Skip to main content

Posts

Showing posts from 2015

Here are 5 Depth in World Hacker

Here are 5 Depth in World Hacker 1. Elite Also known as 3l33t, 3l337, 31337, or a combination of it; is spearheading the network security industry. They understand sistemoperasi outside, able to configure and connect a global network. Capable of programming each day. A very natural grace, they are usually efficient and skilled, to use knowledge appropriately. They are like stealth can enter the system without being seen, although they will not destroy the data. Because they always follow the rules. 2. Semi-Elite Hacker is usually easier than Elite. They also have the ability and extensive knowledge of computers. They understand the operating system (including holes). Usually equipped with a number of kecilprogram enough to change the program exploits. Many of the attacks carried out by hackers who published this caliber, unfortunately by the Elite they are often categorized Lamer. 3. Developed Kiddie This title terutamakarena this age group are young (ABG) and still in sc

Hacker-Hacker Originating from Indonesia

Hacker-Hacker Originating from Indonesia 1.      Dani Fir­man­syah    Xnuxer, Dani Firmansyah nickname in cyberspace, was arrested Cyber ​​Crime Unit of the Directorate of Special Investigation Metro Jaya Regional Police on 24 April 2004 approximately at 17:20 in Jakarta. Friday, April 16, Xnuxer tried to test the security system kpu.go.id through XSS (cross site scripting) of the IP 202.158.10.117, but screen out the message of risk with a low level (KPU website has not been transparent or damaged). Saturday, April 17th, 2004 at 03.12,42, Xnuxer try again penetrating tnp.kpu.go.id server by means of SQL Injection and successfully penetrate IPtnp.kpu.go.id 203.130.201.134, and managed to up date the list of the party's name at 11.23,16 until 11.34,27.Teknik used Xnuxer in hacked namely through spoofing (deception). Xnuxer attacks of IP 202.158.10.117, then open the 208.147.1.1 IP Proxy Anonymous Thailand before msuk to tnp.kpu.go.id 203.130.201.134 IP, and m

6 greatest in the history of hacker attacks

6 greatest in the history of hacker attacks 1. Op Israel Indeed, until now there is no official information related attacks launched by Anonymous and his followers from around the world including other hacker groups. The Israeli side said that the action taken by the Anonymous fails to obliterate Israel from the Internet according to their promise. But the Anonymous claim that their action to shed thousands of sites managed by government, military, corporate account to Facebook, Twitter or state also important data and credit card data. 2. Sony PlayStation Network In 2011 ago, a group of hackers managed to break into the network of Sony's PlayStation Network. This hacking action mengabikbatkan more than 70 million credit card data had been stolen. Because of these actions, Sony finally shut down all its services for several weeks and fix everything including providing compensation to its customers. 3. Epsilon One email marketing company called Epsi

Discard your Eyeglass Thousands Successfully With this method

Discard your Eyeglass Thousands Successfully With this method Keep in mind that if we do not use the power of the old muscle -otot our bodies for some time, what happens is the muscles of the body will weaken over time. For example, if someone is injured her foot and he uses a wheelchair for some time, his legs will become weaker and weaker. The same thing also applies to the muscles around your eyes. If you currently wear glasses and you do not exercise your eye muscles, then your eyesight will become weak karenya eye muscles need exercise just like any other muscle in our body. You have to play an active role in training your eye muscles below the muscle recovery process your eyesight It is advised to close your eyes for a few minutes at every 2-3 hours and avoid hard pressure / tired eyes. You will need to implement exercises for your eyes. There are 16 exercises for your eyes. (Follow the lines of the picture above the eye quickly and repeate

This woman Menakap Fish With Fresh Meat, fish Apparently the ..?

