Sponser Site

Wednesday 18 November 2015

Vijay interesting news

விஜய்யை பற்றி சின்ன வரலாறு :-
இளைய தளபதி விஜய்
22 வருடம் தமிழ் சினிமா வாழ்க்கை..
57 படங்கள் 40 வெற்றி 11 தோல்வி படங்கள்.. 6 சாதாரண படம் 15 படங்கள் 200 நாட்களுக்கு மெல் ஒடீயுள்ளது.. 12 படங்கள் 100 கோடிக்கும் மேல் வசுல் செய்தது.. அதில் 192 கோடி துப்பாக்கி படம் தான் முதலில் உள்ளது..
28 பாடல் பாடியுள்ளார் அனைத்தும் வெற்றி பெற்றது..
6 விஜய் டீவி விருதுகள்.. 1 டாக்டர் பட்டம்.. 2 அடுத்த சூப்பர் ஸ்டார் விருது.. 1 கலைமாமணி விருது.. பொதும் இன்னும் அதிக விருது வாங்கியுள்ளார்..
சிறந்த Dancer,Fighter,Singing,Sentiment, Love,Dialouge Delivery,Comedy, இதுமட்டுமில்லங்க இவர் செய்ற உதவிய மற்ற நடிகர்கள் மாதிரி சொல்லிகாட்டவெ மாட்டார்.. தலகணம் இல்லாத ஆளு.. இவருக்கு தமிழ்நாட்டீல் மட்டுமே 6.26 கோடி ரசிகர் பட்டாளமமே உள்ளது.. அதுமட்டுமின்றி கெரளாவில் நம்பர் 1 இவர்தான்.. தலைவன் ஒருவனே தளபதி மட்டுமமே...

இப்போது புரிகிறதா தளபதியின் POWER...
::::I
:::::::::L
::::::::::::::: A
::::::::::::::: ::::::Y
::::::::::::::: ::::::::::::A
::::::::::::::: ::::::::::::::: ::::T
::::::::::::::: ::::::::::::::: :  ::::::H
::::::::::::::: ::::::::::::::: :::::::A
::::::::::::::: ::::::::::::::: :L
::::::::::::::: ::::::::::::A
::::::::::::::: ::::::.P
::::::::::::::: :::A
::::::::::::::T
::::::::::H
::::I
::::::::::::::: ::V
::::::::::::::: ::::::::::::::I
::::::::::::::: ::::::::::::::: :::::::::::J
::::::::::::::: ::::::::::::::A
::::::::::::::: ::Y
::::::::::::::: :::::::::F
::::::::::::::: ::::::::::::::: ::A
::::::::::::::: ::::::::::::::: ::::::::::N
::::::::::::::: ::::::::::::::: ::Z
::::::::::::::: :::::::::Z

.....☺☺........ ..............☺ ☺
........☺☺..... ............☺☺
..........☺☺... ..........☺☺
.............☺☺ .......☺☺
............... ☺☺..☺☺
............... ....☺ ☺☺
............... .......☺☺
.
.
............... ....☺☺☺
............... ....☺☺☺
............... ....☺☺☺
............... ....☺☺☺
............... ....☺☺☺
............... ....☺☺☺
............... ....☺☺☺
............... ....☺☺☺
.
.
.....☺☺☺☺☺☺☺☺
.....☺☺☺☺☺☺☺☺
............... .....☺☺
............... .....☺☺
............... .....☺☺
...☺☺.......☺☺
...☺☺.......☺☺
...☺☺.☺ ☺☺
...☺☺.☺.☺☺
.
.
............... ☺☺☺☺
.............☺☺ ......☺☺
..........☺☺... ........☺☺
........☺☺☺.☺.☺ ☺☺
......☺☺....... ..............☺ ☺
...☺☺.......... ............... ..☺☺
☺☺............. ............... ....☺☺
.
.
☺☺............. ............... ..☺☺
....☺☺......... ..............☺ ☺
........☺☺..... ...........☺☺
...........☺☺.. ........☺☺
............... ☺☺..☺☺
............... ......☺☺
............... ......☺☺
............... ......☺☺
............... ......☺☺
............... ......☺☺

