KUNJUNGI WEB SAYA

Total Validator Firefox Extension is really a awesome tool and is a hybrid(much advanced version of the W3C validator) and its really easy to use.

Free download...
Once you have downloaded and installed the Total Validator Plugin for Firefox ,all you need to do is navigate to the Webpage that you want to Validate and Click on the TV icon that you see in the Firefox status bar.

To make things even more simple ,you can even make a right click on the Webpage and select the TV icon again and select you method of validation.

Review Image

How To Make Xp Windows Go faster

How To Make Xp Windows Go faster
 Services You Can Disable

There are quite a few services you can disable from starting automatically.
This would be to speed up your boot time and free resources.
They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.

Some possibilities are:
Alerter
Application Management
Clipbook
Fast UserSwitching
Human Interface Devices
Indexing Service
Messenger
Net Logon
NetMeeting
QOS RSVP
Remote Desktop Help Session Manager
Remote Registry
Routing & Remote Access
SSDP Discovery Service
Universal Plug and Play Device Host
Web Client


--------------------------------------------------------------------------------

Cleaning the Prefetch Directory

WindowsXP has a new feature called Prefetch. This keeps a shortcut to recently used programs.
However it can fill up with old and obsolete programs.

To clean this periodically go to:

Star / Run / Prefetch
Press Ctrl-A to highlight all the shorcuts
Delete them

--------------------------------------------------------------------------------

Not Displaying Logon, Logoff, Startup and Shutdown Status Messages

To turn these off:

Start Regedit
Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem
If it is not already there, create a DWORD value named DisableStatusMessages
Give it a value of 1

--------------------------------------------------------------------------------
Clearing the Page File on Shutdown

Click on the Start button
Go to the Control Panel
Administrative Tools
Local Security Policy
Local Policies
Click on Security Options
Right hand menu - right click on "Shutdown: Clear Virtual Memory Pagefile"
Select "Enable"
Reboot

For regedit users.....
If you want to clear the page file on each shutdown:

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementClearPageFileAtShutdown
Set the value to 1

--------------------------------------------------------------------------------

No GUI Boot

If you don't need to see the XP boot logo,

Run MSCONFIG
Click on the BOOT.INI tab
Check the box for /NOGUIBOOT

---------------------------------------------------------------------------------
Speeding the Startup of Some CD Burner Programs

If you use program other than the native WindowsXP CD Burner software,
you might be able to increase the speed that it loads.

Go to Control Panel / Administrative Tools / Services
Double-click on IMAPI CD-Burning COM Service
For the Startup Type, select Disabled
Click on the OK button and then close the Services window
If you dont You should notice

--------------------------------------------------------------------------------

Getting Rid of Unread Email Messages

To remove the Unread Email message by user's login names:

Start Regedit
For a single user: Go to HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionUnreadMail
For all users: Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUnreadMail
Create a DWORD key called MessageExpiryDays
Give it a value of 0

------------------------------------------------------------------------------

Decreasing Boot Time

Microsoft has made available a program to analyze and decrease the time it takes to boot to WindowsXP
The program is called BootVis

Uncompress the file.
Run BOOTVIS.EXE
For a starting point, run Trace / Next Boot + Driver Delays
This will reboot your computer and provide a benchmark
After the reboot, BootVis will take a minute or two to show graphs of your system startup.
Note how much time it takes for your system to load (click on the red vertical line)
Then run Trace / Optimize System
Re-Run the Next Boot + Drive Delays
Note how much the time has decreased
Mine went from approximately 33 to 25 seconds.

--------------------------------------------------------------------------------
Increasing Graphics Performance

By default, WindowsXP turns on a lot of shadows, fades, slides etc to menu items.
Most simply slow down their display.

To turn these off selectively:

Right click on the My Computer icon
Select Properties
Click on the Advanced tab
Under Performance, click on the Settings button
To turn them all of, select Adjust for best performance
My preference is to leave them all off except for Show shadows under mouse pointer and Show window contents while dragging

---------------------------------------------------------------------------

Increasing System Performance

If you have 512 megs or more of memory, you can increase system performance
by having the core system kept in memory.

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementDisablePagingExecutive
Set the value to be 1
Reboot the computer

---------------------------------------------------------------------------

Increasing File System Caching

To increase the amount of memory Windows will locked for I/O operations:

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management
Edit the key IoPageLockLimit

-----------------------------------------------------------------------------

Resolving Inability to Add or Remove Programs

If a particular user cannot add or remove programs, there might be a simple registry edit neeed.

Go to HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesUninstall
Change the DWORD NoAddRemovePrograms to 0 disable it

4096 - 32megs of memory or less
8192 - 32+ megs of memory
16384 - 64+ megs of memory
32768 - 128+ megs of memory
65536 - 256+ megs of memory

How to Download-Upload Files from email

How to Download-Upload Files from email
This post will teach u how to send big files to email

This technic is really a newly powerfull way of downloading movies games... Nothing to worry about the fu***** deleters and all the jerks!

Enought bullshit lets get down to buisness:

First of all u need to have a big mail box. here are the one which we can cover. click on the icon to go to the website

• Gmail (Google mail)
• Storage space - 1GB
• Maximum attachment size - 10MB
Image
www.gmail.com

• Walla! mail (the best)
• Storage space - 1GB
• Maximum attachment size - 7MB
Image
www.walla.com

• Spymac Mail
• Storage space - 1GB
• Maximum attachment size - 10MB
Image
www.spymac.com

• Unitedemailsystems
• Storage space - 3GB
• Maximum attachment size - 10MB
Image
www.unitedemailsystems.com

• Xasamail
• Storage space - 2GB
• Maximum attachment size - 10MB
Image
www.xasamail.com


• Omnilect Mail
• Storage space - 2GB
• Maximum attachment size - 7MB
Image
www.omnilect.com

------------------------------------------------------------
Image

Then download the software called peer to mail:
http://dw.com.com/redir?pid=10351095&merid=72949&mfgid=72949&lop=link&edId=3&siteId=4&oId=3002-2196_4-10351095&ontId=2196&destUrl=http%3A%2F%2Fwww.peer2mail.com%2FP2MSetup.exe

official website:
http://www.peer2mail.com
--------------------------------------------------------------
Next step : configurate the soft

go in settings > SMTP server setting

and give an smtp adress that u know

Ex: smtp.laposte.net
user : HULK
pass: ******

Once configurated u don't need to touch it for the rest pf ur upload
Image

This is a critical step, if u are experimenting any pb of connexion this is were u need to have a look:

This is possible that temporaly ur internet provider dont allow u to use other smtp adress than his. So use it
ie:
smtp.free.fr
smtp.wanadoo.fr
(these are french one I don't know of which one u are using)
...

If u are experimenting any pb it is better to desactivate ur antivirus (the scanning mail option)

Image


----------------------------------------------------------

Image

1 - Click on Splint/Send File.
2 - Click on the icon (choose a file to send.....).
3 - select the archive that u want to upload it.
4 - type the address of ur account (email).
5 - It determines the size of the parts that the archive will be divided ( take a look at the max size used by ur mail) i advise u to put a size of 6MB.
6 - It determines the type of sending. "send via smtp server"

After all that, press OK.

