<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4669357348104312371</atom:id><lastBuildDate>Sat, 31 Aug 2024 15:49:23 +0000</lastBuildDate><category>coding</category><category>windows</category><category>software</category><category>crack</category><category>hacker</category><category>Firewall</category><category>HTML</category><category>News</category><category>hardware</category><category>html5</category><category>opensource</category><category>printer</category><category>resetter</category><title>CODING Hacker and for Dumies</title><description></description><link>http://coding-androidadv.blogspot.com/</link><managingEditor>noreply@blogger.com (AndroidADV)</managingEditor><generator>Blogger</generator><openSearch:totalResults>10</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4669357348104312371.post-3558500589355685538</guid><pubDate>Wed, 11 Jan 2012 11:15:00 +0000</pubDate><atom:updated>2012-01-11T18:15:01.413+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">HTML</category><title>COLOR HUNTER</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1Yu4payHID8HXF7U7fGFOYnvNLupXVsH9fhRyor0DybepNcWVYxhy6z5pwiEkypTKXJ661HY6jsa8TxOGR2RPxsR53wFP_enTvd_-5BPihyphenhyphent0X_ML7jW4ZM63stzwtMRLKGKpCPkmh27F/s1600/color+hunter.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;285&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1Yu4payHID8HXF7U7fGFOYnvNLupXVsH9fhRyor0DybepNcWVYxhy6z5pwiEkypTKXJ661HY6jsa8TxOGR2RPxsR53wFP_enTvd_-5BPihyphenhyphent0X_ML7jW4ZM63stzwtMRLKGKpCPkmh27F/s400/color+hunter.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Heyoo ...&lt;br /&gt;
How are you ?? ... i hope youll fine ....&lt;br /&gt;
&lt;br /&gt;
hey did you know how to search colour in HTML code ....&lt;br /&gt;
goto &lt;a href=&quot;http://www.colorhunter.com/tag/727272/1&quot;&gt;http://www.colorhunter.com/tag/727272/1&lt;/a&gt;</description><link>http://coding-androidadv.blogspot.com/2012/01/color-hunter.html</link><author>noreply@blogger.com (AndroidADV)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1Yu4payHID8HXF7U7fGFOYnvNLupXVsH9fhRyor0DybepNcWVYxhy6z5pwiEkypTKXJ661HY6jsa8TxOGR2RPxsR53wFP_enTvd_-5BPihyphenhyphent0X_ML7jW4ZM63stzwtMRLKGKpCPkmh27F/s72-c/color+hunter.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4669357348104312371.post-5051309039213438252</guid><pubDate>Mon, 09 Jan 2012 23:15:00 +0000</pubDate><atom:updated>2012-01-10T06:15:00.811+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">coding</category><category domain="http://www.blogger.com/atom/ns#">Firewall</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">News</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Bebagai Cara Membajak Password</title><description>Ada banyak cara untuk mendapatkan suatu password / membajak password / crack password. Beberapa diantaranya tidak membutuhkan keahlian khusus. Berikut adalah cara-cara yang paling umum dan paling sering digunakan :&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;[1]. Social Engineering&lt;br /&gt;
[2]. KeyLogger&lt;br /&gt;
[3]. Web Spoofing&lt;br /&gt;
[4]. Menghadang Email&lt;br /&gt;
[5]. Password Cracking&lt;br /&gt;
[6]. Session Hijacking&lt;br /&gt;
[7]. Menjadi Proxy Server&lt;br /&gt;
[8]. Memanfaatkan Kelalaian User Dalam Penggunaan FiturBrowser&lt;br /&gt;
[9]. Googling&lt;br /&gt;
[10]. Phising&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;[1]. Social Engineering&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn-oDYpoS_pIMjerXd4sZRi1xifacrZUN3OD4lo4UXiLaXKOd60Xlxku4LL_O-GaagVW052Ub_4xUZ3OGrfR6vz2w7Ty6PpxsVpODynGHP852l-vLy6JJi4SwIpBcjufiWxxUtt9PTbVuz/s1600/SocialEngineering.webp&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn-oDYpoS_pIMjerXd4sZRi1xifacrZUN3OD4lo4UXiLaXKOd60Xlxku4LL_O-GaagVW052Ub_4xUZ3OGrfR6vz2w7Ty6PpxsVpODynGHP852l-vLy6JJi4SwIpBcjufiWxxUtt9PTbVuz/s320/SocialEngineering.webp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Social Engineering adalah nama suatu tehnik pengumpulan informasi dengan memanfaatkan celah psikologi korban. Atau mungkin boleh juga dikatakan sebagai ‘penipuan’ Sosial Engineering membutuhkan kesabaran dan kehati-hatian agar sang korban tidak curiga. Kita dituntut untuk kreatif dan mampu berpikiran seperti sang korban.&lt;/div&gt;&lt;br /&gt;
Social Engineering merupakan seni ‘memaksa’ orang lain untuk melakukan sesuatu sesuai dengan harapan atau keinginan anda. Tentu saja ‘pemaksaan’ yang dilakukan tidak secara terang-terangan atau diluar tingkah laku normal yang biasa dilakukan sang korban. Manusia cenderung untuk percaya atau mudah terpengaruh terhadap orang yang memiliki nama besar, pernah (atau sedang berusaha) memberikan pertolongan, dan memiliki kata-kata atau penampilan yang meyakinkan. Hal ini sering dimanfaatkan pelaku social engineering untuk menjerat korbannya. Seringkali sang pelaku membuat suatu kondisi agar kita memiliki semacam ketergantungan kepadanya.Ya, tanpa kita sadari dia mengkondisikan kita dalam suatu masalah dan membuat ( seolah – olah hanya ) dialah yang bisa mengatasi masalah itu. Dengan demikian,tentu kita akan cenderung untuk menuruti apa yang dia instruksikan tanpa merasa curiga.&lt;br /&gt;
&lt;br /&gt;
Sosial Engineering adakalanya menjadi ancaman serius. Memang sepertinya tidak ada kaitan dengan teknologi, namun sosial engineering tetap layak diwaspadai karena bisa berakibat fatal bagi sistem anda. Why?? Karena bagaimanapun juga suatu komputer tetap saja tidak bisa lepas dari manusia. Ya, tidak ada satu sistem komputerpun di muka bumi ini yang bisa lepas dari campur tangan manusia. sehebat apapun pertahanan anda, jika anda sudah dikuasai oleh attacker melalui social engineering, maka bisa jadi anda sendirilah yang membukakan jalan masuk bagi sang attacker.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;[2]. KeyLogger&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhomZCOLTcoyH5Ozly27u1UKf6uUTP8N13ao-2EwKKFTjI3O5AIED5new1BWjmll_7fDC_3l7WUEhpoiX23rLbwtwmiaNm3iABl6Who-9Vcp9E0nLX8_CoK_A7cIxzbIcQBgv5-M_1cbV_Q/s1600/actualspy2.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhomZCOLTcoyH5Ozly27u1UKf6uUTP8N13ao-2EwKKFTjI3O5AIED5new1BWjmll_7fDC_3l7WUEhpoiX23rLbwtwmiaNm3iABl6Who-9Vcp9E0nLX8_CoK_A7cIxzbIcQBgv5-M_1cbV_Q/s320/actualspy2.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;KeyLogger adalah software yang dapat merekam aktivitas user. Hasil rekaman itu biasa disimpan berupa teks atau gambar. KeyLogger bekerja berdasarkan ketukan keyboard user. Aplikasi ini mampu mengenali form-form sensitif seperti form password misalnya.&lt;/div&gt;&lt;br /&gt;
Ada cara aman untuk menghindari keyloger:&lt;br /&gt;
1. Gunakan password dengan karakter special seperti !@#$%^&amp;amp;*(){}[]. Kebanyakan keyloger akan mengabaikan karakter ini sehingga sang pelaku (pemasang keyloger) tidak akan mendapatkan password anda yang sebenarnya.&lt;br /&gt;
&lt;br /&gt;
2. Persiapkan password dari rumah, simpan dalam bentuk teks. Saat ingin memasukkan password, tingal copy-paste ajah. Keyloger akan membaca password anda berdasarkan ketukan keyboard. Namun cara ini agak beresiko. Mengapa? karena saat anda melakukan copy, data anda akan tersimpan di clipboard. Saat ini banyak dijumpai software-software gratis yang bisa menampilkan data dalam clipboard.&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;[3]. Web Spoofing&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdlGUZUTE8AD4UlGrerxgTyzQ6IBJdUOv8-mpHiph88jb31fXJHeqiM4U8eyP07SFdiz3rQdjNFdwEGFIsXNsx86b_OmqZ2d_EIZEzIGnGFNtTeQkjvqZWFviOjB6oNyvPvbuQFHy6-FDp/s1600/spoofing.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdlGUZUTE8AD4UlGrerxgTyzQ6IBJdUOv8-mpHiph88jb31fXJHeqiM4U8eyP07SFdiz3rQdjNFdwEGFIsXNsx86b_OmqZ2d_EIZEzIGnGFNtTeQkjvqZWFviOjB6oNyvPvbuQFHy6-FDp/s320/spoofing.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Masih ingat kasus pecurian Account sejumlah nasabah Bank BCA? Ya, itulah salah satu contoh nyata dari Web spoofing. Inti dari tehnik ini ialah dengan memanfaatkan kesalahan user saat mengetikkan alamat situs pada address bar. Pada dasarnya, Web Spoofing adalah usaha untuk menipu korban agar mengira dia sedang mengakses suatu situs tertentu, padahal bukan.&lt;/div&gt;&lt;br /&gt;
