise to start and stick for awhile on developing apps for Android 2.1

Any sponsors for a new Android phone or tablet?


Thank You.

Posted in Mobile Developement | Leave a comment

Recover deleted data

The recycler bin is useful but you will be surprised it is quite often user tends to clear the recycle bin only to realize some data was mistakenly deleted or on the other hand deleted data from pen drives or removable drive, these external drives tend not to have a recycle bin.

If such an incident happens the first thing to do is to stop using that particular drive, due to the fact that once a user deleted a file the operating system dose not literally deleted it but marks that space as available space in other words an empty space, you can relate this to the old magnetic tape drives where you can record a song over another song, hence further usage might cause that space to be overwritten, immediately stop using that particular drive.

Method for external drives

Observe not to use your external drive, in order to recover your data immediately use PC Inspector download it on your internal drive, run it and follow the procedure below.


Fig 1: Language setup

Select your language and press ok as marked with the circle above presented by the green tick.


Fig 2: Selecting a recovery type

Click the tab mark with the circle above to recover deleted files.


Fig 3: Selecting a drive where the file last resided

Select the external hard drive as the above case drive I: 3.81 GB hence it is a 4 GB pen drive click ok presented by the green tick.


Fig 4: Deleted files detected

As seen above I have two deleted files in my pen drive and the colour green means they are still in good condition and can be recovered 100 % while my pen drive appears empty purposely cleared for demonstration in the case where you have previously deleted more files you would need to wait till the program populates the list.


Fig 5: Selecting destination to save the recovered file

Select the file or files and press the save tab on the left side presented as a floppy disk, select the preferred location and press ok presented by the green tick.


Fig 6: Recovery process completed

As seen above the file has been successfully recovered.

Method for internal drives

To deal with internal drives it’s a bit tricky hence the best advice is to stop working on it and in no circumstance should you switch it off as this will force your operating system to auto save programs before shut down and might over write the empty mark spaces that the data to be recovered resides, the recovery procedure is almost similar but the hard disk handling is totally different.

When data or new data is saved it is scattered in pieces of bits all over the hard drive in other words the said files are fragmented hence the operating system will give the available marked empty space as required, the process is similar in most storage devices. You should consider the fact that if the drive is an external one then the chances of getting back the file are higher than an internal drive, this is highly risky if the data deleted is from an internal disk of which the operating system is installed on that particular partition i.e C:

The difference is that when the drive of interest has an operating system running on it, it will constantly have reading and writing activities in the background, this is because the presence of the page file folder, temp file folder, prefetch folder and auto save programs constantly changes hard drive contents.

If the file of interest is of low importance you can use the same recovery procedure as the “Method for external drives” the down side of this process is that the file might not be 100% healthy in terms of being usable/readable as the fragmented data chance of it being over written are higher and might recover an estimated figure of less than 100%.

The things I would advice is to only approach the below procedure as a professional, I do not take responsibilities nor will I be held liable to anyone’s losses.

  1. Force shut down your pc immediately to stop further data reading and writing, our aim is to stop any further writing/overwriting on the drive
  2. Remove your hard disk in the case of a desktop and connect it as a slave drive in order to run the program from another PC on a different hard drive, or in the case of a laptop remove your hard drive and mount it in an external drive casing, connect it via USB to another pc
  3. once the drive of interest is handled as an external drive, only then it is possible to ensure only reading access which would read and extract the lost data with out damaging it’s health

Before opening up any laptop or desktop make sure to discharge your body from any static electricity by simply touching a metal surface or the metal casing of your desktop/tower cover.


Fig 7: Opening the laptop case to remove hard drive

Find the hard drive location, open up the cover and remove the metal casing that holds and protects the hard drive.


Fig 8: SATA (left) and ATA (right) pin/connectors comparison

Distinguish the difference between SATA and ATA drives of which both of them have different mounting pins, this will enable you to know which type of casing will suit your hard drive, remember there are more others in the market and all with different properties but the most common is SATA.


Fig 9: Inserting hard drive to external board

Align the pins and just slide it in gently, due to the lack of SATA casing, I am demonstrating it with an ATA casing.


