We often find our Facebook timeline spammed with useless status updates, including meaningless photos and irrelevant remarks, from friends on social networking sites. Most of the users assume their updates to be wise or witty, but, they are, at times, perceived to be so poorly articulated that they end up becoming a source of annoyance for others. Sooner or later, an opinion is formed about such posters and users start scrolling the timeline down without even taking a glance of their posts. If you don't want to be categorised under such annoying posters, here are some tips which you can follow to better your updates and make them appear meaningful.

Tuesday, November 5, 2013
Monday, December 3, 2012
How to Create Your Own Customized Run Commands
How to Create Your Own Customized Run Commands
Creating the Customized Run Command
Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below
3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.
5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program
Sunday, November 18, 2012
How to do Netbios Hacking..
THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.
STEP-BY-STEP NETBIOS HACKING PROCEDURE
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).
Example: C:\>net view \\219.64.55.112
The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here “219.64.55.112″ is an IP address of remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP address in it’s place.If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address.
3. After succeeding, use the “net use” command in the command prompt.The “net use” is another netbios command which makes it possible to hack remote drives or printers.
Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint
NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. “Myprint” is the name of remote computer’s printer.These are displayed after giving “net use” command. “219.64.55.112″ is the IP address of remote computer that you want to hack.
4. After succeeding your computer will give a message that “The command completed successfully“. Once you get the above message you are only one step away from hacking the computer.
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system.You can access files\folders quickly through “Command Prompt”.
NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address.
Saturday, November 17, 2012
5 Of The World’s Most Famous Hackers & What Happened To Them
There are two types of hackers. First, you’ve got the kind that is so often portrayed by Hollywood as an anti-social nerd with a chip on his shoulder out to dominate the cyberworld by breaking into secure networks and messing things up. Second, you’ve got the kind of people who just enjoy fiddling around with software source code and hardware gigs.
That’s right. The term “hacker” originally referred to the second type, which held absolutely no malevolent connotations. Only recently has the term been used to refer primarily to criminal masterminds. There are good hackers and bad hackers! Nowadays, benevolent hackers are often called “white hats” while the more sinister are called “black hats.”
In this article, I’ll be talking specifically about famous hackers that don hats of black. Here are five of the most widely known black hatters and what happened to them for their recklessness.
Jonathan James
Yes, James hacked into NASA’s network and downloaded enough source code to learn how the International Space Station worked. The total value of the downloaded assets equaled $1.7 million. To add insult to injury, NASA had to shut down their network for three whole weeks while they investigated the breach, which cost them $41,000.
The story of James has a tragic ending, however. In 2007, a number of high profile companies fell victim to a massive wave of malicious network attacks. Even though James denied any involvement, he was suspected and investigated. In 2008, James committed suicide, believing he would be convicted of crimes that he did not commit.
Kevin Mitnick
What did he do? After serving a year in prison for hacking into the Digital Equipment Corporation’s network, he was let out for 3 years of supervised release. Near the end of that period, however, he fled and went on a 2.5-year hacking spree that involved breaching the national defense warning system and stealing corporate secrets.
Mitnick was eventually caught and convicted, ending with a 5-year prison sentence. After serving those years fully, he became a consultant and public speaker for computer security. He now runs Mitnick Security Consulting, LLC.
Albert Gonzalez
Gonzalez started off as the leader of a hacker group known as ShadowCrew. This group would go on to steal 1.5 million credit card numbers and sell them online for profit. ShadowCrew also fabricated fraudulent passports, health insurance cards, and birth certificates for identity theft crimes totaling $4.3 million stolen.
The big bucks wouldn’t come until later, when Gonzalez hacked into the databases of TJX Companies and Heartland Payment Systems for their stored credit card numbers. In 2010, Gonzalez was sentenced to prison for 20 years (2 sentences of 20 years to be served out simultaneously).
Kevin Poulsen
He then earned his way onto the FBI’s wanted list when he hacked into federal systems and stole wiretap information. Funny enough, he was later captured in a supermarket and sentenced to 51 months in prison, as well paying $56,000 in restitution.
Like Kevin Mitnick, Poulsen changed his ways after being released from prison. He began working as a journalist and is now a senior editor for Wired News. At one point, he even helped law enforcement to identify 744 sex offenders on MySpace.