♥ Vijay Movies ♥

1992 - Naaliya theerpu {1}
1993 - Senthoora Paandi {2}
1994 - Rasigan {3}
1995 - Rajavin parvaiyile {4}
1995 - Deva {5}
1995 - Vishnu {6}
1995 - Chandralekha {7}
1996 - Coimbatore mapulai {8}
1996 - Poove unakaga {9}
1996 - Vasantha vasal {10}
1996 - Maanbumigu manavan {11}
1996 - Selva {12}
1997 - Kaalemellam kaathuiruppen {13}
1997 - Love today {14}
1997 - Once more {15}
1997 - Nerrukku Ner {16}
1997 - kadhalukku mariyadhai {17}
1997 - Ninaithen vandhai {18}
1998 - Priyamudan {19}
1998 - Nilaave Vaa {20}
1999 - Thulladha manamum thullum {21}
1999 - Endrendrum Kadhal {22}
1999 - Nenjinile {23}
1999 - Minsara kanna {24}
2000 - Kannukul nilavu {25}
2000 - Kushi {26}
2000 - Priyamaanavale {27}
2001 - Friends {28}
2001 - Badri {29}
2001 - Shajahan {30}
2002 - Thamizhan {31}
2002 - Youth {32}
2002 - Bhagavathi {33}
2003 - Vaseegara {34}
2003 - Puthuiya Geethai {35}
2003 - Thirumalai {36}
2004 - Udhaya {37}
2004 - Gilli {38}
2004 - Madhurai {39}
2005 - Thirupaachi {40}
2005 - Sachien {41}
2005 - Sukran {42}
2005 - Sivagasi {43}
2006 - Aadhi {44}
2007 - Pokkiri {45}
2007 - Azhagiya Tamil magan {46}
2008 - Kuruvi {47}
2009 - Villu {48}
2009 - Vettaikaaran {49}
2010 - Sura {50}
2011 - Kaavalan {51}
2011 - Velayudham {52}
2012 - Nanban {53}
2012 - Thuppakki {54}
2013 - Thalaiva {55}
2014 - Jilla {56}
2014 - kaththi{57}
2015- puli{58}
2016-coming soon
            "TRUE VIJAY FANS WILL FORWARD IT TO ALL THEIR  GROUPS " 👍I HAVE DONE
 IT👍

Friday 13 February 2015

Charles Proxy

Charles Proxy is a web proxy and monitoring tool developed to help you record and display all the sent and received packets on your computer. This is also a very good tool for website developers because the user can see what is sent and received between the browser and the server. This helps to easily find, diagnose and fix the issues. Features include:
- SSL Proxying – view SSL requests and responses in plain text
- Bandwidth Throttling to simulate slower Internet connections including latency
- AJAX debugging – view XML and JSON requests and responses as a tree or as text
- AMF – view the contents of Flash Remoting / Flex Remoting messages as a tree

Download and use it now: Charles Proxy 3.7

Hacking Option CCProxy


CCProxy can be called as Windows proxy server, because it fully supports Windows XP, Windows 7, Windows 8, Vista, Windows 2003, Windows 2008, Windows 2000, Windows 98, Windows NT and Windows ME. We have tested CCProxy on the following Windows operation system for Internet connection sharing.
  • Windows 98 SE: [Windows 98 Second Edition, Win98 SE, Win 98 SE, Window 98]
  • Windows ME: [Windows Millennium Edition, Windows Me, Win ME, WinME, Window ME]
  • Windows 2000 (Server, Advanced Server, Professional): [Win2K, Win2000, Window 2000]
  • Windows NT: [Window NT, WinNT, SP4]
  • Windows XP: [Window XP, WinXP, Win XP, SP1, SP2, SP3]
  • Windows 2003: [Window 2003, Win2003, Win 2003, Win2K3]
  • Windows Vista: [Window Vista, Win Vista, Vista, SP1]
  • Windows 7: [Window 7, Win 7, Win7]
  • Windows 2008:[Window 2008, Win2008, 2008]
  • Windows 8: [Window 8, Win 8, Win8]
Proxy Server for Windows
We recommend installing CCProxy on Win2003. CC Proxy Server works well under 300 users and 2000 connections on Windows 2003.


I. Brief Introduction on Proxy Server for WinXP, Proxy Server for Win7 etc
When we talk about proxy server for WinXP, proxy server for Win7 or proxy server for some other Windows editions, it mostly means a computer with WinXP/Win7/Vista/Win2003/Win2008 installed which is running as a proxy server. Nowadays, we make use of proxy server for various purpose like sharing Internet connections on a local area network, hide our IP address, implement Internet access control, access blocked websites and so on. Bellow are some benefits of proxy server:
  • To share Internet connection on a LAN. Some small businesses and families have multiple computers but with only one Internet connection, they can share Internet connection for other computers on the LAN with a proxy server.
  • To speed up Internet surfing. All requests from client computers will reach the proxy server at first, if the proxy server has cached the required resources in its local hard disk before with the web cache function, clients will get feedback directly from proxy server, it will be more quickly than direct accessing.
  • To hide the IP address of the client computer so that it can surf anonymous, this is mostly for security reasons. A proxy server can act as an intermediary between the user's computer and the Internet to prevent from attack and unexpected access.
  • To implement Internet access control like authentication for Internet connection, bandwidth control, online time control, Internet web filter and content filter etc.
  • To bypass security restrictions and filters. For example, many work offices have blocked facebook and myspace however, via a proxy server you will be able to access blocked websites easily.
  • To scan outbound content, e.g., for data leak protection.
  • To circumvent regional restrictions. For example, a server using IP-based geolocation to restrict its service to a certain country can be accessed using a proxy located in that country to access the service.


