<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2469874072062639518</id><updated>2024-09-01T23:25:26.352-07:00</updated><title type='text'>Hacking Universe</title><subtitle type='html'>All About hacking And Hacking Tutorial hacking News hacking Artical Etc .</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>10</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2469874072062639518.post-8364913490016544859</id><published>2017-12-13T00:12:00.001-08:00</published><updated>2017-12-13T00:12:08.578-08:00</updated><title type='text'>CRAK CD PROTECTION </title><content type='html'>HOW TO CRAK CD PROTECTION 
TOPIC
( 1)About, Programs needed … etc.
(2). The easy protection.
(3). Finding the right file – and the right error.
(4). Finding the right line number.
(5). Editing the line.
(6). Testing.
(7). Quick order list.

STEP ######1that explains all about RiPPing except how to crack the CD
protections… so here is the other part – how to finish the RiPPing by cracking
the protection. This will help you w/ the most basic system of protection,
called C- dilla, that is the most usual one…
The programs we will use are 2: first, and decompiler – the files we will
work with are in ExE format, and we need a program that will HeX them (transfer
to 16 base, hexa, form) and locate the orders given in the code, then we will
find the line we need and change it to remove the protection with... – the
second program: we need a program that will *edit* the files, and fetch the
right line number we got using the first program… all those action are easly
done w/ the programs: Win32Dasm (the disassembler - decompiler program, added in
the dir [root/Win32Dasm]), and Hiew (the editing program added in the dir
[root/Hiew]). The programs are added to the tutorial, because I’m not so sure
you can find then on a stable location on the net, in the dir [root/programs].
</content><link rel='replies' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/8364913490016544859/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://hackingunive.blogspot.com/2017/12/crak-cd-protection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/8364913490016544859'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/8364913490016544859'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/2017/12/crak-cd-protection.html' title='CRAK CD PROTECTION '/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2469874072062639518.post-4445768265064516813</id><published>2017-12-10T21:20:00.001-08:00</published><updated>2017-12-10T21:20:52.720-08:00</updated><title type='text'></title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h2&gt;
Password Cracking&lt;/h2&gt;
Passwords are typically cracked using one or more of the following methods:&lt;br /&gt;


&lt;br /&gt;
&lt;h3&gt;
Guessing:&lt;/h3&gt;
Even with all of the advanced programs, algorithms, and techniques 
computer scientists have come up with, sometimes the most effective way 
of cracking a user password is by using logic and/or trying commonly 
used passwords.  For many unknowledgeable users, passwords are more of 
an annoyance than a security, and therefore they use passwords that can 
be easily remembered, and thus easily guessed, such as:&lt;br /&gt;


	The word &quot;password&quot; &lt;br /&gt;
	The same as the user name  &lt;br /&gt;
	Name of the user  &lt;br /&gt;
	Birthdays or birth places  &lt;br /&gt;
	Relatives  &lt;br /&gt;
	Pets  &lt;br /&gt;
	Favorite colors, foods, places, etc.  &lt;br /&gt;
&lt;br /&gt;
  This method can be more time efficient than using a program, but 
obviously this method works best when the person &quot;recovering&quot; the 
password knows the user.  One other thing to keep in mind is that the 
average user does not like coming up with multiple passwords, so if you 
can figure out one password for one area, you can usually gain access to
 most other password protected areas using the same password.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Dictionary Attacks:&lt;/h3&gt;
Dictionary Attacks are a method of using a program to try a list of
 words on the interface or program that is protecting the area that you 
want to gain access to.  The most simple password crackers using 
dictionary attacks use a list of common single words, aka a 
&quot;dictionary&quot;.  More advanced programs often use a dictionary on top of 
mixing in numbers or common symbols at the beginning or end of the 
guessed words.&lt;br /&gt;
Some can even be given a set of personal information or a profile of the
 user and pick out important words to guess, even if they are not proper
 words, such as pronouns like last names and names of relatives.&lt;br /&gt;
  A weakness of dictionary attacks is that it obviously relies on words 
supplied by a user, typically real words, to function.  If the password 
is misspelled, is in another language, or very simply uses a word that 
is not in the dictionary or profile, it cannot succeed.  Most of the 
time, even using two words in one password can thwart a dictionary 
attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Examples of programs that use dictionary attacks:  &lt;a href=&quot;http://www.openwall.com/john/&quot;&gt;John the Ripper&lt;/a&gt;, &lt;a href=&quot;http://www.l0phtcrack.com/&quot;&gt;L0phtCrack&lt;/a&gt;, and &lt;a href=&quot;http://cain-abel.en.softonic.com/&quot;&gt;Cain And Abel&lt;/a&gt;.

