Wilujeng Sumping Di Site Sim Kuring



»» Hèîclè Kîngdôm ««

Contoh Script VB6 Tidur Dan Bangun

Diposting oleh Admin Selasa, 30 Juni 2009 0 komentar
Option ExplicitPrivate Declare Sub Sleep Lib "kernel32" (ByVal dwMilliseconds As Long)Private Sub Form_Click() Me.Caption = "Sleeping" Call Sleep(20000) Me.Caption = "Awake"End SubPrivate Sub Label1_Click() Me.Caption = "Sleeping" Call Sleep(20000) Me.Caption = "Awake"End ...
Taw dengan lagunya saykoji yang online? pasti pada taw kan? le pernah denger dia bilang wifi tapi binggung apa maksudnya?mungkin dalam artikel ini lw bisa mengerti apa itu WIFI Artikel ini gw ambil dari basicvista25.blogspot.com mungkin artikel nya seperti iniWi-Fi (Wireless Fidelity) adalah koneksi tanpa kabel dimana kita tidak perlu menggunakan kabel pada pemasangan setiap perangkatnya. Wi-Fi memiliki kemampuan untuk menggerakkan perangkatnya tanpa memindahkan kabel atau perangkat lain dan tetap terkoneksi pada area layanan...

Serangan Hacker

Diposting oleh Admin 0 komentar
1. Memblokir Remote Access => Utk mencegah PC anda diambil alih oleh Hacker,nonaktifkan Remote Access. Dlm menu Start, klik kanan pada “My Computer” & pilih “Properties”. Maka ada tampilan “System Properties”, kemudian pilih tab “Remote”, singkirkan/hilangkan tanda ( V ) yg ada didepan semua option yg ada utk menonaktifkannya. Kemudian klik “OK”.2. Menghapus User Account yg tdk terpakai => Pada “Windows XP Professional” terdapat beberapa user account yg dapat diakses melalui trojan & dimanfaatkan utk melakukan...

Teen Hacker Become Security Consultants

Diposting oleh Admin Rabu, 24 Juni 2009 1 komentar
VIVAnews - Owen Thor Walker, New Zealand hacker origin, be present as a cyber security consultant by TelstraClear, the second-largest telecommunications company in the country. TelstraClear is the son of Australia's largest telecommunications company, Telstra."We believe Walker has the ability to assist senior executives and customers understand the security threats that can attack their network," said TelstraClear spokesman Chris Mirams to the National Radio in Wellington, Wednesday 25 March 2009.Years ago, Walker sued over...
VIVAnews - Owen Thor Walker, hacker asal Selandia Baru, kini dipekerjakan sebagai konsultan keamanan cyber oleh TelstraClear, perusahaan telekomunikasi terbesar kedua di negaranya. TelstraClear merupakan anak perusahaan telekomunikasi terbesar Australia, Telstra."Kami percaya Walker memiliki kemampuan untuk membantu eksekutif senior dan pelanggan memahami ancaman keamanan yang dapat menyerang jaringan mereka," kata juru bicara TelstraClear Chris Mirams kepada National Radio di Wellington, Rabu 25 Maret 2009.Tahun lalu, Walker...

Etika Hacker Translate

Diposting oleh Admin 0 komentar
Terjemahan Ethic Hacker / Etika Hacker* Jangan percaya otoriter/kemapanan - dukung desentralisasi.* Hackers haruslah dinilai berdasarkan kemampuan hackingnya - bukannya berdasar kriteria seperti derajat, umur, ras, atau posisi. Anda bisa berkarya seni dan keindahan melalui komputer. Komputer dapat merubah hidupmu menuju kelebih baikan.Sedangkan dalam prakteknya, Etika Hacker diatas (prinsip) dipraktekkan dengan mengikuti kode etik:* Jangan merusak sistem manapun secara sengaja. (rmrf hard disk, crash, overflow, dll. Mengubah...

Hacker Ethic

Diposting oleh Admin 0 komentar
* Access to computers - and anything which has the potential to teach you about this world to be free and total. All information should be freely available / free.* Do not believe in authoritarian / kemapanan - to support decentralization.* Hackers should be judged based on the ability hackingnya - not based on criteria such as degrees, age, race, or position. You can create art and beauty through the computer. Computers can change your life towards kelebih baikan.While in practice, the Hacker Ethic (principle) practiced with...

In Tier Hacker

Diposting oleh Admin 0 komentar
Also known as 3l33t, 3l337, 31,337, or a combination thereof, is the spearhead of the network security industry. They understand sistemoperasi outside in, able to configure & connect the global network. Pemrogramman able to do each day. A grace that is very natural, they are usually effisien & adept, with the appropriate knowledge to use. Invisible as they can enter the system without the knowledge, although they will not destroy data. Because they always follow the rules.Semi-Elite:Hacker is usually more mudadaripada...

