tutorial about web security computer networking

tutorial about web security computer networking

TwitterFacebookGoogle PlusLinkedInRSS FeedEmail
  • Home
  • Business
    • Internet
    • Market
    • Stock
  • Downloads
    • Dvd
    • Games
    • Software
      • Office
  • Parent Category
    • Child Category 1
      • Sub Child Category 1
      • Sub Child Category 2
      • Sub Child Category 3
    • Child Category 2
    • Child Category 3
    • Child Category 4
  • Featured
  • Health
    • Childcare
    • Doctors
  • Uncategorized

Senin, 21 Januari 2013

005.how to make totally free 24/7 radio station keep working even you are not connected in 5 minutes

13.44    No comments


Kirimkan Ini lewat EmailBlogThis!Bagikan ke XBerbagi ke FacebookBagikan ke Pinterest
Posting Lebih Baru Posting Lama Beranda

0 komentar:

Posting Komentar

Langganan: Posting Komentar (Atom)
  • Popular
  • Tags
  • Blog Archives
  • Vodafone 3G Trick - July 2013
    Hello visitors it's almost one week that I haven't posted any trick. So today I'm back with new vodafone 3g trick working almost...
  • Turbobit Premium Link Generator - Working
    Hello readers here is latest Turbobit premium link generator. Which works very smoothly. It is tested by us and we found it is working perfe...
  • Using Oinkmaster to Update Snort Rules
    I've never explained how I like to keep Snort rules updated on my sensors. The tool of choice for automatic rule updates is Andreas Ost...
  • Thoughts on New Lab
    I'm building a new test lab. To start, I needed a lot of Cat 5 cables of specific lengths and colors. Cat5Net.com 's handy order f...
  • Get-Winevent Part IV: Querying the Event Log for 'Filtering Platform Connection' Information (Part A)
    The command: ' auditpol /set /subcategory:"Filtering Platform Connection" /success:enable /failure:enable ' enables the ...
  • Cisco 802.1x Voice VLAN Authentication Bypass Vulnerability
    Ok, last night i blogged about VoIP enumeration techniques and well it made me want to find exploits for Cisco products. I was reading at ja...
  • How to do Sleeve Faces
    Doing sleeve faces (or record faces) is a fun thing you can do with all your old records! Here are some tips for how you can get the most ou...
  • 3Com Buys TippingPoint
    The Register is reporting that 3Com is buying TippingPoint for $430 million. TippingPoint employs 125 people and makes the UnityOne lay...
  • How to make an effective pro and con list (using a spreadsheet)
    Pro and Con lists are useful any time we need to make a decision, especially when there is no clear choice what the better decision is....
  • Airtel High Speed TCP VPN Config - 14 July 2013
    Dear visitors today I'm back with new high speed TCP config which is working in many States. This TCP config is consists of high speed p...

