|
|
Hans Petter Langtangen, "A Primer on Scientific Programming with Python (Texts in Computational Science and Engineering) "
Springer | 2009 | ISBN: 3642024742 | 693 pages | PDF | 5,6 MB
The book serves as a first introduction to computer programming of scientific applications, using the high-level Python language. The exposition is example- and problem-oriented, where the applications are taken from mathematics, numerical calculus, statistics, physics, biology, and finance. The book teaches "Matlab-style" and procedural programming as well as object-oriented programming. High school mathematics is a required background, and it is advantageous to study classical and numerical one-variable calculus in parallel with reading this book. Besides learning how to program computers, the reader will also learn how to solve mathematical problems, arising in various branches of science and engineering, with the aid of numerical methods and programming. By blending programming, mathematics and scientific applications, the book lays a solid foundation for practicing computational science.
http://uploading.com/files/3QJ9MX9Z/PrimerScientific_Programming.rar.html
http://depositfiles.com/files/95uik72m0
http://www.megaupload.com/?d=XXLRQGKN
|
|
|
Chris Fry, Martin Nystrom, “Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks ”
O'Reilly Media, Inc. | 2009-02-24 | ISBN: 0596518161 | 248 pages | PDF | 4 MB
How well does your enterprise stand up against today's sophisticated security threats? With this book, security experts from Cisco Systems demonstrate how you can detect damaging security incidents on your global network -first by discovering which assets you need to monitor closely, then by helping you develop targeted strategies and pragmatic techniques to identify security incidents.
Security Monitoring offers six steps to improve network monitoring, based on the authors' years of experience conducting incident response to keep Cisco's global network secure. These steps will guide you through the following:
Develop Policies: define the rules, regulations, and criteria against which to monitor
Know Your Network: build knowledge of your infrastructure with network telemetry
Select Your Targets: define the subset of infrastructure where you'll focus monitoring
Choose Event Sources: identify the event types needed to discover policy violations
Feed and Tune: collect data and generate alerts, tuning systems using context
Maintain Dependable Event Sources: prevent critical gaps in your event collection and monitoring
http://letitbit.net/download/7169.772992c910bc91e1df857e4fab/Oreilly.Security.Monitoring.Feb.2009.rar.html
http://www.filefactory.com/file/ah0db40/n/Oreilly_Security_Monitoring_Feb_2009_rar
|
|
|
tholp87 wrote:
http://vietbao.vn/The-gioi-tre/Chung-chi-quoc-te-canh-cua-cua-thanh-cong/70057666/504/
Giờ là năm 2009.Không biết mức lương có còn cao như vậy không ?
Sao không thấy nhắc đến chứng chỉ SCJP nhỉ ? Giờ em muốn đăng ký học chứng chỉ SCJP .Ai rành về chứng chỉ này tư vấn giúp em với.Có chứng chỉ SCJP làm công ty lương khởi điểm bao nhiêu nhỉ ?
- Thử search bằng google với từ khóa chứng chỉ SCJP.
- Chuyện lương bổng còn tùy vào năng lực thực tế của bồ.
|
|
|
linux_xxx wrote:
Vậy thì em xin hỏi các bác làm sao để hiểu biết tường tận về regetry đấy!Em có xem mấy cái ebook về "reg"mà thấy nó toàn là thủ thuật không hà!
Vào google gõ "regedit" có cả đống tài liệu. Muốn hiểu tường tận về nó chắc phải là mấy bác lập trình viên của M$ viết ra Windows. Bạn cần cái gì thì tìm hiểu cái đó thôi.
|
|
|
Có thể ổ DVD bạn mới mua về nó kén đĩa. Hãy thử test với một ổ đĩa khác.
|
|
|
hieuskya2 wrote:
Em muốn mua 1 cái MTXT tầm khoảng trên dưới 20 triệu, và có thể chơi game, nghe nhạc, và chạy các ứng dụng khác về đồ họa ... được tốt. Các bác trong diễn đàn cho em ý kiến. À, em rất muốn dùng WIN 7 thì mua máy tính vào thời điểm nào thì nó cài sẵn hệ điều hành này ?