Pada kasus bank BCA, pelaku membuat situs yang sangat mirip dan identik dengan situs aslinya sehingga sang korban yang terkecoh tidak akan merasa ragu mengisikan informasi sensitif seperti user name dan Passwordnya. Padahal, karena situs tersebut adalah situs tipuan, maka semua informasi berharga tadi terekam oleh webserver palsu, yaitu milik sang pelaku.&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;[4]. Menghadang Email&lt;/b&gt;&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8jgSZw-W_C6SySEwZzhlBdSvYT3-Ps0-YrWHwjTSoHK1FAs9OXlgmP2Ni2ldnd5nNPoV2EPyQi3av6slS-oYbKdCqekNSKvo7JDs8OxOm1hKAb3o00zyTH1eq0n_VPGPLQV9AWCBqHWZB/s1600/Mailsnarf.webp&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;242&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8jgSZw-W_C6SySEwZzhlBdSvYT3-Ps0-YrWHwjTSoHK1FAs9OXlgmP2Ni2ldnd5nNPoV2EPyQi3av6slS-oYbKdCqekNSKvo7JDs8OxOm1hKAb3o00zyTH1eq0n_VPGPLQV9AWCBqHWZB/s320/Mailsnarf.webp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Menghadang email? Ya, dan sangat mudah untuk melakukan hal ini. Salah satu cara adalah dengan menggunakan mailsnarf yang terdapat pada utility dsniff. Cara kerja Mailsnarf adalah dengan menghadang paket data yang lewat di Internet dan menyusunnya menjadi suatu email utuh.&lt;br /&gt;
&lt;br /&gt;
Dsniff dan mailsnift merupakan software bekerja atas dasar WinPcap (setara dengan libcap pada Linux) yaitu suatu library yang menangkap paket-paket data. Paket-paket yang ditangkap ini akan disimpan dalam bentuk file oleh Windump, sedangkan Dsniff dan MailSnarf bertindak lebih jauh lagi yaitu menganalisa paket-paket data ini dan menampilkan password (dsniff) atau isi email (mailsnarf).&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[5]. Password Cracking&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6hdTqTScfxj_0xsygpEmFHzCal0VRyWdmRFpQzM-tqmq3bw1rh1lYhCAhOU4uvRW0gVn9KfrIATiVFs6MfS_kT0XuMA81RaN67CGkMOSviDMdPrbNOb1sc9JcZDEn7rs2KNDm4wxfodNH/s1600/MSsql+brute+force+attacker.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;274&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6hdTqTScfxj_0xsygpEmFHzCal0VRyWdmRFpQzM-tqmq3bw1rh1lYhCAhOU4uvRW0gVn9KfrIATiVFs6MfS_kT0XuMA81RaN67CGkMOSviDMdPrbNOb1sc9JcZDEn7rs2KNDm4wxfodNH/s320/MSsql+brute+force+attacker.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
‘Hacking while sleeping.’ itulah ungkapan yang biasa dipakai oleh orang-orang yang melakukan password cracking. Mengapa? Karena pada umumnya dibuthkan waktu yang lama untuk melakukan pasword cracking. Bisa berjam-jam, bahkan berhari – hari! Semua itu tergantung dari target, apakah sang target menggunakan password yang umum, password memiliki panjang karakter yang tidak biasa, atau password memiliki kombinasi dengan karakter-karakter special.&lt;br /&gt;
&lt;br /&gt;
Salah satu software yang biasa digunakan untuk melakukan hal ini ialah dengan mengunakan Brutus, salah satu jenis software remote password cracker yang cukup terkenal. Brutus bekerja dengan teknik dictionary attack atau bruce-force attack terhadap port-port http, POP3,ftp, telnet, dan NetBIOS.&lt;br /&gt;
&lt;br /&gt;
Dictionary Attack bekerja dengan mencobakan kata-kata yang ada dalam kamus password. Sedangkan brute – force attack bekerja dengan mencobakan semua kombinasi huruf, angka, atau karakter.&lt;br /&gt;
&lt;br /&gt;
Brute Force Atack bekerja sangat lambat dan membutuhkan waktu yang lama tergantung dari jenis spesifikasi komputernya dan panjang karakter passwordnya. Saat ini telah banyak situs yang menutup akses terhadap akses terhadap usaha login yang secara terus-menerus tidak berhasil.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[6]. Session Hjacking&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYSHA1o0CAkbyzuGpNRBlqA6Z3ELDdDHgOKZ5W_5XeSS_EZyzskxDnCk58rf-nONrbQXBoqvh7lQhKpvzfmmSx1PM52MV5j6XDMuciGDZileTTQvOXUUojkc15jhJGvqBsKJrhrqfI5rlv/s1600/session1.webp&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;290&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYSHA1o0CAkbyzuGpNRBlqA6Z3ELDdDHgOKZ5W_5XeSS_EZyzskxDnCk58rf-nONrbQXBoqvh7lQhKpvzfmmSx1PM52MV5j6XDMuciGDZileTTQvOXUUojkc15jhJGvqBsKJrhrqfI5rlv/s320/session1.webp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
Session hijacking dewasa ini semakin marak dikalangan para attacker. Session Hijacking biasa dilakukan dengan melakukan peniruan cookies. Jadi pada intinya, kita harus bisa meniru cookies sang korban untuk mendapatkan sesi loginnya.&lt;br /&gt;
&lt;br /&gt;
Lalu bagaimana cara mendapatkan cookies sang korban?&lt;br /&gt;
&lt;br /&gt;
1. Dengan analisa Cookies.&lt;br /&gt;
Cara ini relatif sulit dilakukan.&lt;br /&gt;
2. Mencuri Cokies.&lt;br /&gt;
Misalnya Sang Attacker ingin mendapatkan account si A. Sang Attacker bisa dengan mudah membuat semacam script Java Script yang disisipkan dalam email untuk dikirim ke korban.Saat korban membuka email itu, tanpa sadar cookiesnya akan dicuri dan direkam ke suatu webserver dengan memanfaatkan suatu script PHP.&lt;br /&gt;
&lt;br /&gt;
Belakangan ini yang paling sering menjadi incaran adalah account Friendster. Ada yang menyisipkan suatu scipt lewat testimonial, ada yang menyisipkannya di profilnya sendiri untuk mencuri cookies sang korban dan lain sebagainya. Saya memiliki tips untuk ini:&lt;br /&gt;
&lt;br /&gt;
1. Jangan menggunakan browser Internet Explorer&lt;br /&gt;
Saat ingin membuka profil orang lain, jangan menggunakan Internet Explorer. Catat alamat profil yang ingi anda lihat,logout terlebih dahulu dari account anda dan bersihkan semua cookies, baru kemudian bukalah profil Friendster tujuan.&lt;br /&gt;
&lt;br /&gt;
2. Periksa Source CODEnya&lt;br /&gt;
Ketika menerima testimonial, periksa terlebih dahulu source codenya. Apakah disana terdapat script asing atau kata-kata yang identik dengan pembajakan seperti :&lt;br /&gt;
&lt;br /&gt;
‘HACKED’, ‘DEFACED’, ‘OWNED’.. dll..&lt;br /&gt;
Jika ragu-ragu……. reject ajah..&lt;br /&gt;
&lt;br /&gt;
3. LogOUT tiba-tiba.&lt;br /&gt;
Waspada ketika tanpa suatu alasan yang jelas tiba-tiba anda logout dengan sendirinya dari account anda. Saat anda diminta memasukkan username dan password, lihat dulu addressbar anda! apakan anda sedang berada di situs yang semestinya atau tidak. Periksa source code halaman tersebut.Lihat pada form action, kemana informasi anda nantinya akan dikirim.&lt;br /&gt;
&lt;br /&gt;
Sebenarnya session hijacking bisa dicegah jika saja sang penyedia layanan memperhatikan hal-hal berikut:&lt;br /&gt;
1. Menetapkan session identifier yang unik&lt;br /&gt;
2. Menetapkan sistem identifier berpola acak&lt;br /&gt;
3. Session identifier yang independen&lt;br /&gt;
4. Session identifier yang bisa dipetakan dengan koneksi&lt;br /&gt;
client side.&lt;br /&gt;