Label

  • 'Get-WinEvent' ETL Providers Event Logs (2)
  • 'Get-WinEvent' Logons (1)
  • "One Page Checklist for Securing and Cleaning a Malware Infected Windows PC" (1)
  • "Security by Isolation" (1)
  • "The Cloud" (1)
  • "universal privelege" (1)
  • *NIX find (1)
  • 2013 (1)
  • 2014 (1)
  • 3g tricks (59)
  • 500D (1)
  • accesschk (1)
  • Adf.ly Hacks (1)
  • Adobe (1)
  • Adsense (2)
  • Advanced Persistent Threat; (1)
  • afcert (31)
  • after you format your computer sometimes you find that sound does not work videos ... games to solve that you need this program to make a backup for your drivers (2)
  • Air Force (18)
  • Aircel tricks (4)
  • Airtel tricks (36)
  • aix (1)
  • alternative to tap; tcpdump; syslog;FVS318 (1)
  • Amazon (1)
  • analysis (1)
  • Android (4)
  • Anniversary (1)
  • announcement (2)
  • App (1)
  • appsec (4)
  • apt (56)
  • APT;Snort;Data Protection (1)
  • Argus (1)
  • Astrill (3)
  • attribution (4)
  • Audacity (1)
  • Automatic (1)
  • Automobile hacking... (1)
  • avast (1)
  • Background (2)
  • Backup (3)
  • Bacon (1)
  • banana bread (3)
  • bananas (2)
  • Bands (1)
  • Bank Fraud;Money Mules;Small Business (1)
  • Bank of America (1)
  • Banner (1)
  • Bash 4.0;awk;geoiplookup;pcregrep; (1)
  • Basketball (3)
  • batch (1)
  • Beginner (1)
  • Best (1)
  • Best Way To Get Back a Stolen/lost Computer/phone (1)
  • bestbook (7)
  • bike (1)
  • Bing (1)
  • BINGO (1)
  • Bittorrent (1)
  • Black and white (1)
  • blackhat (30)
  • blender (3)
  • Blog (7)
  • Blogger (8)
  • blogging (1)
  • Blur (1)
  • books (5)
  • Bot Hunter;SRI; APT; (1)
  • Bowling (1)
  • bread (3)
  • breakers (4)
  • bro (6)
  • Browser (2)
  • bruins (1)
  • Brush (1)
  • Brushes (1)
  • BSNL Tricks (3)
  • bulk (1)
  • business (24)
  • Business Card (1)
  • button (1)
  • BYU (2)
  • cake (1)
  • Camer (1)
  • Camera (1)
  • Candle (1)
  • Canon (2)
  • Capitol One (1)
  • Car (1)
  • Card (2)
  • Card Making (1)
  • Cards (1)
  • ccna (6)
  • celebrity (1)
  • Cell Phone (3)
  • Cell Tracking (1)
  • Censorship (1)
  • certification (26)
  • Change (1)
  • Chase bank (1)
  • Cheap (5)
  • Check-TCPUDPClient.ps1 (1)
  • cheesecake (2)
  • china (87)
  • Chinese (1)
  • Christmas (3)
  • Chrome (3)
  • Chrome OS (2)
  • cisco (30)
  • cissp (7)
  • Classifieds (1)
  • Clipart (2)
  • Clker (1)
  • Clone (2)
  • cloud (4)
  • clowns (12)
  • Coke (1)
  • Cola (1)
  • Color (1)
  • Color Code (1)
  • Color Enhancement (2)
  • Color Palette (1)
  • Colorize (1)
  • Combining logparser.exe with cmd.exe (1)
  • commodore (6)
  • Comparison (1)
  • Computer (1)
  • computers (1)
  • conferences (34)
  • Conficker C; Syslogd; Firewall Blocking (1)
  • controls (5)
  • cooking (2)
  • correlation (5)
  • counterintelligence (18)
  • CR-48 (2)
  • Craft (1)
  • create (1)
  • crime (13)
  • Crystal Light (1)
  • CV (1)
  • Cyber Security Review;"The Shadow Government";"McMafia" (1)
  • cybercommand (3)
  • cyberwar (21)
  • dan geer (1)
  • Dapper (1)
  • Darkroom (1)
  • Darktable (4)
  • data breaches; ITRC;2010 (1)