===========

press the selected button in the figure:

Image

===========

After all the parts have been sent,go to ur account (email) and confirms, then u have to bring the Encrypted password follows the example below:

Image

===========


Always give the following information to the users:
follows the example below:

Email: GMail
Login: zezão
Password: |/kjds42d4sd24 \|

remmember:
- only Encrypted Password, never sends ur true password

--------------------------------------------------

Be careful : never post ur coordinates without having previously verifyed the content in the mailbox

sometimes peer2mail tells u that evrything is sent but It can happens that nothing is sent


---------------------------------------------------------------------------------------------------------

U want to download games and movies with a good speed ( thats what we all here for!)

So here is an easy way to download large files from mailbox

----------------------------------------------------
first download peer to mail

Image

official website:
http://www.peer2mail.com
----------------------------------------------------

Open it and go to the browse tab

---------------------------------------------------

then take the coordinates of the film/game u want to download

in this tutorial i'll use the film mulan :

mail: walla.com
login: dragon_mushu
pass: <(/++EiJPy)>

--------------------------------------------------
U noticed that the mail used is walla.com

so go to www.walla.com with the adress bar or with the prerecorded website (see picture)

Image

login with:
"dragon_mushu" & "<(/++EiJPy)>"

Image
----------------------------------------------------
go into the inbox then click on this icon:
Image

this wil do this:
Image

after uve retrieve all the segment click on "download"
------------------------------------------------------

If everithing is fine the movie will be merge automatically
and u won't need to care about the segments

------------------------------------------------------

If u look for a place to share/download movies/games using peer2mail just go to the peer2mail website www.peer2mail.com. Then go to the forum and click on "peer2mail related websites".

here is the direct link (may not work)
http://www.peer2mail.com/forums/viewforum.php?f=13

----------------------------------------------------------------------

Here u are now u should be an expert on peer2mail!!!




-----------------------------------------------------------------------------------------------------------------

Peer2Mail is the first software that let you store and share files on any web-mail account. If you have a web mail account with large storage space, you can use P2M to store files on it. Web-mail providers such as Gmail (Google Mail), Walla!, Yahoo and more, provide storage space that ranges from 100MB to 3GB.
P2M splits the file you want to share/store zips and encrypts it. P2M then sends the file segments one by one to your account. Once P2M uploaded all file segments, you can download them and use P2M to merge the segments back to the original file.

Sending a File

In order to send a file to an email account, Peer2Mail needs to split it into segments. Web-mail providers limit the size of an email attachment usually to a nominal 10Megs, but due to the size increase resulting from transport encodings, the limit works out to be a few MB less (Usually 7MB). Use the following dialog to prepare the file before sending:

* File Name - The file/s you want to send. You can use the Browse button to select a single or multiple files.

* Mail To - The recipients who will receive the file (Web-mail account). When using Direct Send you may enter only one email address. If you are sending Via MAPI then you can enter as many recipients as you like; Use the Recipients button to easily add email address separated by semi colon (icon_wink.gif.

* Optional Encryption Password - P2M automatically encrypts each segment to protect you privacy, however you can set a password (key) for the encryption to maximize the privacy. You will need this password when you merge the segments back.

* Segment Size - P2M splits the file into segments. Here you can determine the segment size, most of the web-mail providers limit the attachment size to a nominal 10Megs, but due to the size increase resulting from transport encodings, the limit works out to be a few MB less (Usually 7MB). It is recommended to test your web-mail provider for the size of an attachment it can receive.

Send Method -

o Direct Send - P2M has a built in SMTP component that sends the segments directly to the web-mail providers. You don't need to enter your ISP details in order to use P2M. If you are using this feature please make sure you enter a value in the 'From Email Address' because some web-mail providers reject email messages where there is no 'From' address. You can even enter a fake mail address.

o Send Via MAPI - P2M can send the segments using MAPI (Usually your outlook client). When you use this option P2M will split the files and move the sending responsibility to Outlook. Note that it will use your ISP SMTP server and details to send the files. You may enter as many recipients as you wish when using this option.

o Send Via SMTP Server - Send the segments using your ISP SMTP Server. If you are using this feature please make sure you enter a value in the 'From Email Address' because some web-mail providers reject email messages where there is no 'From' address. You can even enter a fake mail address. You may enter as many recipients as you wish when using this option.

* From Email Address - This is the source address of the mail. This address doesn't have to be valid, although sometimes web-mail providers reject emails where the domain part of the address isn't valid.

Image

Once you are done, click on the Ok button. You can now choose if you want P2M to send all the segments or only specific few by checking/un-checking the checkboxes. Once you are ready, click on the Send button. It may take a few hours to complete the operation depending on the file size and your internet connection.
Note: If you are using an antivirus program that scans outgoing mail, it is recommended to disable this feature since it takes a long time for each segment to be scanned.


Plain Transfer

In case you don't want Peer2Mail to split, zip and encrypt your files, and just want to send the files "as is�" then you can use Plain Transfer. This option isn't secure. P2M just sends the file as an email attachment and some web mail providers might even block it.

Choose Plain Transfer from the drop down button: Image.
Once you are done filling the details as described above, click on the Ok button. Once you are ready, click on the Send button.
Note: If you are using an antivirus program that scans outgoing mail, it is recommended to disable this feature since it takes a long time for each segment to be scanned.


Downloading the Segments

P2M includes a built in browser so you can easily log into your web-mail account. Before you can merge the segments you need to download them. It is important that you will save all the segments into the same folder. The first segment name ends with the P2M extension and the rest follow with a serial number 001...00x.

Auto Download

Peer2Mail can automatically list and download files from web-mail accounts. Currently P2M supports auto-download from Gmail, Walla, Yahoo, Spymac, Unitedemailsystems, Xasamail, Gawab, Hriders and Omnilect. To use this feature, login to your account and click on the green download button (Image). P2M will then list the segments (may take a few minutes) and at any time you can tell P2M what segment to download by clicking on the checkboxes that appear next to them. Click on the Download button to begin downloading the selected segments.
If you checked the Auto Merge checkbox then Peer2Mail will automatically merge the segments once the download process is done
Image

The listing process can be a bit slow since P2M scans the mail account and gathers information about each attachment. Sometimes a server doesn't reply to a request so P2M might skip it. To fix that, once the listing process is over, click on the refresh button and P2M will re-index only the segments it didn't already list.
P2M scans for segments only in the inbox for Yahoo, Walla, Spymac, Unitedemailsystems, Xasamailand, Gawab, Hriders, Omnilect, and on all folders with Gmail.

Merging the Segments

Once you completed downloading all the segments, use P2M to merge it back to the original file. Choose the folder you want the file to be saved in and click on the Merge button. The Merge dialog:

# P2M File/s - use the Browse button to select the first segment of the file you wish to merge. The first segment extension is P2M.

# Decryption Password - If you used a password when you sent the file to your account, you must enter it now in order to merge it back. Incorrect password will result in a failure to merge the segments.