&lt;h3&gt;
Brute Force: &lt;/h3&gt;
Brute force password attacks are a last resort to cracking a 
password as they are the least efficient.  In the most simple terms, 
brute force means to systematically try all the combinations for a 
password. This method is quite efficient for short passwords, but would 
start to become infeasible to try, even on modern hardware, with a 
password of 7 characters or larger.  Assuming only alphabetical 
characters, all in capitals or all in lower-case, it would take 26&lt;sup&gt;7&lt;/sup&gt;
 (8,031,810,176) guesses.  This also assumes that the cracker knows the 
length of the password.  Other factors include number, case-sensitivity,
 and other symbols  on the keyboard.  The complexity of the password 
depends upon the creativity of the user and the  complexity of the 
program that is using the password.&lt;br /&gt;
   The upside to the brute force attack is that it will ALWAYS find the 
password, no matter it&#39;s complexity.  The downside is whether or not you
 will still be alive when it finally guesses it.&lt;br /&gt;

Examples of programs that use brute force attacks:  &lt;a href=&quot;http://www.openwall.com/john/&quot;&gt;John the Ripper&lt;/a&gt;, &lt;a href=&quot;http://rarcrack.sourceforge.net/&quot;&gt;Rarcrack&lt;/a&gt;, and &lt;a href=&quot;http://www.red-database-security.com/whitepaper/oracle_passwords.html&quot;&gt;Oracle&lt;/a&gt;.

&lt;h3&gt;
Rainbow Tables&lt;/h3&gt;
Rainbow tables are a type of precomputed password attack.  The 
previous two attacks, Dictionary and Brute-Force, enter a password into 
the locked program, the program then hashes the entry and compares the 
hash to the correct password hash.  Rainbow tables compute hashes for 
each word in a dictionary, store all of the hashes into a hash table, 
retrieve the hash of the password to be cracked, and do a comparison 
between each password hash and the real password hash.  This method 
assumes that you can retrieve the hash of the password to be guessed and
 that the hashing algorithm is the same between the rainbow table and 
the password.  As the majority of common, low-security hashes are 
computed using MD5, sometimes SHA-1, this problem isn&#39;t very worrisome.
&lt;br /&gt;
Rainbow tables have only become an efficient technique recently, 
as the hard drive space needed to store the hashes was slightly 
combersome until memory became cheaper.  To give you an idea of how 
large a rainbow table can be:&amp;nbsp;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/4445768265064516813/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://hackingunive.blogspot.com/2017/12/password-cracking-passwords-are.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/4445768265064516813'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/4445768265064516813'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/2017/12/password-cracking-passwords-are.html' title=''/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2469874072062639518.post-1099126982856673759</id><published>2017-12-04T04:14:00.001-08:00</published><updated>2017-12-04T04:14:41.623-08:00</updated><title type='text'>SUNDHA MATAJI MANDIR NEW  VIDEO</title><content type='html'>&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;270&quot; src=&quot;https://www.youtube.com/embed/lfDwM45QYR8&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;</content><link rel='replies' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/1099126982856673759/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://hackingunive.blogspot.com/2017/12/sundha-mataji-mandir-new-video.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/1099126982856673759'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/1099126982856673759'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/2017/12/sundha-mataji-mandir-new-video.html' title='SUNDHA MATAJI MANDIR NEW  VIDEO'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/lfDwM45QYR8/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2469874072062639518.post-4955270244491078647</id><published>2017-11-21T01:35:00.001-08:00</published><updated>2017-11-21T01:35:15.799-08:00</updated><title type='text'>MOHABBATEIN LUTAANGA</title><content type='html'>&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;270&quot; src=&quot;https://www.youtube.com/embed/TTPgVXH5S3M&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;</content><link rel='replies' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/4955270244491078647/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://hackingunive.blogspot.com/2017/11/mohabbatein-lutaanga.