
Dalam pencarian di internet aku terjumpa ayat ini Teringat kata-kata Hitler; ” Aku boleh bunuh semua Yahudi kalau aku mahu, tetapi aku tinggalkan sedikit supaya kamu kenal siapa mereka! “ Aku tertany…
Listed under name of Ezadnet Technology (CA 0220943-V). World at your fingertips but thorn on your feet,Stay alert stay secure.
Dalam pencarian di internet aku terjumpa ayat ini Teringat kata-kata Hitler; ” Aku boleh bunuh semua Yahudi kalau aku mahu, tetapi aku tinggalkan sedikit supaya kamu kenal siapa mereka! “ Aku tertany…
In computing, a user agent is software (a software agent) that is acting on behalf of a user. For example, an email reader is a mail user agent, and in the Session Initiation Protocol (SIP), the term …
This is and example to use facebook open graph and you can edit more on facebook developer.Open graph offers many commonly used actions and objects, which you can start using right away, or you can cr…
How it Works What DNS prefetching does is attempt to resolve domain names before we, the users, try to follow a link. This is accomplished using the computer's built-in DNS resolution mechanism. O…
Internet use in Malaysia is at an all-time high and is still growing, and broadband adoption is rapidly spreading along with mobile connectivity. In this environment of increasing digital interconnec…
If you use linux hosting such as cpanel, you really are not able to update your php.ini settings. This is the best way to use your own php.ini in your hosting. But make sure it not read by public and …
Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby b…
There is no silver bullet when it comes to encryption. Even the most complex, invulnerable encryption today could be child’s play in the future. The NIST (National Institute of Standards and Technolog…
Enterprise Wi-Fi networks can keep using WPA2 security safely, despite a recent Defcon exploit that has been widely, but wrongly, interpreted as rendering it useless. The exploit successfully compromi…
subhanallah...
Subhanallah! Gambar Cicit Rasulullah Yang Comel | Ezad Blog · 11 years ago
ye la 2..
blog reader la...
DONT TRUST ANYONE. Even your girlfriend..hurmm..