tutorial about web security computer networking

tutorial about web security computer networking

TwitterFacebookGoogle PlusLinkedInRSS FeedEmail
  • Home
  • Business
    • Internet
    • Market
    • Stock
  • Downloads
    • Dvd
    • Games
    • Software
      • Office
  • Parent Category
    • Child Category 1
      • Sub Child Category 1
      • Sub Child Category 2
      • Sub Child Category 3
    • Child Category 2
    • Child Category 3
    • Child Category 4
  • Featured
  • Health
    • Childcare
    • Doctors
  • Uncategorized

Senin, 21 Januari 2013

003.download torrent using internet download manager (IDM)

13.41    No comments


Kirimkan Ini lewat EmailBlogThis!Bagikan ke XBerbagi ke FacebookBagikan ke Pinterest
Posting Lebih Baru Posting Lama Beranda
Lihat versi seluler

0 komentar:

Posting Komentar

Langganan: Posting Komentar (Atom)
  • Popular
  • Tags
  • Blog Archives
  • Vodafone 3G Trick - July 2013
    Hello visitors it's almost one week that I haven't posted any trick. So today I'm back with new vodafone 3g trick working almost...
  • Turbobit Premium Link Generator - Working
    Hello readers here is latest Turbobit premium link generator. Which works very smoothly. It is tested by us and we found it is working perfe...
  • Using Oinkmaster to Update Snort Rules
    I've never explained how I like to keep Snort rules updated on my sensors. The tool of choice for automatic rule updates is Andreas Ost...
  • Thoughts on New Lab
    I'm building a new test lab. To start, I needed a lot of Cat 5 cables of specific lengths and colors. Cat5Net.com 's handy order f...
  • Get-Winevent Part IV: Querying the Event Log for 'Filtering Platform Connection' Information (Part A)
    The command: ' auditpol /set /subcategory:"Filtering Platform Connection" /success:enable /failure:enable ' enables the ...
  • Cisco 802.1x Voice VLAN Authentication Bypass Vulnerability
    Ok, last night i blogged about VoIP enumeration techniques and well it made me want to find exploits for Cisco products. I was reading at ja...
  • How to make an effective pro and con list (using a spreadsheet)
    Pro and Con lists are useful any time we need to make a decision, especially when there is no clear choice what the better decision is....
  • 3Com Buys TippingPoint
    The Register is reporting that 3Com is buying TippingPoint for $430 million. TippingPoint employs 125 people and makes the UnityOne lay...
  • Laaptu Auto Guessing Script
    Hello Readers, today we are back with new trick on Laaptu. Using this trick you easily earn free recharge from laaptu. Many of you might kno...
  • Airtel High Speed TCP VPN Config - 14 July 2013
    Dear visitors today I'm back with new high speed TCP config which is working in many States. This TCP config is consists of high speed p...