Fig 10: Close the casing

Secure the hard drive on the hard drive board and gently place it back in the casing to be used as an external hard drive and recover the necessary data as required by following the same steps above.

In many tutorials and DIY, inform users to stop using their machines while excluding the fact that there are authorized background process that will constantly have reading and writing activities in the background, and might affect the recovered data health, the most approachable way is to force shut down your pc and take matters from there.

Thank You.


Posted in Security | Leave a comment

Build it under 3 hours

I am going to demonstrate how to build a website under 3 hours and encrypt your source codes to prevent or at least make it hard for your website to be reverse engineered, the programming required are HTML, CSS, PHP and MySQL. I have left my website open to anyone pleasing to attaining the source code and to further enhance and make the experience speedy I obtained and used blueprints CSS, I believe knowledge should always be available for those who seek it.

Web designing & web programming skills are essential to undertake this example, in order to produce a quality design one must consider the sites

  1. objective: what do you want to achieve with your site
  2. theme: what feel/mode in the essence of colour would you like to portray
  3. walk through: simple enough for a user to navigate from page to page
  4. simple: get to the point of what you want
  5. plan: how to tackle the building and hosting of your website

Your objective will determine a lot on which type of website to build either static or dynamic, for most personal websites static are more preferable and for corporate or business dynamic website are preferable in order to attract and keep the traffic to their site and at the same time address their information to as many clients as possible

Bear in mind you must collect hosting data so as to know on which server your site is going to be, this is essential as it will determine which programs to use to build your site and database, also collect speed test data in order to determine exactly how much content you can put on a given page in other terms determine the weight of content loading time, to be on the safe side I have chosen PHP and MYSQL since most hosting sites offer these resources and to enable rapid loading I resized and used less pictures, eliminated the use of data/resources from other servers good example would be site widgets this will tremendously increase your loading speed, with the exception of Facebook.

These days one page website is a common trend it servers to give an impression of both modern and professional feel, this is because most users do not have time to go through a whole website hence you must only display exactly what they are looking for in a matter of a glance, so in order to keep up with technology one must first research on the common trend so as to give themselves a head start and decide exactly what will suit there site objective.

My plan in this case my sketch is a four page website


Fig 1: My sketched template

After having the overall sketch the second thing is to determine the content lay out by this I mean fonts, text size, colour and content position, this can be kept consistent with the help of a CSS file


Fig 2: My CSS file

CSS will allow you to use the same format through out your pages, so they are consistent with each other hence have a reflection to the user that they are in the same website, the main advantage is that you get to minimize time taken and the total work load by reusing the same code in every other  web page, this is made possible by referring or in layman’s term point the location of your CSS file to be incorporated with your web page.

<link rel=”stylesheet” href=”../alkathirikhalid/mycss.css” type=”text/css”>



Fig 3: Main template to be reused within the entire website

As seen above, after having that one page functioning, you can copy paste it as many times as you please and proved links for it, reuse of codes shorten the work load.


Fig 4: Filling content into the home page

All in all having a static page in the long run looses its appeal since common users will eventually get bored of viewing the same contents almost every other day but for the purpose of presenting oneself it suffice the need since your name and background never changes.

Incorporating a private message box will allow users whom want to stay anonymous to be in the position to convey there thoughts to wards you and this is sometimes crucial, if you are an open minded person and view criticism as a means to improve yourself or some users just like to stay anonymous.


Fig 5: Implementing a Form for messaging

In most cases most website would provide an area for a user to input a name, email address and also some times a phone number, but in the case above for any person whom would like to stay open can use other form of contacts as Facebook, Twitter and email.



Fig 6: Testing Form and MySQL database

Bellow I provide simple codes for novice on the construction of a message box and how it calls the PHP page to access and insert data by MYSQL into the database.

This is the textbox codes

<form action=”name.php” method=”post”>

<p>Private Message:

<textarea name=”message” cols=”40″ style=”height: 230px”></textarea>

<input type=”submit”>


This is the PHP and MYSQL codes

$con = mysql_connect(“host”,”user”,”password”);
if (!$con)
  die(‘Could not connect: ‘ . mysql_error());

mysql_select_db(“table”, $con);

$sql=”INSERT INTO table (message)

if (!mysql_query($sql,$con))
  die(‘Error: ‘ . mysql_error());
header(‘Location: ./’);

N/B implement validation to avoid MySQL injection


Fig 7: Viewing test inputs through PhpMyAdmin

All is well but bear in mind reverse engineering is common and you can simply prevent this by encrypting your website before hosting it.