Sang bên diễn đang www.vozforums.com tham khảo nhé bạn.
|
|
|
Wesley J. Chun, "Core Python Programming"
Prentice Hall PTR | ISBN: 0132269937 | 352 Pages | PDF | 3,4 MB
Python is an agile, robust, expressive, fully object-oriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. In Core Python Programming, Second Edition, leading Python developer and trainer Wesley Chun helps you learn Python quickly and comprehensively so that you can immediately succeed with any Python project.
Using practical code examples, Chun introduces all the fundamentals of Python programming: syntax, objects and memory management, data types, operators, files and I/O, functions, generators, error handling and exceptions, loops, iterators, functional programming, object-oriented programming and more. After you learn the core fundamentals of Python, he shows you what you can do with your new skills, delving into advanced topics, such as regular expressions, networking programming with sockets, multithreading, GUI development, Web/CGI programming and extending Python in C.
This edition reflects major enhancements in the Python 2.x series, including 2.5 as well as capabilities set for future versions. It contains new chapters on database and Internet client programming, plus coverage of many new topics, including new-style classes, Java and Jython, Microsoft Office (Win32 COM Client) programming, and much more.
* Learn professional Python style, best practices, and good programming habits
* Gain a deep understanding of Python's objects and memory model as well as its OOP features, including those found in Python's new-style classes
* Build more effective Web, CGI, Internet, and network and other client/server applications
* Learn how to develop your own GUI applications using Tkinter and other toolkits available for Python
* Improve the performance of your Python applications by writing extensions in C and other languages, or enhance I/O-bound applications by using multithreading
* Learn about Python's database API and how to use a variety of database systems with Python, including MySQL, Postgres, and SQLite
http://depositfiles.com/files/bdxnxn5zr
http://rapidshare.com/files/262565515/0132269937_PYTHON_Programming..zip
|
|
|
ledinhcuong99 wrote:
sleeper wrote:
ledinhcuong99 wrote:
.......mạng nhà mình dạo này lạ lắm...ko vào được yahoo,game online,với cả lướt web...nhưng lại vào được skype với cả paltalk...vậy thì rõ ràng là có mạng rồi...
...hỏi nhiều người thì họ bảo là tắt firewall đi...nhưng rõ ràng mình có để firewall đâu...tiền mạng thì vẫn đóng đầy đủ..
...mạng nó lúc vào được web lúc lại ko vào được...mình gọi 1080 gọi thì họ bảo là do kết nối....nhưng nhà hàng xóm dùng chung với mình thì vẫn vào như bình thường....
ai biết thì giúp mình với nhé...thanks
- bạn mô tả như thế thì biết dựa vào cái gì để giúp?
Bạn đăng ký thuê bao Internet của nhà cung cấp nào thì gọi họ đến xem, đó là trách nhiệm của họ. Đi gọi 1080 mà làm chi?
...gọi thử rồi...nó bảo mang PC đến công ty để nó xem...nếu mà mang đến công ty của nó thì cũng chả cần phải hỏi mấy bạn làm j`..
...nhà mình dùng cả IE,Firefox,lẫn Safari...
Oh!!! Nhà cung cấp dịch vụ Internet nào lại hỗ trợ khách hàng kiểu đó nhỉ???
@bolzano_1989: mạng có vấn đề thì cần có giải pháp cụ thể chứ chơi kiểu hên xui thế... không bền đâu
|
|
|
bolzano_1989 wrote:
Bạn dùng trình duyệt gì vậy ? Nếu chưa dùng Firefox thì thử dùng xem vào mạng được không .
Không hiểu ý bồ lắm, dùng IE không vào mạng được và khắc phục bằng cách dùng FF ư?
|
|
|
ledinhcuong99 wrote:
.......mạng nhà mình dạo này lạ lắm...ko vào được yahoo,game online,với cả lướt web...nhưng lại vào được skype với cả paltalk...vậy thì rõ ràng là có mạng rồi...
...hỏi nhiều người thì họ bảo là tắt firewall đi...nhưng rõ ràng mình có để firewall đâu...tiền mạng thì vẫn đóng đầy đủ..
...mạng nó lúc vào được web lúc lại ko vào được...mình gọi 1080 gọi thì họ bảo là do kết nối....nhưng nhà hàng xóm dùng chung với mình thì vẫn vào như bình thường....
ai biết thì giúp mình với nhé...thanks
- bạn mô tả như thế thì biết dựa vào cái gì để giúp?