Fenomena lain adalah, hingga saat artikel ini diterbitkan, ternyata masih banyak dijumpai para user yang tidak melakukan sign out setelah membuka accountnya. Dengan demikian, orang lain yang mengunakan komputer itu dan membuka website yang sama dengan yang telah dibuka oleh orang pertama akan otomatis login ke account sang korban.&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[7]. Menjadi Proxy Server&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQlLOHLop1P6hng8no5hLWmt9KyrTzRaBXifgVMfFDzdKjl-HwxLABOv3MjjJ3-gbq5w7yn66zPNnirBp3LWOoGKNUV1koMqR52eQIpEkRL_DiDomICOjhqvGw94DTPOrnpTnvXGue0k1h/s1600/proxy%252Bserver.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;193&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQlLOHLop1P6hng8no5hLWmt9KyrTzRaBXifgVMfFDzdKjl-HwxLABOv3MjjJ3-gbq5w7yn66zPNnirBp3LWOoGKNUV1koMqR52eQIpEkRL_DiDomICOjhqvGw94DTPOrnpTnvXGue0k1h/s320/proxy%252Bserver.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Kita bisa mengumpulkan informasi dengan menjadi proxy server bagi korban untuk dapat berselancar. Dengan menjadi proxy server, seluruh identitas sang peselancar bisa menjadi milik kita.&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[8]. Memanfaatkan Kelalaian user dalam penggunaan fiturbrowser&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://ndroe.web.id/content/uploads/2011/02/password_exporter.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;302&quot; src=&quot;http://ndroe.web.id/content/uploads/2011/02/password_exporter.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
Setiap browser tentunya memiliki fitur yang ditujukan untuk kemudahan dan kenyamanan penggunanya dalam berselancar. Diantaranya ialah dengan adanya cache dan Password Manager.&lt;br /&gt;
&lt;br /&gt;
Di Internet tentunya banyak suatu website yang isinya tidak berubah dalam beberapa hari (Contohnya spyrozone.tk nich.. hehehe Nah, untuk situs yang seperti ini cache menjadi hal yang sangat berguna. Cache akan menyimpan file-file hasil browsing sehinga nantinya jika anda berkunjung lagi ke situs tersebut browser tidak perlu lagi melakukan download untuk kedua kalinya dari server sehingga setiap halaman situs yang telah anda buka sebelumnya akan terbuka dengan lebih cepat. Semua itu biasanya diatur oleh header time to live.&lt;br /&gt;
&lt;br /&gt;
Lho, bagaimana dengan situs-situs penyedia berita yang selalu up to date? Untuk site yang seperti itu, time to live-nya akan di set=0 sehinga nantinya anda akan terus melakukan download setiap kali berkunjung.&lt;br /&gt;
&lt;br /&gt;
Cukup nyaman bukan? Ya, tapi ancaman mulai timbul. Cobalah kini anda jelajahi opsi-opsi yang berkaitan dengan cache pada browser anda. Tentu anda bisa menemui bahwa ada fasilitas untuk menentukan berapa besarnya file temporary yang bisa disimpan di harddisk. Cari juga lokasi dimana file-file tersebut akan disimpan.&lt;br /&gt;
&lt;br /&gt;
Coba anda buka folder tersebut, anda akan menemui file-file html &amp;amp; file-file gambar dari site-site yang sudah anda kunjungi. Pada Browser IE, anda bisa melihat lokasi file cache dengan menjelajahi menu Tools — Internet options — Settings&lt;br /&gt;
&lt;br /&gt;
Lalu apa yang bisa didapatkan?? toh cuma file-file ‘sampah’?? Hmm… sekarang coba anda copy semua file yang ada di sana ke suatu folder. Lalu bukalah salah-satu file htmlnya. Jika itu komputer publik,anda bisa mengetahui situs apa saja yang telah diakses oleh oleh orang sebelum anda.&lt;br /&gt;
&lt;br /&gt;
Hmm.. hanya dengan melihat file temporary anda bahkan bisa melihat password dan dll. Banyak saya temui situs yang menyimpan password dan menampilkannya pada url. Tentunya anda juga pasti sering membacanya di berbagai tutorial.&lt;br /&gt;
&lt;br /&gt;
Kebanyakan browser pada saat ini memiliki fasilitas untuk menyimpan password. Misalnya saat meggunakan Mozilla Firefox, anda pasti sering menerima kotak dialog konfirmasi yang menanyakan apakah anda ingin password anda disimpan atau tidak oleh PasswordManager. Kebanyakan user cenderung untuk memilih opsi YES, entah itu dengan penuh kesadaran atau memang mereka tidak tau ( baca: tidak mau tau) apa maksud dari kotak dialog itu.&lt;br /&gt;
&lt;br /&gt;
Orang lain yang kemudian mengunakan browser itu bisa dengan sangat mudah mendapatkan password korban dengan memasuki menu Tools — Options — Security – Saved password.&lt;br /&gt;
&lt;br /&gt;
Contoh lain adalah fasilitas wand password yang dimiliki oleh browser Opera. Saat anda memasukkan user name dan password pada suatu form dan menekan tombol submit, opera secara default akan meminta konfirmasi kepada anda apakah anda ingin browser menyimpan id dan password anda atau tidak. Lagi dan lagi… kebanyakan netter ceroboh, mereka cenderung untuk memilih opsi ‘YES’.&lt;br /&gt;
&lt;br /&gt;
Lalu?? Orang lain yang kemudian menggunakan browser itu bisa melihat situs apa saja yang telah diakses oleh user, arahkan browser ke situs tersebut, letakkan cursor pada form isian user name, tekan [ALT]+[ENTER] dan BOOOMM!!!! Kenapa?? Jangan kaget dulu!! Hehehe.. form login akan otomatis terisi dengan user name korban lengkap dengan passwordnya (It’s fun enough..&lt;br /&gt;
&lt;br /&gt;
Ini hanya sebagian kecil contoh, jelajahi fitur-firtur browser lain!&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[9]. Googling&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFi1lT0HBMXeDZf4JcpFKG7N4Ai-pusVpggilKqtihoOctCca2YDULpDb1vISRacnwbSiF_frrSoPIZGic7o4uzIdawUNTucHcqTtF0ZCn-iBcIMjcAnxUs_KO5pNxO3oxWT9gkELmZOI/s1600/Best+Web+Browsers+Internet+Explorer+%2528IE%2529+8+Mozilla+Firefox+Safari+Opera+Chrome.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;203&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFi1lT0HBMXeDZf4JcpFKG7N4Ai-pusVpggilKqtihoOctCca2YDULpDb1vISRacnwbSiF_frrSoPIZGic7o4uzIdawUNTucHcqTtF0ZCn-iBcIMjcAnxUs_KO5pNxO3oxWT9gkELmZOI/s320/Best+Web+Browsers+Internet+Explorer+%2528IE%2529+8+Mozilla+Firefox+Safari+Opera+Chrome.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
Google.com. Banyak sudah situs yang runtuh, password dan nomor – nomor kartu kredit yang dicuri akibat dari ulah orang yang menyalahgunaan kesaktiannya Dahulu, hal ini mudah dilakukan.Hanya dengan mengetikkan kata kunci tertentu yang berkaitan dengan user name dan password, anda bisa memanen ratusan password user melalui google. Tapi sekarang tampaknya anda harus gigit jari jika menggunakan cara diatas&lt;br /&gt;
&lt;br /&gt;
Jangan sedih dulu karena Google baru saja menelurkan produk barunya, yaitu Google Code Search. Ancaman baru mulai timbul, ‘si pintar’ ini kini dapat meng-crawl hingga kepada archive file yang berada di public directory web server. Hati-hati yang punya kebiasaan untuk menyimpan informasi penting di dalamnya (password, dan info berharga lainnya) Sebaiknya mulai sekarang kebiasaan itu dihilangkan. Selalu proteksi folder-folder yang sensitif agar situs anda bisa hidup lebih lama. Kalo nggak… yach.. tunggu ajah ada orang yang memanfaatkan produk baru google ini untuk mengeruk informasi sensitif dari web server anda. dan jika itu sudah terjadi… maka bersiaplah.. ‘taman bermain’ anda akan diambil alih olehnya..&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;[10] Phising&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.thebobbysteele.com/wp-content/uploads/2006/10/phising.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;http://www.thebobbysteele.com/wp-content/uploads/2006/10/phising.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;Phising , adalah tindakan memperoleh informasi pribadi seperti User ID, PIN, nomor rekening, nomor kartu kredit Anda secara tidak sah. Informasi ini kemudian akan dimanfaatkan oleh pihak penipu untuk mengakses rekening, melakukan penipuan kartu kredit atau memandu nasabah untuk melakukan transfer ke rekening tertentu dengan iming-iming hadiah&lt;/div&gt;&lt;div&gt;Aksi ini semakin marak terjadi. Tercatat secara global, jumlah penipuan bermodus phising selama Januari 2005 melonjak 42% dari bulan sebelumnya. Anti-Phishing Working Group (APWG) dalam laporan bulanannya, mencatat ada 12.845 e-mail baru dan unik serta 2.560 situs palsu yang digunakan sebagai sarana phishing.