Original code


Fig 8: Normal page

Encrypted code


Fig 9: Encrypted page

Most website would encrypt part of their pages while other contents within the same page are visible this is due to the fact that when some encryption is done some of the website layout is lost and the website just dose not appear as it suppose to, so if you are faced with this issue just encrypt those parts that are essential and discard the rest in its original format.

The approach and advice I would lend is to


Fig 10: Hierarchical division


Fig 11: Dummy files


Fig 12: URL shortening

  1. Before building your site divide the task in a hierarchical manner (Fig 10)where by you put webpages a side from the content pages by content I refer to images or any other material that you are going to use for your website i.e webpage folder and image folder this division will allow you to focus on the things that matter at a given time, rather than having all contents in one folder the chances of getting confused and wasting time looking for just one particle file are high, this method will be minimize and almost eliminate confusion and time wasted
  2. Create dummy files (Fig 11) within those folders and rename them accordingly it much more understandable for a page to be named home rather than index, then paste in your template code all at once followed by link those pages individually then only you inserting contents, by this method you allow your webpages to be fully functioning then later expanding them by inserting content, this approach is faster
  3. Division of pages into it’s individual folders will allow URL shortening (Fig 12) and encapsulation technics to be applied such as htaccess so as to enforce per-directory access control, hence you point a user to a folder rather than a file, example if a user visits my site http://www.alkathirikhalid.com the server take the user to http://www.alkathirikhalid.com/home/ so the user knows they are in the home page rather than http://www.alkathirikhalid.com/home.html or any other extensions, novice users do not necessary need to know if your site is .htm .html .xhtml or .aspx this simple notation allows your site to be more presentable with a professional appeal
  4. Rather than building everything from scratch try to incorporate outside tools and reuse codes, for every code you build once try as much as possible to build it in a manner that would accommodate any future change and also revise it into a template to be in the position to be use later this minimizes time and energy, some good resource can be found on the web
  5. Anticipate the size for the scroll bar so that a short page might not look out of line with the rest while a use navigates through your site, this can be achieved by making all pages exactly the same size or almost equivalent
  6. Test your website with as many web browsers as possible in order to detect and fix any bugs


Thank You.

Posted in Web Developement | Leave a comment

App Inventor

Here I built an application for users with special needs specifically users whom are mute or have some difficulty of verbal expression, this application helps express their feelings by predefined buttons which gives a sound responses whenever they are pressed.


Fig 1: App Inventor BETA web application

I have named this application as “SaySomething” and as seen above it contains buttons a good example is the button labeled “I miss you” below the image there are two sounds 1 and 2 each corresponding to the above buttons respectively, these are the files that would be played one for each button.


Fig 2: Button and sound connections

To test the application I have used my phone, as seen above I have connected to my device, there is an option to use an emulator in the case where one does not have an android phone.


Fig 3: Testing my “SaySomething” application

Tested and working, now what is left is to download and install it.


Fig 4: Installing “SaySomething” application

The application is successfully downloaded and installed. It is really easy with the features of drag and drop and anyone can develop their own applications on the go and another thing is that it is more suitable for personal use and can be distributed easily.

  1. I encourage the use of android SDK and eclipse IDE for developers, which offer far more features than App Inventor.
  2. There are no apparent codes for APP Inventor it is basically a drag and drop of graphics to build an application hence a developer can’t have the flexibility of incorporating the source codes to other application.
  3. App Inventor application are not allowed in the android market for now.
  4. It is better to use an actual phone rather than an emulator due to two reasons
  • An emulator is slower in responses than a phone.
  • The android version may differ and might give a slightly different output when used on an actual phone than what was expected. Hence it is best practice to use a real phone preferably the one you are going to run the application on.

Apart from all the above points, App Inventor is quite fun, easy and fast to developed personal non commercial applications of which can be shared among friends and family or even an organization to access all the company feature in one place.