II-1. Build Proxy Server for WinXP
There are many proxy server software which can be used to build for WinXP, the most prominent superiority of CCProxy is that it's very smart and easy-to-use. Bellow are the steps to build a proxy server for WinXP with CCProxy.

  1. Choose a computer which is running WinXP and connected to both the LAN and the Internet.
  2. Download the latest version of CCProxy from it's download center.
  3. Launch "ccproxysetup.exe" and keep clicking the "Next" button to finish installation. You do not need to make any additional configuration, CCProxy will work as proxy server for WinXP automatically.

CCProxy Main Interface
Figure 1
To make proxy server for WinXP work well, you need to turn off the system firewall of WinXP or make an exception rule for CCProxy. Click Windows "Start" -> "Control Panel" -> "Security Center" -> "Windows Firwall" -> you can click "Off" check box to turn off Windows Firewall or keep it on as Figure 2.
Windows Firewall
Figure 2
If you keep the Windows Firewall on, you need to create exception rule for CCProxy: click the "Exceptions" tab -> "Add Program" -> select CCProxy -> "OK" to save (Figure 3).
Create Exception Rule
Figure 3


II-2. Build Proxy Server for Win7
CCProxy can also be used to build proxy server for Win7, in fact it's compatible with various Windows editions including Windows 7, Windows XP, Vista, Windows 2003, Windows 2008, Windows NT, Windows 2000, Windows Me, Windows 98. Both 32 bit and 64 bit Windows can be supported by CCProxy. Bellow are the steps to build a proxy server for Win7 with CCProxy.

  1. Choose a computer running Win7 and is connected to both the LAN and the Internet.
  2. Download the latest version of CCProxy from it's download center.
  3. Launch "ccproxysetup.exe" as Windows administrator and keep clicking the "Next" button to finish installation. You do not need to make any additional configuration, just run CCProxy as administrator, it will work as proxy server for Win7 automatically.

CCProxy Main Interface
Figure 4
To make proxy server for Win7 work well, you need to change the Windows Firewall default settings: click Windows "Start" -> "Control Panel" -> "System and Security" -> "Windows Firwall" -> "Turn Windows Firewall on or off" -> please turn off Windows Firewall for "Home or work (private) network" and turn on Windows Firewall for "Publick network" as Figure 5.
Turn Windows Firewall
Figure 5


III. Make Proxy Settings on the Client
After you have built proxy server for WinXP and proxy server for Win7, please make proxy settings on the client computers as bellow to surf via proxy.


Proxy settings in IE
Click "Tools" -> "Internet Options" -> "Connections" -> "LAN Settings" -> select "Use a proxy server for your LAN" -> "Advanced", configure as bellow.
Proxy Settings
Figure 6
Proxy settings in Firefox
Click "Tools" -> "Options" -> "Advanced" -> "Network" -> "Connections" -> "Settings" -> "Manual proxy configuration", configure as bellow.
Options
Figure 7
Figure 8 shows surfing via CC Proxy server after you have made proxy server settings in IE.
Settings in IE
Figure 8 
 
 
CC Proxy Server  Download

Burp Suite

Getting Started With Burp Suite

Burp Suite is an integrated platform for performing security testing of web applications. It is not a point-and-click tool, but is designed to be used by hands-on testers to support the testing process. With a little bit of effort, anyone can start using the core features of Burp to test the security of their applications. Some of Burp's more advanced features will take further learning and experience to master. All of this investment is hugely worth it - Burp's user-driven workflow is by the far the most effective way to perform web security testing, and will take you way beyond the capabilities of any conventional point-and-click scanner. Burp is intuitive and user-friendly, and the best way to start learning is by doing. These steps will get you started with running Burp and using its basic features. You can then read on deeper into the documentation to become more proficient in using this supremely powerful tool.
Note: Using Burp Suite may result in unexpected effects in some applications. Until you are fully familiar with its functionality and settings, you should only use Burp Suite against non-production systems.