&lt;/div&gt;&lt;div&gt;Selain terjadi peningkatan kuantitas, kualitas serangan pun juga mengalami kenaikan. Artinya, situs-situs palsu itu ditempatkan pada server yang tidak menggunakan protokol standar sehingga terhindar dari pendeteksian&lt;/div&gt;&lt;div&gt;Bagaimana phishing dilakukan?&lt;/div&gt;&lt;div&gt;Teknik umum yang sering digunakan oleh penipu adalah sebagai berikut:&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;div&gt;Penggunaan alamat e-mail palsu dan grafik untuk menyesatkan Nasabah sehingga Nasabah terpancing menerima keabsahan e-mail atau web sites. Agar tampak meyakinkan, pelaku juga seringkali memanfaatkan logo atau merk dagang milik lembaga resmi, seperti; bank atau penerbit kartu kredit. Pemalsuan ini dilakukan untuk memancing korban menyerahkan data pribadi, seperti; password, PIN dan nomor kartu kredit&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Membuat situs palsu yang sama persis dengan situs resmi.atau . pelaku phishing mengirimkan e-mail yang berisikan link ke situs palsu tersebut.&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Membuat hyperlink ke web-site palsu atau menyediakan form isian yang ditempelkan pada e-mail yang dikirim.&lt;/div&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
Naskah Asli : http://www.binushacker.net/bebagai-cara-membajak-password.html&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;ul&gt;&lt;/ul&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;color: #cc0000;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;</description><link>http://coding-androidadv.blogspot.com/2012/01/bebagai-cara-membajak-password.html</link><author>noreply@blogger.com (AndroidADV)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgn-oDYpoS_pIMjerXd4sZRi1xifacrZUN3OD4lo4UXiLaXKOd60Xlxku4LL_O-GaagVW052Ub_4xUZ3OGrfR6vz2w7Ty6PpxsVpODynGHP852l-vLy6JJi4SwIpBcjufiWxxUtt9PTbVuz/s72-c/SocialEngineering.webp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4669357348104312371.post-1635456972255248933</guid><pubDate>Mon, 09 Jan 2012 11:15:00 +0000</pubDate><atom:updated>2012-01-09T18:15:02.065+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hardware</category><category domain="http://www.blogger.com/atom/ns#">printer</category><category domain="http://www.blogger.com/atom/ns#">resetter</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Reset Printer EPSON T11</title><description>Ada beberapa jenis printer yang sering mengalami blinking adalah printer yang bermerk epson dan canon, untuk epson seperti tipe T10, T11, T20, C41, C45, C90 untuk printer canon misalnya IP100, IP1600, atau seri IP lainnya. Untuk kali ini akan saya bahas adalah cara reset printer sendiri untuk tipe epson t10 dan t11 yang biasanya tipe ini sudah di modifikasi dengan menggunakan tinta infus. kelebihan dan kekurangan printer infus dan tidan infus akan saya bahas nanti. Oke langsung saya ikuti langkah-langkahnya cara reset printer epson t10 dan t11.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp67_2Z-P9oEsyIcMRVkTm03Kuapl1lCpcIwIRYNVYdd-cAnTobtxCZqLczy1HfBvK2_0NM2OYznF7LSBHPgUR_SuAWKNrxXP6o0vkf-l8EvsLcy3BsRahxbYIQmK07UydW6BdHA8NoBW7/s1600/epson-stylus-t11-inkjet-printer.webp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp67_2Z-P9oEsyIcMRVkTm03Kuapl1lCpcIwIRYNVYdd-cAnTobtxCZqLczy1HfBvK2_0NM2OYznF7LSBHPgUR_SuAWKNrxXP6o0vkf-l8EvsLcy3BsRahxbYIQmK07UydW6BdHA8NoBW7/s400/epson-stylus-t11-inkjet-printer.webp&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Download file reset Download &lt;a href=&quot;http://adf.ly/4YxZc&quot;&gt;reseter printer EPSON T10 dan T11&lt;/a&gt;&lt;/div&gt;&lt;ol&gt;&lt;li&gt;&lt;div&gt;Ekstrak File Menggunakan Winzip, 7Zip atau Winrar&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Double Klik Loader.exe (Ingat!! Jangan klik AdjProg.exe)&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Klik Accept&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Klik Select Untuk memilih Jenis printer.&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Klik Particular adjustment Mode&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Cari Tulisan Waste Ink pad Counter&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Klik OK&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Klik Check untuk mengecek Main pad Counter&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Klik Initialization&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Matikan Printer jika di minta.&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Nyalakan kembali&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div&gt;Klik Finish&lt;/div&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;br /&gt;
&lt;div&gt;Selamat Mencoba!&lt;/div&gt;</description><link>http://coding-androidadv.blogspot.com/2012/01/how-to-reset-printer-epson-t11.html</link><author>noreply@blogger.com (AndroidADV)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjp67_2Z-P9oEsyIcMRVkTm03Kuapl1lCpcIwIRYNVYdd-cAnTobtxCZqLczy1HfBvK2_0NM2OYznF7LSBHPgUR_SuAWKNrxXP6o0vkf-l8EvsLcy3BsRahxbYIQmK07UydW6BdHA8NoBW7/s72-c/epson-stylus-t11-inkjet-printer.webp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4669357348104312371.post-5834420859038010811</guid><pubDate>Sun, 08 Jan 2012 11:15:00 +0000</pubDate><atom:updated>2012-01-08T18:15:00.093+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">coding</category><category domain="http://www.blogger.com/atom/ns#">crack</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>CC Checker Private Tools</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3w_BTZ7aW3QRNYM3s3TtlUPnZmxXQLbevXe_2nL16gW3_tMJhDqSfmEm5E1HucjUCx_ncVit_LrV2XLwirlvus2TJMdNREjrrmbY3y67HAp3xK_CAqPjKZzqn7mACW78cvtvZbtFR0O03/s1600/cc+checker.webp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3w_BTZ7aW3QRNYM3s3TtlUPnZmxXQLbevXe_2nL16gW3_tMJhDqSfmEm5E1HucjUCx_ncVit_LrV2XLwirlvus2TJMdNREjrrmbY3y67HAp3xK_CAqPjKZzqn7mACW78cvtvZbtFR0O03/s1600/cc+checker.webp&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Heyoo ...&lt;br /&gt;
I Have Tools for checking valid ato invalid a Credit Card&lt;br /&gt;
&amp;nbsp;Before You order something or anything in internet&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://adf.ly/4Ywmy&quot;&gt;Download Here&lt;/a&gt;</description><link>http://coding-androidadv.blogspot.com/2012/01/cc-checker-private-tools.html</link><author>noreply@blogger.com (AndroidADV)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3w_BTZ7aW3QRNYM3s3TtlUPnZmxXQLbevXe_2nL16gW3_tMJhDqSfmEm5E1HucjUCx_ncVit_LrV2XLwirlvus2TJMdNREjrrmbY3y67HAp3xK_CAqPjKZzqn7mACW78cvtvZbtFR0O03/s72-c/cc+checker.webp" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4669357348104312371.post-8957687693204826750</guid><pubDate>Sat, 07 Jan 2012 11:15:00 +0000</pubDate><atom:updated>2012-01-07T18:15:00.093+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">coding</category><category domain="http://www.blogger.com/atom/ns#">html5</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Making Snake Game in HTML5</title><description>Halaman 404 ato maintenance adalah suatu masa dimana kita harus menyiapkan page khusus untuk itu, nah begitu pun saya, dan kemaren kemaren saya coba belajar tentang canvas yang notabenya adalah tag baru yang di muncukan pada html5, nah sekarang sialakan di nikmati hasil nya  &lt;br /&gt;
&lt;br /&gt;
Silakan di coba &lt;br /&gt;
Demo : http://anggamovic.co.tv/demo/snake.php&lt;br /&gt;
&lt;br /&gt;