Thank you.

Posted in Mobile Developement | Leave a comment

WEP Issues

I guess by now we all have heard a lot about this, I took the liberty of physically demonstrating it to myself to grasp the actual extent of this issue. I was only alarmed to this after noticing my networking becoming slow and when even it’s obvious no pc are running but the router data light keeps blinking.


Fig 1: Searching for WIFI targets

The results were shocking I managed to hack my network three times under different passwords, all under 2 minutes duration, the scripts are getting easier and readily available through the internet and the fun just begun.

I immediately understood what was going on and for the fun of it I dearly wanted to know how many devices were connected to my network by checking the IP addresses and also to track that user mac address.


Fig 2: Running AutoScan Network 1.26

The auto scan above revealed more than what I intended to know with the other help of Snort and WireShark, I have intentionally hidden some data above for privacy issues. I managed to get the culprit mac address, other than just using my net I quickly notice most of the data being transferred I could easily intercept and the fact that he or she didn’t even go to the extent of hiding the mac address I saw no harm nor threat imposed by the individual rather than just surfing the net.


Fig 3:  Enabling the system log from the network router


Fig 4: Enabling the MAC filter from the network router
(I have intentionally hidden some data above for privacy reasons)


Fig 5: Retrieving MAC addresses from Windows

Run “ipconfig /all” if you are running windows , to get the MAC addresses for the devices in your PC.


Fig 6: Retrieving MAC addresses from Linux

Run “ifconfig -a” under linux, to get the MAC addresses for the devices in your PC.

I guess by now we all know that the best security to date is WPA2 but for the likes of those whom are using old routers that doesn’t support this feature. There are other options that they can use.

  1. Hide your SSID so that it is not visible
  2. Try to make your password meaningless and as long as possible with the mixture of letters, number and symbols, this will only slow the process but not entirely a solid solution
  3. Enable MAC filter, only allow the devices that you specify to connect.
  4. Enable a system log, to watch on the activity going through your router
  5. Scan your network time to time to gather useful feed back.

I am currently on all the above and more, my system is on a dual boot with BackTrack 5 the leading Penetration Testing Distribution.


Thank you.

Posted in Security | Leave a comment

Augmented reality

This is a useful tool for people who like to develop and keep track of places of interest with more information and interaction than what the current applications offer, I have created two locations of interest one being my university with four blocks and another place of interest with five blocks.


Fig 1: Layar account

The things needed to undertake this are

  1. Create an account http://www.layar.com
  2. Download and install WampServer  http://www.wampserver.com/en/download.php


Fig 2: Creation and Setup steps

The name you will give to your PHP page above on step one must be the full URL where your PHP resides, the steps above are simple and direct to the point, after establishing your place of interest you need to collect data about that place example:

Megan Avenue
189 Jalan Tun Razak
50400 Kuala Lumpur


Fig 3: Image for my layar being Megan Avenue

Block A:  3.162209,101.717528
Block B: B 3.162231,101.716965
Block C: 3.16174,101.717391
Block D: 3.161499,101.717391
Block E: 3.161647,101.716924


After inputting all the necessary information, you will need to load the images that your layar will use, this is mostly for viewing part by the developer being you and also viewing by layar, for indexing your layar and provide it as an API for viewing to others once searched, hence under ‘listing and indexing’ upload the necessary images.

Later you will put these same images into your database so that your layar can retrieve them this is for the augmented reality where you would see those images while viewing through your camera when they are in range, you achieve this by setting up a url link to your image file.



Fig 4: Requested parameters

The above depicts the parameter required to be retrieved from your database by your PHP page, also something to note is security, ensue your database is guarded by a strong password and also learn the security measure to prevent general SQL injection attacks.


Fig 5: Database accessed via phpMyAdmin

Step 3


Fig 6: Testing

This is sufficient to know that the API is working and running, due to being out of range from Megan Avenue, I am going to demonstrate the work and feel of the augmented reality by using a location within my range.