Launching Burp

Burp Suite is a Java application and is distributed as a standalone Java executable file, with the .JAR extension. You can download Burp Suite Free Edition from the PortSwigger.net website. For Burp Suite Professional users, you can log in and download the latest Professional build using your account details. The Burp JAR file can be executed using a Java Runtime Environment, and there is no need to unpack the contents of the JAR file itself.
To launch Burp, first check whether Java is installed:
  • Open a command prompt:
    • On Windows, click the Start button, type "cmd" into the search box, and click on the "cmd.exe" item under "Programs".
    • On Mac OS X, in the system dock, click on Applications, then Utilities, then Terminal.app.
    • On Linux, look in your lists of applications for an item called "console" or "shell".
  • In the command prompt window, type: java -version
  • If Java is installed, you will see a message like: java version "1.6.0_21". To run Burp, you will need a version of Java that is 1.6 or later.
  • If Java is not installed, or if your version of Java is older than 1.6, you will need to install Java. Download the latest Java Runtime Environment (JRE), run the installer, and then open a new command prompt and start again.
With Java installed, on some platforms you may be able to run Burp directly by double-clicking the Burp JAR file. However, it is preferable to launch Burp from the command line, as this gives you more control over its execution, in particular the amount of memory that your computer assigns to Burp. To do this, in your command prompt type a command like:
java -jar -Xmx1024m /path/to/burp.jar
where 1024 is the amount of memory (in Mb) that you want to assign to Burp, and /path/to/burp.jar is the location of the Burp JAR file on your computer.
If everything is working, a splash screen should display for a few seconds, and then the main Burp Suite window should appear. If nothing happens, or if an error message appears, please refer to the troubleshooting help.

Display Settings

The first time you run Burp, it is worth taking a moment to check your display settings. Burp lets you select different sized fonts for different parts of the UI, and you may want to change these settings, depending on your screen resolution.
First, look at the text shown in Burp's menus, tab captions, buttons and other text. If you want to change the main UI font size, go to the Options tab, then go to the Display sub-tab, and edit the font size in the User Interface section. Then restart Burp and check whether the new font is suitable.
Second, go to the Repeater tab and look at the HTTP message shown in the request panel. If you want to change the font size for HTTP messages, go to the Options tab, then go to the Display sub-tab, and edit the font size in the HTTP Message Display section. Then go back to the Repeater tab and check whether the new font is suitable (there is no need to restart).