How to copy songs from your iPod to your PC

How to copy songs from your iPod to your PC
How to copy songs from your iPod to your PC
A reader points out a straightforward way for Windows users to transfer music from an iPod to your hard drive, without extra software:

  1. Connect the iPod to your PC. If iTunes starts syncing (ie erasing) your music automatically, hit the X in the upper right hand corner of iTunes display, to the left of the search box, to stop it.
  2. In Control Panel, Portable Media Devices, double-click your iPod.
  3. Navigate to the Music folder.
  4. Select all the music folders, and drag and drop them into a folder on your hard drive, or directly into iTunes.

And you’re done! The iPod music folder structure is strange and inexplicable, but once you move your files into iTunes you can set it to automatically organize your folder by artist and album to clean that up. (To do this, in iTunes Edit menu, choose Preferences and in the Advanced tab, check “Keep iTunes Music Folder organized.”)

If you give this a go, lemme know how it goes. I’ll ammend the instructions with any additional info for other versions of Windows and iPods.


Just for the record, I did not write this article, but I would have known how to do this. But one thing I ahve noticed is that you do not need to go into the control panel. Instead just make explorer.exe show hidden folders. Then, navigate into the iPod directory, go into iPod_control, and follow step four of the article. Software

How to Bypass BIOS Passwords

How to Bypass BIOS Passwords
BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot


--------------------------------------------------------------------------------

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.


--------------------------------------------------------------------------------

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

Cracking Zip Password Files

Cracking Zip Password Files
Cracking Zip Password Files

Tut On Cracking Zip Password Files..
What is FZC? FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you're gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as altavista.com.
FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a "wordlist", which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).
FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you're not supposed to have. So like every tool, this one can be used for good and for evil.
The first thing I want to say is that reading this tutorial... is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase "check name.txt" often in this text. These files should be in FZC's directory. They contain more information about FZC.
FZC is a good password recovery tool, because it's very fast and also support resuming so you don't have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn't really matter, because in order to bruteforce a password with 32 chars you'll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.
FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don't require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.
Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait... and wait... and wait...and have good thoughts like "In wordlist mode I'm gonna get the password in minutes" or something like this... you start doing all this and remember "Hey this guy started with all this bullshit and didn't say how I can start a wordlist attack!..." So please wait just a little more, read this tutorial 'till the end and you can do all this "bullshit".

We need to keep in mind that are some people might choose some really weird passwords (for example: 'e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won't help you anymore. Instead, you'll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won't get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB's list and start using the Brute Force attack.
If you have some sort of a really fast and new computer and you're afraid that you won't be able to use your computer's power to the fullest because the zip cracker doesn't support this kind of technology, it's your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.

Now that we've gone through all the theoretical stuff, let's get to the actual commands.


--------------------------------------------------------------------------------
Bruteforce
--------------------------------------------------------------------------------


The command line you'll need to use for using brute force is:

fzc -mb -nzFile.zip -lChr Lenght -cType of chars

Now if you read the bforce.txt that comes with fzc you'll find the description of how works Chr Lenght and the Type of chars, but hey, I'm gonna explain this too. Why not, right?... (but remember look at the bforce.txt too)

For Chr Lenght you can use 4 kind of switches...

-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords
-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars
-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don't think that you would do this.... if you are thinking in doing this get a live...
-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option...

For the Type of chars we have 5 switches they are:

-> a for using lowercase letters
-> A for using uppercase letters
-> ! for using simbols (check the Bforce.txt if you want to see what simbols)
-> s for using space
-> 1 for using numbers


Example:
If you want to find a password with lowercase and numbers by brute force you would just do something like:

fzc -mb -nzTest.zip -l4-7 -ca1

This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.

*****
hint
*****

You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn't work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


--------------------------------------------------------------------------------
Wordlis
--------------------------------------------------------------------------------

Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I'm not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I'm going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.
To start a wordlist attak you'll do something like.

fzc -mwMode number -nzFile.zip -nwWordlist

Where:

Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.
File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn't in the same directory of FZC you'll need to give the all path.

You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.
So if you something like

fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+

FZC would just start reading at line 50 and would just read with length >= to 9.

Example:

If you want to crack a file called myfile.zip using the "theargonlistserver1.txt" wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:

fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50





--------------------------------------------------------------------------------
Resuming
--------------------------------------------------------------------------------

Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).
To resume the bruteforce attack you just need to do:

fzc -mr

And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.
But if you want to resume a wordlist attack you'll need to start a new wordlist attack, saying where it's gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you'll type

fzc -mw3 -nzfile.zip -nwwordlist.txt -f100

Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you... don't forget to read the files that come with the program

A Webs Standards checklist, how to make a proper website

A Webs Standards checklist, how to make a proper website
A Web Standards Checklist, How to make a proper website

A web standards checklist

The term web standards can mean different things to different people. For some, it is 'table-free sites', for others it is 'using valid code'. However, web standards are much broader than that. A site built to web standards should adhere to standards (HTML, XHTML, XML, CSS, XSLT, DOM, MathML, SVG etc) and pursue best practices (valid code, accessible code, semantically correct code, user-friendly URLs etc).

In other words, a site built to web standards should ideally be lean, clean, CSS-based, accessible, usable and search engine friendly.

About the checklist

This is not an uber-checklist. There are probably many items that could be added. More importantly, it should not be seen as a list of items that must be addressed on every site that you develop. It is simply a guide that can be used:

* to show the breadth of web standards
* as a handy tool for developers during the production phase of websites
* as an aid for developers who are interested in moving towards web standards

The checklist

1.Quality of code
1. Does the site use a correct Doctype?
2. Does the site use a Character set?
3. Does the site use Valid (X)HTML?
4. Does the site use Valid CSS?
5. Does the site use any CSS hacks?
6. Does the site use unnecessary classes or ids?
7. Is the code well structured?
8. Does the site have any broken links?
9. How does the site perform in terms of speed/page size?
10. Does the site have JavaScript errors?

2. Degree of separation between content and presentation
1. Does the site use CSS for all presentation aspects (fonts, colour, padding, borders etc)?
2. Are all decorative images in the CSS, or do they appear in the (X)HTML?

3. Accessibility for users
1. Are "alt" attributes used for all descriptive images?
2. Does the site use relative units rather than absolute units for text size?
3. Do any aspects of the layout break if font size is increased?
4. Does the site use visible skip menus?
5. Does the site use accessible forms?
6. Does the site use accessible tables?
7. Is there sufficient colour brightness/contrasts?
8. Is colour alone used for critical information?
9. Is there delayed responsiveness for dropdown menus (for users with reduced motor skills)?
10. Are all links descriptive (for blind users)?

4. Accessibility for devices
1. Does the site work acceptably across modern and older browsers?
2. Is the content accessible with CSS switched off or not supported?
3. Is the content accessible with images switched off or not supported?
4. Does the site work in text browsers such as Lynx?
5. Does the site work well when printed?
6. Does the site work well in Hand Held devices?
7. Does the site include detailed metadata?
8. Does the site work well in a range of browser window sizes?