Fig 7: Running layar and presenting the augmented reality


Fig 8: Changing phone position by hand movement

This application can be downloaded and run on IPhones, Android and Nokia OVI, it shows the objects in range and gives an estimation of the distance and also further information on the bottom bar, once the layar application is  installed you can search for a specific name string or anyone string belonging to a given developer and it will bring up all the developers POI hence regardless of the number of layar names one has developed it works on by targeting the location of the POI of a given account and retrieving data both from your layer account for a specific layar i.e data such us logos, name hence applicable for personal and corporate use on sharing data about locations and other information, given the nature of personal preference of changing the look and feel of a given point and also the nature of corporations having a multitude of companies with different logos suiting their organizational needs.


Fig 9: My layar

Once layer is installed on a mobile device you can search for the layar name which should be similar to the layar name given by the developer in most cases the company name, since I am not a company nor in any organization, my layars are based on the co-ordinates of that particular place of interest i.e

Layar name: megan avenue kl

Developer: Al-Kathiri Khalid

*You must be in the range of at least 1.5 Km to see the POI

Layar name: ucsi south wing

Developer: Al-Kathiri Khalid

There are many other POI developed by other individuals or organization a good example would be masmap POI by masmap.org. After your first setup, your next setup for any layar would take you less than 5 minutes, ensuring you follow the best practice I would lay down.

  1. Create and organize your work in a sense of hierarchical structure for easy of navigation, to improve efficiency and convenience of finding data for trouble shooting, where data is organized either by type or function the most practical and common one is to organize your data by type where common files are put under same folder or subfolder example image folder will contain all image files.
  2. Rather than having a local host of which you would require to attain your IP address and also leave your networking running this will render your experience of the application being slow since your layar will have to connect to your localhost to access the database you created, I would suggest you have your own website with tools that allow you to administer your site (FTP and PHP access) or search for free webhosting with these feature example like http://6te.freewebhostingarea.com and many more.
  3. The essential part is to share your API end point URL with every other new location you create this would allow you to use the same database name and structure, only thing is you add the new data.
  4. Map your website ftp location as a network drive to easily access your data rather than navigating through your web browser for access and editing, this will make you faster and efficient, further information would be found on the previous topic I talked about mapping a drive the procedure is almost similar and my ftp location can be seen in figure three.

The future is here hence I prefer cloud computing over standalone for mobility and accessibility reasons, this eliminates the need to carry around a laptop, my only tool is any computer so long it has internet access. If you must access and use your PC remotely either by another PC or your mobile, I would recommend Team viewer it has the features of either installing or running hence it can be installed on your pc and carry the executable file on your pen drive to be used on other Pc that you do not wish to install it. for those using localhost, word of advice above all stay safe and secure while opening your network allowing access to your database.


Thank you.

Posted in Mobile Developement | Leave a comment

Google AdSense for you

Apart from all the tutorials written and explained about this advertising trend most of them hit behind the bush making the learning long and tedious, eventually new learners or potential new users looses hope.

This is due to the fact that most free tutorials have a hidden agenda and that is to control traffic flow to their site in these sites they have advertisement in them and by making the tutorial long it allows “a one day user” to be a regular user hence increasing traffic to their site, this is crucial in a sense that it increase the chances of either one or more of the learner to also have a second interest or get attracted to one or more of those advertisements, the site also seems to offer further tutorials in that particular site or another site, it seems you are legitimately being helped but in reality nothing is for free, those said free tutorials and further tutorials generate income per click for every time you try to access knowledge, hence you see why they have to keep you on a loop.

It is always wise to read from the original source.

AdSense for beginners, users need to have some knowledge of working with html tags, this is achievable by observation alone by using any web creator application or blog writer there is a section at the bottom that either says code or source this is the section where you paste the generated codes that pick advertisements from Google to your site or blog. There are certain keywords users need to familiarize but as for beginners just stick to generate, copy and paste.


Fig 1: Overview tab in the Home page

The Home tab shows your Estimated earning as of today to a month, Finalized earnings Google release the money based on two criteria one it must reach a certain minimum pay out which is 100$ and second based on a user preference,  mine I have set it on hold meaning I let Google hold for me till when I see fit to receive a cheque, Page views, Clicks, Page CTR this stands for page click through rate, CPC this stands for cost per click and Page RPM this stands for page revenue per thousands.