Gary McKinnon
McKinnon claimed that he was only searching for information related to free energy suppression and UFO activity cover-ups. But according to U.S. authorities, he deleted a number of critical files, rendering over 300 computers inoperable and resulting in over $700,000 in damages.
Being of Scottish descent and operating out of the United Kingdom, McKinnon was able to dodge the American government for a time. As of today, he continues to fight against extradition to the United States.
Now, do you know any famous hackers who should be in this hall of infamy? Put his (or her) name down in the comments.
Friday, November 16, 2012
How to Hack a Website with Basic HTML Coding
1 Open the site you want to hack. Provide wrong username/password combination in its log in form. (e.g. : Username : me and Password: ' or 1=1 --)An error will occur saying wrong username-password. Now be prepared your experiment starts from here.
2 Right click anywhere on that error page =>> go to view source.
3 There you can see the HTML coding with JavaScript.• There you find somewhat like this....<_form action="...Login....">• Before this login information copy the URL of the site in which you are. (e.g. :"< _form..........action=http://www.targetwebsite.com/login.......>")
4 Then delete the JavaScript from the above that validates your information in the server.(Do this very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information)
5 Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> “there instead of "<_type=password>". See there if maximum length of password is less than 11 then increase it to 11 (e.g. : if then write )
6 Just go to file => save as and save it anywhere in your hard disk with ext.html(e.g.: c:\chan.html)
7 Reopen your target web page by double clicking 'chan.html' file that you saved in your hard disk earlier.• You see that some changes in current page as compared to original One. Don't worry.
8 Provide any username [e.g.: hacker] and password [e.g.:' or 1=1 --] You have successfully cracked the above website and entered into the account of List user saved in the server's database.
NOTE- Do the coding and changes very carefully, your success to hack the site depends upon this i.e. how efficiently you delete the java scripts that validate your account information.
Wednesday, November 14, 2012
Turbo C For Windows 7 and Windows Vista Full Screen Mode Enabled.
How to enable full screen mode of turbo c in windows 7 and windows vista is very frequently asked question by many peoples on the internet so finally we found a fix for this full screen mode problem and sharing with you. you can do it with a software and by following some easy steps. That being said many are aware of the DOSBox method for installing and using Turbo C which is very buggy and needs frequent modifications to run properly. Such as you need to set the library and other folders manually after mounting the drive in dosbox along with that, Many are not able to run Turbo C in full screen when using it through DOSBox. Tedious as it sounds!
Installing TurboC on Windows Vista and Windows 7
Step 1. Download the TurboC Simulator installer..
Step 2. Although I said it can patch existing installations of TurboC, I don’t recommend that so Delete the TC folder in your C Drive. (Remember to backup your projects from the BIN folder)
Step 3. Double click the downloaded Installer > Follow the installation by proceeding with Next/Install/Finish. Choose to open the TurboC patcher after installation.
Step 4 (A). For a simple and straightforward Patched installation of TurboC on Windows Vista/7/8. Just click on the Install button on the center of the patcher.
Step 5 (A). Go to desktop, There you will find the “TurboC FIXED” icon. Click on that and start the Turbo C and compile your programs. Your Installations will be in the default C:/TC/ folder as in the Windows XP.
For Advanced Installations and Patching Custom Installations of TurboC.
Step 4 (B). Click on the Options checkbox and fiddle with the settings like Custom installation folder and patching custom installations of TC.
Step 5 (B). Click the install button.
You can safely uninstall the Patcher after clicking the Install button, To do that go to Control Panel > Install/Uninstall Programs and uninstall the TurboC Simulator. Thats it!
How To Hack A WiFi Network Both WEP and WPA Passwords 2012
Today ill tell you, how to hack WiFi Using Some Simple And Working Tricks You Can easily hack the WiFi network. I think you know that if you want to lock down your WiFi network, you will use WPA encryption because the WEP encryption is easy to crack. In this tutorial we will tell you how to crack WEP passwords, an older and less often used network security protocol. If the network you want to crack is using the more popular WPA encryption, See Below For Second Tutorial.
In This step-by-step tutorial, how to crack a Wi-Fi network with WEP security turned on.
Requirements For WiFi Hacking :-
1. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. Here’s what you’ll need: A compatible wireless adapter—This is the biggest requirement. You’ll need a wireless adapter that’s capable of packet injection, and chances are the one in your computer is not.
2. A BackTrack Live CD
3. A nearby WEP-enabled Wi-Fi network. The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.
4. Patience with the command line. This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the password. Like the doctor said to the short person, be a little patient.
