> code 64 bicth code 64 bicth - All Post
Latest Updates

How to change name facebook limit 2014

How to change name facebook limit 2014
How to change name facebook limit 2014

This time code 64 bicth will share tutorial how to change facebook name that can not be replaced, or already at the limit.

okey follow the following ways:

1. login to your facebook account

2. go to settings, then click on the email and add your new email ( remember the email that has not been registered to faceook ) and in your email confirmation 

3. change your facebook password

4. remove your old email

5. process will run for 2x24 hour or a maximum of 2 days

6. and lastly your account will surh new rename: D


Good luck: D

Tapping Of The Pentagon

ADA programming language is a programming language that is being used by developers of weapons in the Pentagon ( Defense Base USA ) . Now children can master the TC had little tutorial from me . However, this tutorial should not be used indiscriminately

ADA programming language is a programming language that is being used by developers of weapons in the Pentagon ( Defense Base USA ) . Now children can master the TC had little tutorial from me . However, this tutorial should not be used indiscriminately . Specifications required for the laptops :

1 . Free linux OS
2 . 've installed gcc - gnat
3 . intel pentium 1 min
4 . RAM adjust
5 . bessar try the hard drive because the ELF file will be larger than 50kb
6 . etc.

specifications for developers :
1 . understand a little pascal
2 . can not require military
3 . careful - careful in using
A little tutorial of mine that was certainly released the names of each - each maker :
with Ada.Text_IO ; Ada.Text_IO use ;
procedure hello is begin
Put_Line ( " hello Mr. Genie " ) ;
hello end ;

little explanation for the application that I created . That the name of the file should berextensi * . Adb . Keep the file name matches the name of the procedure . Due to the existing compiler that using OOP version 95 which is used even though the USA 85 or procedural . But the results of the execution can still be executed .

In line with the first file I wrote which indicates that this file is no source file text_io call . And use as a validation of the use of the command . Furthermore, start writing a procedure in a procedure after the file name ( hello ) and is to begin . But before we begin the word can still define variables and functions which signifies begin play function . And Put_Line function will display the word in the argument ( hello Mr Genie ) to enter after the word aired . And the last end and the name of the procedure to terminate a procedure definition .

Then how to mengkompilasikannya ? By using the command gnatmake nama_procedure.adb then enter. After that run the command that has been provided by ELF ( . / Filename ) .

A few of these tutorials later on next season I will post another new tutorial of this programming language .

The fate Hacker To Be Ended

The fate Hacker To Be Ended

A number of experts in the computer world spent decades in order to create a system to enhance the hackers to its knees . And recently researchers in California believe that they have succeeded in creating such a system .

Using a technique called ' obfuscating ' , Professor Amit Sahai and colleagues told the magazine Quanta that they have created a way to change the file in the program that can create confusion hackers .Citing page Daily Mail , Thursday ( 01/06/2014 ) , obfuscating its own way of working is to combine random elements into the software code , in which only the people who run the program are able to access the output correctly .


Sahai named the program with the nickname ' multilinear jigsaw puzzle ' , but until now still need to be developed to be used by commercial software makers . This is because the generated code can not be distinguished so it is still difficult to be managed and analyzed .Sahai artificial systems that have so far proved impenetrable to hackers and can be used universally , which means all kinds of software can be protected from hacker attacks . If the system can not be proved to be hacked , the hacker then surely era coming to an end .


Moreover , Sahai and colleagues claim that obfuscating techniques can also be used in military software . For example, to encrypt the operating system and smartphone .

Bugs of Java and Pascal Programming


This time we will discuss some of the bugs that have been provided pascal and java but both of them do not realize it.
 
The following example source code:


Okay programs;
uses crt;
okay = object
The main procedure;
end;
var path: right;
oke.utama procedure; begin
writeln ('My Name');
begin
jalan.utama;
end.


okay {public class
public static void main (String args []) {
System.out.println ("My Name");
of the source code you may be confused on what I discussed.
I discuss and solve some of the problems I have:
 
1. shall define the class will take a lot of RAM memory.
2. If Perform calling class / object and turn it into a variable RAM would cost 2 times the size of the file.
3. speed will be reduced because the program did when defining a variable object / class tercopy.
4. the size of the RAM can be consumed more than 2 times because the call may be many variables - time.

Thus my post. I am not here to offend the java lovers but mengkirtik java maker so this bug can be eliminated.

Cyber Terrorists Use DDOS Attacks to Exchange Platforms


Cyber Terrorists Use DDOS Attacks to Exchange Platforms


Security experts warn that distributed denial-of-service (DDOS) attacks are increasingly used in an attempt to influence stock prices and disrupt exchange platforms.

DDOS attacks are used for various reasons. Hacktivists rely on them to raise awareness, companies to disrupt the competition, and they even represent a handy “tool” for extortionists.

However, DDOS protection services provider Prolexic reveals that these types of attacks are posing a significant threat to the financial services industry and trading platforms.

“As part of our DDoS attack forensics, we have uncovered a disturbing trend: Many of these malicious attacks appear to be intent on lowering the target’s stock price or currency values, or even temporarily preventing trades from taking place,” explained Stuart Scholly, president of Prolexic.

Experts say they’ve found a direct link between DDOS attacks and temporary changes in the valuation of companies. That’s because an organization’s image is closely associated with its online presence.

Spreading rumors on the Web about a company or disrupting its website, particularly when it's an exchange platform or a publicly traded firm, can have a serious impact.

Prolexic reveals that a small number of cyber terrorist groups are behind most of the attacks aimed at publicly traded companies, trading platforms and the financial services industry. So far, they’ve failed to launch an attack big enough to cause serious damage.

However, experts warn that this threat should be taken seriously, especially since DDOS attacks are becoming more and more sophisticated and powerful.

“What’s more, the risk goes beyond the actual outage – social media chatter and media coverage can amplify the perceived effect, disruption and damage caused by a cyber-attack campaign,” Scholly added.

Additional details on global markets DDOS attacks are available in the white paper published by Prolexic (registration required).

Referand : Sofpedia.com