Software Super Jahil

Saya bawa software super jahil full version nih,.. Lumayan buat menjahili teman, pacar, kakak dll.
Software ini namanya PC Pranks.
Software ini ada beberapa pilihan seperti format hardisk,virus,mouse kita jalan sendiri dan masih banyak lagi. Keren kan ,..


Pengertian dan Dasar – Dasar Web Attack(Definition and Basic - Basic Web Attack)


Assalamualaikum...

Various cases of attacks on a website has now become a trend in itself. Many government websites , school , business , or personal web is a target for attackers . it is the impact of the weakness of the security system that is owned by the web . is " There is no perfect system " but at least " Try to improve existing deficiencies to make it better " by Bima :)

What is web attack ?

Web attack is an activity undertaken by a person by using a slit or side vulnerabilities on web applications and servers . Actually it is not difficult to do seebuah hacking activity , it's just that it takes patience and a strong willingness to get the hang of it . However , most of the instances cara2 prefer to utilize tools that easier . in terms of techniques and methods if it is not too complicated to learn , as long as the basic tau prior fundamentally :) " No need to be a hacker to be able Hacking " by Bima ;)



So , before studying the techniques and methods , it is good to know first base and basically whatever the term is often done in the world , especially web hacking attack . Here I just want to share what I know , there was no intention to teach or patronizing , may be useful for the needy .. :)

Web Attack groove

There are various ways in which an attacker to find the weaknesses and break through a security system in order to gain full access to the website . The following is an overview of the flow of web attacks based on what I did in the process of web attack :



Prey 0.5.9

Prey is a software to track / locate your laptop and android phone if it is lost or dicuri.dirancang to assist the user in order to remain in control of the entire mobile device owned integrated.



Basically, we are required to install prey on any items to be monitored (be it a laptop, PC or mobile phone). Prey were installed earlier will be the agent who will send a signal about the existence of our goods.
When we lost the goods, we can turn the prey through the website so that agents will immediately send a signal and provide the location information of our goods are and other information. When we turn on the prey that we lost the prey items immediately retrieve the information required in accordance settings that have been made ​​through the control panel. In addition to collecting information so you can easily find the goods, may also prey on the settings so that a sound or display a particular message.