Crack That WEP
To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. It’s right there on the taskbar in the lower left corner, second button to the right. Now, the commands.
First run the following to get a list of your network interfaces:
airmon-ng
The only one I’ve got there is labeled
ra0. Yours may be different; take note of the label and write it down. From here on in, substitute it in everywhere a command includes (interface).
Now, run the following four commands. See the output that I got for them in the screenshot below.
airmon-ng stop (interface)
ifconfig (interface) down
macchanger --mac 00:11:22:33:44:55 (interface)
airmon-ng start (interface)
How to Crack a Wi-Fi Network’s WPA Password with Reaver :-
Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. Here’s how to crack a WPA or WPA2 password, step by step, with Reaver—and how to protect your network against Reaver attacks.
Requirement For WiFi Hacking :-
The BackTrack 5 Live DVD. BackTrack is a bootable Linux distribution that’s filled to the brim with network testing tools, and while it’s not strictly required to use Reaver, it’s the easiest approach for most users.
- A computer with Wi-Fi and a DVD drive. BackTrack will work with the wireless card on most laptops, so chances are your laptop will work fine. However, BackTrack doesn’t have a full compatibility list, so no guarantees. You’ll also need a DVD drive, since that’s how you’ll boot into BackTrack. I used a six-year-old MacBook Pro.
- A nearby WPA-secured Wi-Fi network. Technically, it will need to be a network using WPA security with the WPS feature enabled. I’ll explain in more detail in the “How Reaver Works” section how WPS creates the security hole that makes WPA cracking possible.
- A little patience. This is a 4-step process, and while it’s not terribly difficult to crack a WPA password with Reaver, it’s a brute-force attack, which means your computer will be testing a number of different combinations of cracks on your router before it finds the right one. When I tested it, Reaver took roughly 2.5 hours to successfully crack my password. The Reaver home page suggests it can take anywhere from 4-10 hours. Your mileage may vary.
How To Hack WiFi network :-
Step 1: Boot into BackTrack.
Step 2: Install Reaver
- Click Applications > Internet > Wicd Network Manager
- Select your network and click Connect, enter your password if necessary, click OK, and then click Connect a second time.
Now that you’re online, let’s install Reaver. Click the Terminal button in the menu bar (or click Applications > Accessories > Terminal). At the prompt, type:
apt-get update
And then, after the update completes:
apt-get install reaver
Step 3: Gather Your Device Information, Prep Your Crackin’
Find your wireless card: Inside Terminal, type:
iwconfig
Put your wireless card into monitor mode: Assuming your wireless card’s interface name is
wlan0, execute the following command to put your wireless card into monitor mode:airmon-ng start wlan0 Find the BSSID of the router you want to crack
Step 4: Crack a Network’s WPA Password with Reaver
reaver -i moninterface -b bssid -vv
For example, if your monitor interface was
mon0 like mine, and your BSSID was8D:AE:9D:65:1F:B2 (a BSSID I just made up), your command would look like:reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -vv
After Doing This You Are Able To get The WiFi Password. If You Have Any Query.. POst in Comments 
Tuesday, November 13, 2012
2012 SEO Tricks and Tips for Google..
Before starting this I would like to mention the aim of Google in providing search results to people – the aim is ” SEARCH SHOULD END ” . The meaning of this phrase is that when a person searches for some information and if he is still not satisfied even after visiting first 20 pages or searching with many different combination of searches, then that will result in the failure of Google. So for this google introduced an algorithmic change in its search which is called ” GOOGLE PANDA” .
Note : Panda is named after a Google employee not Kungfu Panda 
Right from 2011 January Google kept on tweaking the algo in order to combat the content farms. What ever it is Google is now worried about only and only one thing and that is ” USER EXPERIENCE”
So what I want to say finally is google tweaks in 2012 and the panda updates can be predicted based on this concept. Also this can help us in being safe in getting effected by panda. Here are those user experience based SEO TIPS AND TRICKS that every website owner should concentrate.
SEO Trick # 1 – Unique and Informative CONTENT
Make sure you add unique and more importantly informative and attractive content. Google has changed a lot recently because previously if you wanted to rank for some keywords you should have good back links and authority. Now I can see sites with awesome, unique and well researched content are ranking very high even with low authority.
Freshness is also important, that means updating the content is very very essential. So if you have articles that are major traffic getting ones then you should regularly update them with recent information.