Configuring Your Browser

Burp is designed to be used alongside your browser. Burp functions as an HTTP proxy server, and all HTTP/S traffic from your browser passes through Burp. To do any kind of testing with Burp, you need to configure your browser to work with it.
Firstly, you need to confirm that Burp's Proxy listener is active and working. Go to the Proxy tab, then the Options sub-tab, and look in the Proxy Listeners section. You should see an entry in the table with the checkbox ticked in the Running column, and "127.0.0.1:8080" showing in the Interface column. If this is not the case, try pressing the "Restore defaults" button to the left of the panel. If the listener is still not running, then Burp was not able to open the default Proxy listener port (8080). You will need to select the table entry, click "Edit", and change the port number of the listener to a different number. See the Proxy listeners help for more details.
Secondly, you need to configure your browser to use the Burp Proxy listener as its HTTP proxy server. To do this, you need to change your browser's proxy settings to use the proxy host address (by default, 127.0.0.1) and port (by default, 8080) for both HTTP and HTTPS protocols, with no exceptions. The details of how to do this vary by browser and version, but are roughly as follows:
  • Internet Explorer - Go to the Tools menu, select Internet Options, go to the Connections tab, and click on the "LAN settings" button. Make sure the "Automatically detect settings" box is unchecked. Make sure the "Use automatic configuration script" box is unchecked. Make sure the "Use a proxy server for your LAN" box is checked. Enter your Burp Proxy listener address in the "Address" field (by default, 127.0.0.1). Enter your Burp Proxy listener port in the "Port" field (by default, 8080). Make sure the "Bypass proxy server for local addresses" box is unchecked. Then click on the "Advanced" button. Make sure the "Use the same proxy server for all protocols" box is checked. Delete anything that appears in the "Exceptions" field. Then click "OK" to close all of the options dialogs.
  • Chrome - The Chrome browser picks up the HTTP proxy settings configured on the host computer. If you are using Chrome, you can open your computer's built-in browser and follow the instructions for configuring that. If you aren't sure where the built-in proxy settings are, open Chrome, go to the Customize menu, select Settings, click on "Show advanced settings", and click the "Change proxy settings ..." button. This will open the relevant configuration options for your host computer.
  • Firefox - Note: If you are using Firefox and you have the Plug-n-hack plugin installed in Firefox, you can configure your browser to work with Burp automatically. Using your browser, visit the URL of your Proxy listener (as identified above - for example: http://127.0.0.1:8080) and following the "Plug-n-hack" link.
    If you do not have the Plug-n-hack plugin installed in Firefox, go to the Firefox menu, click on Options, click on Advanced, go to the Network tab, and click on the Settings button in the Connection section. Select the "Manual proxy configuration" radio button. Enter your Burp Proxy listener address in the "HTTP proxy" field (by default, 127.0.0.1). Enter your Burp Proxy listener port in the "Port" field (by default, 8080). Make sure the "Use this proxy server for all protocols" box is checked. Delete anything that appears in the "No proxy for" field. Then click "OK" to close all of the options dialogs.
  • Safari - Go the Safari menu, click on Preferences, click on Advanced, and by the Proxies label click the "Change Settings" button. This will open the Network configuration settings for your current network adapter. In the Proxies tab, check the "Web Proxy (HTTP)" box, and enter your Burp Proxy listener address in the "Web Proxy Server" field (by default, 127.0.0.1), and your Burp Proxy listener port in the (unlabeled) port field (by default, 8080). Ensure the "Bypass proxy settings for these Hosts & Domains" box is empty. Repeat these steps for the "Secure Web Proxy (HTTPS)" checkbox. Click "OK" and "Apply" and close the open dialogs.
When you've configured your browser, you need to test that it is working properly. With Burp running, in your browser go to any HTTP URL (don't use HTTPS for the moment). Your browser should sit waiting for the request to complete. In Burp, go to the Proxy tab, and then the Intercept sub-tab. These tabs should be highlighted, and there should be an HTTP request showing in the main panel. Click on the "Intercept is on" button so that it says "Intercept is off". Go back to your browser, and you should (shortly) see the URL you requested being loaded in the normal way. If things aren't working in the way described, please refer to the troubleshooting help.
Finally, you need to configure your browser to be able to send HTTPS requests through Burp without any problems. This step isn't strictly necessary to use Burp in a basic way or only for non-HTTPS URLs, but it only needs to be done once and is necessary to get the most out of Burp when testing applications that use HTTPS. The reason for this requirement is that Burp breaks SSL connections between your browser and destination web servers, in order to view and modify the plain contents of HTTPS messages. SSL is designed to prevent this happening, and so by default your browser will show a security warning when you visit an HTTPS URL using Burp. To ensure that applications using HTTPS function properly, you need to install Burp's Certificate Authority (CA) SSL certificate in your browser trust store. For detailed help on doing this, please refer to the help on installing Burp's CA certificate. When you have done this, you can confirm things are working properly by closing all your browser windows, opening a new browser and visiting any HTTPS URL. The browser should not display any security warnings, and the page should load in the normal way (you will need to turn off interception again in the Proxy Intercept tab if you have re-enabled this).

The Basics of Using Burp

Once you have Burp running, and have configured your browser to work with Burp, go to the Proxy Intercept tab, and ensure that interception is turned on (if the button says "Intercept is off" then click it to toggle the interception status). Then go to your browser and visit any URL.
Each HTTP request made by your browser is displayed in the Intercept tab. You can view each message, and edit it if required. You then click the "Forward" button to send the request on to the destination web server. If at any time there are intercepted messages pending, you will need to forward all of these in order for your browser to complete loading the pages it is waiting for. You can toggle the "Intercept is on / off" button in order to browse normally without any interception, if you require. For more help, see Getting started with Burp Proxy.
As you browse an application via Burp, the Proxy history keeps a record of all requests and responses. In the Proxy, go to the History tab and review the series of requests you have made. Select an item in the table and view the full messages in the Request and Response tabs.
Also, as you browse, Burp builds up a site map of the target application. Go to the Target tab, and the Site Map sub-tab, to view this. The site map contains all of the URLs you have visited in your browser, and also all of the content that Burp has inferred from responses to your requests (e.g. by parsing links from HTML responses). Items that have been requested are shown in black, and other items are shown in gray. You can expand branches in the tree, select individual items, and view the full requests and responses (where available). For more help, see Using the Target tool.
Burp Suite is designed to be a hands-on tool, where the user controls the actions that are performed. At the core of Burp's user-driven workflow is the ability to pass HTTP requests between the Burp tools, to carry out particular tasks. You can send messages from the Proxy intercept tab, the Proxy history, the site map, and indeed anywhere else in Burp that you see HTTP messages. To do this, select one or more messages, and use the context menu to send the request to another tool.
The Burp tools you will use for particular tasks are as follows:
  • Spider - This can be used for automatically crawling an application, to discover its content and functionality.
  • Scanner - This is used to automatically scan HTTP requests to find security vulnerabilities.
  • Intruder - This allows you to perform customized automated attacks, to carry out all kinds of testing tasks.
  • Repeater - This is used to manually modify and reissue individual HTTP requests over and over.
  • Sequencer - This is used to analyze the quality of randomness in an application's session tokens.
  • Decoder - This lets you transform bits of application data using common encoding and decoding schemes.
  • Comparer - This is used to perform a visual comparison of bits of application data to find interesting differences.
You can combine Burp's different tools in numerous ways, to perform testing tasks ranging from very simple to highly advanced and specialized. For more detailed help on Burp's user-driven workflow, see Using Burp Suite.
If you don't want to use Burp as a hands-on testing tool, and only want to perform a quick and easy vulnerability scan of your application, please refer to Using Burp as a Point-and-Click Scanner.