5. Basic Usability
1. Is there a clear visual hierarchy?
2. Are heading levels easy to distinguish?
3. Does the site have easy to understand navigation?
4. Does the site use consistent navigation?
5. Are links underlined?
6. Does the site use consistent and appropriate language?
7. Do you have a sitemap page and contact page? Are they easy to find?
8. For large sites, is there a search tool?
9. Is there a link to the home page on every page in the site?
10. Are visited links clearly defined with a unique colour?

6. Site management
1. Does the site have a meaningful and helpful 404 error page that works from any depth in the site?
2. Does the site use friendly URLs?
3. Do your URLs work without "www"?
4. Does the site have a favicon?

1. Quality of code

1.1 Does the site use a correct Doctype?
A doctype (short for 'document type declaration') informs the validator which version of (X)HTML you're using, and must appear at the very top of every web page. Doctypes are a key component of compliant web pages: your markup and CSS won't validate without them.
CODE
http://www.alistapart.com/articles/doctype/


More:
CODE
http://www.w3.org/QA/2002/04/valid-dtd-list.html

CODE
http://css.maxdesign.com.au/listamatic/about-boxmodel.htm

CODE
http://gutfeldt.ch/matthias/articles/doctypeswitch.html


1.2 Does the site use a Character set?
If a user agent (eg. a browser) is unable to detect the character encoding used in a Web document, the user may be presented with unreadable text. This information is particularly important for those maintaining and extending a multilingual site, but declaring the character encoding of the document is important for anyone producing XHTML/HTML or CSS.
CODE
http://www.w3.org/International/tutorials/tutorial-char-enc/


More:
CODE
http://www.w3.org/International/O-charset.html


1.3 Does the site use Valid (X)HTML?
Valid code will render faster than code with errors. Valid code will render better than invalid code. Browsers are becoming more standards compliant, and it is becoming increasingly necessary to write valid and standards compliant HTML.
CODE
http://www.maxdesign.com.au/presentation/sit2003/06.htm


More:
CODE
http://validator.w3.org/


1.4 Does the site use Valid CSS?
You need to make sure that there aren't any errors in either your HTML or your CSS, since mistakes in either place can result in botched document appearance.
CODE
http://www.meyerweb.com/eric/articles/webrev/199904.html


More:
CODE
http://jigsaw.w3.org/css-validator/


1.5 Does the site use any CSS hacks?
Basically, hacks come down to personal choice, the amount of knowledge you have of workarounds, the specific design you are trying to achieve.
CODE
http://www.mail-archive.com/wsg@webstandardsgroup.org/msg05823.html


More:
CODE
http://css-discuss.incutio.com/?page=CssHack

CODE
http://css-discuss.incutio.com/?page=ToHackOrNotToHack

CODE
http://centricle.com/ref/css/filters/


1.6 Does the site use unnecessary classes or ids?
I've noticed that developers learning new skills often end up with good CSS but poor XHTML. Specifically, the HTML code tends to be full of unnecessary divs and ids. This results in fairly meaningless HTML and bloated style sheets.
CODE
http://www.clagnut.com/blog/228/


1.7 Is the code well structured?
Semantically correct markup uses html elements for their given purpose. Well structured HTML has semantic meaning for a wide range of user agents (browsers without style sheets, text browsers, PDAs, search engines etc.)
CODE
http://www.maxdesign.com.au/presentation/benefits/index04.htm


More:
CODE
http://www.w3.org/2003/12/semantic-extractor.html


1.8 Does the site have any broken links?
Broken links can frustrate users and potentially drive customers away. Broken links can also keep search engines from properly indexing your site.

More:
CODE
http://validator.w3.org/checklink


1.9 How does the site perform in terms of speed/page size?
Don't make me wait... That's the message users give us in survey after survey. Even broadband users can suffer the slow-loading blues.
CODE
http://www.websiteoptimization.com/speed/


1.10 Does the site have JavaScript errors?
Internet Explore for Windows allows you to turn on a debugger that will pop up a new window and let you know there are javascript errors on your site. This is available under 'Internet Options' on the Advanced tab. Uncheck 'Disable script debugging'.

2. Degree of separation between content and presentation

2.1 Does the site use CSS for all presentation aspects (fonts, colour, padding, borders etc)?
Use style sheets to control layout and presentation.
CODE
http://www.w3.org/TR/WCAG10/wai-pageauth.html#tech-style-sheets


2.2 Are all decorative images in the CSS, or do they appear in the (X)HTML?
The aim for web developers is to remove all presentation from the html code, leaving it clean and semantically correct.
CODE
http://www.maxdesign.com.au/presentation/benefits/index07.htm


3. Accessibility for users

3.1 Are "alt" attributes used for all descriptive images?
Provide a text equivalent for every non-text element
CODE
http://www.w3.org/TR/WCAG10/wai-pageauth.html#tech-text-equivalent


3.2 Does the site use relative units rather than absolute units for text size?
Use relative rather than absolute units in markup language attribute values and style sheet property values'.
CODE
http://www.w3.org/TR/WCAG10/wai-pageauth.html#tech-relative-units


More:
CODE
http://www.w3.org/TR/WCAG10/wai-pageauth.html#tech-relative-units

CODE
http://www.clagnut.com/blog/348/


3.3 Do any aspects of the layout break if font size is increased?
Try this simple test. Look at your website in a browser that supports easy incrementation of font size. Now increase your browser's font size. And again. And again... Look at your site. Does the page layout still hold together? It is dangerous for developers to assume that everyone browses using default font sizes.
3.4 Does the site use visible skip menus?

A method shall be provided that permits users to skip repetitive navigation links.
CODE
http://www.section508.gov/index.cfm?FuseAction=Content&ID=12


Group related links, identify the group (for user agents), and, until user agents do so, provide a way to bypass the group.
CODE
http://www.w3.org/TR/WCAG10-TECHS/#tech-group-links


...blind visitors are not the only ones inconvenienced by too many links in a navigation area. Recall that a mobility-impaired person with poor adaptive technology might be stuck tabbing through that morass.
CODE
http://joeclark.org/book/sashay/serialization/Chapter08.html#h4-2020


More:
CODE
http://www.niehs.nih.gov/websmith/508/o.htm


3.5 Does the site use accessible forms?
Forms aren't the easiest of things to use for people with disabilities. Navigating around a page with written content is one thing, hopping between form fields and inputting information is another.
CODE
http://www.htmldog.com/guides/htmladvanced/forms/


More:
CODE
http://www.webstandards.org/learn/tutorials/accessible-forms/01-accessible-forms.html

CODE
http://www.accessify.com/tools-and-wizards/accessible-form-builder.asp

CODE
http://accessify.com/tutorials/better-accessible-forms.asp


3.6 Does the site use accessible tables?
For data tables, identify row and column headers... For data tables that have two or more logical levels of row or column headers, use markup to associate data cells and header cells.
CODE
http://www.w3.org/TR/WCAG10/wai-pageauth.html#tech-table-headers


More:
CODE
http://www.bcc.ctc.edu/webpublishing/ada/resources/tables.asp

CODE
http://www.accessify.com/tools-and-wizards/accessible-table-builder_step1.asp

CODE
http://www.webaim.org/techniques/tables/


3.7 Is there sufficient colour brightness/contrasts?
Ensure that foreground and background colour combinations provide sufficient contrast when viewed by someone having colour deficits.
CODE
http://www.w3.org/TR/WCAG10/wai-pageauth.html#tech-colour-contrast


More:
CODE
http://www.juicystudio.com/services/colourcontrast.asp


3.8 Is colour alone used for critical information?
Ensure that all information conveyed with colour is also available without colour, for example from context or markup.
CODE
http://www.w3.org/TR/WCAG10/wai-pageauth.html#tech-colour-convey


There are basically three types of colour deficiency; Deuteranope (a form of red/green colour deficit), Protanope (another form of red/green colour deficit) and Tritanope (a blue/yellow deficit- very rare).