Label

  • 'Get-WinEvent' ETL Providers Event Logs (2)
  • 'Get-WinEvent' Logons (1)
  • "One Page Checklist for Securing and Cleaning a Malware Infected Windows PC" (1)
  • "Security by Isolation" (1)
  • "The Cloud" (1)
  • "universal privelege" (1)
  • *NIX find (1)
  • 2013 (1)
  • 2014 (1)
  • 3g tricks (59)
  • 500D (1)
  • accesschk (1)
  • Adf.ly Hacks (1)
  • Adobe (1)
  • Adsense (2)
  • Advanced Persistent Threat; (1)
  • afcert (31)
  • after you format your computer sometimes you find that sound does not work videos ... games to solve that you need this program to make a backup for your drivers (2)
  • Air Force (18)
  • Aircel tricks (4)
  • Airtel tricks (36)
  • aix (1)
  • alternative to tap; tcpdump; syslog;FVS318 (1)
  • Amazon (1)
  • analysis (1)
  • Android (4)
  • Anniversary (1)
  • announcement (2)
  • App (1)
  • appsec (4)
  • apt (56)
  • APT;Snort;Data Protection (1)
  • Argus (1)
  • Astrill (3)
  • attribution (4)
  • Audacity (1)
  • Automatic (1)
  • Automobile hacking... (1)
  • avast (1)
  • Background (2)
  • Backup (3)
  • Bacon (1)
  • banana bread (3)
  • bananas (2)
  • Bands (1)
  • Bank Fraud;Money Mules;Small Business (1)
  • Bank of America (1)
  • Banner (1)
  • Bash 4.0;awk;geoiplookup;pcregrep; (1)
  • Basketball (3)
  • batch (1)
  • Beginner (1)
  • Best (1)
  • Best Way To Get Back a Stolen/lost Computer/phone (1)
  • bestbook (7)
  • bike (1)
  • Bing (1)
  • BINGO (1)
  • Bittorrent (1)
  • Black and white (1)
  • blackhat (30)
  • blender (3)
  • Blog (7)
  • Blogger (8)
  • blogging (1)
  • Blur (1)
  • books (5)
  • Bot Hunter;SRI; APT; (1)
  • Bowling (1)
  • bread (3)
  • breakers (4)
  • bro (6)
  • Browser (2)
  • bruins (1)
  • Brush (1)
  • Brushes (1)
  • BSNL Tricks (3)
  • bulk (1)
  • business (24)
  • Business Card (1)
  • button (1)
  • BYU (2)
  • cake (1)
  • Camer (1)
  • Camera (1)
  • Candle (1)
  • Canon (2)
  • Capitol One (1)
  • Car (1)
  • Card (2)
  • Card Making (1)
  • Cards (1)
  • ccna (6)
  • celebrity (1)
  • Cell Phone (3)
  • Cell Tracking (1)
  • Censorship (1)
  • certification (26)
  • Change (1)
  • Chase bank (1)
  • Cheap (5)
  • Check-TCPUDPClient.ps1 (1)
  • cheesecake (2)
  • china (87)
  • Chinese (1)
  • Christmas (3)
  • Chrome (3)
  • Chrome OS (2)
  • cisco (30)
  • cissp (7)
  • Classifieds (1)
  • Clipart (2)
  • Clker (1)
  • Clone (2)
  • cloud (4)
  • clowns (12)
  • Coke (1)
  • Cola (1)
  • Color (1)
  • Color Code (1)
  • Color Enhancement (2)
  • Color Palette (1)
  • Colorize (1)
  • Combining logparser.exe with cmd.exe (1)
  • commodore (6)
  • Comparison (1)
  • Computer (1)
  • computers (1)
  • conferences (34)
  • Conficker C; Syslogd; Firewall Blocking (1)
  • controls (5)
  • cooking (2)
  • correlation (5)
  • counterintelligence (18)
  • CR-48 (2)
  • Craft (1)
  • create (1)
  • crime (13)
  • Crystal Light (1)
  • CV (1)
  • Cyber Security Review;"The Shadow Government";"McMafia" (1)
  • cybercommand (3)
  • cyberwar (21)
  • dan geer (1)
  • Dapper (1)
  • Darkroom (1)
  • Darktable (4)
  • data breaches; ITRC;2010 (1)