SEO Trick # 2 – Google plus influence
Google + is going to play a major role this year and already the influence of that is clearly visible. Google is doing to control spam and also improve user reliability by exposing the authors Google plus profiles.
So right away start branding your website with your google plus profile and the extra advantage for this is that the visibility of your site in search results will be more.
SEO Trick # 3 – Too many ads will kill your site
Yes, as the basic rule of Google is to make sure user is comfortable in getting information with out unnecessary disturbances through too many pop ups and ads. So sites with too many ads may get effected especially download site which contains too many ads are surely going to get effected. This is said by google employee @matt cutts himself to me in webmasters google hangout.
Note : I will update this list regularly in order to get quality tricks – please comment below if you want to share your personal seo trick for 2012.
Monday, November 12, 2012
How To Hack PC On Cyber Cafe
Here is a quick new hack on how to intrude in the PC which is shut downed at Cyber cafe. (Don’t Forget to read our disclaimer at the bottom of the post.)
1. As you all must have know these days all Cyber cafe owners have a program for administration to control all PC’s in local area network. So all files can be inter transmitted.
2. First of all press Ctrl+Alt+Del the task manager or any controlling application, will open. Then from APPLICATIONS select the program that is controlling all PC’s & terminate it, This is for security reason. Now log of PC, & you ll get user names of the PC.
3. But some times, cyber cafes have security clients installed that have restricted access to Task Manager
, restart the computer & press F8 continuously before windows boots.
The Menu will open, select Safe Mode from it. And now you can copy files from networked PC’s without any security layer.
Next step is where you’ll need to crack the hashes. SO go to your home PC , Download & install Saminside cracking tool. And from some another Cyber cafe try to crack the hashes of that PC. By same log off method explained below.
This where you actually perform hacking. Have a gret time & tell us weather it worked for you.
Meanwhile if you can get IP address, of the PC you wish to hack try to get it from ip-explorer.com, but this is not the part of this hack its sort of next step of hacking from outside the network.
Disclaimer : The trick here explained it for educational purpose only & not to perform illegal or criminal activities. Don’t forget hacking into some one’s privacy is considered as crime. SO do it on your home network that you own or something. We are not responsible for anything you do & consequences of it by using our articles.
Monday, October 8, 2012
10 Quotes to Provide Instant Motivation
You’re not alone if you sometimes feel like you’re just going through the motions. We all sometimes feel dispirited and unmotivated; it’s just that some of us are better at re-finding our enthusiasm than others.
I know I’m not the only one who has a stash of wise quotes, like Warren Buffett, filed away for those days when I’m just not feeling it. Reading words that say beautifully what we need to hear can remind us of what we hold dear, the values we espouse and the rewards of our hard work (or the dangers of slacking!) and give us just the push we need to stay on track.
It might seem contradictory, but I find that it’s easier for me to meet my financial goals when I remember to keep money in perspective and focus more on the things that really matter. These quotes remind us that money on it’s own is not our true motivation. Our ultimate goal is to live long, happy lives doing what we love, and surrounded by the people that matter to us. Now what could be more motivating than knowing you are working towards such a worthy goal?
It might seem contradictory, but I find that it’s easier for me to meet my financial goals when I remember to keep money in perspective and focus more on the things that really matter. These quotes remind us that money on it’s own is not our true motivation. Our ultimate goal is to live long, happy lives doing what we love, and surrounded by the people that matter to us. Now what could be more motivating than knowing you are working towards such a worthy goal?
“Time is more valuable than money. You can get more money, but you cannot get more time.” – Jim Rohn
We need to be at least as aware of how we spend our time as how we spend our money. I’ve known too many people who put off doing the things that they loved until it was too late. Do save your money, but not at the expense of time to do the things that fill you with a zest for life.
“Money never made a man happy yet, nor will it. The more a man has, the more he wants. Instead of filling a vacuum, it makes one.” – Benjamin Franklin
If the only way that you have to measure your success in life is money, you’re never going to be fulfilled. Find out what you really want to accomplish with your life, so that your money can be a tool to accomplish that and not the goal in and of itself.
“You have not lived a perfect day, even though you have earned your money, unless you have done something for someone who will never be able to repay you.” – Ruth Smeltzer
Every one of us has the power to make a positive difference in the lives of those around us. No matter how rich or poor we are, how articulate or smart or strong or kind, we can all make a difference. Remind yourself every day that you have the power to help others and look for ways to make it so.
