November 2015
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.

The Pirate Bay is the world's largest torrent tracker site which handles requests from millions of users everyday and is in the top 100 most visited websites on the Internet. Generally, The Pirate Bay is famous for potentially hosting illegal contents on its website.

Despite years of persecution, it continues to disobey copyright laws worldwide. Even both the founders of The Pirate Bay (TPB)file exchange service were arrested by the authorities and are in prison, but their notorious pirated content exchange continues to receive millions of unique visitors daily. That’s really Strange!! But how??

Recently, The Pirate Bay team has revealed how cloud technology made its service’s virtual servers truly secure to avoid police raids and detection.

While it doesn't own any physical servers,The Pirate Bay is working on “virtual machines” through a few commercial cloud hosting services, even without knowing that whom they are dealing with.

According to TorrentFreak report, at presentThe Pirate Bay has 21 virtual machines (VMs) that are hosted around the globe at different cloud provider.

The cloud technology eliminate the use of any crucial pieces of hardware, thus saved cost, guaranteed better uptime, and made the site more portable, and therefore made the torrent harder to take down.

The Pirate Bay operates using 182 GB of RAM and 94 GPU cores, with total storage capacity of 620 GB, which actually are not used in full.

Out of 21 VMs, eight of the VMs are used to serve web pages, six are dedicated to handling searches, while two VMs currently runs the site’s database and the remaining five virtual machines are used for load balancing, statistics, the proxy site on port 80, torrent storage and for the controller.

Interestingly, the commercial cloud hosting providers have no ideas that The Pirate Bayis using their services, because all traffic goes through the load balancer, which masks the activities of other virtual machines from the cloud providers. This clearly means that none of the IP-addresses of the cloud hosting providers are publicly linked to The Pirate Bay, so that should keep them safe.

While, in case of closure of some of these cloud servers by the police, it is always possible to move VMs to another location in a relatively short duration of time. Just like when back in 2006 in Sweden, police raided The Pirate Bay's hosting company, seizing everything from blank CDs to fax machines and servers, taking down the site. But, it took just three days to return in its normal state.

World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.


The controversial file-sharing website The Pirate Bay will still be running in Sweden as the District Court of Stockholm on Friday ruled that they be unable to force the internet service providers (ISPs) to block the website from operating.


The Pirate Bay is an infamous Swedish search engine predominantly used worldwide for pirating material, such as software, movies, music files and TV shows, entirely free of charge.


Numerous ISPs around Europe block the Pirate Bay, but the notorious site will not be inaccessible in its home country Sweden, at least for now, according to the local media.


Last year, a lawsuit was filed by Warner Music, Sony Music, Universal Music, Nordisk Film and the Swedish Film Industry in order to force Swedish ISP broadband companies to block the Pirate Bay, claiming them liable for the infringements of its customers.


Also Read: The Pirate Bay Runs on 21 "Raid-Proof" Virtual Machines To Avoids Detection


However, the Broadband companies refused to comply, stating that their only role is to provide their clients with access to the Internet while facilitating the free flow of information.


Sweden – We can't Ban The Pirate Bay


Now, a Stockholm District Court has handed down its decision in favor of ISPs, ruling that Sweden can not make them block the access to the Pirate Bay website, as those broadband companies are not responsible for what their customers do.


"A unanimous district court considers, therefore, that it is not in a position to authorize such a ban as the rights holders want, and, therefore, rejects their requests,"presiding Chief Magistrate Anders Dereborg said.



In other words, the ISP networks are not participating in any crimes, according to the court ruling, as they are just the delivery medium.


Also Read: The Pirate Bay relaunch is FBI's Honeypot? Pirate Bay Team Responds,'NO WAY'


While it is possible that the group representing the copyright holders could appeal a higher court, in the meantime, the group will still have to pay the ISPs legal costs thus far, which amounts to more than $150,000.


So, before the group appeals a higher authority, this is something it might want to reconsider.