More:
CODE
http://colourfilter.wickline.org/

CODE
http://www.toledo-bend.com/colourblind/Ishihara.html

CODE
http://www.vischeck.com/vischeck/vischeckURL.php


3.9 Is there delayed responsiveness for dropdown menus?
Users with reduced motor skills may find dropdown menus hard to use if responsiveness is set too fast.

3.10 Are all links descriptive?
Link text should be meaningful enough to make sense when read out of context - either on its own or as part of a sequence of links. Link text should also be terse.
CODE
http://www.w3.org/TR/WCAG10/wai-pageauth.html#tech-meaningful-links


4. Accessibility for devices.

4.1 Does the site work acceptably across modern and older browsers?

Before starting to build a CSS-based layout, you should decide which browsers to support and to what level you intend to support them.
CODE
http://www.maxdesign.com.au/presentation/process/index_step01.cfm



4.2 Is the content accessible with CSS switched off or not supported?
Some people may visit your site with either a browser that does not support CSS or a browser with CSS switched off. In content is structured well, this will not be an issue.

4.3 Is the content accessible with images switched off or not supported?
Some people browse websites with images switched off - especially people on very slow connections. Content should still be accessible for these people.

4.4 Does the site work in text browsers such as Lynx?
This is like a combination of images and CSS switched off. A text-based browser will rely on well structured content to provide meaning.

More:
CODE
http://www.delorie.com/web/lynxview


4.5 Does the site work well when printed?
You can take any (X)HTML document and simply style it for print, without having to touch the markup.
CODE
http://www.alistapart.com/articles/goingtoprint/


More:
CODE
http://www.d.umn.edu/itss/support/Training/Online/webdesign/css.html#print


4.6 Does the site work well in Hand Held devices?
This is a hard one to deal with until hand held devices consistently support their correct media type. However, some layouts work better in current hand-held devices. The importance of supporting hand held devices will depend on target audiences.

4.7 Does the site include detailed metadata?
Metadata is machine understandable information for the web
CODE
http://www.w3.org/Metadata/


Metadata is structured information that is created specifically to describe another resource. In other words, metadata is 'data about data'.


4.8 Does the site work well in a range of browser window sizes?
It is a common assumption amongst developers that average screen sizes are increasing. Some developers assume that the average screen size is now 1024px wide. But what about users with smaller screens and users with hand held devices? Are they part of your target audience and are they being disadvantaged?

5. Basic Usability
5.1 Is there a clear visual hierarchy?
Organise and prioritise the contents of a page by using size, prominence and content relationships.
CODE
http://www.great-web-design-tips.com/web-site-design/165.html


5.2 Are heading levels easy to distinguish?
Use header elements to convey document structure and use them according to specification.
CODE
http://www.w3.org/TR/WCAG10/wai-pageauth.html#tech-logical-headings


5.3 Is the site's navigation easy to understand?
Your navigation system should give your visitor a clue as to what page of the site they are currently on and where they can go next.
CODE
http://www.1stsitefree.com/design_nav.htm


5.4 Is the site's navigation consistent?
If each page on your site has a consistent style of presentation, visitors will find it easier to navigate between pages and find information
CODE
http://www.juicystudio.com/tutorial/accessibility/navigation.asp


5.5 Does the site use consistent and appropriate language?
The use of clear and simple language promotes effective communication. Trying to come across as articulate can be as difficult to read as poorly written grammar, especially if the language used isn't the visitor's primary language.
CODE
http://www.juicystudio.com/tutorial/accessibility/clear.asp


5.6 Does the site have a sitemap page and contact page? Are they easy to find?
Most site maps fail to convey multiple levels of the site's information architecture. In usability tests, users often overlook site maps or can't find them. Complexity is also a problem: a map should be a map, not a navigational challenge of its own.
CODE
http://www.useit.com/alertbox/20020106.html


5.7 For large sites, is there a search tool?
While search tools are not needed on smaller sites, and some people will not ever use them, site-specific search tools allow users a choice of navigation options.

5.8 Is there a link to the home page on every page in the site?
Some users like to go back to a site's home page after navigating to content within a site. The home page becomes a base camp for these users, allowing them to regroup before exploring new content.

5.9 Are links underlined?
To maximise the perceived affordance of clickability, colour and underline the link text. Users shouldn't have to guess or scrub the page to find out where they can click.
CODE
http://www.useit.com/alertbox/20040510.html


5.10 Are visited links clearly defined?
Most important, knowing which pages they've already visited frees users from unintentionally revisiting the same pages over and over again.
CODE
http://www.useit.com/alertbox/20040503.html


6. Site management

6.1 Does the site have a meaningful and helpful 404 error page that works from any depth in the site?
You've requested a page - either by typing a URL directly into the address bar or clicking on an out-of-date link and you've found yourself in the middle of cyberspace nowhere. A user-friendly website will give you a helping hand while many others will simply do nothing, relying on the browser's built-in ability to explain what the problem is.
CODE
http://www.alistapart.com/articles/perfect404/


6.2 Does the site use friendly URLs?
Most search engines (with a few exceptions - namely Google) will not index any pages that have a question mark or other character (like an ampersand or equals sign) in the URL... what good is a site if no one can find it?
CODE
http://www.sitepoint.com/article/search-engine-friendly-urls


One of the worst elements of the web from a user interface standpoint is the URL. However, if they're short, logical, and self-correcting, URLs can be acceptably usable
CODE
http://www.merges.net/theory/20010305.html


More:
CODE
http://www.sitepoint.com/article/search-engine-friendly-urls

CODE
http://www.websitegoodies.com/article/32

CODE
http://www.merges.net/theory/20010305.html


6.3 Does the site's URL work without "www"?
While this is not critical, and in some cases is not even possible, it is always good to give people the choice of both options. If a user types your domain name without the www and gets no site, this could disadvantage both the user and you.
6.4 Does the site have a favicon?

A Favicon is a multi-resolution image included on nearly all professionally developed sites. The Favicon allows the webmaster to further promote their site, and to create a more customized appearance within a visitor's browser.
CODE
http://www.favicon.com/


Favicons are definitely not critical. However, if they are not present, they can cause 404 errors in your logs (site statistics). Browsers like IE will request them from the server when a site is bookmarked. If a favicon isn't available, a 404 error may be generated. Therefore, having a favicon could cut down on favicon specific 404 errors. The same is true of a 'robots.txt' file.

Benarkah Pembobolan ATM BCA dilakukan para Hacker?