  • databases (1)
  • Delete (1)
  • Depth of Field (1)
  • Design (3)
  • detection (16)
  • dfm (1)
  • Diffuser (1)
  • DigiKam (3)
  • disasters (10)
  • Disc Golf (1)
  • Discover (1)
  • Disruptive Mnemonic (1)
  • DIY (16)
  • dns (1)
  • Docomo tricks (2)
  • Documents (1)
  • dod (7)
  • DOF (1)
  • Drawing (3)
  • drink (2)
  • DSLR (3)
  • dumbbells (1)
  • Dynamic (1)
  • Earthquake (1)
  • EarthVPN (2)
  • easy (2)
  • Eddie Kohler; ipsumdump (2)
  • Editing (3)
  • education (9)
  • Effort (1)
  • Email (2)
  • engineering (11)
  • English Learning (1)
  • Enhancement (1)
  • Excel (1)
  • exercise (1)
  • Exercise Equipment (1)
  • exploits (15)
  • Explorer (1)
  • Exposing Shell Paths with Powershell (1)
  • F-Spot (1)
  • Face (2)
  • Facebook (9)
  • Facebook Killer (1)
  • Faces (1)
  • Favicon (1)
  • favorites (261)
  • feds (17)
  • Feed Reader (1)
  • Feeds (2)
  • File (2)
  • File Host (1)
  • FileVersionInfo (2)
  • finance (2)
  • Firefox (1)
  • Firewall (3)
  • fisma (21)
  • Fix (2)
  • Flag (1)
  • Flash (3)
  • Flier (3)
  • Flower (2)
  • Flyer (2)
  • Font (2)
  • Fonts (1)
  • food (10)
  • forensics (6)
  • fraud (2)
  • free (4)
  • Free recharge (3)
  • Freebies (11)
  • freebsd (433)
  • FreeFileSync (1)
  • Freegate (1)
  • Friends (1)
  • Frisbee (1)
  • frosting (1)
  • Frugal (1)
  • Fruit (1)
  • Fun (3)
  • Fun Disc (1)
  • Game (1)
  • gawk;SrcIP;DstIP;sort;uniq;Cygwin (1)
  • gci (1)
  • GE (11)
  • ge-cirt (2)
  • Geeky News (1)
  • GeoIP (1)
  • geoiplookup;tcpdump;firewall logs (1)
  • get (1)
  • get-acl (1)
  • Get-WinEvent Logon (3)
  • Get-WinEvent Logon Windows Filtering Platform (1)
  • get-wmiobject win32_networkadapter;XP and Vista network interfaces (1)
  • GetOwnerModuleFromTcpEntry Powershell iphlpapi.dll (1)
  • Getting Things Done (1)
  • gfwvpn (2)
  • Gimp (24)
  • Giveaways (1)
  • Glue (1)
  • Gmail (3)
  • gnuplot (1)
  • goal setting (1)
  • goals (1)
  • Gold's Gym (1)
  • Golf (1)
  • Google (13)
  • Google Docs (4)
  • Google Shopping (1)
  • Google Voice (1)
  • Google+ (1)
  • Graphic Design (5)
  • Great Firewall of China (4)
  • Grunge (3)
  • GTD (1)
  • Hack (1)
  • hacking tool (3)
  • hakin9 (11)
  • Hallmark (1)
  • hardware (19)
  • Hartman Personality (1)
  • HDR (2)
  • head (1)
  • Headlights (1)
  • Heal (1)
  • Heal Selection (1)
  • Heal Transparency (1)
  • health (2)
  • Hello Kitty (1)
  • High Quality (1)
  • Hiking (1)
  • history (2)
  • Hotspotshield (1)
  • HTML (1)
  • Hydrogen Peroxide (1)
  • ICBC (1)
  • Ice (1)
  • ice cream (1)
  • ICF;Cygwin;Microsoft's Firewall (1)
  • icon (2)
  • idea tricks (7)
  • Illustrator (1)
  • impressions (18)
  • Improve (1)
  • incidents (35)
  • Info (23)
  • information warfare (1)
  • infrastructure (1)
  • ingredients (1)
  • ingress snort logs (1)
  • Inkscape (19)
  • insiders (10)
  • insurance (2)
  • Internet (1)
  • interviews (5)
  • iPod (1)
  • ips (9)
  • ipsumdump (3)
  • ipv6 (61)
  • ir (16)
  • Is Digital Security Possible (1)
  • Istanbul (1)
  • ITL (1)
  • Japan (1)
  • javascript hack (2)