Troublem With MSDBGRID32.ocx

Diposting oleh Admin Selasa, 23 Juni 2009 0 komentar
it has long nozzle - scratch, meaning ngepost ups. ok so first go I often have problems with MSDBGRID32 that cause I have to work 2 times, kok musti kerja 2 kali emangnya why? simple answer is I use a dbgrid connect it to ADO (data access object) nah happen after I setup the error message like this MSDBGRID32.ocx component not found, so I change into ADODC. For the friend - a friend with his problem with me please download component This H...

Encrypt Part 2

Diposting oleh Admin 0 komentar
Encrypt Part 2 Translate Inggrispost I told about this time to encrypt part - 2 part 1 when encrypt it in this review to understand better the details, taken from a Wikipedia article is as follows:In the field of cryptography, the encryption process is to secure the information by creating an information can not be read without the aid of special. Because encryption has been used to secure communications in various countries, only certain organizations and individuals that have a very urgent akan confidentiality using encryption....
_SetupBidi('source'); hallo vb ker wherever you are, it has been scrawled ech Reviews diblog mean, hehe. advised that it is rushing to leave and I have a problem with the doctor, hehe. so I will not have long - long may fuss you heard about encrypt and decrypt, but you do not know what the meaning of it to the 2. Ok I will try to translate what decrypt program is a system that has been made in exekutable which can not change back in the encrypt keblikan from the above, still binggung? ok may be a small example like this decrypt...

Translate History VB

Diposting oleh Admin 0 komentar
_SetupBidi('source'); Visual Basic Express The evolution of Visual Basic VB 1.0 introduced in 1991, I made the approach to connect with GUI programming language derived from the prototype I dikembang by "Alan Cooper" I call on the tripod,. Then Microsoft contract for copper and asosiasinya the tripod so that it can be used in Windows 3.0 under the code name Ruby.Next Travel Visual Basic (VB 1.0 VB To date, 10): Travel from Visual Basic (VB VB1 to 10) 1. Project "Thunder" dirintis 2. Visual Basic 1.0 (May 1991) on the...
Who does not know that Facebook is all in the era of the internet this? Yap, Facebook is a social site, such as a laptop also ... Yes I, my previous post about how to log on false friends, this time I post about how to create a false log on facebook. Go directly to the discussion ... 1. Please list in http://www.700megs.com why do I send you the list there? in the web hosting is free and there is also support from the php in ripway.com if not registered simply log in at: http://www.700megs.com/register.jsp...
If you are looking for that unique personal gift that will make your chosen recipient smile, and is sure to be appreciated, a t-shirt with that funny joke or one liner on it or an amusing unusual picture or graphic is an ideal solutionGiving the gift of laughter in the form of a t-shirt can be seen in many different ways. You can use it to share a joke with your fellow human beings, or it can be enjoyed solely by the wearer of the t-shirt. They can be clean risque or just plain offensive, its your choice. Some rude ones are...

bikin fake login di facebook

Diposting oleh Admin Senin, 22 Juni 2009 2 komentar
gw binggung maw nulis ape, langsung aja y neh artikel gw dapet dari rum sebelah Bikin fake login tanpa banyak babibu lagi mungkin artikel ny seperti iniSiapa sih yang tidak kenal Facebook di zaman yang serba internet ini ? Yap, Facebook adalah situs sosial, seperti friendster juga... (Males ngomong nih, tanya ma mbah google aja yah..)Ya udah, sebelumnya saya posting tentang cara login palsu di friendster, kali ini saya posting tentang cara...

Buat Yang Troble Dengan DBGrid

Diposting oleh Admin Kamis, 18 Juni 2009 0 komentar
dah lama neh ngga corat - coret ups maksudnya tuh ngepost, gw maw cerita neh dikit wktu dolo gw sering dibuat pusing dengan tulisan MSDBGRID32.ocx not found sehingga gw musti kerja 2 kalikok kerja 2 kali? ia soalnya waktu pertama gw bikin program kan pake ADO (Access Data Object) ech gara" ada tulisan kaya gt gw musti ganti ama ADODC (gw lopa kepanjangannya,hehe) tapi sekarang gw ngga ada akan kerja 2 kali lagi karena gw dah dapetin ocx sialannya,hehe. apabila dari kalian" ada kassus sama kaya gw silahkan Download Disini agar...

Hacking Windows SP2

Diposting oleh Admin Kamis, 11 Juni 2009 0 komentar
duh dah lama y ngga ngepost neh, maklum lah lagi sibuk"nya kul, sampe lopa mpunya blog.hehe yaudah gw ngga akan panjang lebar ngomong di postingan kale ini gw akan membahas tentang Cara Hacking Windows SP2 Artikel ini gw ambil dari artikelnya mas chaidir, mungkin sebagai artikel nya seperti iniApakah anda pernah menggunakan komputer di Lab atau pinjam komputer teman atau bahkan menggunakan komputer di tempat umum? Nah, biasanya klo di Lab...