Benarkah Pembobolan ATM BCA dilakukan para Hacker?
Sedikit menyimpang dari tema sejarah, saya akan membahas kasus pembobolan ATM BCA ini dari sudut pandang saya sebagai Blogger Sekaligus Seorang Hacker. Kenapa saya angkat tema ini? Sebenarnya saya berniat untuk meletakkan artikel ini di blog saya yang masih ada hubungannya dengan IT tapi setelah saya pertimbangkan kelihatannya artikel ini lebih cocok ada di blog ini dan saya pribadi memberikan label Sejarah Kelam Bangsa Kita untuk postingan ini.
Okeh kita lanjut ke inti masalah, Sepertinya berita tentang keamanan mesin ATM, khususnya ATM BCA sedang menjadi berita yang hangat diperbincangkan sejak kemarin. Banyak nasabah dari Bank tersebut merasa dirugikan karena kehilangan sejumlah besar Uang bahkan sempat saya dengar ada yang kehilangan sampai 150 juta padahal mereka tidak merasa menarik tunai tabungan mereka lewat ATM.
Banyak pendapat mencuat dari berbagai kalangan, ada yang berpendapat bahwa itu adalah adalah sindikat pembobol ATM yang sudah lama berkeliaran, ada yang berpendapat bahwa itu adalah permainan dari Internal BCA sendiri bahkan ada yang berpendapat bahwa itu adalah ulah dari para Hacker.
Saya tidak akan membahas pendapat pertama dan kedua karena menurut saya itu adalah pendapat yang paling kuat dan meyakinkan. Namun disini, saya akan membahas pendapat yang ketiga. Benarkah ini adalah ulah para Hacker?
Sebelum membahas ini lebih jauh saya akan sedikit meluruskan pengertian Hacker tersebut. Banyak orang mengira bahwa Hacker adalah orang yang berprilaku negatif dalam memanfaatkan ilmu yang dimilikinya, padahal sebenarnya para Hacker justru memanfaatkan pengetahuan mereka untuk membantu orang lain/ untuk hal yang positif. Kenapa saya katakan demikian? Karena saya sendiripun adalah seorang member dari 2 komunitas Hacker yang ada di Jakarta yaitu *****Hacker dan ****Hacker, nah lantas apa sebutan bagi mereka yang memakai ilmunya untuk kegiatan yang menjurus ke prilaku kriminal tersebut? Saya dan teman-teman di dalam komunitas biasa menyebutnya Cracker.
Setelah meluruskan pengertian tersebut saya akan kembali mengajukan pertanyaan serupa. Benarkah ini adalah ulah para Hacker Cracker?
Saya pribadi akan menjawab bahwa ini bukan ulah dari para Hacker Cracker, kenapa? Karena setahu saya seorang cracker tidak akan melakukan hal sekonyol itu hanya untuk membobol sebuah ATM. Kenapa saya katakan konyol? Karena saya dengar pembobolan Rekening lewat ATM ini dilakukan dengan menggunakan Spycam dan pengganda kartu ATM.
Jika anda pernah isenk searh di Google, peralatan yang mereka gunakan untuk membobol ATM tersebut dijual secara bebas di dunia maya dan hanya seharga $ 1500 atau senilai Rp.13.800.000,00 (jika kurs rupiah terhadap dolar senilai Rp 9.200,00.) harga yang sangat murah jika dibandingkan dengan hasil yang akan mereka dapatkan dan saya pribadi berpendapat bahwa ini semua bahkan bisa dilakukan oleh orang awam.
Lalu artinya apakah para cracker dapat melakukan hal yang jauh lebih berbahaya bagi para nasabah bank tersebut? Okeh karena disini bank yang diperbincangkan adalah Bank BCA saya akan memberikan sedikit contoh bagaimana para Cracker dapat dengan mudah membobol Security KlikBCA hanya dengan memanfaatkan XSS dan yang terpenting mempunyai sebuah nama domain sendiri yang menggunakan script php dan disini saya hanya akan menggunakan nama domain fiktif untuk memaparkannya. Apa itu XSS saya tidak akan membahasnya disini dan jika anda tertarik untuk mencari tahu silahkan gunakan Fasilitas Search Engine seperti Google, Yahoo, Bing, dll.
Saya akan melanjutkan, Mungkin banyak orang termasuk mereka yang ada di dalam Lingkup dari Security Klik BCA ini berpikir apa sih hal terburuk yang bisa menimpa server dengan XSS? Memang tidak secara langsung, namun ingat satu bug bisa di-exploit dengan 1001 macam cara yang semakin lama semakin efektif. Anda akan terkejut menyadari bahwa bug “seremeh” ini ternyata bisa diexploit sedemikian rupa.
The Vulnerability
Bug XSS ini akan muncul bila kita memasukkan username dan password yang salah. Ketika kita salah mengisi password, maka akan muncul dialog box yang memberitahu bahwa password kita salah.
URL ketika password kita salah adalah:
https://ibank.klikbca.com/authentication.do?value(ac
tions)=logout&value(strError)=Mohon masukkan User ID/Password Anda yg benar \n (Please enter Your correct User ID/Password)
INi hanya pembelajaran SEO Semata-mata untuk meningkatkan, pagarank di yahoo