A few month back, The Pirate Bay co-founders Gottfrid SvartholmFredrik Neij, Peter Sunde and Carl Lundström cleared all the charges alleging criminal copyright infringement and abuse of electronic communications in a Belgian court.

World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
In today's world, we would love to be unique in our different social spheres but time is a major constraint. What would be practical then is to be able to fuse your 4 passions: Blogger, Facebook, Twitter & your mobile into one! This is especially true for online businesses and customers who love getting a SMS when your blog is updated.

  1. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 1 Version 3.jpg
    1
    Sign in at twitterfeed.
  2. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 2 Version 3.jpg
    2
    Click 'Dashboard' → 'Create New Feed'.
  3. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 3 Version 3.jpg
    3
    Fill the name of your Blog in the area 'Feed Name'.
  4. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 4 Version 3.jpg
    4
    In the area labelled 'Blog URL or RSS Feed URL' type the link http:// blogname.blogspot.com/feeds/posts/default?alt=rss where 'blogname' should be replaced by the name of your blog (e.g. rikaz.blogspot.com would read as http: // rikaz.blogspot.com/feeds/posts/default?alt=rss).
  5. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 5 Version 3.jpg
    5
    Click the 'test rss feed' to see if it works and then click 'Continue to Step 2'(Hint: You could also go to 'Advanced Settings' and tweak the frequency of posting etc.)
  6. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 6 Version 3.jpg
    6
    Under 'Available Services' click 'Twitter'.
  7. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 7 Version 3.jpg
    7
    Click 'Authenticate Twitter'.
  8. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 8 Version 3.jpg
    8
    In the Twitter site enter your username and password and click 'Authorize app'.
  9. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 9 Version 3.jpg
    9
    Once back in the twitterfeed site click 'Create Service'.
  10. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 10 Version 3.jpg
    10
    Under 'Available Services' click 'Facebook'.
  11. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 11 Version 3.jpg
    11
    Click 'Connect with Facebook' (You should ideally be logged into Facebook before this step.)
  12. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 12 Version 3.jpg
    12
    Under 'Facebook Pages' select your page which you want to link with your blog.
  13. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 13 Version 3.jpg
    13
    To activate your mobile send the SMS follow<Twitter username> to 40404 (Twitter access codes could be different so check support.twitter.com/entries/14226-how-to-find-your-twitter-short-long-code) and wait for the confirmation!
  14. Integrate Your Blogger Post With Facebook, Twitter, and SMS with Twitterfeed Step 14 Version 3.jpg
    14
    You have now connected your blog with your Facebook & Twitter accounts and your fans can get updated via SMS!
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Someone asked me this recently. I don’t have just one answer. I compiled a list of things I thought of and emailed it to my friend…then I thought I would post it here for future reference. Feel free to add to the list! There is also a forums thread on the same topic, that I remembered as I complied my thoughts, so I stole some of the ideas posted there.
1. Upgrade to the newest version legally and without paying money
2. Have the latest version of the operating system run faster than the previous version on the same hardware
3. Easily install and run different graphical interfaces if I don’t like the default setup
4. Install twenty programs with one command
5. Have the system automatically update all my installed programs for me.

6. Install the same copy of my OS (Ubuntu) on multiple computers without worrying about license restrictions or activation keys
7. Give away copies of the operating system and other programs that run on it without breaking any laws, governmental or ethical or moral, because it was all intended to be used this way
8. Have full control over my computer hardware and know that there are no secret back doors in my software, put there by malicious software companies or governments
9. Run without using a virus scanner, adware/spyware protection, and not reboot my computer for months, even when I do keep up with all of the latest security updates

10. Run my computer without needing to defragment my hard drive, ever
11. Try out software, decide I don’t like it, uninstall it, and know that it didn’t leave little bits of stuff in a registry that can build up and slow down my machine
12. Make a major mistake that requires a complete reinstallation and be able to do it in less than an hour, because I put all of my data on a separate partition from the operating system and program files
13. Boot into a desktop with flash and effects as cool as Windows Vista on a three year old computer…in less than 40 seconds, including the time it takes me to type my username and password to login
14. Customize anything I want, legally, including my favorite programs. I can even track down the software developers to ask them questions, contribute ideas, and get involved in the actual design/software writing process if I want to
15. Have 4+ word processor windows open working on papers, listen to music, play with flashy desktop effects, have contact with a largely happy community and have firefox, instant messaging, and email clients all open at the same time, without ever having had to beg someone for a code to make my os work, and without the system running so slow it is useless