  • databases (1)
  • Delete (1)
  • Depth of Field (1)
  • Design (3)
  • detection (16)
  • dfm (1)
  • Diffuser (1)
  • DigiKam (3)
  • disasters (10)
  • Disc Golf (1)
  • Discover (1)
  • Disruptive Mnemonic (1)
  • DIY (16)
  • dns (1)
  • Docomo tricks (2)
  • Documents (1)
  • dod (7)
  • DOF (1)
  • Drawing (3)
  • drink (2)
  • DSLR (3)
  • dumbbells (1)
  • Dynamic (1)
  • Earthquake (1)
  • EarthVPN (2)
  • easy (2)
  • Eddie Kohler; ipsumdump (2)
  • Editing (3)
  • education (9)
  • Effort (1)
  • Email (2)
  • engineering (11)
  • English Learning (1)
  • Enhancement (1)
  • Excel (1)
  • exercise (1)
  • Exercise Equipment (1)
  • exploits (15)
  • Explorer (1)
  • Exposing Shell Paths with Powershell (1)
  • F-Spot (1)
  • Face (2)
  • Facebook (9)
  • Facebook Killer (1)
  • Faces (1)
  • Favicon (1)
  • favorites (261)
  • feds (17)
  • Feed Reader (1)
  • Feeds (2)
  • File (2)
  • File Host (1)
  • FileVersionInfo (2)
  • finance (2)
  • Firefox (1)
  • Firewall (3)
  • fisma (21)
  • Fix (2)
  • Flag (1)
  • Flash (3)
  • Flier (3)
  • Flower (2)
  • Flyer (2)
  • Font (2)
  • Fonts (1)
  • food (10)
  • forensics (6)
  • fraud (2)
  • free (4)
  • Free recharge (3)
  • Freebies (11)
  • freebsd (433)
  • FreeFileSync (1)
  • Freegate (1)
  • Friends (1)
  • Frisbee (1)
  • frosting (1)
  • Frugal (1)
  • Fruit (1)
  • Fun (3)
  • Fun Disc (1)
  • Game (1)
  • gawk;SrcIP;DstIP;sort;uniq;Cygwin (1)
  • gci (1)
  • GE (11)
  • ge-cirt (2)
  • Geeky News (1)
  • GeoIP (1)
  • geoiplookup;tcpdump;firewall logs (1)
  • get (1)
  • get-acl (1)
  • Get-WinEvent Logon (3)
  • Get-WinEvent Logon Windows Filtering Platform (1)
  • get-wmiobject win32_networkadapter;XP and Vista network interfaces (1)
  • GetOwnerModuleFromTcpEntry Powershell iphlpapi.dll (1)
  • Getting Things Done (1)
  • gfwvpn (2)
  • Gimp (24)
  • Giveaways (1)
  • Glue (1)
  • Gmail (3)
  • gnuplot (1)
  • goal setting (1)
  • goals (1)
  • Gold's Gym (1)
  • Golf (1)
  • Google (13)
  • Google Docs (4)
  • Google Shopping (1)
  • Google Voice (1)
  • Google+ (1)
  • Graphic Design (5)
  • Great Firewall of China (4)
  • Grunge (3)
  • GTD (1)
  • Hack (1)
  • hacking tool (3)
  • hakin9 (11)
  • Hallmark (1)
  • hardware (19)
  • Hartman Personality (1)
  • HDR (2)
  • head (1)
  • Headlights (1)
  • Heal (1)
  • Heal Selection (1)
  • Heal Transparency (1)
  • health (2)
  • Hello Kitty (1)
  • High Quality (1)
  • Hiking (1)
  • history (2)
  • Hotspotshield (1)
  • HTML (1)
  • Hydrogen Peroxide (1)
  • ICBC (1)
  • Ice (1)
  • ice cream (1)
  • ICF;Cygwin;Microsoft's Firewall (1)
  • icon (2)
  • idea tricks (7)
  • Illustrator (1)
  • impressions (18)
  • Improve (1)
  • incidents (35)
  • Info (23)
  • information warfare (1)
  • infrastructure (1)
  • ingredients (1)
  • ingress snort logs (1)
  • Inkscape (19)
  • insiders (10)
  • insurance (2)
  • Internet (1)
  • interviews (5)
  • iPod (1)
  • ips (9)
  • ipsumdump (3)
  • ipv6 (61)
  • ir (16)
  • Is Digital Security Possible (1)
  • Istanbul (1)
  • ITL (1)
  • Japan (1)
  • javascript hack (2)
