This time code 64 bicth will share tutorial how to change facebook name that can not be replaced, or already at the limit. okey follow the following ways:
1. login to your facebook account
2. go to settings, then click on the email and add your new email ( remember the email that has not been registered to faceook ) and in your email confirmation
3. change your facebook password
4. remove your old...
Tapping Of The Pentagon

ADA programming language is a programming language that is being used by developers of weapons in the Pentagon ( Defense Base USA ) . Now children can master the TC had little tutorial from me . However, this tutorial should not be used indiscriminately . Specifications required for the laptops :
1 . Free linux OS
2 . 've installed gcc - gnat
3 . intel pentium 1 min
4 . RAM adjust
5 . bessar try the hard drive...
Posted by Unknown
at 20:16,
Add Comment
Read more
The fate Hacker To Be Ended

A number of experts in the computer world spent decades in order to create a system to enhance the hackers to its knees . And recently researchers in California believe that they have succeeded in creating such a system .
Using a technique called ' obfuscating ' , Professor Amit Sahai and
colleagues told the magazine Quanta that they have created a way to
change the file in the program that can create confusion...
Posted by Unknown
at 19:39,
Add Comment
Read more
Bugs of Java and Pascal Programming

This time we will discuss some of the bugs that have been provided pascal and java but both of them do not realize it.
The following example source code:
Okay programs; uses crt; okay = object The main procedure; end; var path: right; oke.utama procedure; begin writeln ('My Name'); begin jalan.utama; end. okay {public class public static void main (String args []) {System.out.println ("My Name");
of the...
Posted by Unknown
at 19:38,
Add Comment
Read more
Cyber Terrorists Use DDOS Attacks to Exchange Platforms

Security experts warn that distributed denial-of-service (DDOS) attacks are increasingly used in an attempt to influence stock prices and disrupt exchange platforms.
DDOS attacks are used for various reasons. Hacktivists rely on them to raise awareness, companies to disrupt the competition, and they even represent a handy “tool” for extortionists.
However, DDOS protection services provider Prolexic reveals...
Posted by Unknown
at 18:19,
Add Comment
Read more
Subscribe to:
Posts (Atom)