
Dalam pencarian di internet aku terjumpa ayat ini Teringat kata-kata Hitler; ” Aku boleh bunuh semua Yahudi kalau aku mahu, tetapi aku tinggalkan sedikit supaya kamu kenal siapa mereka! “ Aku tertany…
Listed under name of Ezadnet Technology (CA 0220943-V). World at your fingertips but thorn on your feet,Stay alert stay secure.
Dalam pencarian di internet aku terjumpa ayat ini Teringat kata-kata Hitler; ” Aku boleh bunuh semua Yahudi kalau aku mahu, tetapi aku tinggalkan sedikit supaya kamu kenal siapa mereka! “ Aku tertany…
In computing, a user agent is software (a software agent) that is acting on behalf of a user. For example, an email reader is a mail user agent, and in the Session Initiation Protocol (SIP), the term …
This is and example to use facebook open graph and you can edit more on facebook developer.Open graph offers many commonly used actions and objects, which you can start using right away, or you can cr…
How it Works What DNS prefetching does is attempt to resolve domain names before we, the users, try to follow a link. This is accomplished using the computer's built-in DNS resolution mechanism. O…
Internet use in Malaysia is at an all-time high and is still growing, and broadband adoption is rapidly spreading along with mobile connectivity. In this environment of increasing digital interconnec…
If you use linux hosting such as cpanel, you really are not able to update your php.ini settings. This is the best way to use your own php.ini in your hosting. But make sure it not read by public and …
Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby b…
There is no silver bullet when it comes to encryption. Even the most complex, invulnerable encryption today could be child’s play in the future. The NIST (National Institute of Standards and Technolog…
Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless. The exploit successfully compromi…
The Federal Bureau of Investigation estimates around 64,000 computers in the U.S. infected with the DNSChanger Trojan may have Internet connectivity problems Monday. This particularly nasty piece of …
Before this someone ask me to edit registry to change default user agent. If we want to change only one user agent it maybe easy. but how about when we want to change hundred of user agent out there ?…
Masih ingatkah anda apakah gelaran Rasulullah s.a.w untuk zaujahnya (isterinya), iaitu Saidatina Aisyah r.a? Rasulullah s.a.w menggelar Saidatina Aisyah r.a dengan gelaran Al-Humaira yang bermaksud p…
When i wake up this morning and see statistic of my site and my blog i get many bad bot and spam that want try to access to my domain. it is nothing strange for me. as I tried to fight bad bots, suspi…
Senarai Calon PRU 13 (PAS, PKR, DAP, BN, Bebas & Lain-Lain) untuk setiap negeri di Malaysia pada 5 Mei 2013 dalam Pilihan Raya Umum ke-13. Senarai Calon PRU 13…
Hotlink protection prevents other websites from directly linking to files on your website. Other sites will still be able to link to any file type that you don't specify (i.e., HTML files). An example…
Sedar x anda sekarang berada kat mana? Ambil 9 minit masa anda untuk hayati identiti anda =) …
IPv6 or Internet Protocol Version 6 is is the latest revision of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on netwo…
Sometime when we need to block bad word or filthy words we need to install plugin, module and etc. Or sometime we spent money to block all bad word. from what I know most of the bad word comes from ba…
Window 8..More faster and more GUI (graphical user interface) than window 7 even you using low specification hardware. After installing window 8 on your computer you will ask for for activate it. Many…
In computer science, a cache is a component that transparently stores data so that future requests for that data can be served faster. The data that is stored within a cache might be values that ha…
First thing need to know, DONT TRUST ANYONE. Even your girlfriend. heheh..When we submit or sign any forms such as login form in the browser we will leave autocomplete on each form. This means that em…
What is XSS protection ? XSS mean Cross-site scripting is a type of computer security vulnerability typically found in Web applications. Due to breaches of browser security, XSS enables attackers to i…
Host currently block to access http://www.ezadnet.my. If we have remove or add ip/host/user agent from list we never mention here anymore. verizon.net sucuri.net builtwith.com suttlessurvey.com psyc…
In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Altho…
Many bot crawling your site will make your site high usage of bandwidth, You can limit who can crawling your site like, -Googlebot Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.…
1xx Informational Request received, continuing process. This class of status code indicates a provisional response, consisting only of the Status-Line and optional headers, and is terminated by an …
Many of you maybe use free antivirus on your computer.If you want to check your antivirus is good condition or not try this trick. -Right click on your desktop computer and choose new --> text documen…
Pergi ke http://developers.facebook.com/apps Pilih create new application gambar seperti di bawah akan terhasil. App Name anda boleh letak apa je seperti nama anda.App Namespace tidak perlu diletak. …
1. Cesedian Root =78.47.115.195,78.47.115.198 2. Google =8.8.8.8,8.8.4.4 3. Open =208.67.222.222,208.67.220.220 4. Open 2 =216.87.84.209,216.87.84.211 5. Advantage …
Very useful if you point all your error pages to the same file. Save more space and easy to handle it.. rite ? This is a sample 'REDIRECT_STATUS' to your error page. First you need to use .htaccess f…
Referrer filtering for common media files. Replace with your own domain name.This blocks most common fingerprinting attacks ;) Note: Change www\.example\.com with your own domain name, substituting t…
RewriteCond %{REMOTE_HOST} 12.226.240.248 [OR] RewriteCond %{REMOTE_HOST} 24.111.102.26 [OR] RewriteCond %{REMOTE_HOST} 24.117.121.113 [OR] RewriteCond %{REMOTE_HOST} 65.30.216.140 [OR] R…
cls @ECHO OFF title Folder Personal if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK if NOT EXIST Personal goto MDLOCKER :CONFIRM echo Are you sure u want…
Perhatian..javaskript ini hanya digunakan di browser. function EzadNet(e) { var message = "EzadNet -Its Malaysian Story-"; if(!document.EzadNet) // initialize { if(document.l…
DOS is Denial of Services DOS menghantar packet ke sesebuah server sampai server itu tidak boleh menampungnya. Biasanya semua orang menggunakan software dr linux os atau windows os untuk melakukan DO…
Change your dns from your original ISP into public DNS ip address like google DNS or fastest DNS ip address. After download you can open DnsJumper.ini and you can add more open dns ip on this post. D…
Create new file and save as timernuke.cmd, then edit it which this code. @echo off TITLE TimerNuke reg QUERY "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v "ProductName" | findstr /i "…
Hari-hari yang berlalu begitu memenatkan. Aku sendiri tidak larat untuk mengikutinya. Otakku berjalan tanpa henti. Berjalan dan terus berjalan. Dimanakah noktahnya untuk diriku berehat sebentar dari m…
subhanallah...
Subhanallah! Gambar Cicit Rasulullah Yang Comel | Ezad Blog · 11 years ago
ye la 2..
blog reader la...
DONT TRUST ANYONE. Even your girlfriend..hurmm..