The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS e…
3 way to crack facebook password

Method 1: Reset the Password The easiest way to “hack” into someone’s Facebook is through resetting the password. This could be easier done by people who are friends with the person they’re trying …
ADOLF HITLER : Sudut Kisah Yang Disembunyikan.

Dalam pencarian di internet aku terjumpa ayat ini Teringat kata-kata Hitler; ” Aku boleh bunuh semua Yahudi kalau aku mahu, tetapi aku tinggalkan sedikit supaya kamu kenal siapa mereka! “ Aku tertany…
How to detect operating system using user agent

In computing, a user agent is software (a software agent) that is acting on behalf of a user. For example, an email reader is a mail user agent, and in the Session Initiation Protocol (SIP), the term …
How to create facebook open graph/seo on blogspot

This is and example to use facebook open graph and you can edit more on facebook developer.Open graph offers many commonly used actions and objects, which you can start using right away, or you can cr…
How your Browser Speeds up Cross Domain Loading using DNS Prefetching

How it Works What DNS prefetching does is attempt to resolve domain names before we, the users, try to follow a link. This is accomplished using the computer's built-in DNS resolution mechanism. O…
Wireless Threats: Is Your Broadband Secure Enough?

Internet use in Malaysia is at an all-time high and is still growing, and broadband adoption is rapidly spreading along with mobile connectivity. In this environment of increasing digital interconnec…
Simple step to use php.ini using htaccess

If you use linux hosting such as cpanel, you really are not able to update your php.ini settings. This is the best way to use your own php.ini in your hosting. But make sure it not read by public and …
SQL Injection-how about your site ?

Many web developers are unaware of how SQL queries can be tampered with, and assume that an SQL query is a trusted command. It means that SQL queries are able to circumvent access controls, thereby b…
Recent Comments
-
fyna
subhanallah...
Subhanallah! Gambar Cicit Rasulullah Yang Comel | Ezad Blog · 11 years ago
-
Princess Nabella
ye la 2..
-
Mohd Nor Rizad
blog reader la...
-
Princess Nabella
DONT TRUST ANYONE. Even your girlfriend..hurmm..