  • Jimmer Fredette (3)
  • Joanna Rutkowska;metaphysics of network security (1)
  • Job (1)
  • Job application (1)
  • JPG (1)
  • junk mail (1)
  • Kazam (1)
  • Kdenlive (1)
  • key (1)
  • Kool-Aid (1)
  • Kubuntu (1)
  • Landscape (3)
  • Laptop (1)
  • law (19)
  • layers (1)
  • leadership (2)
  • legal (1)
  • Liberkey (2)
  • Liberkey.com (1)
  • Libreoffice (1)
  • licence (1)
  • Life Hack (2)
  • Lighting (2)
  • Lightroom (3)
  • Link of the Day (3)
  • linux (15)
  • LinuxFest Northwest (2)
  • List (2)
  • LMMS (1)
  • LoadCapAndFilter;NCSI.txt; (1)
  • LocateIP.sh;tcp/IDS analysis; (1)
  • logging (1)
  • Logo (3)
  • Logon screen error; (1)
  • lsof for Powershell (1)
  • lsof for Windows (1)
  • lsof tcpdump (1)
  • Luminance (2)
  • Make money online (4)
  • Making Money (1)
  • malware (15)
  • mandiant (6)
  • Mass Text (1)
  • Memory (1)
  • mergecap (1)
  • Messaging (1)
  • metasploit (5)
  • metrics (2)
  • microsoft (31)
  • microwave (1)
  • Mnemonic (1)
  • Modules (2)
  • Moiré (1)
  • Money (4)
  • Mother's Day (1)
  • Movie (2)
  • mssp (1)
  • Music (2)
  • Music Video (1)
  • Myers Briggs Type Indicator (1)
  • native tail.exe; cmd.exe; (1)
  • Nature (1)
  • Navigation (1)
  • net helpmsg;Windows Error Messages;Silliness (1)
  • net optics (14)
  • Netbook (1)
  • NetGear Firewall;Syslog output;Parsing Logs;LinuxFest Northwest (1)
  • netmon captures (1)
  • netsh ETL tracing (1)
  • netstat (1)
  • Networ Monitor 3.3;VSC++ Express;WDDK;Visual Studio;OpenSource Parsers;logparser; (1)
  • network (5)
  • Networking (1)
  • new (1)
  • Nikon (1)
  • Ninja Turtles (1)
  • novasec (3)
  • nsm (308)
  • offense (19)
  • official (1)
  • oisf (2)
  • one year anniversary (1)
  • open source (1)
  • openfiles (1)
  • openpacket (12)
  • Operating System (1)
  • opt out (1)
  • Organization (3)
  • other (4)
  • packetstash (1)
  • Parsing Netstat (1)
  • Pattern (1)
  • pcregrep (1)
  • People (1)
  • philosophy (73)
  • Phone Charger (1)
  • Photivo (1)
  • Photo (1)
  • Photo Editing (3)
  • Photo Management (6)
  • Photo Storing (1)
  • Photography (24)
  • Photoshop (8)
  • Picasa (4)
  • pirates (5)
  • pizza (1)
  • Plant (1)
  • Pockets (1)
  • Pop (1)
  • Pop-up (1)
  • popcorn (1)
  • Port 6000;X11;FVS318;Syslog (1)
  • portable (1)
  • Portableapps (3)
  • portableapps.com (1)
  • Portrait (3)
  • Poster (2)
  • powerpoint (4)
  • Powershell (1)
  • Powershell LSOF (1)
  • pre-review (51)
  • predictions (3)
  • Premium Accounts (5)
  • Present (1)
  • press (10)
  • Pro and Con (1)
  • Process (1)
  • Productivity (1)
  • Profile (1)
  • Project (1)
  • promo (1)
  • proxy (3)
  • ps;fstat;lsof;Linux;Windows;OpenBSD;DEP (1)
  • psirt (5)
  • Pumpkin (1)
  • quick (2)
  • RAW (6)
  • Raw Studio (1)
  • RawTherapee (3)
  • reading (12)
  • reasonable steps to safeguard sensitive digital content (1)
  • recipe (3)
  • Record (1)
  • recordmydesktop (1)
  • redteam (3)
  • Reflector (1)
  • regulations (1)
  • Reliance tricks (1)
  • Relief (1)
  • Remember (1)
  • remove (4)
  • Remove Background (1)
  • reports (6)