hack chip zynga poker

hack chip zynga poker
Sekitar 208,000 hasil (0.20 detik)
Hasil Telusur

   1.
      hacking facebook + chip zynga poker gratis - Brawijaya Forum - (1)
      buat elo yang sukanya minta2 cheat,ni gw lg bagi2 gratis hacking facebook + hacking chips poker facebook,lu kirim email aja ke phignon@gmail.comato belajar ...
      forum.ub.ac.id/index.php?action=vthread&forum=4&topic... - Tembolok
   2.
      Zynga Poker Hack Chips Free Download
      Related Terms for Zynga Poker Hack Chips Zynga Poker Hack Chips On Facebook, Zynga Poker Hack Chips For Texas Hold Em, Zynga Poker Hack Chips Online, ...
      www.topshareware.com/zynga-poker-hack-chips/.../1.htm - Tembolok - Mirip
   3.
      Humas Tarakan: Cara Mudah Hacking Chips Poker Zynga
      5 Agu 2009 ... Cara Mudah Hacking Chips Poker Zynga. Game Poker online sudah terbilang lama di dalam dunia internet baik yang bersifat bisnis judi langsung ...
      adrianinur.blogspot.com/.../cara-mudah-hacking-chips-poker-zynga.html - Tembolok - Mirip
   4.
      Cara Hack Zynga Poker | Hasi Aulia's Weblog
      Posts Tagged 'cara hack zynga poker'. Cara mencuri chips poker facebook (cara hack facebook). Posted by admin on 2 August, 2009 ...
      hasiaulia.net/tag/cara-hack-zynga-poker/ - Tembolok - Mirip
   5.
      DOWNLOAD DOWNLOAD DOWNLOAD HACK CHIPS ZYNGA POKER FACEBOOK EXE WEB ...
      14 Mei 2010 ... Hack Facebook Poker Chips Zynga Hack Dow They deliver even the latest ... Facebook zynga poker chip hack pro 2010 downl Free Download, ...
      www.lowongankerja2010x.com/.../download+download+hack+chips+zynga+poker+facebook+exe+web+search
   6.
      Cara Cheat Chip Zynga Poker.html | Facebook Games Cheats
      Related Terms for Zynga Poker Hack Chips Zynga Texas Hold Em Poker Hack Chips, ... zynga cash chip poker hacking bot. Poker Bo t has been built and tested ...
      tophealthplans.info/bloginfo/cara+cheat+chip+zynga+poker.html - Tembolok
   7.
      Zynga
       - [ Terjemahkan laman ini ]
      NEWEST Chips Hack Zynga Server To Players Pro50m+ ( 10billion chips ) ... Are there any Zynga Poker Cheats on Facebook... 4 Answers ...
      www.mahalo.com/zynga - Tembolok - Mirip
   8.
      Download facebook free zynga poker chips hack v20 files from ...
       - [ Terjemahkan laman ini ]
      Download facebook free zynga poker chips hack v20 using General-Search.com File Share Search Engine. 417 rapidshare facebook free zynga poker links ...
      www.general-search.com/.../facebook-free-zynga-poker-chips-hack-v20 - Tembolok - Mirip
   9.
      Hack Facebook Zynga Poker Chips : Texas Rankem, Social Community ...
       - [ Terjemahkan laman ini ]
      Hack Facebook Zynga Poker Chips · Hack Facebook Poker Chips Zynga · Hack Facebook Poker Chips Zynga · Hack Poker Chips Zynga On Facebook · Hack Poker Chips ...
      www.vclcomponents.com/...__/hack_facebook_zynga_poker_chips - Tembolok
  10.
      Zynga Facebook Poker Chips Hack Archives | Kinjeng.Net
      Tags: bot poker, bot zynga poker, bot zynga poker terbaru, cara menggunakan bot zynga poker, cara menggunakan zynga poker bot, poker bot, Poker Bot For ...
      kinjeng.net/tag/zynga-facebook-poker-chips-hack - Tembolok - Mirip

   1.
      ZPChips - Buy FB Chips
      www.zpchips.com      24/7, As Low As 1.60 Per M Trsuted, Reliable & affordable !

Hasil Telusur

   1.
      hack chip zynga poker generator 2010 Download » Full Software ...
       - [ Terjemahkan laman ini ]
      hack chip zynga poker generator 2010 search results, download hack chip zynga poker generator 2010 files from dl4all.com.
      www.dl4all.com/.../hack+chip+zynga+poker+generator+2010.html - Tembolok - Mirip
   2.
      Cara Hack Chips Zynga Poker Akun Facebook | Roomen Blog
      22 Feb 2010 ... Tapi tidak semuanya, karena saya yakin sebagian besar dari mereka sudah tahu dan mengerti bahwa hack chips zynga poker benar-benar bisa ...
      roomen.blogspot.com/.../cara-hack-chips-zynga-poker-akun.html - Tembolok
   3.
      hack chip zynga poker - Download from 4shared.com - Filestube.com
       - [ Terjemahkan laman ini ]
      24 Dec 2009 ... File: hack chip zynga poker download, from: 4shared.com, size: 3 MB, date: 2009-12-24 23:03:23 - FilesTube.com, Rapidshare Files.
      www.filestube.com/...g/hack-chip-zynga-poker.html - Tembolok - Mirip
   4.
      Hack Chips Zynga Poker Via Cheat Engine
      Personal Blog | Media Belajar Bareng | Pacitan Blog: Hack Chips Zynga Poker Via Cheat Engine - WWW.MASRENDRA.INFO.
      www.masrendra.info/.../hack-chips-zynga-poker-via-cheat-engine.html - Tembolok
   5.
      Cara Mudah Hacking Chips Poker Zynga : Warta Warga
      Pingback by Cara Mudah Hacking Chips Poker Zynga « Sistem Informasi Site on 4 January 2010: [...] January 4, 2010 · Leave a Comment Cara Mudah Hacking Chips ...
      wartawarga.gunadarma.ac.id/.../cara-mudah-hacking-chips-poker-zynga/ - Tembolok - Mirip
   6.
      cheat engine 5.5 hack chips zynga poker
      Cheat engine 5.5 hack chips zynga poker free download. Software cheat engine 5.5 hack chips zynga poker giveaway.
      www.giveawayoftheday.com/cheat+engine+5.5+hack+chips+zynga+poker/ - Tembolok - Mirip
   7.
      Tutorial Hack Chip Zynga Poker Bot | Facebook
      20 pesan
      silahkan kujngi blog ini kalau yang ingin donwload programnya http://rinoku.blogspot.com/2010/02/tutorial-hack-chip-zynga-poker.html. Terima kasih ...
      www.facebook.com/topic.php?uid=156471133083&topic... - Tembolok
      Dapatkan hasil diskusi lainnya
   8.
      Hacking Facebook + Chip Zynga Poker - Brawijaya Forum - (1)
      coba pake teknik reverting ini :Persiapan :1.Mental anda,yang sabar,jangan tergesa-gesa pengen berhasil,pelan-pelan asal prosesnya berhasil.2.
      forum.ub.ac.id/index.php?action=vthread&forum=4&topic... - Tembolok
   9.
      How to Get Many Chips on Zynga Texas Holdem Poker ( Facebook ...
       - [ Terjemahkan laman ini ]
      30 Apr 2009 ... Zynga Poker Bot Texas Holdem Poker Bot Fac...ebook Poker Bot Hacks Poker Chips Texas Holdem 100 Bil. Rated 3.15 | 3846 Views ...
      www.metacafe.com/.../how_to_get_many_chips_on_zynga_texas_holdem_poker_facebook_bebo_myspace/ - Tembolok - Mirip
  10.
      Simple Search Engine Files - CARA HACK CHIP ZYNGA POKER ...
      Simple Search Engine Files Files Search Results: 258 for cara hack chip zynga poker http://searchfiles.co.cc/Rapidshare/files/1989_Blue_Chip/21903.html ...
      searchfiles.co.cc/all/search/cara+hack+chip+zynga+poker-.html - Tembolok
#
hack chip zynga Poker
Carirumahdijual.com adalah Web iklan yg khusus untuk properti seperti tanah dijual, rumah dikontrakkan atau cari rumah, kost, apartemen semuanya ada disini.
iklangratisonline.com/hack-chip-zynga-poker.html - Tembolok
#
Cara Hack Chips ZyNga Poker FACEBOOK
25 Mar 2010 ... Cara Hack Chips ZyNga Poker FACEBOOK. Game Poker online sudah terbilang lama di dalam dunia internet baik yang bersifat bisnis judi langsung ...
www.viandraminerva.co.cc/.../cara-hack-chips-zynga-poker-facebook.html - Tembolok
#
Hacking Facebook Chip Zynga Poker Gratis Brawijaya Forum | Free ...
Brawijaya Forum / Games / hacking facebook + chip zynga poker gratis Zynga Poker Chip Duplicator. Anda bisa menggunakan program dari Mark ini untuk ...
daoes.com/.../hacking+facebook++chip+zynga+poker+gratis+brawijaya+forum+ - Tembolok
#
Hack Chip Poker Terbaru? Bohong! | ahyari [dot] com
1 Apr 2010 ... Zynga Poker Corporation. Untuk chips yang di curi/hack/bunned,ternyata ada salah satu cara untuk mengembalikan. chip, ya mudah2an zynga bisa ...
ahyari.com/hack-chip-poker/ - Tembolok
#
Hacking Facebook Chip Zynga Poker Brawijaya Forum 2 | Free ...
Brawijaya Forum / Games / hacking facebook + chip zynga poker gratis zynga poker chips hack tool gmna cra pake x bro maklum msh baru ? . (source) ...
adsensegratis.com/.../hacking+facebook++chip+zynga+poker+brawijaya+forum+2 - Tembolok
#
everything's free: Hack Chips Zynga Poker
Hack Chips Zynga Poker mungkin sudah bukan merupakan kabar yang baru atau banyak dicari saat ini. Ada beberapa cara termudah untuk melakukan Hack Chips ...
teknigar.blogspot.com/2010/.../hack-chips-zynga-poker.html - Tembolok - Mirip
#
hack zynga poker chips - Forum Plasa
9 pesan - 8 penulis - Pos terakhir: 28 Nov 2009
hack zynga poker chips Hacking and Security. ... yg Nge Hack chips kita mending ga' usah diikutin ... yg mo beli chip poker silakan PM : ...
forum2.plasa.com/showthread.php?p=8842874 - Tembolok
Dapatkan hasil diskusi lainnya
#
UAL CHIP ZYNGA POKER PALING MURAH | Iklan Baris Gratis
bagi anda yang mau hack chip poker ZYNGA bisa pakai CHAET ENGINE. kemudian aktifkan chip anda tersebut ke email: activation_chipszynga01@yahoo.com isi email ...
iklankamu.com/.../ual-chip-zynga-poker-paling-murah.html - Tembolok - Mirip
#
Download Hack Chip Zynga Poker Software Downloads - Iklan Prima ...
Berbagai Macam Iklan tentang download hack chip zynga poker software downloads dari Iklanprima.info - Media Pasang Iklan Baris Gratis.
iklanprima.info/.../download+hack+chip+zynga+poker+software+downloads+ - Tembolok
#
Download Program Hacker Chip Zynga Poker Software - Downloads Free ...
Program Hacker Chip Zynga Poker Search. Download Free Program Hacker Chip Zynga Poker ... Program Hack Facebook Poker Chip Zynga · Hacker Chip Zynga Poker ...
www.xentrik.net/.../program_hacker_chip_zynga_poker.html - Tembolok