The My ads tab shows content new ad unit or import old add code this is where you generate the codes, custom channel is provided and it is very useful to custom the type of adds you intend to advertise on your site or blog for instance if your site is about computers that means a user is there for or have interest in computers hence you provide what the user seeks this increase the chances of them clicking on the adds, the same is for search bar code you customer the search feeds according to the content of your site or blog, feeds are nothing more than targeted Google adds.

The Allow & block ads shows what the user have as the name suggests allowed or blocked any ads, but as for beginners you don’t even have to bother on this.


Fig 2: Performance report based on the Page views and Estimated earnings

Google AdSense have improved on it’s services since the last time by incorporating new features, It has become easier than ever by allowing user to save generated code in their AdSense account and also provides performance report, this has personally helped me to keep track of every code I create, and most of those old codes are still in use and can be imported into my account.

You can achieve Traffic by having multiple blogs ranging from different subjects or criteria with contents that carry relevant information based on those criteria and blog settings, and If you are a web developer you can include some ads on your client website based on the agreement you might have with them, I prefer a search bar either on top or at the bottom of the page and if possible at least two to three relevant nice looking ads at the sides.


Fig 3: Google will frequently send Adwards vouchers and your cheque by mail

Example of Google AdSense Script:

<script type=”text/javascript”><!–
google_ad_client = “ca-pub-03525951********”;
/* alkathirikhalid1 */
google_ad_slot = “9187314211”;
google_ad_width = 728;
google_ad_height = 90;
<script type=”text/javascript”


Fig 4: An Ad generated by the above Google AdSense Script

I have partial omitted my Publisher ID above for privacy reasons because any code you generate has a Publisher ID this means you can put your code use and reuse it in more than one given site or blog, hence forth generating income for you. Above is one of my pictorial examples, not a working advertisement because you are responsible and accountable for the use of your codes, protecting them prevents misuse, for more information I suggest you go directly to the source in order to stay up to date. The steps I would lend on how to improve your income are

  1. Traffic: This is achieved by campaigning about your sites and blogs to customers, you can start slow by reaching out to them, advertise through social medias such as twitter, Facebook, Google+ the more people know about your site and blogs the more likely chance of one or more of them visiting, increasing traffic to your sites or blogs increases the chances of users being attracted to the adds, all it takes is just a click to get paid, under no circumstances should a AdSense account holder be randomly clicking their contents or ask their friends to do so, Google can easily detect based  on cookies, IP address, user trends. “Once earnings are verified, they are posted to your Payments page, which reflects your finalized earnings, including all revenue owed to you for valid activity. Revenue from invalid clicks or impressions is refunded back to the affected advertisers.”
  2. Content: It is easier to campaign and attract users to your sites and blogs but this isn’t enough, the content should be up to date to not only attract but also keep them coming, your content must also be relevant to what your sites and blogs are about since this is the thing that caught the users attention on the first place, edit your title, data or content and metadata to also allow your sites and blogs to be easily recognized by spider search engines, categorized and delivered to users while searching. If you are running a static web site or blog hence the information is always fixed, I suggest to custom your ads, users tend to neglect ads that they are familiar with, also the ads are more attractive in nature when they are kept less on a site or blog per page and pictorial ads are more appealing and can blend well with your site or blog based on your ads customization.
  3. Multiple sites or blogs: It is not sufficient to generate a substantial income based on one site or blog alone, especially if you are a blogger since blogging services get direct commission from Google through you, hence you end up getting 40%-60% of your ads income depending on the blog service terms and conditions.
  4. Submit content: Submit your site and site information to search engines specifically Google search this will allow your site or blog to be easily found from search engines.
  5. Adwords: This is strictly for business campaigning, you pay Google to show your site based on your contents, beginners stick to diverting traffic to your site or blog, set relevant titles, data or contents and metadata, refresh contents or customize ads by keeping the ads attractive and relevant to users needs, choose pictorial ads over textual ads, open multiple sites or blogs use and reuse your ad codes.

Once you have observed the main four points I have provided it is sufficient to allow and set your blogs and sites to some extent of automation, generating income even while you sleep.

Thank you.


Posted in Google AdSense | Leave a comment