16. Use the command “dpkg –get-selections > pkg.list” to make a full, detailed list of all software I have installed, backup my /etc and /home directories on a separate partition, and you are able to recover your system any time, easily
17. Run multiple desktops simultaneously, or even allow multiple users to log in and use the computer simultaneously
18. Resize a hard disk partition without having to delete it and without losing the data on it
19. Use the same hardware for more than 5 years before it really needs to be replaced…I have some hardware that is nearly 10 years old, running Linux, and still useful
20. Browse the web while the OS is being installed!
21. Use almost any hardware and have a driver for it included with the operating system…eliminating the need to scour the internet to find the hardware manufacturer’s website to locate one
22. Get the source code for almost anything, including the OS kernel and most of my applications
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.



Cybercriminals take advantage of increased shoppers who lower their guard during the holidays.
Davor Pavelic/Ikon Images/Corbis
You downloaded the app because it advertised fantastic holiday deals. Who could resist?
You open it up and it looks like a copy of Amazon, but it doesn't work very well. Frustrated, you delete it. Problem solved, right?
Not so fast. The malicious app has already gotten its claws into your phone, collecting your personal information. Discovered by security researchers at zScaler, this is real. It's one of many attempts hackers and fraudsters will make to take advantage of your zeal for deals.
Cyber Monday, the annual online shopping spree after Thanksgiving weekend, might seem like a dream come true. Who wouldn't love all those deals? But there's someone else who might be even happier than you are about that discount e-reader or smartwatch. That would be criminals.
"For cybercriminals, Cyber Monday is like Christmas," said Tim Erlin, an executive at cybersecurity company Tripwire who focuses on fraud in commerce. As sales jump up during the holidays, so does fraud.
A whopping 40 percent of annual online fraud happens during the last three months of the year, according to Rurik Bradbury, a marketing executive at e-commerce security company Trustev.
Why so much? The holiday shopping season creates the perfect combination of ingredients for fraud. Take a heaping helping of shoppers online, which means a lot more credit cards and personal information available to steal. Add in a generous number of those those shoppers throwing caution to the wind by clicking on links that promise fabulous deals. Now sprinkle a dash of passwords that people reuse for their Facebook, bank and work accounts.
All hackers have to do is cook up an app or set up fake deal websites, and then attract you with an email promising great deals. Click the link and -- bam! -- you've downloaded malicious software. Your computer or phone is now compromised by hackers. You don't even have to hand your credit card number over to the criminal. Though if you do, it's even worse.
While hackers are getting better at tricking us, we're also using the Internet much more for shopping. Last year, Cyber Monday sales exceeded $2.5 billion in the United States, according to a report from financial analyst firm Forrester, which called the day of online deals, "the single largest online shopping day of the year." Forrester analysts expect this year's Cyber Monday to be just as strong. Total online holiday spending should go up, too, according to the National Retail Federation. E-commerce holiday sales could tally as high as $105 billion.
What's more, criminals might be more driven this year to take their fraud online. That's because it's getting harder to steal credit card information from in-store computers with the introduction of new chip technology in the US that's already popular overseas. Experts say that will squeeze more fraud into the e-commerce realm, rather than eliminating it altogether. It could increase as much as 106 percent, according Trustev research.
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Microsoft on Tuesday released an Xbox One-compatible version of its SmartGlass companion app, bringing remote control and other interactive features to the iOS platform ahead of the gaming console's release. 
Microsoft debuts Xbox One compatible 'SmartGlass' iOS app ahead of console launch
Add caption

Xbox One SmartGlass allows users to navigate the Xbox One menu system with touch gestures, while providing a mode of input for keyboard duties. 