Love Quotes

We Were Lonely My Valentine.

along a pavement of loneliness
you towards me
and I towards you
unknown celestial bodies eclipse at night

we pass and our gravity of loneliness
brings us together
so close to touch
but not close enough

your presence draws my heart
and I feel you can’t pull away
from gravity we stargaze
our loneliness orbits
and companionship to fill the black void

we touch and our solitude
evaporates into the stratosphere
and the night is secluded
I take you as a lover
and you take me as yours
we enter the expanding universe at its core

the night to linger in our arms
we feel humanity
as humans share
we need each other
as strangers share
we feel included and wanted
for one night only we are true lovers

one last kiss my valentine
celestial bodies continue on their extraterrestrial journeys
as I walk in the breaking dawn
along the pavement of loneliness
I know loneliness can be confined

Upcoming Bollywood Movies 2015 Calendar & Release Dates


Movie Name

Release Dates

Roy13 Feb 2015
MSG The Messenger13 Feb 2015
Badlapur20 Feb 2015
Dum Laga Ke Haisha27 Feb 2015
NH106 Mar 2015
Dirty Politics6 Mar 2015
Detective Byomkesh Bakshi 3 Apr 2015
Ek Paheli Leela 10 Apr 2015
Main Gabbar  1 May 2015
Mastizaade  1 May 2015
Bombay Velvet 15 May 2015
Welcome Back 29 May 2015
Dil Dhadakne Do 5 June 2015
Hero 3 Jul 2015
Bajrangi Bhaijaan 16 Jul 2015
Brothers 14 Aug  2015
Fan 2015
Phantom 28 Aug 2015
Shaandar Sep 4 2015
Singh is BlingOct 2015
Prem Ratan Dhan Pao 1 Nov 2015
Jagga Jasoos 27 Nov 2015
Rohit Shetty-SRKDec 2015
Hera Pheri 3 18 Dec 2015
BajiRao Mastani 25 Dec 2015

Tsu Secrets

TSU Signup



There is a new social network on the block. Tsu promises to split its advertising dollars it makes off of sharing your content with, well you.But is Tsu a Scam?
Tsu plays into the human desire to ‘get rich quick’. No effort required on your part beyond inviting your friends and family.Then just keep posting stuff like you already do! This kind of model has been on the internet forever. Once upon a time, long since gone companies, paid you just to surf websites, use toolbars, fill out surveys, read email, heck even use a search engine. The result is always the same and it will be here.. Company folds after they get the money to pay their investors/they get enough money… from “your friends and family”.
I’ve seen complicated formulas and math talking about the possibilities of your massive profits on Tsu. Whatever numbers and magic hoopla you’d like to put, In my opinion Tsu is a scam. Spend your time on your OWN website creating your OWN content and spam your network with that..
You’ll be better off.