Source :&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&amp;lt;!documentTYPE html&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;html lang=”en”&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;head&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;meta charset=”utf-8″ /&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;title&amp;gt;Play Snake Game&amp;lt;/title&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;style type=”text/css”&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; body {text-align:center;}&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; canvas { border:5px dotted #ccc; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; h1 { font-size:50px; text-align: center; margin: 0; padding-bottom: 25px;}&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;/style&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;script type=”text/javascript”&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; function play_game()&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var level = 160; // Game level, by decreasing will speed up&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var rect_w = 45; // Width&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var rect_h = 30; // Height&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var inc_score = 50; // Score&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var snake_color = “#006699″; // Snake Color&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var ctx; // Canvas attributes&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var tn = []; // temp directions storage&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var x_dir = [-1, 0, 1, 0]; // position adjusments&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var y_dir = [0, -1, 0, 1]; // position adjusments&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var queue = [];&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var frog = 1; // defalut food&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var map = [];&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var MR = Math.random;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var X = 5 + (MR() * (rect_w – 10))|0; // Calculate positions&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var Y = 5 + (MR() * (rect_h – 10))|0; // Calculate positions&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var direction = MR() * 3 | 0;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var interval = 0;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var score = 0;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var sum = 0, easy = 0;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var i, dir;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; // getting play area&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var c = document.getElementById(‘playArea’);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; ctx = c.getContext(’2d’);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; // Map positions&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; for (i = 0; i &amp;lt; rect_w; i++)&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; map[i] = [];&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; // random placement of snake food&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; function rand_frog()&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var x, y;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; do&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; x = MR() * rect_w|0;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; y = MR() * rect_h|0;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; while (map[x][y]);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; map[x][y] = 1;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; ctx.fillStyle = snake_color;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; ctx.strokeRect(x * 10+1, y * 10+1, 8, 8);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; // Default somewhere placement&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; rand_frog();&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; function set_game_speed()&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; if (easy)&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; X = (X+rect_w)%rect_w;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; Y = (Y+rect_h)%rect_h;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; –inc_score;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; if (tn.length)&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; dir = tn.pop();&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; if ((dir % 2) !== (direction % 2))&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; direction = dir;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; if ((easy || (0 &amp;lt;= X &amp;amp;&amp;amp; 0 &amp;lt;= Y &amp;amp;&amp;amp; X &amp;lt; rect_w &amp;amp;&amp;amp; Y &amp;lt; rect_h)) &amp;amp;&amp;amp; 2 !== map[X][Y])&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; if (1 === map[X][Y])&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; score+= Math.max(5, inc_score);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; inc_score = 50;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; rand_frog();&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; frog++;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; //ctx.fillStyle(“#ffffff”);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; ctx.fillRect(X * 10, Y * 10, 9, 9);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; map[X][Y] = 2;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; queue.unshift([X, Y]);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; X+= x_dir[direction];&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; Y+= y_dir[direction];&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; if (frog &amp;lt; queue.length)&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; dir = queue.pop()&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; map[dir[0]][dir[1]] = 0;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; ctx.clearRect(dir[0] * 10, dir[1] * 10, 10, 10);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; else if (!tn.length)&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var msg_score = document.getElementById(“msg”);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; msg_score.innerHTML = “Thank you for playing game.&amp;lt;br /&amp;gt; Your Score : &amp;lt;b&amp;gt;”+score+”&amp;lt;/b&amp;gt;&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&amp;lt;input type=’button’ value=’Play Again’ onclick=’window.location.reload();’ /&amp;gt;”;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; document.getElementById(“playArea”).style.display = ‘none’;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; window.clearInterval(interval);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; interval = window.setInterval(set_game_speed, level);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; document.onkeydown = function(e) {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; var code = e.keyCode – 37;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; if (0 &amp;lt;= code &amp;amp;&amp;amp; code &amp;lt; 4 &amp;amp;&amp;amp; code !== tn[0])&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; tn.unshift(code);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; else if (-5 == code)&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; if (interval)&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; window.clearInterval(interval);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; interval = 0;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; else&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; interval = window.setInterval(set_game_speed, 60);&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; else&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; dir = sum + code;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; if (dir == 44||dir==94||dir==126||dir==171) {&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; sum+= code&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; } else if (dir === 218) easy = 1;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; }&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;/script&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;/head&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;body onload=”play_game()”&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;h1&amp;gt;Play Snake Game&amp;lt;/h1&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;div id=”msg”&amp;gt;&amp;lt;/div&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;canvas id=”playArea” width=”450″ height=”300″&amp;gt;Sorry your browser does not support HTML5&amp;lt;/canvas&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;/body&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt; &amp;lt;/html&amp;gt;&lt;/blockquote&gt;&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;br /&gt;
