Earn money with Redworx Software Affiliate Program

I have created this post back in 2017 and since then many people managed to take the advantage of using this method to generate additional easy income and even did better than I ever did. However, although this method is still fully working becoming an affiliate of the software provider redworx.net is still possible, my guide has become outdated in terms of images and instructions. Therefore today you are reading the updated new guide of 2020. This includes updated text and images I am going to create a tutorial video as well for this post.

Today I have another interesting method for earning money online with no financial investments for you. The method is an affiliate program method. All you basically need to do is register at my buddys website and get traffic on your affiliate links. In this text I will be going more into detail on how to actually generate traffic and attract only the right people who are looking for a paid product. Read more [...]

How to make a Secure Login Form Authentication System with Cookies, Sessions, Token, PDO using PHP and MySQL Tutorial

This is the video tutorial page to my successful tutorial about how to make a secure login form authentication system in PHP with cookies, sessions, token, PDO using a MySQL Database with source code in my videos.

Your time is valuable?

If you do not have the time to follow the videos and your time is valuable, feel free to donate $5 to my patreon page via link below as I spent a lot of time creating this video for you my friend.

Download Source code here! Read more [...]

Advanced Keylogger remote database (that sends email)

A very Long time ago I created a tutorial, a C++ tutorial on how to make a simple keylogger Virus. A lot of Viewers requested me to make an Addition to the tutorial: i.e. a keylogger which sends the logged text file or string as an email (Attachment) to an email address. This is the most common term searched online in the relation to this Topic.
And please do not get me wrong. While a keylogger is often used in an unethical way its primary purpose is useful in all means, text input, hotkeys, bug tracking, etc. but also private use in form of actually logging everything whether it is personal use to secure what you have typed into a text editor in case it crashes or making sure your computer is not used by somebody else without your knowledge or watch out for your kids about what they do on the computer.
Today I have an advanced keylogger tutorial in comparison to my Video. And yes I will make a Video on this soon it will be embedded below.
However, todays method is a Little bit better from my perspective. Instead of sending an email we will be submitting the logs to a database remotely and we will also be able to Access and read the logged Information remotely.
So what you will need for this is a webspace with a MySql Database preferably with PHPMyAdmin on it because it is the easiest database management system alternatively you can do it via SSH remotely.

Let us start with the Keylogger class. For the sake of this tutorial there will be just a keylogger class which will have a Character Buffer to store chars which have been input as well as a List of tasks to submit our characters to the server.
What we will also need is two imports from user32.dll, which is a standard windows library. We will import GetAsyncKeyState, it is the same function used in my other C++ keylogger tutorial video on youtube. We will also import MapVirtualKey to map our keycodes into actual keychars. Read more [...]

Using USB Device as Key for Authentication System

Using a USB Device as Key for Authentication System

Good day, In this post I would like to present you an idea which came to my mind the other day. I was thinking of a cool and convenient way for an authentication system which does not require typing anything into an entry field. Getting to the point: I thought about using a USB device, USB storage / flash drive or mobile phone etc. as the key for an authentication system. This means whenever you have to authenticate in a system all you need to do is plugging in your USB device. The authentication system will scan it and determine whether it is white listed as a valid key for the authentication or not.

So I decided to go on researches on the internet to find out how I will be able to access the USB devices of my Windows 7 Computer and how I will be able to determine its current state, means knowing if it is plugged in at the current moment or not.
I found out I could use Marshal, which is a class located in the System.Runtime.InteropServices of .NET 4.0 Namespace to achieve this. A short bit later I was able to find a public class which would let me do exactly what I need. I decided not to reinvent wheels and use the public class I have found on CodeProject. Read more [...]

Implementing TOTP Google Authenticator with PHP

Today I decided to write an article on how to implement the TOTP Google Authenticator into your website’s login authentication system using PHP for any purpose (software, mobile app, website). It does not matter whether you want to use it for a website or software you have created or a mobile phone app, the Google Authenticator does not have to be necessarily used with PHP and either way you can use PHP for your authentication interface anywhere.

Table of Contents Read more [...]