“It’s good to have money and the things that money can buy, but it’s good, too, to check up once in a while and make sure that you haven’t lost the things that money can’t buy.” – George Lorimer
I wouldn’t be writing for MoneyNing if I didn’t believe that money is important and should be handled with care, but at the end of the day, we need to make sure that we have balance in our lives.
“Money will buy you a fine dog, but only love can make it wag its tail” – Richard Friedman
Money is a wonderful tool, but there are very real limits to what it can buy. It can’t buy you real respect or love or self esteem if you don’t have other qualities to earn it.
“Don’t tell me where your priorities are. Show me where you spend your money and I’ll tell you what they are.” – James W. Frick
This quote always reminds me that my children are watching me. They notice if mom and dad are resourceful in finding ways for them to get a good education and life experiences and conversely they’ll notice if I say the art museum is too expensive but I have money for a pack of cigarettes.
“Many people take no care of their money till they come nearly to the end of it, and others do just the same with their time.” – Johann Wolfgang von Goethe
A lot of these quotes might seem to send the message that money should not be a consideration at all, but I think that the idea is more that you keep it in the proper perspective. To me, that means knowing that it’s not more important than love and happiness, but also knowing that it’s a valuable commodity and should be treated with careful respect.
“There are people who have money and people who are rich.” – Coco Chanel
There are two ways you could interpret this. One could be that there are people who have a lot of money for a little while but never build any real wealth because they squander it by being flashy and foolish. The other is that all of the money in the world can’t buy you a feeling of being truly content in your own skin and happy with what you do have, no matter how grand or modest.
“We are all faced with a series of great opportunities brilliantly disguised as impossible situations.” – Charles R. Swindoll
It’s only natural to get upset, angry and frustrated when we face adversity. The problem is, those emotions alone don’t change anything. The more you can get into the habit of reframing situations to look for the hidden opportunities, the happier you’ll be and yes, you’ll always find new ways to be happy and successful, too.
“The great thing in the world is not so much where we stand, as in what direction we are moving.” – Oliver Wendell Holmes
Don’t judge yourself by where you are today but by whether or not you are making an honest effort to move in the direction you want to be. Applaud yourself for your efforts and you’ll be even more inspired to continue to work hard and stay focused.
Thursday, October 4, 2012
A Poem For My Love
My Angel
Some people believe, there is a one
The one who points, your way to the sun.
A person they believe, makes them complete
The one who will support, when facing defeat
'You are my angel', my one and only
My forever love, so we'll never be lonely.
You've brought to my life, all your love and care
It made me see, when I realized how rare . .
It is to meet your angel, or their lifetime one
Through you and my children, whose life has begun.
What you've done, you've illuminated my soul
It's you and your love, that has made me whole.
The feel of your love, your soft touch and caress
We're tight so close, your heart beats in my chest.
All that we have, always felt missing before
Though I love you today, tomorrow it will be more.
Our love is life, we are the strongest tree
Which will always grow forever, like you and me.
You have opened my heart and held it so dear
You are my angel and will always keep it near.
You have seen my ups and cared when I was low.
'You are my angel', I just need you to know.
You entered my life, through a ray of sun above
And when we leave, we will leave together in love
My love for you, has become my reason to be
I hope one day you'll find, your angel in me.
Lots of love baby
The one who points, your way to the sun.
A person they believe, makes them complete
The one who will support, when facing defeat
'You are my angel', my one and only
My forever love, so we'll never be lonely.
You've brought to my life, all your love and care
It made me see, when I realized how rare . .
It is to meet your angel, or their lifetime one
Through you and my children, whose life has begun.
What you've done, you've illuminated my soul
It's you and your love, that has made me whole.
The feel of your love, your soft touch and caress
We're tight so close, your heart beats in my chest.
All that we have, always felt missing before
Though I love you today, tomorrow it will be more.
Our love is life, we are the strongest tree
Which will always grow forever, like you and me.
You have opened my heart and held it so dear
You are my angel and will always keep it near.
You have seen my ups and cared when I was low.
'You are my angel', I just need you to know.
You entered my life, through a ray of sun above
And when we leave, we will leave together in love
My love for you, has become my reason to be
I hope one day you'll find, your angel in me.
Lots of love baby
Lonely Yash..:'(
Friday, September 28, 2012
How To Motivate Yourself in Failure Time.