  • research (1)
  • Restoration (1)
  • Resume (1)
  • Resynthesize (2)
  • Resynthesizer (2)
  • Rethynthesizer (1)
  • Review (2)
  • reviews (250)
  • risk (13)
  • roi (14)
  • routing (1)
  • RSS (2)
  • rtime.cmd (1)
  • russia (1)
  • sans (34)
  • Saturation (1)
  • save money (1)
  • scada (1)
  • Scene (1)
  • Screen Casting (1)
  • Screencasting (1)
  • screenshot (1)
  • Search (1)
  • sec (1)
  • Security (3)
  • Security;Hotmail;Microsoft (1)
  • sguil (189)
  • Shotwell (1)
  • Silhouette (1)
  • Simple (5)
  • Sipdroid (1)
  • Sleeve (1)
  • Slurpee (1)
  • Small Business Owners (1)
  • Smart (1)
  • SMS (4)
  • snorby (1)
  • snort (51)
  • Snort Report (22)
  • Social Networking; EFF;Privacy (1)
  • Soda (1)
  • Soda Pop (1)
  • Software (2)
  • Softwares (6)
  • solaris (2)
  • sorting ingress source IPs (1)
  • Sorting/Searching for Events by UserID (2)
  • Spreadsheet (3)
  • spying (3)
  • Stand (1)
  • standards (8)
  • start up (1)
  • steam (1)
  • Storage (1)
  • Subcribe (1)
  • Sun (2)
  • Sunset (1)
  • svchost (2)
  • Sync (1)
  • sysadmin (16)
  • System.Diagnostics.Process with System.Security.AccessControl (1)
  • Taobao (1)
  • Task List (1)
  • tasklist (1)
  • tcpslice (2)
  • Tech Updates (3)
  • Template (1)
  • Test (1)
  • Test Harness;Vista;work needed (1)
  • text (6)
  • Text Message (1)
  • texture (3)
  • Thanksgiving (1)
  • The Security Process (1)
  • Threads (1)
  • threat model (11)
  • threats (97)
  • threats; attack vectors; sniffers;firewalls (1)
  • Thumb Drive (1)
  • Tip (1)
  • Tip of the Day (25)
  • Tips (1)
  • To-Do List (1)
  • Tonemapping (1)
  • tools (43)
  • Toothpaste (1)
  • trace (1)
  • Traffic Talk (10)
  • training (50)
  • Transfer (1)
  • Tree (3)
  • TrendMicro;Sophos;PC Tools;DEP;AV; (1)
  • Trick (1)
  • Tsunami (1)
  • TTP (9)
  • tubing (1)
  • tufte (8)
  • Tutorial (13)
  • Tutorials (3)
  • tv (1)
  • ubuntu (5)
  • UFRaw (1)
  • Ultoo hacks (2)
  • Unboxing (1)
  • updates (1)
  • USB Drive (1)
  • usenix (1)
  • Valentine (2)
  • Valentines day (2)
  • Vector (7)
  • verizon (5)
  • video (2)
  • virtualization (32)
  • virus protection (1)
  • Vista Firewall;Parsing Logs;cmd.exe;Windump;nmap (1)
  • Vista Firewall;Parsing Logs;logparser.exe (1)
  • Vista Firewall;Parsing Logs;Powershell (1)
  • Vodafone tricks (15)
  • Voip (1)
  • VPN (4)
  • vpnning (1)
  • VPNs (1)
  • vulnerabilities (36)
  • Wallpaper (4)
  • warranties (1)
  • wassail (1)
  • Waterer (1)
  • watermark (3)
  • WD-40 (2)
  • Web Design (2)
  • Website (2)
  • weight lift (1)
  • weight lifting (1)
  • weight loss (2)
  • Wells Fargo (1)
  • whipped cream (1)
  • whipping cream (1)
  • Win32:SQLSlammer;Malware detection;Snort;Traceroute (1)
  • Windows (10)
  • Windows 7 Firewall;Parsing Logs;Powershell;logparser.exe (1)
  • Windows TCP/IP Address information (1)
  • windows times-stamping (1)
  • Windshield (1)
  • Wireless (1)
  • wisdom (13)
  • Wordpress (1)
  • workout (1)
  • writing (44)
  • xvidcap (1)
  • Yahoo Pipes (1)
  • year (1)
  • years (1)
  • Youtube (1)
  • Zoom (1)