  • Jimmer Fredette (3)
  • Joanna Rutkowska;metaphysics of network security (1)
  • Job (1)
  • Job application (1)
  • JPG (1)
  • junk mail (1)
  • Kazam (1)
  • Kdenlive (1)
  • key (1)
  • Kool-Aid (1)
  • Kubuntu (1)
  • Landscape (3)
  • Laptop (1)
  • law (19)
  • layers (1)
  • leadership (2)
  • legal (1)
  • Liberkey (2)
  • Liberkey.com (1)
  • Libreoffice (1)
  • licence (1)
  • Life Hack (2)
  • Lighting (2)
  • Lightroom (3)
  • Link of the Day (3)
  • linux (15)
  • LinuxFest Northwest (2)
  • List (2)
  • LMMS (1)
  • LoadCapAndFilter;NCSI.txt; (1)
  • LocateIP.sh;tcp/IDS analysis; (1)
  • logging (1)
  • Logo (3)
  • Logon screen error; (1)
  • lsof for Powershell (1)
  • lsof for Windows (1)
  • lsof tcpdump (1)
  • Luminance (2)
  • Make money online (4)
  • Making Money (1)
  • malware (15)
  • mandiant (6)
  • Mass Text (1)
  • Memory (1)
  • mergecap (1)
  • Messaging (1)
  • metasploit (5)
  • metrics (2)
  • microsoft (31)
  • microwave (1)
  • Mnemonic (1)
  • Modules (2)
  • Moiré (1)
  • Money (4)
  • Mother's Day (1)
  • Movie (2)
  • mssp (1)
  • Music (2)
  • Music Video (1)
  • Myers Briggs Type Indicator (1)
  • native tail.exe; cmd.exe; (1)
  • Nature (1)
  • Navigation (1)
  • net helpmsg;Windows Error Messages;Silliness (1)
  • net optics (14)
  • Netbook (1)
  • NetGear Firewall;Syslog output;Parsing Logs;LinuxFest Northwest (1)
  • netmon captures (1)
  • netsh ETL tracing (1)
  • netstat (1)
  • Networ Monitor 3.3;VSC++ Express;WDDK;Visual Studio;OpenSource Parsers;logparser; (1)
  • network (5)
  • Networking (1)
  • new (1)
  • Nikon (1)
  • Ninja Turtles (1)
  • novasec (3)
  • nsm (308)
  • offense (19)
  • official (1)
  • oisf (2)
  • one year anniversary (1)
  • open source (1)
  • openfiles (1)
  • openpacket (12)
  • Operating System (1)
  • opt out (1)
  • Organization (3)
  • other (4)
  • packetstash (1)
  • Parsing Netstat (1)
  • Pattern (1)
  • pcregrep (1)
  • People (1)
  • philosophy (73)
  • Phone Charger (1)
  • Photivo (1)
  • Photo (1)
  • Photo Editing (3)
  • Photo Management (6)
  • Photo Storing (1)
  • Photography (24)
  • Photoshop (8)
  • Picasa (4)
  • pirates (5)
  • pizza (1)
  • Plant (1)
  • Pockets (1)
  • Pop (1)
  • Pop-up (1)
  • popcorn (1)
  • Port 6000;X11;FVS318;Syslog (1)
  • portable (1)
  • Portableapps (3)
  • portableapps.com (1)
  • Portrait (3)
  • Poster (2)
  • powerpoint (4)
  • Powershell (1)
  • Powershell LSOF (1)
  • pre-review (51)
  • predictions (3)
  • Premium Accounts (5)
  • Present (1)
  • press (10)
  • Pro and Con (1)
  • Process (1)
  • Productivity (1)
  • Profile (1)
  • Project (1)
  • promo (1)
  • proxy (3)
  • ps;fstat;lsof;Linux;Windows;OpenBSD;DEP (1)
  • psirt (5)
  • Pumpkin (1)
  • quick (2)
  • RAW (6)
  • Raw Studio (1)
  • RawTherapee (3)
  • reading (12)
  • reasonable steps to safeguard sensitive digital content (1)
  • recipe (3)
  • Record (1)
  • recordmydesktop (1)
  • redteam (3)
  • Reflector (1)
  • regulations (1)
  • Reliance tricks (1)
  • Relief (1)
  • Remember (1)
  • remove (4)
  • Remove Background (1)
  • reports (6)