Staying motivated is a struggle — our drive is constantly assaulted by negative thoughts and anxiety about the future. Everyone faces doubt and depression. What separates the highly successful is the ability to keep moving forward.
There is no simple solution for a lack of motivation. Even after beating it, the problem reappears at the first sign of failure. The key is understanding your thoughts and how they drive your emotions. By learning how to nurture motivating thoughts, neutralize negative ones, and focus on the task at hand, you can pull yourself out of a slump before it gains momentum.
Reasons We Lose Motivation
There are 3 primary reasons we lose motivation.
- Lack of confidence – If you don’t believe you can succeed, what’s the point in trying?
- Lack of focus – If you don’t know what you want, do you really want anything?
- Lack of direction – If you don’t know what to do, how can you be motivated to do it?
How to Boost Confidence
The first motivation killer is a lack of confidence. When this happens to me, it’s usually because I’m focusing entirely on what I want and neglecting what I already have. When you only think about what you want, your mind creates explanations for why you aren’t getting it. This creates negative thoughts. Past failures, bad breaks, and personal weaknesses dominate your mind. You become jealous of your competitors and start making excuses for why you can’t succeed. In this state, you tend to make a bad impression, assume the worst about others, and lose self confidence.
The way to get out of this thought pattern is to focus on gratitude. Set aside time to focus on everything positive in your life. Make a mental list of your strengths, past successes, and current advantages. We tend to take our strengths for granted and dwell on our failures. By making an effort to feel grateful, you’ll realize how competent and successful you already are. This will rejuvenate your confidence and get you motivated to build on your current success.
It might sound strange that repeating things you already know can improve your mindset, but it’s amazingly effective. The mind distorts reality to confirm what it wants to believe. The more negatively you think, the more examples your mind will discover to confirm that belief. When you truly believe that you deserve success, your mind will generate ways to achieve it. The best way to bring success to yourself is to genuinely desire to create value for the rest of the world.
Developing Tangible Focus
The second motivation killer is a lack of focus. How often do you focus on what you don’t want, rather than on a concrete goal? We normally think in terms of fear. I’m afraid of being poor. I’m afraid no one will respect me. I’m afraid of being alone. The problem with this type of thinking is that fear alone isn’t actionable. Instead of doing something about our fear, it feeds on itself and drains our motivation.
If you’re caught up in fear based thinking, the first step is focusing that energy on a well defined goal. By defining a goal, you automatically define a set of actions. If you have a fear of poverty, create a plan to increase your income. It could be going back to school, obtaining a higher paying job, or developing a profitable website. The key is moving from an intangible desire to concrete, measurable steps.
By focusing your mind on a positive goal instead of an ambiguous fear, you put your brain to work. It instantly begins devising a plan for success. Instead of worrying about the future you start to do something about it. This is the first step in motivating yourself to take action. When know what you want, you become motivated to take action.
Developing Direction
The final piece in the motivational puzzle is direction. If focus means having an ultimate goal, direction is having a day-to-day strategy to achieve it. A lack of direction kills motivation because without an obvious next action we succumb to procrastination. An example of this is a person who wants to have a popular blog, but who spends more time reading posts about blogging than actually writing articles.
The key to finding direction is identifying the activities that lead to success. For every goal, there are activities that pay off and those that don’t. Make a list of all your activities and arrange them based on results. Then make a make an action plan that focuses on the activities that lead to big returns. To continue the example from above, a blogger’s list would look something like this:
- Write content
- Research relevant topics
- Network with other bloggers
- Optimize design and ad placements
- Answer comments and email
- Read other blogs
Keeping track of your most important tasks will direct your energy towards success. Without a constant reminder, it’s easy to waste entire days on filler activities like reading RSS feeds, email, and random web surfing.
When my motivation starts to wane, I regain direction by creating a plan that contains two positive actions. The first one should be a small task you’ve been meaning to do, while the second should be a long-term goal. I immediately do the smaller task. This creates positive momentum. After that I take the first step towards achieving the long-term goal. Doing this periodically is great for getting out of a slump, creating positive reinforcement, and getting long-term plans moving.
It’s inevitable that you’ll encounter periods of low energy, bad luck, and even the occasional failure. If you don’t discipline your mind, these minor speed bumps can turn into mental monsters. By being on guard against the top 3 motivation killers you can preserve your motivation and propel yourself to success.
Subscribe to:
Posts (Atom)