Arsip Blog

  • ▼  2013 (132)
    • ►  Juli (5)
    • ►  Juni (14)
    • ►  Mei (11)
    • ►  April (16)
    • ►  Maret (23)
    • ►  Februari (29)
    • ▼  Januari (34)
      • make the fake page for any websate you want
      • share your internet connection and tur your PC to ...
      • Airtel 3G TCP VPN Trick For Feb 2013
      • move the mouse cursor with your head
      • hacking tips and secrets (part 2) how to make a fa...
      • Vodafone 3G TCP VPN Trick For Feb 2013
      • let's continue with hacking tutorials
      • On Thought Leadership and Non-Technical Relevance
      • the first tutorial will be available soon
      • Tip of the Day - A smarter way to eat microwave po...
      • Cloud Storage 2013 - A look at the old and the new
      • 006.How to convert installed programs to exe files
      • 005.how to make totally free 24/7 radio station ke...
      • 004.how to delete your facebook friends easier and...
      • 003.download torrent using internet download manag...
      • 002.how to change the outlook of facebook safely
      • 001.how to connect to the internet using your nokia
      • welcome in our blog
      • Latest Idea UDP VPN Trick Working In Many States
      • Airtel TCP VPN Trick Working In Many States - Jan ...
      • How to Win This TCP/IP Book
      • Airtel UDP 53 VPN Trick Working Again For 2013
      • Bitshare Premium Link Generator - 2013
      • Ultoo Multisender Desktop Client V1.3 - 2013
      • Airtel Back Query Trick For Jan 2013
      • Latest Airtel Front Query Trick - Jan 2013
      • Bejtlich's New Book: Planned for Summer Publication
      • Happy 10th Birthday TaoSecurity Blog
      • Welcome to Network Security Monitoring in the Cloud
      • Airtel PD Proxy Trick Working Again - Jan 2013
      • Vodafone 3G Proxy Trick Working - Jan 2013
      • New Airtel TCP VPN Trick - 100% Working
      • Security Onion + (ELSA or Snorby) + CapMe = Awesome
      • New Airtel 3G Proxy Trick - Working In Many States
  • ►  2012 (115)
    • ►  Desember (19)
    • ►  November (28)
    • ►  Oktober (3)
    • ►  September (13)
    • ►  Agustus (5)
    • ►  Juli (6)
    • ►  Juni (8)
    • ►  Mei (9)
    • ►  April (3)
    • ►  Maret (10)
    • ►  Februari (8)
    • ►  Januari (3)
  • ►  2011 (187)
    • ►  Desember (8)
    • ►  November (7)
    • ►  Oktober (11)
    • ►  September (11)
    • ►  Agustus (23)
    • ►  Juli (22)
    • ►  Juni (9)
    • ►  Mei (9)
    • ►  April (15)
    • ►  Maret (25)
    • ►  Februari (27)
    • ►  Januari (20)
  • ►  2010 (262)
    • ►  Desember (41)
    • ►  November (22)
    • ►  Oktober (10)
    • ►  September (17)
    • ►  Agustus (15)
    • ►  Juli (27)
    • ►  Juni (18)
    • ►  Mei (19)
    • ►  April (23)
    • ►  Maret (20)
    • ►  Februari (25)
    • ►  Januari (25)
  • ►  2009 (247)
    • ►  Desember (12)
    • ►  November (18)
    • ►  Oktober (21)
    • ►  September (15)
    • ►  Agustus (23)
    • ►  Juli (28)
    • ►  Juni (31)
    • ►  Mei (33)
    • ►  April (8)
    • ►  Maret (18)
    • ►  Februari (21)
    • ►  Januari (19)
  • ►  2008 (259)
    • ►  Desember (25)
    • ►  November (28)
    • ►  Oktober (25)
    • ►  September (21)
    • ►  Agustus (18)
    • ►  Juli (19)
    • ►  Juni (22)
    • ►  Mei (17)
    • ►  April (20)
    • ►  Maret (26)
    • ►  Februari (11)
    • ►  Januari (27)
  • ►  2007 (507)
    • ►  Desember (14)
    • ►  November (28)
    • ►  Oktober (41)
    • ►  September (51)
    • ►  Agustus (35)
    • ►  Juli (35)
    • ►  Juni (37)
    • ►  Mei (41)
    • ►  April (58)
    • ►  Maret (103)
    • ►  Februari (28)
    • ►  Januari (36)
  • ►  2006 (492)
    • ►  Desember (33)
    • ►  November (26)
    • ►  Oktober (29)
    • ►  September (54)
    • ►  Agustus (83)
    • ►  Juli (52)
    • ►  Juni (32)
    • ►  Mei (16)
    • ►  April (37)
    • ►  Maret (41)
    • ►  Februari (31)
    • ►  Januari (58)
  • ►  2005 (501)
    • ►  Desember (45)
    • ►  November (33)
    • ►  Oktober (32)
    • ►  September (36)
    • ►  Agustus (61)
    • ►  Juli (54)
    • ►  Juni (42)
    • ►  Mei (36)
    • ►  April (45)
    • ►  Maret (41)
    • ►  Februari (45)
    • ►  Januari (31)
  • ►  2004 (348)
    • ►  Desember (49)
    • ►  November (38)
    • ►  Oktober (24)
    • ►  September (28)
    • ►  Agustus (29)
    • ►  Juli (17)
    • ►  Juni (27)
    • ►  Mei (30)
    • ►  April (17)
    • ►  Maret (25)
    • ►  Februari (38)
    • ►  Januari (26)
  • ►  2003 (375)
    • ►  Desember (25)
    • ►  November (36)
    • ►  Oktober (58)
    • ►  September (20)
    • ►  Agustus (60)
    • ►  Juli (31)
    • ►  Juni (34)
    • ►  Mei (18)
    • ►  April (42)
    • ►  Maret (9)
    • ►  Februari (23)
    • ►  Januari (19)

Recent Posts

 
Copyright © tutorial about web security computer networking | Powered by Blogger
Design by FThemes | Blogger Theme by Lasantha - Premium Blogger Templates | NewBloggerThemes.com