Along with a media remote control, which in some cases can also control set-top cable boxes thanks to the Xbox One's built-in integration feature, the iOS app can be used to browse the Web on a TV. In addition, the app displays SmartGlass companions, a type of second-screen functionality for videos and gaming content. 

Away from the house, Xbox One SmartGlass lets users search for, browse and "pin" gaming content for future play. As with the Xbox 360 version of SmartGlass, the update iteration also grants access to Xbox Live for achievement tracking and messaging. 

Xbox One SmartGlass is available now as a free download from the iOS App Store, while the console itself will ship on Nov. 21
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.

Vtech's app store database has been compromised, exposing the personal information of nearly 5 million parents and more than 200,000 kids. This breach is considered as among the biggest hacks ever documented. (Photo : Oli Scarff | Getty Images)

Electronic toy maker VTech's Learning Lodge, the company's app store database, has been compromised. The security breach, which occurred earlier this month, has been deemed among the biggest hacks ever documented.
The incident exposed the private information of nearly 5 million parents and more than 200,000 children.
According to Motherboard, the hacked personal information of the Chinese company's customers include names, passwords, email addresses and home addresses of 4,833,678 parents as well as the first names, birthdays and genders of their children.
It is worth mentioning that the leaked information makes it possible to link the kids to their parents, as revealed by an expert who assessed the consumer data breach for Motherboard.
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Avoiding Credit Fraud Fraud is simply easy as long as you use cash. But, what if you even get hacked while withdrawing cash from an ATM? If you are living in Germany or traveling there, then think twice before using your payment cards in the ATMs. Here’s why: A Security researcher in Germany has managed to hack ATM and self-service terminal from Sparkasse Bank that allowed him to reveal the sensitive details from the payment card inserted into the machine. Benjamin Kunz-Mejri, CEO of Germany-based security firm Vulnerability Lab, discovered a vulnerability while using a Sparkasse terminal that suddenly ejected his card, and changed status to "temporarily not available." Meanwhile, the machine automatically started performing software update process in the background. However, Benjamin used a special keyboard combination to trick the ATM into another mode. Benjamin’s trick forced ATM system to put update process console (cmd) in the foreground of the warning message. "At that moment the researcher realized that there is a gap and used his iPhone to capture the bootChkN console output (Wincor Nixdorf) of the branch administrator," a blog post on Vulnerability-Lab stated.
After saving the data and reviewing the recording, Benjamin was able to reveal a lot of sensitive information, including the bank’s main branch office:

  •  Usernames
  • Serial numbers
  • Firewall settings
  • Network information
  • Camemputer name
  • Device IDs
  • ATM settings
  • Two system passwords
  • Other hardware related information


"Benjamin reported the critical issue to the Sparkasse Bank, which acknowledged the issue and has now started patching its ATMs and self-service terminals in a pilot program to prevent attacks." Sparkasse Bank said in a statement. 

The ATM (Automated Teller Machine) analyzed by Benjamin is manufactured by Wincor Nixdorf, one of the most famous company in the retail and banking industry. Therefore, the chances are high that other banks that are using the Wincor Nixdorf ATMs and self-service terminals are also affected, along with Sparkasse Bank. Benjamin reported the critical issue to the Sparkasse Bank, which acknowledged the issue and has now started patching its ATMs and self-service terminals to prevent attacks.
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.

Russian hacker have discovered a novel technique to rip off Millions of dollars from banks and ATMs.

 Criminals in Russia used a technique, called “Reverse ATM Attack,” and stole 252 Million Rubles (US$3.8 Million) from at least five different banks, according to the information obtained by Russian digital intelligence firm Group-IB.

 What is Reverse ATM Attack? 

 According to the intelligence firm, an attacker would deposit sums of 5,000, 10,000 and 30,000 Rubles into legitimate bank accounts using ATMs, and immediately withdraw the same amounts right away with a printed receipt of the payment transaction.