&lt;/blockquote&gt;Keep learning &lt;br /&gt;
Silakan di kembangkan &lt;br /&gt;
Demo : http://anggamovic.co.tv/demo/snake.php&lt;br /&gt;
&lt;br /&gt;
Originall post : http://www.binushacker.net/membuat-snake-game-dengan-html5.html</description><link>http://coding-androidadv.blogspot.com/2012/01/making-snake-game-in-html5.html</link><author>noreply@blogger.com (AndroidADV)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4669357348104312371.post-6566561366071758873</guid><pubDate>Fri, 06 Jan 2012 11:15:00 +0000</pubDate><atom:updated>2012-01-06T18:15:00.658+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">coding</category><category domain="http://www.blogger.com/atom/ns#">crack</category><category domain="http://www.blogger.com/atom/ns#">opensource</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Enkripsi USB Drive with Truecrypt</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEd20EcfjDoyaBNFlttVPJnQiJ-kUUXojrymxuxHrDhrVu4QBnx2Xhn6fdIYT0XtijX9seJlf3mz_FP3uoPdb2BOOBQZV_k6B1juq8WBAngsMugDZBHtNEefnL1zON1E6kYjvNdeaBha5K/s1600/enkripsi-encrypt-USB.webp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;160&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEd20EcfjDoyaBNFlttVPJnQiJ-kUUXojrymxuxHrDhrVu4QBnx2Xhn6fdIYT0XtijX9seJlf3mz_FP3uoPdb2BOOBQZV_k6B1juq8WBAngsMugDZBHtNEefnL1zON1E6kYjvNdeaBha5K/s320/enkripsi-encrypt-USB.webp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Aplikasi ini Untuk mengamankan USB kita dari pencuri sehingga data sensitif kita menjadi lebih aman dan nyaman.&lt;/div&gt;Disamping itu juga agar data private anda akan jauh lebih terjaga + kalau USB hilang kita tidak khawatir dengan isi data yang ada di dalam USB &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;http://adf.ly/4YuY3&quot;&gt;Download Here&amp;nbsp;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Tutorial nya bisa diliaat di Video Ini&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/L5Cis0E6Z6I?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;</description><link>http://coding-androidadv.blogspot.com/2012/01/enkripsi-usb-drive-with-truecrypt.html</link><author>noreply@blogger.com (AndroidADV)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEd20EcfjDoyaBNFlttVPJnQiJ-kUUXojrymxuxHrDhrVu4QBnx2Xhn6fdIYT0XtijX9seJlf3mz_FP3uoPdb2BOOBQZV_k6B1juq8WBAngsMugDZBHtNEefnL1zON1E6kYjvNdeaBha5K/s72-c/enkripsi-encrypt-USB.webp" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4669357348104312371.post-6195310371570759635</guid><pubDate>Thu, 05 Jan 2012 12:20:00 +0000</pubDate><atom:updated>2012-01-05T19:21:24.792+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">coding</category><category domain="http://www.blogger.com/atom/ns#">crack</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Find Hackers and Security Holes Using WIRESHARK!!</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIU8MQ8B6F73Gs9QZVYF5ybKSpfLxwMSf8JwbEn6UXeJAsNn2TCfOame4_Sxdcy06zV3LGThlNkS3KUZigYoPsmrAwODgsy3BB3druDbSiAtW989xeqS89vgGdQpXv9swyqBBU9AMDJYdm/s1600/Wireshark+Hacker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIU8MQ8B6F73Gs9QZVYF5ybKSpfLxwMSf8JwbEn6UXeJAsNn2TCfOame4_Sxdcy06zV3LGThlNkS3KUZigYoPsmrAwODgsy3BB3druDbSiAtW989xeqS89vgGdQpXv9swyqBBU9AMDJYdm/s1600/Wireshark+Hacker.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Heyooo ..... &lt;br /&gt;
&lt;br /&gt;
Up to now I have done few posts regarding hacking.. On this post I would like to introduce you a great tool called &quot;Wireshark&quot; in order to find out security vulnerabilities in your network, in other word find out hackers who accessing your computer or the network .... huh&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The scenario is like this;&lt;/b&gt;&lt;br /&gt;
Think you are currently working on a computer network. There are thousands of computers. You feel someone is monitoring on you or someone is accessing your PC or someone is sniffing your yahoo chats or else you need to know which sites, IPs and Ports you are currently connected through your PC.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Test this command on your Windows Command Prompt:-&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;C:\&amp;gt;netstat -a &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
If you type that command on you Windows Command Prompt you could find out all the sites, IPs and Ports and people who currently accessing you computer. But if there is a serious hacking is going on its not enough to find out the bugger.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;So lets move on to the topic.&lt;/b&gt;&lt;br /&gt;
Wireshark (formerly known as Ethereal) is an extremely valuable tool which capable to scan Wireless and Ethernet data and comes with some robust filtering capabilities. In another words Wireshark is a network protocol analyzer, or “packet sniffer”, that captures and shows contents of network frames. It runs on Unix/Linux, and Windows. Wireshark uses the WinPcap project to capture packets (lipcap on Linux).&lt;br /&gt;
&lt;br /&gt;
If you are a network administrator it would be really useful to control your network interface and find security holes. Even the Linux platform is vulnerable to attacks. This is an open source network packet sniffing product that would watch on DNS, TCP, UDP, HTTP and most the known network protocols.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinnojJAV98biS8rBA5N8_vl-MyhpWO8_zO8Wq4xIWLR890EStqFpYZERHr6QW9bMFe2fjIWVVgQhuc8_3fHkLGxRi60yflgEpOo5ge4tSWD0mtV1tR0yAk8nL1uEBUG6Gjda6d5VNPmn3z/s1600/wireshark.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinnojJAV98biS8rBA5N8_vl-MyhpWO8_zO8Wq4xIWLR890EStqFpYZERHr6QW9bMFe2fjIWVVgQhuc8_3fHkLGxRi60yflgEpOo5ge4tSWD0mtV1tR0yAk8nL1uEBUG6Gjda6d5VNPmn3z/s1600/wireshark.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;You can see the content of the captured data packets as well. If some other data packets going though your network location that would be captured as well. For example you can see the data packets received to the PCs that next to you. By looking at the content of data packets you can read their chat records as well.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;Download &lt;a href=&quot;http://adf.ly/4Yf1g&quot;&gt;Wireshark&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;Originall post &lt;a href=&quot;http://gamenuwan.blogspot.com/&quot;&gt;here&lt;/a&gt;&lt;/span&gt;  &lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;/span&gt;</description><link>http://coding-androidadv.blogspot.com/2012/01/find-hackers-and-security-holes-using.html</link><author>noreply@blogger.com (AndroidADV)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIU8MQ8B6F73Gs9QZVYF5ybKSpfLxwMSf8JwbEn6UXeJAsNn2TCfOame4_Sxdcy06zV3LGThlNkS3KUZigYoPsmrAwODgsy3BB3druDbSiAtW989xeqS89vgGdQpXv9swyqBBU9AMDJYdm/s72-c/Wireshark+Hacker.