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/4955270244491078647'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/4955270244491078647'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/2017/11/mohabbatein-lutaanga.html' title='MOHABBATEIN LUTAANGA'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/TTPgVXH5S3M/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2469874072062639518.post-5215980229732440398</id><published>2017-11-16T04:18:00.001-08:00</published><updated>2017-11-16T04:18:46.940-08:00</updated><title type='text'>JUST A FUN FOR EVERY ONE HOW TO HANDEL GIRLFRIEND</title><content type='html'>&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;270&quot; src=&quot;https://www.youtube.com/embed/d3szm3NW0wY&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;</content><link rel='replies' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/5215980229732440398/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://hackingunive.blogspot.com/2017/11/just-fun-for-every-one-how-to-handel.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/5215980229732440398'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/5215980229732440398'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/2017/11/just-fun-for-every-one-how-to-handel.html' title='JUST A FUN FOR EVERY ONE HOW TO HANDEL GIRLFRIEND'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/d3szm3NW0wY/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2469874072062639518.post-5654469880818709117</id><published>2017-11-16T02:46:00.003-08:00</published><updated>2017-11-16T02:46:15.493-08:00</updated><title type='text'></title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahMdPVTZ-pEi9VE3pr260GTo1Kj6r4KkGh70rkCHYWsD0SMFT8HoYlvqpGdiAiYroE5Aa52gm2HAoTyNm6m4mDo6Ho0Y5OY2Q2zT8XZYlRMOCYlehk2m7SHzVr9bj_bYw6jWS5mbd8q4/s1600/h1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;642&quot; data-original-width=&quot;1343&quot; height=&quot;190&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahMdPVTZ-pEi9VE3pr260GTo1Kj6r4KkGh70rkCHYWsD0SMFT8HoYlvqpGdiAiYroE5Aa52gm2HAoTyNm6m4mDo6Ho0Y5OY2Q2zT8XZYlRMOCYlehk2m7SHzVr9bj_bYw6jWS5mbd8q4/s400/h1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/5654469880818709117/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://hackingunive.blogspot.com/2017/11/blog-post_6.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/5654469880818709117'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/5654469880818709117'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/2017/11/blog-post_6.html' title=''/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahMdPVTZ-pEi9VE3pr260GTo1Kj6r4KkGh70rkCHYWsD0SMFT8HoYlvqpGdiAiYroE5Aa52gm2HAoTyNm6m4mDo6Ho0Y5OY2Q2zT8XZYlRMOCYlehk2m7SHzVr9bj_bYw6jWS5mbd8q4/s72-c/h1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2469874072062639518.post-1848304352685811598</id><published>2017-11-16T02:46:00.001-08:00</published><updated>2017-11-16T02:46:04.050-08:00</updated><title type='text'></title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahMdPVTZ-pEi9VE3pr260GTo1Kj6r4KkGh70rkCHYWsD0SMFT8HoYlvqpGdiAiYroE5Aa52gm2HAoTyNm6m4mDo6Ho0Y5OY2Q2zT8XZYlRMOCYlehk2m7SHzVr9bj_bYw6jWS5mbd8q4/s1600/h1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;642&quot; data-original-width=&quot;1343&quot; height=&quot;152&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahMdPVTZ-pEi9VE3pr260GTo1Kj6r4KkGh70rkCHYWsD0SMFT8HoYlvqpGdiAiYroE5Aa52gm2HAoTyNm6m4mDo6Ho0Y5OY2Q2zT8XZYlRMOCYlehk2m7SHzVr9bj_bYw6jWS5mbd8q4/s320/h1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/1848304352685811598/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://hackingunive.blogspot.com/2017/11/blog-post_0.