This woman Menakap Fish With Fresh Meat, fish Apparently the ..? we often see the piranha in films horro, but the place of residence piranha? people who became their food actually very little, in fact they are a source of human food. Brazilian girl's photo was fishing for piranha piranha breeding areas in the river Amazon, people - people often manangkapa piranha fish and serve the soup, or baked, fried and so on. merekaa is a common food there. share out, make sure that everybody knows with these unique cultures. This woman video Menakap Fish With Fresh Meat

Cara menggetahui IP Adder/ IP URL Di MAC 10.3.1

Cara menggetahui IP Adder/ IP URL Di MAC 10.3.1 1. klik di bagian icon Sinyal WIFI, Seperti pada gambar, lalu klik Open Network Preferences.    2. Setelah itu akan keluar Tampilan seperti pada gambar dibawah ini. setelah itu cari wi-fi yang berwarna hijau dibagian titiknya atau klik wi-fi yang ada sinyalnya ( wi-fi yang digunakan pada saat online) pada gambar diatas sudah menampilkan keterangan, yang kita cari dibagian status Connected dibagian bawahnya, lihat pada gambar dengan teliti. Keterangan gambar wi-fi : Nama hostpot wi-fi yang anda gunakan, IP address 192.168.1.115 itu adalah alamat ip address anda. setelah itu cek IP Address anda dengan Terminal Ketik ping 192.168.1.115. gambar diatas manampilkan keterangan IP Address anda terhubung/connected. *Selamat Mencoba *

Menghitung Luas Segitiga Menggunakan Microsoft Visual Basic 6.0

Menghitung Luas Segitiga Menggunakan Microsoft Visual Basic 6.0 Sebelum membuat program menghitung luas segitiga, kita harus mengetahui rumus cara menghitung luas segitiga tersebut supaya dapat diterjemahkan kedalam bahasa pemograman yang pada kesempatan ini menggunakan Visual Basic (VB) 6.0. Adapun rumus meghitung luas segitiga adalah 1/2 x Alas x Tinggi. Ini berarti kita menggunakan tiga textbox untuk input data alas dan tinggi serta untuk menampilkan hasil. Tiga buah command button untuk mengeksekusi proses, pengosongan textbox dan comandbutton untuk keluar. Desain programnya seperti gambar berikut : ( Desain Program ) Kalau desain disini tidak terlalu dimasalahkan, yang penting komponen" yang perlukan harus ada seperti Nama objeck Alas,Tinggi,Hasil,Hitung, Reset, Eit. desain sih sesuka kawan-kawan saja enaknya gimana, Ok. Nah nih Silahkan Copy Coding dibawah ini : Private Sub Command1_Click() Const rumus = 0.5 Dim luas As Double

Coding Borland C++ "Menu makanan Anak "kos-kosan"

"MenumakananAnak"KOst" ini yang mau buat Aplikasi "Menu makanan Anak KOst" di Borland C++, Langsung aja deh Pratek,Coding dibawah ini di Copy semua di aplikasi Borland C++ teman-teman, habis itu di Compale..Langsung dilihat deh hasilnya insaallah bermanfaat buat teman" yang membutuhkan. #include<conio.h> #include<iostream.h> #include<stdio.h> #include<iomanip.h> #define maxb 100 #define maxk 100 main() { int i, j, x, y; char makan [7][3][20]; clrscr(); cout<<"\t\t\t ^_.Menu makan anak kost._^\n\n\n"; for(i=0;i<7;i++) { for(j=0;j<3;j++) {cout<<"Menu\t[ hari " ;    if(i==0)    cout<<"Senin";    else if(i==1)    cout<<"Selasa";    else if(i==2)    cout<<"Rabu";    else if(i==3)    cout<<"Kamis";    else if(i==4)    cout<<"Jumat";    else if(i==5)    cout

Perbedaan queue dan stact

Array adalah suatu type data struktur yg berupa sejumlah data sejenis (bertype data sama) yg jumlahnya tetap dan diberi suatu nama tertentu. Array dua dimensi sering kali digambarkan/dianalogikan sebagai sebuah matriks atau bentuk grid. Jika array berdimensi   satu hanya terdiri dari 1 dan banyak kolom, array berdimensi dua terdiri dari banyak baris dan banyak kolom yg bertype sama. Struktur data adalah cara menyimpan atau merepresentasikan data didalam komputer agar bisa dipakai secara efisien. Perbedaan queue dan stact Stack memakai sistem LIFO atau last in first out (yang pertama masuk akan keluar terakhir, begitu pula yang terakhir masuk akan keluar pertama kali) yang apabila kita mengahapus/ keluar data, maka data yang terakhirlah yang akan terhapus/ keluar terlebih dahulu. Sementara queue memakai siste FIFO atau first in first out (yang pertama masuk akan keluar pertama, begitu pula yang masuk terakhir akan keluar terakhir) yang apabila kita menghapus / mengeluarkan data, maka