Why should you listen to me? I own a social network. Yup. Girlfriend Social is the largest women only friendship social network in the world. I use advertising on the site but also offer members the option to pay for upgrades so they don’t have to see or be a part of advertising. I know exactly how much money it costs to keep servers going, continue to pay for advertising, keep security going and a million other things that running a major website does.I also own several blogs and other websites that use affiliate marketing and advertising models. I’ve been doing this part of the internet for many many years.
If you seriously want to make money on the internet in some way, you can. Make a blog or website. Publish ads or charge a membership. Profit… This will take awhile and a fair amount of effort but you can “make money”. Probably even enough to go out to dinner a few times a month.
1) The Advertising Model….
I can’t quite get a legit answer from the website about their advertising model. One site says that it shares the total revenue the website makes each day with every user. One site implies you will get part of your advertising that your content/ users you invite content specifically makes. Whatever the faulty model is, the second the social media gurus and black hat scammy people get to the network 2 things will happen.
1) The site will be made into a spammy spam game. “Share the post and get all your friends to share it so we all make .00001 cents!” will be the norm. Users are currently reporting massive reshares, like and follow schemes and SHARE ALL THESE POSTS in buckets already.
2) If there are 100 members and they split 100$ of total revenue for the day, everyone gets 1$. When there are 100 million members there likely wont be 100 million dollars in revenue. You will be getting less than $1. Each user, each person invites will “weaken” the worth of the network causing eventually people to make fractions of a penny. FRACTIONS OF A PENNY on actions. Do you stop for a penny on the ground? 5 cents? Do you see this going any other way?
2) Is TSU a Ponzi Scheme/ Pyramid Scam / MLM Marketing Fraud?
I’ve seen people call Tsu a Ponzi scheme, Tsu a Pyramid scam, and Tsu a MLM marketing Fraud…
Ponzi schemes typically make new investors pay money. They pay that new money to “old investors”. So since Tsu is not asking for money, is not a Ponzi scheme. Although Ponzi has typically become a commonly used word for a scam of some type. Pyramid or MLM Scam is better towards what Tsu is than Ponzi scheme as shown with the FTC warning about such things… http://business.ftc.gov/…/inv08-bottom-line-about-multi-lev…
” If the money you make is based on your sales to the public, it may be a legitimate multilevel marketing plan. If the money you make is based on the number of people you recruit and your sales to them, it’s not. It’s a pyramid scheme. Pyramid schemes are illegal, and the vast majority of participants lose money.”
Your “sales” here are advertising dollars on your content and how much money you get paid seems to be directly related to how many people you help recruit in. To me that falls into the FTC guidline listed above, but since there isn’t a clear document about their payment plan its hard to say 100% for sure. Either way, play it safe and don’t play into it.
3) The Payout … When You Get Your Hard Earned Money….
According to the monetization terms on their website…. “As such, you will receive periodic deposits in your Tsū bank account, which are directly related to your usage of the Service.” The money goes into the Tsu bank, not yours.
You’d be lucky to make 5$ from their non published model. It will require a $100 pay(according to their FAQ) something you or the majority of people will never actually earn because you are making fractions of a cent each day. Or say 1 cent a day… ( a number I’ve seen a few people saying they have earned) It will take 10,000 days Or roughly 28 Years to earn $100. And that is if the payout doesnt really go down (which is should based on the other things I mentioned). This is a common tactic to hold funds till you reach a thresehold.. This will leave a nice pool of “ad dollars” sitting around for the company to pay off VC with because people can’t get to the magically upper end for payout. You MIGHT be able to make it by of course spamming the entire internet and everyone you know for the next 6 months. Work hard for that 50$ payout folks.
4)They will Run a Social Network on 10% of Revenue…
… Really… icon smile Is Tsu a Scam? 6 Things to Consider Servers, Bandwidth, Security, Staff members, Support teams….. on 1websites Is Tsu a Scam? 6 Things to Consider0% of revenue. This means if somehow it IS possible all of these will be lacking. No support, Hackers paradise since there is no security teams on it, and slow slow servers. As one person (Greg Crichton) on my google plus post about it pointed out, It doesn’t even have https/SSL Website security installed. That’s like doing banking on a non secure network!
Some of you seem to think your content can do better on its own. Launch a blog and do it. You’ll quickly see how expensive it is to “run a website” and “host/publish photos” and most importantly… “get advertising traffic”. icon smile Is Tsu a Scam? 6 Things to Consider What Tsu is telling you it can do on 10% of ads? Plus it owe a fair amount of money to the venture capital money it already took? Good luck on that model folks.
5) We Need to Take Back Our Content….
I’m also not exactly sure about these “I make content so i need to stop these companies from profiting from the content” type comments. I own 100% of my own websites and I do in fact make a living from that. If you want to use someone elses websites, you are uh… using them and can pay upfront to use them or you can pay by have ads served to you. This is the internet. You exchange your ‘content and information’ for ads.
I COULD place videos completely on my own blog instead of on YouTube, but how many people would see it? How much will it cost to have those videos streamed on my server time after time? You are also paying for the promotion your video receives as being a part of the 2nd largest search engine in the world.
6) But what does it hurt? How can you judge a Network that isn’t very old yet?
I think people don’t value their network as much as they should. Your social network is a precious thing you have worked hard to build through real life or online friendships. You develop trust and experience as an expert about things. Every single person has from the Social media gurus to the person who just updates their facebook page with photos of their kids. Their social network views them in some way. Social expert or Mom with kid photos. Do you want that opinion to include the person who invited them to an affiliate scheme that will likely mislead and rip people off.
There is currently NO delete button to remove your TSU account permanently. BIG RED FLAG. If i “own my content” and a bunch of other hoopla on the typo filled FAQ, why can’t i takeout my content at any time? This is common tactic with new websites because “user count” is more important than anything. They make it difficult/impossible for you to remove your account so they can report to their investors that “Numbers are Up!”. Its been mentioned you can email support and they will eventually remove it, this has not been proven, timeline, etc as of yet. There is no automated way to do it but they are “working on this basic core feature of any website”. If they really believed all the fluff they say in their FAQ about what’s yours is yours, the lack of delete is a big flag saying that wont hold true.
microsofttest Is Tsu a Scam? 6 Things to ConsiderBut lets forget all that for a minute…
People will do what they will, but spamming your precious network with invites to an unproven, heavily weighted against it Monetization Model is certainly not on MY to do list.
If nothing else wait a few months till a bunch of people get the “magical Bill Gates sending you 100$ for each person you forward it to” paychecks… If this magic network works against all the logical odds.. you have lots of friends and family members to pull into it for eternity. No rush required. Or are you people that desperate for money that you will play into this pipe dream with ZERO proof of it working?