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/1848304352685811598'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/1848304352685811598'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/2017/11/blog-post_0.html' title=''/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahMdPVTZ-pEi9VE3pr260GTo1Kj6r4KkGh70rkCHYWsD0SMFT8HoYlvqpGdiAiYroE5Aa52gm2HAoTyNm6m4mDo6Ho0Y5OY2Q2zT8XZYlRMOCYlehk2m7SHzVr9bj_bYw6jWS5mbd8q4/s72-c/h1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2469874072062639518.post-7542729052501746153</id><published>2017-11-16T02:44:00.001-08:00</published><updated>2017-11-16T02:44:50.836-08:00</updated><title type='text'></title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahMdPVTZ-pEi9VE3pr260GTo1Kj6r4KkGh70rkCHYWsD0SMFT8HoYlvqpGdiAiYroE5Aa52gm2HAoTyNm6m4mDo6Ho0Y5OY2Q2zT8XZYlRMOCYlehk2m7SHzVr9bj_bYw6jWS5mbd8q4/s1600/h1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;642&quot; data-original-width=&quot;1343&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahMdPVTZ-pEi9VE3pr260GTo1Kj6r4KkGh70rkCHYWsD0SMFT8HoYlvqpGdiAiYroE5Aa52gm2HAoTyNm6m4mDo6Ho0Y5OY2Q2zT8XZYlRMOCYlehk2m7SHzVr9bj_bYw6jWS5mbd8q4/s1600/h1.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/7542729052501746153/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://hackingunive.blogspot.com/2017/11/blog-post_16.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/7542729052501746153'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/7542729052501746153'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/2017/11/blog-post_16.html' title=''/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahMdPVTZ-pEi9VE3pr260GTo1Kj6r4KkGh70rkCHYWsD0SMFT8HoYlvqpGdiAiYroE5Aa52gm2HAoTyNm6m4mDo6Ho0Y5OY2Q2zT8XZYlRMOCYlehk2m7SHzVr9bj_bYw6jWS5mbd8q4/s72-c/h1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2469874072062639518.post-1785818320360100647</id><published>2017-11-14T03:42:00.002-08:00</published><updated>2017-11-14T03:42:24.769-08:00</updated><title type='text'></title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlSo7Wn9Ipynbz7EMRRSpYgGnCviCeBK_8r4fSpQUJAbOc-0wbCkMxetv7tAu10ZB-gw5aLH3tscAUQI21o-s27Y6RIQt2UnE8fjXJRFDDEqD9kcEKwFZzPXzORlfus1NqiB6NlEINdn4/s1600/h3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;180&quot; data-original-width=&quot;1349&quot; height=&quot;42&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlSo7Wn9Ipynbz7EMRRSpYgGnCviCeBK_8r4fSpQUJAbOc-0wbCkMxetv7tAu10ZB-gw5aLH3tscAUQI21o-s27Y6RIQt2UnE8fjXJRFDDEqD9kcEKwFZzPXzORlfus1NqiB6NlEINdn4/s320/h3.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/1785818320360100647/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://hackingunive.blogspot.com/2017/11/blog-post_14.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/1785818320360100647'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/1785818320360100647'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/2017/11/blog-post_14.html' title=''/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlSo7Wn9Ipynbz7EMRRSpYgGnCviCeBK_8r4fSpQUJAbOc-0wbCkMxetv7tAu10ZB-gw5aLH3tscAUQI21o-s27Y6RIQt2UnE8fjXJRFDDEqD9kcEKwFZzPXzORlfus1NqiB6NlEINdn4/s72-c/h3.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2469874072062639518.post-1931466141622379572</id><published>2017-11-14T03:40:00.001-08:00</published><updated>2017-11-14T03:40:31.453-08:00</updated><title type='text'></title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI62PD8bhParjGI8cjRiwON6kgH4cH4voILMrqmIjtJLyxW3pcZ2OkzoVN4Mc1Z0YXmmpDZvkqnAxZU-TSh0AcpQmvFEcQBW1SRRM36EBZG6Ks93VgurhhYPxEv18Mmv3OMYwI4-xwb-s/s1600/mask.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;480&quot; data-original-width=&quot;852&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI62PD8bhParjGI8cjRiwON6kgH4cH4voILMrqmIjtJLyxW3pcZ2OkzoVN4Mc1Z0YXmmpDZvkqnAxZU-TSh0AcpQmvFEcQBW1SRRM36EBZG6Ks93VgurhhYPxEv18Mmv3OMYwI4-xwb-s/s1600/mask.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='https://hackingunive.blogspot.com/feeds/1931466141622379572/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://hackingunive.blogspot.com/2017/11/blog-post.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/1931466141622379572'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/2469874072062639518/posts/default/1931466141622379572'/><link rel='alternate' type='text/html' href='https://hackingunive.blogspot.com/2017/11/blog-post.html' title=''/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/16619216810653250495</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI62PD8bhParjGI8cjRiwON6kgH4cH4voILMrqmIjtJLyxW3pcZ2OkzoVN4Mc1Z0YXmmpDZvkqnAxZU-TSh0AcpQmvFEcQBW1SRRM36EBZG6Ks93VgurhhYPxEv18Mmv3OMYwI4-xwb-s/s72-c/mask.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>