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4669357348104312371.post-3003151521347431399</guid><pubDate>Tue, 03 Jan 2012 08:37:00 +0000</pubDate><atom:updated>2012-01-03T15:58:41.140+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">coding</category><category domain="http://www.blogger.com/atom/ns#">crack</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">software</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to access blocked websites??With Torpark,anonymous browser!!</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoOzLTTfiKxV6p-xjMsIUk325s6X2CUEGtu8Q1CBaJsWGasprJdnUeZkMBcgE_BYue1i06pbZ0m8OHg5eDR2N1xHaUuGcdLep9ywpxGVJtGo1yhRRMDU3O5rUYVxA9go3stic9rndEmAyh/s1600/Torpark_logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoOzLTTfiKxV6p-xjMsIUk325s6X2CUEGtu8Q1CBaJsWGasprJdnUeZkMBcgE_BYue1i06pbZ0m8OHg5eDR2N1xHaUuGcdLep9ywpxGVJtGo1yhRRMDU3O5rUYVxA9go3stic9rndEmAyh/s1600/Torpark_logo.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;I would like to introduce to you guys a something more useful and powerful which can use for the anonymous internet surfing. I received so many mails by asking how to unblock restricted websites. I explained in my previous posts about proxy sites and also listed some proxy sites which you can use to browse the internet anonymously. But it seems all those proxy sites have been blocked on your network. So what to do if the firewalls on your network block all your favorite websites and proxy sites as well?? &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Don’t worry still you have a solution.. That is the Torpark.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
So what the hell is that and how does it do it huh??&lt;br /&gt;
First of all how your firewall blocks websites?&lt;br /&gt;
Basically it blocks websites by specified website URLS and by looking at keywords which has given by network administrator. For example FortiGate firewall has web filtering features such as URL/Keyword/Phrase Block, URL Exempt List, Content Profiles, Blocks Java Applet, Cookies, Active X, etc. In the FortiGate firewall content blocking enables you to specify file types and words that should have to block. With web content block enabled, every requested web page is checked against the content block list. The score value of each pattern appearing on the page is added, and if the total is greater than the threshold value set in the protection profile, the page is blocked.&lt;br /&gt;
&lt;br /&gt;
That can be happened if the firewall can read and understand the content of incoming data packets. So what if the firewall can’t understand the content of incoming data packets?? That means the firewall can’t find out any specific URLs or keywords within that web content…&lt;br /&gt;
&lt;br /&gt;
So that’s what exactly happened when we are browsing internet using Torpark. So let’s go in to the subject….&lt;br /&gt;
&lt;br /&gt;
The Torpark is a combination of Mozilla FireFox browser and the Tor(Onion Router).&lt;br /&gt;
So what the hell is Tor??&lt;br /&gt;
Tor is an Internet based system which enables users to communicate anonymously on the Internet. The Tor network encrypts traffic between a computer and the Tor network of routers. The client side Torpark browser connects out to Tor, periodically negotiating a virtual circuit through the Tor network. Tor provides a way for two parties - a connection initiator and a connection responder to communicate with each other anonymously. Which protects its communications against traffic analysis attacks. The all data packets are encrypted in a tunnel between your PC and the Tor network. After sending encrypted data to the Tor network, it will change the tunnels until it reach the internet as unencrypted. Also Tor network will be passing back data to your computer as encrypted and your Torpark browser is used to decrypt them and render it to user. So it will be bit slowly specially when establishing the circuit.&lt;br /&gt;
&lt;br /&gt;
So now you see how hard it is for network observers (such as crackers, companies, and governments) to reliably learn who is talking to whom and for what purpose, by examining data packets flowing over the network since which used to communicate all data in an encrypted and anonymous way. And another good thing is Torpark browser is portable and you can run it in a USB drive as well.&lt;br /&gt;
&lt;br /&gt;
So I think I am done with this post. Hope you all got the idea. So good luck you all.&lt;br /&gt;
&lt;br /&gt;
You can Download Torpark &lt;a href=&quot;http://www.download.com/Torpark/3000-2356_4-10586817.html?hhTest=1&quot;&gt;here&lt;/a&gt;</description><link>http://coding-androidadv.blogspot.com/2012/01/how-to-access-blocked-websiteswith.html</link><author>noreply@blogger.com (AndroidADV)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoOzLTTfiKxV6p-xjMsIUk325s6X2CUEGtu8Q1CBaJsWGasprJdnUeZkMBcgE_BYue1i06pbZ0m8OHg5eDR2N1xHaUuGcdLep9ywpxGVJtGo1yhRRMDU3O5rUYVxA9go3stic9rndEmAyh/s72-c/Torpark_logo.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4669357348104312371.post-6155296757711906630</guid><pubDate>Mon, 02 Jan 2012 01:51:00 +0000</pubDate><atom:updated>2012-01-02T09:08:19.864+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">coding</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>How to Block a Site ! This is the Answer !</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCgUUcT88e8YOpIAR6OksaFzjTjgiywHHix73CiEHsf8zqHc7uTg4l2v9Qymm4KtzFhuQW-WtwdmptJc4l6V0fOxlSJqiohT5G4IQUBeiUMwveWMdWptAkYocVKPBDclR3SgD9m9HGxM1n/s1600/acces+denied.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCgUUcT88e8YOpIAR6OksaFzjTjgiywHHix73CiEHsf8zqHc7uTg4l2v9Qymm4KtzFhuQW-WtwdmptJc4l6V0fOxlSJqiohT5G4IQUBeiUMwveWMdWptAkYocVKPBDclR3SgD9m9HGxM1n/s320/acces+denied.jpeg&quot; width=&quot;224&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;Y&lt;/span&gt;oo guys do you want to block a site in your local computer? or change the localhost name? or want to give a specific name to known IP address? its simple. You can do it by editing the host file in your windows OS. So first of all what is the host file?&lt;br /&gt;
&lt;br /&gt;
The Hosts file contains the mappings of IP addresses to host names. This file is loaded into memory (cache) at startup, then Windows checks the Hosts file before it queries any DNS servers, which enables it to override addresses in the DNS. This prevents access to the listed sites by redirecting any connection attempts back to the local machine. Another feature of the HOSTS file is its ability to block other applications from connecting to the Internet, providing the entry exists.&lt;br /&gt;
&lt;br /&gt;
You could find windows hosts files in following locations..&lt;br /&gt;
&lt;b&gt;Windows Vista = C:\WINDOWS\SYSTEM32\DRIVERS\ETC&lt;br /&gt;
Windows XP = C:\WINDOWS\SYSTEM32\DRIVERS\ETC&lt;br /&gt;
Windows 2K = C:\WINNT\SYSTEM32\DRIVERS\ETC&lt;br /&gt;
Win 98/ME = C:\WINDOWS&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Open the hosts file in notepad.&lt;br /&gt;
For example if you want to block a site called www.hailztorm.com.&lt;br /&gt;
Type following commands in the bottom of your host file,&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;127.0.0.1 www.hailztorm.com&lt;br /&gt;
127.0.0.1 www.nuwandimuthu.tk&lt;br /&gt;
