|
[Dunia]
Google ingin melancarkan perkhidmatan WiFi percuma di seluruh dunia
[Copy link]
|
|
hmmmmmm..."KITA"....KITA????????? awak posa x hari ni?
|
|
|
|
|
|
|
|
lebai,lebai kena install unchecky..dia akn warn semua jenis installations yang dalam database dia adware,malware,lavaware ka,botakchipengware kaa...dia akn warn...
|
|
|
|
|
|
|
|
http://unchecky.com/
Have you ever felt, while installing software, that the installer tries to push additional unwanted programs at all cost? Ever missed a checkbox, and spent hours afterwards removing adware?
Ever opened your browser after an installation, only to find out that you have a new homepage, a new search engine, or even a new browser?
Unchecky aims to keep potentially unwanted programs out of your computer. |
|
|
|
|
|
|
|
http://blog.doofix.com/how-to-re ... m-pop-up-ads-deals/
Eye Perform is a bogus browser add-on. When it comes into your computer, it will do harm to your computer like an adware. First of all, Eye Perform will take over your browsers by changing some crucial settings and system files. Once you login to the network and open launch the browser, you will see a lot of pop-up ads created by Eye Perform.
In order to cause more annoying troubles, this adware maliciously installs extra unwanted programs onto your PC. Some of them could spy on you and help cyber hackers steal your confidential information. Also, with many malicious browser add-ons running, your compute will run more and more slowly and even crash suddenly. Hence, we highly recommend you to remove Eye Perform adware as soon as possible. Eye Perform will do harm to Windows system:1. Eye Perform alters system start-up items and browser settings.
2. Eye Perform installs extra unwanted programs to computers.
3. Eye Perform generates plenty of unwanted pop-up advertisements on various web browsers.
4. Eye Perform uses security vulnerabilities to help other nasty viruses enter the compromised PC.
5. Eye Perform tracks users’ browsing traces for collecting personal information.
Uninstall Eye Perform from Firefox:- Help=>Troubleshooting Information
- Reset Firefox
- Finish
Delete Eye Perform from IE:
- Run inetcpl.cpl
- Advanced=>Reset
- Delete Personal Settings=>Reset=>Close
Remove Eye Perform from Google Chrome:
- C:\Users\”your username”\AppData\Local\Google\Chrome\Application\User Data
- Rename Default folder to Default2
- Open Google Chrome
|
|
|
|
|
|
|
|
jom beli..
http://portswigger.net/burp/help/proxy_using.html
Using Burp Proxy
The Proxy tool lies at the heart of Burp's user-driven workflow, and gives you a direct view into how your target application works "under the hood". It operates as a web proxy server, and sits as a man-in-the-middle between your browser and destination web servers. This lets you intercept, inspect and modify the raw traffic passing in both directions.
If the application employs HTTPS, Burp breaks the SSL connection between your browser and the server, so that even encrypted data can be viewed and modified within the Proxy.
Getting Set Up
Setting up Burp and your browser to work with each other involves the following elements. If you need more help on these items, please see the help on Getting started with Burp Suite.
Proxy listener - Burp uses Proxy listeners to accept requests from your browser. The default Burp listener, on port 8080 of your IPv4 loopback interface, is normally sufficient for general-purpose testing. Burp will show an alert on startup if it is not able to open this port (usually because another application is using it). You can modify the default listener and add new ones via the Proxy listener options.
Browser proxy config - You need to configure your browser to use the Burp Proxy listener as its proxy server, for both HTTP and HTTPS protocols.
Burp CA certificate - Since Burp breaks SSL connections between your browser and servers, your browser will by default show a warning message if you visit an HTTPS site via Burp Proxy.
This is because the browser does not recognize Burp's SSL certificate, and infers that your traffic may be being intercepted by a third-party attacker. To use Burp effectively with SSL connections, you really need to install Burp's Certificate Authority master certificate in your browser, so that it trusts the certificates generated by Burp.
When you have things set up, visit any URL in your browser, and go to the Intercept tab in Burp Proxy. If everything is working, you should see an HTTP request displayed for you to view and modify. You should also see entries appearing in the Proxy history tab. You will need to forward HTTP messages as they appear in the Intercept tab, in order to continue browsing.
Intercepting Requests and Responses
The Intercept tab displays individual HTTP requests and responses that have been intercepted by Burp Proxy for review and modification. This feature is a key part of Burp's user-driven workflow:
Manually reviewing intercepted messages is often key to understanding the application's attack surface in detail. Modifying request parameters often allows you to quickly identify common security vulnerabilities.
Intercepted requests and responses are displayed in an HTTP message editor, which contains numerous features designed to help you quickly analyze and manipulate the messages.
By default, Burp Proxy intercepts only request messages, and does not intercept requests for URLs with common file extensions that are often not directly interesting when testing (images, CSS, and static JavaScript).
You can change this default behavior in the interception options. For example, you can configure Burp to only intercept in-scope requests containing parameters, or to intercept all responses containing HTML. Furthermore, you may often want to turn off Burp's interception altogether, so that all HTTP messages are automatically forwarded without requiring user intervention. You can do this using the master interception toggle, in the Intercept tab.
|
|
|
|
|
|
|
|
hampeh.... hahah
itu sutun multinick cuti ka hr ni....
|
|
|
|
|
|
|
|
bila habis pantang2 ni?
ada je..sekor..lavajus....
|
|
|
|
|
|
|
|
1. lavajuskurma (UID: 2147109)
2. lavajusapple (UID: 2147018)
3. lavajusmanggo (UID: 2147016)
|
|
|
|
|
|
|
|
tq lobai..
|
|
|
|
|
|
|
|
milo_888: Adakah projek ini backed by US gov?? Modern day invasion... dapat worlwide access to everybody's personal info..
omg!!....korang ni biar betul.....sounds like a hollywood action/thriller/spy movie...jeh....
|
|
|
|
|
|
|
| |
|