  • research (1)
  • Restoration (1)
  • Resume (1)
  • Resynthesize (2)
  • Resynthesizer (2)
  • Rethynthesizer (1)
  • Review (2)
  • reviews (250)
  • risk (13)
  • roi (14)
  • routing (1)
  • RSS (2)
  • rtime.cmd (1)
  • russia (1)
  • sans (34)
  • Saturation (1)
  • save money (1)
  • scada (1)
  • Scene (1)
  • Screen Casting (1)
  • Screencasting (1)
  • screenshot (1)
  • Search (1)
  • sec (1)
  • Security (3)
  • Security;Hotmail;Microsoft (1)
  • sguil (189)
  • Shotwell (1)
  • Silhouette (1)
  • Simple (5)
  • Sipdroid (1)
  • Sleeve (1)
  • Slurpee (1)
  • Small Business Owners (1)
  • Smart (1)
  • SMS (4)
  • snorby (1)
  • snort (51)
  • Snort Report (22)
  • Social Networking; EFF;Privacy (1)
  • Soda (1)
  • Soda Pop (1)
  • Software (2)
  • Softwares (6)
  • solaris (2)
  • sorting ingress source IPs (1)
  • Sorting/Searching for Events by UserID (2)
  • Spreadsheet (3)
  • spying (3)
  • Stand (1)
  • standards (8)
  • start up (1)
  • steam (1)
  • Storage (1)
  • Subcribe (1)
  • Sun (2)
  • Sunset (1)
  • svchost (2)
  • Sync (1)
  • sysadmin (16)
  • System.Diagnostics.Process with System.Security.AccessControl (1)
  • Taobao (1)
  • Task List (1)
  • tasklist (1)
  • tcpslice (2)
  • Tech Updates (3)
  • Template (1)
  • Test (1)
  • Test Harness;Vista;work needed (1)
  • text (6)
  • Text Message (1)
  • texture (3)
  • Thanksgiving (1)
  • The Security Process (1)
  • Threads (1)
  • threat model (11)
  • threats (97)
  • threats; attack vectors; sniffers;firewalls (1)
  • Thumb Drive (1)
  • Tip (1)
  • Tip of the Day (25)
  • Tips (1)
  • To-Do List (1)
  • Tonemapping (1)
  • tools (43)
  • Toothpaste (1)
  • trace (1)
  • Traffic Talk (10)
  • training (50)
  • Transfer (1)
  • Tree (3)
  • TrendMicro;Sophos;PC Tools;DEP;AV; (1)
  • Trick (1)
  • Tsunami (1)
  • TTP (9)
  • tubing (1)
  • tufte (8)
  • Tutorial (13)
  • Tutorials (3)
  • tv (1)
  • ubuntu (5)
  • UFRaw (1)
  • Ultoo hacks (2)
  • Unboxing (1)
  • updates (1)
  • USB Drive (1)
  • usenix (1)
  • Valentine (2)
  • Valentines day (2)
  • Vector (7)
  • verizon (5)
  • video (2)
  • virtualization (32)
  • virus protection (1)
  • Vista Firewall;Parsing Logs;cmd.exe;Windump;nmap (1)
  • Vista Firewall;Parsing Logs;logparser.exe (1)
  • Vista Firewall;Parsing Logs;Powershell (1)
  • Vodafone tricks (15)
  • Voip (1)
  • VPN (4)
  • vpnning (1)
  • VPNs (1)
  • vulnerabilities (36)
  • Wallpaper (4)
  • warranties (1)
  • wassail (1)
  • Waterer (1)
  • watermark (3)
  • WD-40 (2)
  • Web Design (2)
  • Website (2)
  • weight lift (1)
  • weight lifting (1)
  • weight loss (2)
  • Wells Fargo (1)
  • whipped cream (1)
  • whipping cream (1)
  • Win32:SQLSlammer;Malware detection;Snort;Traceroute (1)
  • Windows (10)
  • Windows 7 Firewall;Parsing Logs;Powershell;logparser.exe (1)
  • Windows TCP/IP Address information (1)
  • windows times-stamping (1)
  • Windshield (1)
  • Wireless (1)
  • wisdom (13)
  • Wordpress (1)
  • workout (1)
  • writing (44)
  • xvidcap (1)
  • Yahoo Pipes (1)
  • year (1)
  • years (1)
  • Youtube (1)
  • Zoom (1)

