
Linux (and its close relation Unix) and Windows 2003 (and its close cousin Windows NT) are types of software (known as operating systems) that web servers use to do the kind of things that web s…
Listed under name of Ezadnet Technology (CA 0220943-V). World at your fingertips but thorn on your feet,Stay alert stay secure.
Linux (and its close relation Unix) and Windows 2003 (and its close cousin Windows NT) are types of software (known as operating systems) that web servers use to do the kind of things that web s…
Make sure to enable POP/IMAP access in your Gmail settings first. POP Standard configuration instructions: Incoming Mail (POP3) Server – requires SSL: pop.gmail.com Use SSL: Yes Port: 995 Outgoing Mai…
Hotmail supports access via IMAP, POP3 and SMTP protocols. Below you can find the configuration settings for those protocols. All Hotmail servers (POP3 and SMTP) use implicit SSL (use ConnectSSL metho…
As of version 3.5, Firefox supports DNS prefetching. This is a feature by which Firefox proactively performs domain name resolution on both links that the user may choose to follow as well as URLs fo…
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS e…
In computing, a user agent is software (a software agent) that is acting on behalf of a user. For example, an email reader is a mail user agent, and in the Session Initiation Protocol (SIP), the term …
How it Works What DNS prefetching does is attempt to resolve domain names before we, the users, try to follow a link. This is accomplished using the computer's built-in DNS resolution mechanism. O…
Internet use in Malaysia is at an all-time high and is still growing, and broadband adoption is rapidly spreading along with mobile connectivity. In this environment of increasing digital interconnec…
Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby b…
There is no silver bullet when it comes to encryption. Even the most complex, invulnerable encryption today could be child’s play in the future. The NIST (National Institute of Standards and Technolog…
Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless. The exploit successfully compromi…
The Federal Bureau of Investigation estimates around 64,000 computers in the U.S. infected with the DNSChanger Trojan may have Internet connectivity problems Monday. This particularly nasty piece of …
When i wake up this morning and see statistic of my site and my blog i get many bad bot and spam that want try to access to my domain. it is nothing strange for me. as I tried to fight bad bots, suspi…
IPv6 or Internet Protocol Version 6 is is the latest revision of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on netwo…
Host currently block to access http://www.ezadnet.my. If we have remove or add ip/host/user agent from list we never mention here anymore. verizon.net sucuri.net builtwith.com suttlessurvey.com psyc…
In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Altho…
1. Cesedian Root =78.47.115.195,78.47.115.198 2. Google =8.8.8.8,8.8.4.4 3. Open =208.67.222.222,208.67.220.220 4. Open 2 =216.87.84.209,216.87.84.211 5. Advantage …
Change your dns from your original ISP into public DNS ip address like google DNS or fastest DNS ip address. After download you can open DnsJumper.ini and you can add more open dns ip on this post. D…
subhanallah...
Subhanallah! Gambar Cicit Rasulullah Yang Comel | Ezad Blog · 11 years ago
ye la 2..
blog reader la...
DONT TRUST ANYONE. Even your girlfriend..hurmm..