127.0.0.1 www.gmail.com&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;When you surf to a site, Windows automatically checks to see if the address is located in the Hosts file. The number 127.0.0.1 is the &quot;loop back&quot; IP address of your own computer, so Windows skips the link to the site (www.hailztorm.com) and moves on. The ad server can&#39;t open its window, so it can&#39;t load any programs, spyware, or cookie files either.&lt;br /&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;original post &lt;a href=&quot;http://gamenuwan.blogspot.com/2007/03/want-to-block-site.html&quot;&gt;here&lt;/a&gt;&lt;/span&gt;</description><link>http://coding-androidadv.blogspot.com/2012/01/how-to-block-site-this-is-answer.html</link><author>noreply@blogger.com (AndroidADV)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCgUUcT88e8YOpIAR6OksaFzjTjgiywHHix73CiEHsf8zqHc7uTg4l2v9Qymm4KtzFhuQW-WtwdmptJc4l6V0fOxlSJqiohT5G4IQUBeiUMwveWMdWptAkYocVKPBDclR3SgD9m9HGxM1n/s72-c/acces+denied.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4669357348104312371.post-5850646243349801980</guid><pubDate>Thu, 29 Dec 2011 10:02:00 +0000</pubDate><atom:updated>2012-01-02T09:04:06.172+07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">coding</category><category domain="http://www.blogger.com/atom/ns#">crack</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><title>Is Your Personal Email Account Being Hacked?</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPEf1bS-Ee_Z0oYWIVDrPIRPaDTAs1P3ulJSIwvbTyVNMemf2YVhN4nJv2pslBkXszVx-rckNRLLKnomVEN_NPGJUtbEeU0Z-KJgqibAgj4-2mo7TFW1-IRnDezmD7IQ8eDQ6rLxh0akcf/s1600/hacker+monya.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPEf1bS-Ee_Z0oYWIVDrPIRPaDTAs1P3ulJSIwvbTyVNMemf2YVhN4nJv2pslBkXszVx-rckNRLLKnomVEN_NPGJUtbEeU0Z-KJgqibAgj4-2mo7TFW1-IRnDezmD7IQ8eDQ6rLxh0akcf/s1600/hacker+monya.jpeg&quot; /&gt;&lt;/a&gt;Did someone hack your personal Email/Facebook/hi5 accounts? Or did someone create any fake facebook/hi5/myspace profiles with your personal information? Yurp, Most of buggers are doing those things and having fun over it. Most of mails I received were regarding those matters and it seems most of girls facing those problems&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So how do we find out the buggers who are trying to play against you? You may think they can be experts in computer programming and you are not much good enough to tackle them. Remember this; there is no one we can call as a genius unless they are really good enough depend on their experience. If so they won’t waste their valuable time to do those silly things rather than research on a new thing. So be Optimistic. The hacker&#39;s simple mistake will be enough to track him easily. In this post I’ll explain you few simple ways of locating hackers.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Basically the easiest way is to track his IP and locate him. The IPs can be dynamic or static. For example for website hosted servers or registered companies have static IPs. That assigned by your Internet Service Provider (ISP). It won’t change periodically. But our local machines IPs are dynamic. When we reset the router, our IP will be changed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So how do we gonna track hacker&#39;s IP?? There are many ways of tracking IP. One way is allow him to click a link. That will be the easiest way unless the hacker uses any proxy browser. You can simply host a web page which locates IP of page requester and save it with the requested time. You can use an online free hosting server for it and pass that web page link in a tricky way to people that you want to track. The following php code stub will trace the IP of page requester and save it to a text file along with the requested time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
$clientip = $_SERVER[&#39;REMOTE_ADDR&#39;];&lt;br /&gt;
$myFile = &quot;testFile.txt&quot;;&lt;br /&gt;
$fh = fopen($myFile, &#39;a&#39;) or die(&quot;can&#39;t open file&quot;);&lt;br /&gt;
$thetime = time();&lt;br /&gt;
$stringData = &quot;$clientip -- $thetime \n&quot;;&lt;br /&gt;
fwrite($fh, $stringData);&lt;br /&gt;
fclose($fh);&lt;br /&gt;
?&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Simply opening that text file you can get all IPs with accessed time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So is that the only way to trace an IP? Nope there are many. Another way is if the hacker sent you a mail you can read the mail header information find out his IP unless he use Gmail. So what about Gmail? Actually most of hackers use Gmail to send mails. One advantage is, it doesn’t show senders IP and the other one is we can send anonymous mails using gsmtp.gmail.com server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Then if some one sent an email through yahoo/msn/etc how are we gonna find out? It’s simple. Go to you mail box options and set visible true to view full header of your email. Refer the following image of a yahoo mail header. The &quot;Received: from [xxx.xx.xxx.xx]&quot; is the sender&#39;s IP address.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibQdi7oy80E7V4RJbBinMaUWVS6qwUu1ChFwBdmySUhoDbHhx-4bHpPOuxExSOBtl_JFL1H-ZTfLXy-QVZGJQ_KCwV6ImFExkNzIUQoDAoKY1nVQIdT6z6fXzdiI5LhTsh-pdoyMDgnO5S/s1600/caranya.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;215&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibQdi7oy80E7V4RJbBinMaUWVS6qwUu1ChFwBdmySUhoDbHhx-4bHpPOuxExSOBtl_JFL1H-ZTfLXy-QVZGJQ_KCwV6ImFExkNzIUQoDAoKY1nVQIdT6z6fXzdiI5LhTsh-pdoyMDgnO5S/s400/caranya.jpeg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Now you know few ways to trace someone&#39;s IP. After tracing the IP along with accessed Date and time how you gonna locate him?&lt;br /&gt;
First you can find out the location &amp;amp; registered names by searching it in IP lookup site.&lt;br /&gt;
Ex:- &lt;b&gt;http://ip-lookup.net/, http://www.dnsstuff.com/&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If he has a static IP you will be getting the registered name, location and some other information. But if he has a dynamic IP then the IP locating site will result the location and details of his Internet Service Provider (ISP). So you know the IP with accessed time. The ISP can locate him by tracing that mapped IP with time that he used it. The ISP has pool of IPs and dynamically mapped that IPs among users. So all the mapped IPs, Timestamps and the mapped user details should be logged on their servers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Actually I explained you some simple methods to trace IPs. Those are more accurate and efficient methods. Other than that there are many other ways of tracing an IP.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some other methods to trace hackers:-&lt;br /&gt;
- You can create a .swf with an action script in order to steal cookies, IP, etc and send it as an Email attachment&lt;br /&gt;
- If you know his email address you can send a messenger request and trace his IP while chatting. Ex:- You can share a file and run &quot;netstat -a&quot; in your command prompt or you can use WireShark tool I explained in my previous posts or You can use Sharp-IP-Getter to trace IP while chatting in the yahoo messenger]&lt;br /&gt;
- If you are familiar with Cross-site scripting (XSS), you can use malicious scripts to trace hackers or even to hack mail accounts.&lt;br /&gt;
- You can send a KeyLogger to monitor his all activities and received them via a mail.</description><link>http://coding-androidadv.blogspot.com/2011/12/is-your-personal-email-account-being.html</link><author>noreply@blogger.com (AndroidADV)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPEf1bS-Ee_Z0oYWIVDrPIRPaDTAs1P3ulJSIwvbTyVNMemf2YVhN4nJv2pslBkXszVx-rckNRLLKnomVEN_NPGJUtbEeU0Z-KJgqibAgj4-2mo7TFW1-IRnDezmD7IQ8eDQ6rLxh0akcf/s72-c/hacker+monya.jpeg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>