terowongan Kereta Statsiun Kreta Bawah Tanah

Dalam seri ini berjudul Symmetry adalah Seksi, fotografer dan arsitek Kim Erlandsen menunjukkan sedikit sengsara-Nya untuk subjek. Dia dilihat tempat-tempat dengan langit-langit yang tinggi dan besar melakukan pekerjaan luar biasa menangkap garis-garis halus yang menonjolkan warna lingkungan. Foto Ini Di Portugal.


luar biasa

50 Top Keywords

50 Top Keywords
 Keyword   Cost per Click   Searches   Searches*CPC   #1 Clicks   #2 Clicks   #3 Clicks 
1.quotes$26.116,120,000$159,793,2002,588,760729,504516,528
2.google$4.5024,900,000$112,050,00010,532,7002,968,0802,101,560
3.web hosting$13.624,090,000$55,705,8001,730,070487,528345,196
4.gmail$4.7811,100,000$53,058,0004,695,3001,323,120936,840
5.circuit city$18.142,740,000$49,703,6001,159,020326,608231,256
6.home$3.189,140,000$29,065,2003,866,2201,089,488771,416
7.youtube$1.0324,900,000$25,647,00010,532,7002,968,0802,101,560
8.myspace$0.4255,600,000$23,352,00023,518,8006,627,5204,692,640
9.you tube$2.399,140,000$21,844,6003,866,2201,089,488771,416
10.digital cameras$2.379,140,000$21,661,8003,866,2201,089,488771,416
11.yahoo$0.7130,400,000$21,584,00012,859,2003,623,6802,565,760
12.bank of america$4.215,000,000$21,050,0002,115,000596,000422,000
13.quote$17.161,220,000$20,935,200516,060145,424102,968
14.spyware blockers$9.322,240,000$20,876,800947,520267,008189,056
15.loans$11.311,830,000$20,697,300774,090218,136154,452
16.ebay$0.9520,400,000$19,380,0008,629,2002,431,6801,721,760
17.expedia$7.732,240,000$17,315,200947,520267,008189,056
18.chase$10.921,500,000$16,380,000634,500178,800126,600
19.wamu$12.211,220,000$14,896,200516,060145,424102,968
20.flowers$4.433,350,000$14,840,5001,417,050399,320282,740
21.insurance$14.771,000,000$14,770,000423,000119,20084,400
22.imdb$6.422,240,000$14,380,800947,520267,008189,056
23.capital one$14.121,000,000$14,120,000423,000119,20084,400
24.debt consolidation$20.59673,000$13,857,070284,67980,22156,801
25.united airlines$11.301,220,000$13,786,000516,060145,424102,968
26.mortgage$15.37823,000$12,649,510348,12998,10169,461
27.google com$2.505,000,000$12,500,0002,115,000596,000422,000
28.imac$4.522,740,000$12,384,8001,159,020326,608231,256
29.espn$2.445,000,000$12,200,0002,115,000596,000422,000
30.car insurance$14.82823,000$12,196,860348,12998,10169,461
31.myspace com$0.6916,600,000$11,454,0007,021,8001,978,7201,401,040
32.free credit report$16.39673,000$11,030,470284,67980,22156,801
33.american express$8.921,220,000$10,882,400516,060145,424102,968
34.finance$10.591,000,000$10,590,000423,000119,20084,400
35.hotels$3.163,350,000$10,586,0001,417,050399,320282,740
36.facebook$0.7713,600,000$10,472,0005,752,8001,621,1201,147,840
37.sprint$10.361,000,000$10,360,000423,000119,20084,400
38.cingular$6.761,500,000$10,140,000634,500178,800126,600
39.google earth$4.522,240,000$10,124,800947,520267,008189,056
40.travelocity$5.421,830,000$9,918,600774,090218,136154,452
41.auto insurance$32.76301,000$9,860,760127,32335,87925,404
42.gmail com$4.362,240,000$9,766,400947,520267,008189,056
43.antivirus firewall software$3.542,740,000$9,699,6001,159,020326,608231,256
44.maps$2.813,350,000$9,413,5001,417,050399,320282,740
45.chase com$15.68550,000$8,624,000232,65065,56046,420
46.life quotes$18.78450,000$8,451,000190,35053,64037,980
47.eating disorder treatment$12.17673,000$8,190,410284,67980,22156,801
48.expedia com$11.96673,000$8,049,080284,67980,22156,801
49.credit card$11.86673,000$7,981,780284,67980,22156,801
50.cars$1.954,090,000$7,975,5001,730,070487,528345,196