HOW TO DELETE YOUR TSU ACCOUNT…
If you have already signed up… According to the terms of service You can fill out some kind of form to get your account removed/deleted at some point… But unfortunately your stuff will still be available for others who shared it – icon smile Is Tsu a Scam? 6 Things to Consider
“You can deactivate your Tsū account by logging into the Service and completing the form available here. If we terminate your access to the Service or you use the form detailed above to deactivate your account, your photos, comments, likes, friendships, followers, digital or real assets held by Evacuation Complete and all other data will no longer be accessible through your account (e.g., users will not be able to navigate to your username and view your photos), but those materials and data may persist and appear within the Service (e.g. if your Content has been reshared by others).”
If you signed up already I recommend removing as much as possible, attempting to find their delete form and stop sharing or putting anything you value into it… for the possibility of pennies.



UPDATE: BUT IT’S JUST FOR FUN…. I’ve had a few people mention they are “just using the network because its clean and fun and new”. If this is true, I believe you have the option to turn monetization off (thats been mentioned but I actually can not find any information about this in the FAQ, Terms Etc in any way. Can you find where to turn it off someone?) Till someone shows me how this is done, its required to be on the site. But the reality is fine folks, if you are spamming/begging invites to everyone you know… You do not fall into the “its fun” camp. You are kidding yourself and you are hoping to cash out on this….”Even if its a few bucks, thats more than facebook ever gave me!” type of idea…..There are many other social networks out there, that do not play around with these things, for you to “have fun on”. It’s nothing to me, but I hate seeing people get ripped off or mislead by unethical companies. I mostly made this post to link to people that asked me about it and “why are you not there”. Do what you will, but realize currently “taking a chance to check it out” can have repercussions that I’ve listed above because you can not delete your account at this time.
What about Legal Issues?
A final little update here. Google and YouTube have spent a ton of money to detect when you are using someone elses copywritten material. You are not allowed to monetize your YouTube Videos that include it. Violators are banned. This technology is funded by part of that “revenue” that these companies are making that Tsu is only going to be getting 10% of. They will have no such technology. More legal stuff brought up by another Google plus folk, Debashish Samaddar, who mentions the possible legal issues that are sure to happen.
“Tsu claims that if, and when, the original content creator issues a DMCA take down notice then Tsu will take the content down. But that takes time and within that time Tsu will have already made money. And distributed it.
1. Are they going to take the money back from whoever it was paid to?
2. Sometimes the content creator may not even know that their content is used, so a DMCA notice may never be issued and Tsu will continue to make money and distribute it. Potently unethical and illegal position.
3. For content that is distributed under CC-NC (Creative Commons, Non Commercial) sharing the content is not necessarily a commercial act so it preserves the CC license terms, but it circumvents the license by indirectly making money using that content. Grey area, but potentially illegal.”
Very Very valid points. And what about these lawsuits downstreams? LIke your friend you invited reshared illegal content… are they going to take back your penny too?