 The details included in the receipt, containing a payment reference number and the amount withdrawn, would then be transferred to a partner hacker, who had remote access to the infected POS terminals, usually located outside of Russia.

 Also Read: German Bank ATMs vulnerable to Hackers

 The partner hacker would then use these details to perform a reversal operation on a POS terminal that would lead them into believing that the withdrawals were declined, thereby tricking thousands of American and Czech point-of-sale (POS) terminals, Forbes explained.

  Meanwhile, it would appear to the bank as if the attempt to withdraw cash was cancelled, for example: when the customer has insufficient funds and then the same cash amount will be transferred to the attacker’s bank account using a global "money mule" network. Now, Hackers would repeat these steps as long as the targeted ATM did not end cash.

  Also Read: Beware of ATM Skimming Devices Installed on Vestibule Doors Beware of ATM Skimming Devices Installed on Vestibule Doors Group-IB said the firm had seen at least five such incidents at five different Russian banks, the criminal activity starting in summer 2014 and finishing in the first quarter of 2015.

  The hackers leveraged weaknesses in the withdrawal, transfer and verification stages of credit card transactions used in Russia and managed to bypass checks recommended by VISA and MasterCard.

 Also Read: How Hackers Can Hack Your Chip-and-PIN Credit Cards

 Here 'Checks' means:
  • When the reverse operation targets a single bank, transaction details provided by VISA is not verified by the affected banks
  • When ATM Withdrawals were made in one country and cancelled/reversed in another, certain verification points were again missed.
Group-IB is working with the federal authorities to investigate further into the whole money laundering scheme.
no image
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.

We (Cyber Security and Privacy Foundation) have developed a vulnerable Java based Web Applicatoin . This app is intended for the Java Programmers and other people who wish to learn about Web application vulnerabilities and write secure code.

The full course on Hacking and Securing Web Java Programs is available in

https://www.udemy.com/hacking-securing-java-web-programming/

Warning: Don’t run this app in Your Main Machine or in an online server. Install it in Vitual Machine.

How to setup Java Vulnerable Lab?

Method 1.Very Easiest Method : VirtualBox VM The Most easiest way to use Java Vulnerable is using the VirtualBox VM which has everything set up and ready to use.

Steps:

  1. Install the VirtualBox : https://www.virtualbox.org/wiki/Downloads
  2. Download the VM Image from here : http://sourceforge.net/projects/javavulnerablelab/files/v0.1/JavaVulnerableLab.ova/download
  3. Import the JavaVulnerable.ova into VirtualBox.
  4. Change the Network Settings to Host-Only Network
  5. Start the Machine and Log into the Machine( Credentials; username: root password: cspf)
  6. Start Tomcat by entering "service tomcat start" in the Terminal
  7. Start mysql by entering "service mysql start" in the Terminal
  8. Find the IP Address of Machine
  9. In your Browser, go to "http://[IP_ADDRESS_OF_VM]:8080/JavaVulnerableLab/install.jsp
  10. Click the Install Button
  11. Enjoy :)


Method 2.Easiest Method : Standalone Web Application In this mehtod, you will be running an executable “JAR” file which runs the application with an embedded Apache Tomcat.

Steps:

    1. Install JDK
    2. Download Executable Jar from here: http://sourceforge.net/projects/javavulnerablelab/files/v0.2/JavaVulnerableLab.jar/download
    3. Double Click the JavaVulnerable.jar to run( if double click is not working, run this command "java -jar JavaVulnerable.jar" in your Terminal or CMD)
    4. In your Browser, go to "http://localhost:8080/JavaVulnerableLab/install.jsp
    5. Click the Install Button


Method 3. Using War file: This is a NORMAL method to deploy the WAR file.

