Friday, April 24, 2015
Foarte talentat !!!
3:58 AM
| Posted by
Unknown
|
Saturday, December 13, 2014
http://www.fakenamegenerator.com/
11:38 PM
| Posted by
Unknown
|
FREE DOWNLOAD E-BOOKS
6:33 AM
| Posted by
Unknown
|
FREE DOWNLOAD E-BOOKS▐ ▬▬▬ - Linux Shell Scripting Cookbook, 2nd Edition DOWNLOAD LINK [ PDF ]: http://adf.ly/qSh4V READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/linux-shell-scripting-cook… - Kali Linux Cookbook DOWNLOAD LINK [ PDF ]: http://adf.ly/qSh4W READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/06/kali-linux-cookbook.html - Web Penetration Testing with Kali Linux DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4X READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/web-application-obfuscatio… - Web Application Obfuscation DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4Y READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/web-application-obfuscatio… - Network Security Hacks, 2nd Edition DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4Z READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/network-security-hacks-2nd… - Inside Cyber Warfare: Mapping the Cyber Underworld READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/inside-cyber-warfare-mappi… DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4a - Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4b READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/private-cloud-computing-co… - Low Tech Hacking: Street Smarts for Security Professionals DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4c READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/low-tech-hacking-street-sm… - Access Denied: The Practice and Policy of Global Internet Filterin DOWNLOAD E-BOOK [ PDF ]: http://adf.ly/qSh4d READ MORE ABOUT THIS BOOK: http://www.backtrack-pages.com/…/access-denied-practice-and… *** FREE DOWNLOAD AND READ MORE NEW E-BOOKS: *** http://www.backtrack-pages.com/search/label/E-Books
http://youtu.be/pHJSEc3zU5E
6:09 AM
| Posted by
Unknown
|
How To Trace Your Facebook Profile Visitors
2:19 AM
| Posted by
Unknown
|
How To Trace Your Facebook Profile Visitors Now here we found who recently visited your profile. Follow below steps for get to know your FB recent visitors. Step 1) Go to your Facebook Profile Page. Step 2) Now Press Ctrl + U from your keyboard for see source code of your profile page. Step 3) Now press Ctrl + F from your keyboard to open search box. Step 4) Now search this code {"list": Step 5) You find some Facebook Profile Ids Step 6) There are some Facebook Profile Ids of your friends who visited recently. Step 7) The first one ID's are showing visits the most number of time. Step 8) Now if your want to findout, Open a new tab Enter below link : www.facebook.com/Facebook Profile Id For Example : www.facebook.com/100001257992988 Enjoy The Trick..
Wednesday, December 10, 2014
Steps to Unlock Android pattern lock:
11:37 PM
| Posted by
Unknown
|
Steps to Unlock Android pattern lock: 1.Enabling USB Debugging: For this process to be a success, the device which you wish to unlock should be enabled with USB Debugging. For this go to Settings->Development- >USB debugging and enable it. 2. Connect the device to the computer: Now after making sure that the device is USB Debugging enabled, Connect it to the computer. Go to start and open CMD. Type the following code very carefully. adb shell Now press enter 3. Reboot: After giving the commands in the CMD, restart or reboot the android device. Now give any pattern and your device should be unlocked. If you any doubts in the above process, please feel free to contact us.
president to write a computer program
9:59 AM
| Posted by
Unknown
|
Obama becomes the first US president to write a computer program <<<<<<<<<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> President Barack Obama, to kick off the annual Computer Science Education Week, has become the first US president (at least as far as we know) to write a computer program. While this might not seem like a big deal, this will be seen as a glowing endorsement for the code literacy movement — a campaign that, for the last couple of years, has been extolling the virtues of teaching kids how to program. The question is, however, will learning how to program give the Coder in Chief (sorry) the necessary mental faculties — the fabled coder mindset — to corral a bitterly partisan Congress into ratifying some useful laws? Is fixing US politics just a matter of a well-placed for-next loop? As always, ExtremeTech will tackle one of the trickiest issues facing society head-on. Yesterday, at an event on the White House complex in Washington, President Obama sat down with middle-schooler Adrianna Mitchell and finished a very simple computer program. He made Elsa, from the film Frozen, walk in a straight line. Most reports say that Obama wrote a single line of JavaScript, but I think he did even less than that. From the video (below) it sounds like he’s doing stage three of the Code.org Frozen tutorial, where he simply has to drag a block (which represents a line of JavaScript code) into the “code editor.” In the interests of journalistic integrity, I actually completed the entire Frozen tutorial and didn’t have to write a single line of code. It’s possible that the Coder in Chief was given a special, extra-hard version of the tutorial — because, well, he’s the leader of the free world! — but I doubt it somehow. I should also point out that it’s entirely possible that Bill Clinton, or indeed any of the recent US presidents, might have also dabbled in programming in their spare time. Anyway, putting my cynicism aside for a moment, the concept behind Obama’s first program is a good one. Last year Obama gave a rousing speech (below) about the value of learning to code and computer science in general — and now he’s actually doing it. If the POTUS can take the time to code, and perhaps to develop a more logical, rational mindset as a result, then so can the nation’s kids.
Subscribe to:
Comments
(Atom)
Welcome to my Blog!
Bine ati venit pe blogul nostru.
Cand nu sunt pe blog calatorim!!!
When I'm not blogging, I'm traveling :-)
Email me atGuran
Search
Blogroll
© 2014 by Guran Cosmin.
You're welcome to link to this site or use a single image and brief description to link back to any post. Republishing posts in their entirety is prohibited without permission.
Pictures
Become a Fan
Find Us On Facebook
Contact Form
Video
720x90 AdSpace
Recent Videos
Movie
http://youtu.be/Yj0G5UdBJZw
guran. Powered by Blogger.
Wikipedia
Search results
Popular Posts
-
Tare !!!(guta mititel ) continuare
-
#unuro The Google Black Holes Code: inurl:"view.asp?page=" intext:"plymouth" >>Ok what this code does? So thi...
-
You can press these buttons on your keyboard to use Facebook faster. j , k — Scroll between News Feed stories p — Post a new status l — Li...
-
//// What is DNS ///// Did you know you could be connected to facebook.com – and see facebook.com in your web browser’s address bar – whil...
-
10 Free Keyloggers to monitor your Local PC or Laptop! Here is an exclusive list of top 10 free local keyloggers. However If you are plannin...
-
Your blog is your personal online diary which combines the text, images and other media, and links to other blogs, web p...
-
What is Role Of Cookie,types, uses, setting and Privacy Concerns About Cookies What is Role Of Cookie,types, uses, setting and Privacy Conce...
-
(5) KING OF HACKERS How to Lock Drive of Remote Windows 10/8/7 Victim PC https://www.youtube.com/watch?v=4CgNDXKXxVo Facebook fan page : htt...
-
What is a VPN and how does it work? A VPN or Virtual Private Network is a method used to add security and privacy to private and public ne...
-
(5) For Indians! Happy Diwali in Batch Style! :P ;)... - Legendary Hacking Learners For Indians! Happy Diwali in Batch Style! @echo off colo...