Arsip Blog

  • ▼  2013 (132)
    • ►  Juli (5)
    • ►  Juni (14)
    • ►  Mei (11)
    • ►  April (16)
    • ►  Maret (23)
    • ►  Februari (29)
    • ▼  Januari (34)
      • make the fake page for any websate you want
      • share your internet connection and tur your PC to ...
      • Airtel 3G TCP VPN Trick For Feb 2013
      • move the mouse cursor with your head
      • hacking tips and secrets (part 2) how to make a fa...
      • Vodafone 3G TCP VPN Trick For Feb 2013
      • let's continue with hacking tutorials
      • On Thought Leadership and Non-Technical Relevance
      • the first tutorial will be available soon
      • Tip of the Day - A smarter way to eat microwave po...
      • Cloud Storage 2013 - A look at the old and the new
      • 006.How to convert installed programs to exe files
      • 005.how to make totally free 24/7 radio station ke...
      • 004.how to delete your facebook friends easier and...
      • 003.download torrent using internet download manag...
      • 002.how to change the outlook of facebook safely
      • 001.how to connect to the internet using your nokia
      • welcome in our blog
      • Latest Idea UDP VPN Trick Working In Many States
      • Airtel TCP VPN Trick Working In Many States - Jan ...
      • How to Win This TCP/IP Book
      • Airtel UDP 53 VPN Trick Working Again For 2013
      • Bitshare Premium Link Generator - 2013
      • Ultoo Multisender Desktop Client V1.3 - 2013
      • Airtel Back Query Trick For Jan 2013
      • Latest Airtel Front Query Trick - Jan 2013
      • Bejtlich's New Book: Planned for Summer Publication
      • Happy 10th Birthday TaoSecurity Blog
      • Welcome to Network Security Monitoring in the Cloud
      • Airtel PD Proxy Trick Working Again - Jan 2013
      • Vodafone 3G Proxy Trick Working - Jan 2013
      • New Airtel TCP VPN Trick - 100% Working
      • Security Onion + (ELSA or Snorby) + CapMe = Awesome
      • New Airtel 3G Proxy Trick - Working In Many States
  • ►  2012 (115)
    • ►  Desember (19)
    • ►  November (28)
    • ►  Oktober (3)
    • ►  September (13)
    • ►  Agustus (5)
    • ►  Juli (6)
    • ►  Juni (8)
    • ►  Mei (9)
    • ►  April (3)
    • ►  Maret (10)
    • ►  Februari (8)
    • ►  Januari (3)
  • ►  2011 (187)
    • ►  Desember (8)
    • ►  November (7)
    • ►  Oktober (11)
    • ►  September (11)
    • ►  Agustus (23)
    • ►  Juli (22)
    • ►  Juni (9)
    • ►  Mei (9)
    • ►  April (15)
    • ►  Maret (25)
    • ►  Februari (27)
    • ►  Januari (20)
  • ►  2010 (262)
    • ►  Desember (41)
    • ►  November (22)
    • ►  Oktober (10)
    • ►  September (17)
    • ►  Agustus (15)
    • ►  Juli (27)
    • ►  Juni (18)
    • ►  Mei (19)
    • ►  April (23)
    • ►  Maret (20)
    • ►  Februari (25)
    • ►  Januari (25)
  • ►  2009 (247)
    • ►  Desember (12)
    • ►  November (18)
    • ►  Oktober (21)
    • ►  September (15)
    • ►  Agustus (23)
    • ►  Juli (28)
    • ►  Juni (31)
    • ►  Mei (33)
    • ►  April (8)
    • ►  Maret (18)
    • ►  Februari (21)
    • ►  Januari (19)
  • ►  2008 (259)
    • ►  Desember (25)
    • ►  November (28)
    • ►  Oktober (25)
    • ►  September (21)
    • ►  Agustus (18)
    • ►  Juli (19)
    • ►  Juni (22)
    • ►  Mei (17)
    • ►  April (20)
    • ►  Maret (26)
    • ►  Februari (11)
    • ►  Januari (27)
  • ►  2007 (507)
    • ►  Desember (14)
    • ►  November (28)
    • ►  Oktober (41)
    • ►  September (51)
    • ►  Agustus (35)
    • ►  Juli (35)
    • ►  Juni (37)
    • ►  Mei (41)
    • ►  April (58)
    • ►  Maret (103)
    • ►  Februari (28)
    • ►  Januari (36)
  • ►  2006 (492)
    • ►  Desember (33)
    • ►  November (26)
    • ►  Oktober (29)
    • ►  September (54)
    • ►  Agustus (83)
    • ►  Juli (52)
    • ►  Juni (32)
    • ►  Mei (16)
    • ►  April (37)
    • ►  Maret (41)
    • ►  Februari (31)
    • ►  Januari (58)
  • ►  2005 (501)
    • ►  Desember (45)
    • ►  November (33)
    • ►  Oktober (32)
    • ►  September (36)
    • ►  Agustus (61)
    • ►  Juli (54)
    • ►  Juni (42)
    • ►  Mei (36)
    • ►  April (45)
    • ►  Maret (41)
    • ►  Februari (45)
    • ►  Januari (31)
  • ►  2004 (348)
    • ►  Desember (49)
    • ►  November (38)
    • ►  Oktober (24)
    • ►  September (28)
    • ►  Agustus (29)
    • ►  Juli (17)
    • ►  Juni (27)
    • ►  Mei (30)
    • ►  April (17)
    • ►  Maret (25)
    • ►  Februari (38)
    • ►  Januari (26)
  • ►  2003 (375)
    • ►  Desember (25)
    • ►  November (36)
    • ►  Oktober (58)
    • ►  September (20)
    • ►  Agustus (60)
    • ►  Juli (31)
    • ►  Juni (34)
    • ►  Mei (18)
    • ►  April (42)
    • ►  Maret (9)
    • ►  Februari (23)
    • ►  Januari (19)

Recent Posts

 
Copyright © tutorial about web security computer networking | Powered by Blogger
Design by FThemes | Blogger Theme by Lasantha - Premium Blogger Templates | NewBloggerThemes.com