Steps:

   1. Install Apache Tomcat server
   2. Go to http://[Tomcat_INSTALLED_IP]:8080/manager/  (make sure you have modified tomcat-users.xml file of the tomcat to allow the manager).
   3. Download our WAR file from here: https://sourceforge.net/projects/javavulnerablelab/files/latest/JavaVulnerableLab.war/download
   4. Deploy the WAR in Apache Tomcat manager.
   5. Go to http://[Tomcat_INSTALLED_IP]:8080/JavaVulnerableLab/install.jsp
   6. Click the Install Button

You can contribute or get the source code of Java Vulnerable Lab from here:
https://github.com/breakthesec/JavaVulnerableLab
World Tech blog about Android, Education, PC, News, How to, Custom Roms, Apps, custom recovery, games, internet freebies and software.
Want to know which part of your site or blog will bring you more profit? Add AdSense inside posts and then check out the famous Google AdSense heat map. Recent studies, however, showed that placing AdSense after the first paragraph of a site or blog is one of the best AdSense placement. Unfortunately, the default Blogger platform offered by Google doesn't allow placement of ad after the first paragraph. But because it has become one of the most profitable areas, plenty of webmasters have tried to take advantage of the best AdSense placement. How can you enjoy the same level of profit?

To solve the problem, we will just move the locations of the ads to be displayed by adding JavaScript and DIVs. With the following script, you can easily choose the paragraph or heading after which you want to inject the ad to. This way, you won't have to manually change every post.
Insert Adsense Inside Posts: After the First Paragraph
Add caption


How to Display AdSense Ads after the First Paragraph in Blogger
1. Log into your Blogger account, select your blog and click "Template" on the left side. Open the Template editor using the "Edit HTML" button. Once the editor has opened, click anywhere inside the code area and press the CTRL + F keys (or Command + F) on your keyboard to open the editor' search box. Search the following line: 

<data:post.body/>

Note: You will find multiple occurrences of <data:post.body/>, stop at the second one or if you don't see any changes, test the last one.

2. Add the below DIVs in red before and after, like this:

<div id='adsense-target'><data:post.body/></div>

3. Copy the AdSense code that you want to show and use this tool to convert it into plain text. Just above the line that we just found, add the following HTML and replace the "ADSENSE CODE HERE" text with the converted ad code:

<b:if cond='data:blog.pageType == &quot;item&quot;'>
<div id='adsense-content' style="display:block;text-align: center">ADSENSE CODE HERE</div></b:if>

Screenshot:

Insert Adsense Inside Posts: After the First Paragraph
Add caption


Align AdSense Left or Right
By default, the Google AdSense ad unit will appear in the middle just after the first paragraph. If you are unhappy with the results and want to wrap text around the ad, you can choose one of the options below:

a) Align AdSense to the left: change 

<div id='adsense-content' style="display:block;text-align: center">

 with

<div id='adsense-content' style="display: inline-block;float: left;margin:15px 15px 15px 0px">

After modifying it, the ad will display
something mething like this:

Insert Adsense Inside Posts: After the First Paragraph
Add caption


b) Align AdSense ad to the right of the content: change <div id='adsense-content' style="display:block;text-align: center"> with

<div id='adsense-content' style="display:inline-block;float:right;margin:15px 0px 15px 15px">

4. Finally, right after <div id='adsense-target'><data:post.body/></div> (step 2), add this script:

<script type='text/javascript'>
function insertAfter(addition,target) {
var parent = target.parentNode;
if (parent.lastChild == target) {
parent.appendChild(addition); 
} else {
parent.insertBefore(addition,target.nextSibling);
}
}
var adscont = document.getElementById(&quot;adsense-content&quot;);
var target = document.getElementById(&quot;adsense-target&quot;);
var linebreak = target.getElementsByTagName(&quot;br&quot;);
if (linebreak.length &gt; 0){
insertAfter(adscont,linebreak[0]);
}
</script>

Note:
- To insert the ad after the second paragraph, change "0" from the line in red with "2".
- If you want to put AdSense just below the heading h2 or heading h3 of a post, replace br from &quot;br&quot; with h2 or h3. 

5. Click "Save template" to save the changes and you're done.

With this trick, you can insert AdSense after the first paragraph automatically in Blogger with ease. Now it's your turn to decide which format works best on your site.