Bạn đăng ký thuê bao Internet của nhà cung cấp nào thì gọi họ đến xem, đó là trách nhiệm của họ. Đi gọi 1080 mà làm chi?
|
|
|
cankhon2000 wrote:
Xin các cao thủ giúp đỡ.
Máy trong công ty mình cài win XP SP2 với FAT NTFS.
Admind đã thiết lập pplicy như sau :
Không cho boot bằng CD hay FDD.
Không cho truy xuất CMOS.
Không cho dung USB
Không cho chép hay sửa file trong thư mục Windows
Không cho cài bất cứ phần mềm nào.
Làm sao lấy được quyền admin. Hiện nay tôi chỉ có quyền user limited
Social Engineering
|
|
|
dao thien tien wrote:
Em đăng nhập vào 1 trang wed. Rùi đột nhiên xuất hiện các phần mềm tải về. Rùi bị dính virus này Code:
. Bác nào giúp đỡ em cái
Kaspersky hoặc Symantec diệt được đấy.
PS: sửa lại tiêu đề topic.
|
|
|
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache, Vincent Liu, "Hacking Exposed Wireless: Wireless Security Secrets & Solutions"
McGraw-Hill Osborne Media | 2007 | ISBN: 0072262583 | 386 pages | CHM | 12,2 MB
Secure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.
Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
Defend against WEP key brute-force, aircrack, and traffic injection hacks
Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
Prevent rogue AP and certificate authentication attacks
Perform packet injection from Linux
Launch DoS attacks using device driver-independent tools
Exploit wireless device drivers using the Metasploit 3.0 Framework
Identify and avoid malicious hotspots
Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys
http://uploading.com/files/84IGQJI4/HackWirelesSec.rar.html
http://depositfiles.com/files/yohogaoai
http://bitroad.net/download/1f5783af2bb1605d62c1fb0c3927aa2f5/HackWirelesSec.rar.html
http://www.megaupload.com/?d=02Z7MILU
|
|
|
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
David Endler, Mark Collier, "Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions"
McGraw-Hill Osborne Media | 2006 | ISBN: 0072263644 | 539 pages | CHM | 16,3 MB
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way
This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security
Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.
Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
Fortify Cisco, Avaya, and Asterisk systems
Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
Thwart number harvesting, call pattern tracking, and conversation eavesdropping
Measure and maintain VoIP network quality of service and VoIP conversation quality
Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
Avoid insertion/mixing of malicious audio
Learn about voice SPAM/SPIT and how to prevent it
Defend against voice phishing and identity theft scams
http://uploading.com/files/9LDEGQ7P/HackVoIP.zip.html
http://depositfiles.com/files/scuecr3nl
http://bitroad.net/download/5bbcda04735c99a8856b0837a02c16884/HackVoIP.zip.html
http://www.megaupload.com/?d=PJXB7KN0
|
|
|
Đông Chí wrote:
Hôm nay vào HVA thấy chứ kĩ đâu mất tiêu, làm lại chữ kí và đưa thẻ Code:
vào chữ kí cũng hem được. Các bác quản trị xem lại dùm. Em xin chân thành cảm ơn.
/hvaonline/posts/list/30080.html
|
|
|
quanlavip wrote:
bạn thân mếm mình đã tìm trên google.com.vn 2 tiếng đồng hồ mà không thấy bạn có thể tìm dùm mình đc không thank nhiều
Có thể bạn chưa biết cách tìm kiếm thứ mình cần trên google, bạn đã làm thử theo cách tớ hướng dẫn chưa? Kết quả bạn kamikazeq đã đưa ra rồi đấy.
|
|
|
blog12t1 wrote:
dạ..mới gia nhập diễn đàn nên em chưa đọc kĩ lắm , anh ơi cho em hỏi lại nha cho em hỏi về các bước thành lập một website như thế nào ? và nơi nào có ebook về html để em học hỏi thêm? với mình muốn đăng kí một tên miền kiểu như http://www.(tên).com hay http://www.(tên).vn thì mình đăng kí ở đâu ? ( ủa mà em past ở đây đúng không vậy )
Hmm, bạn nên chịu khó sử dụng google để tự tìm lời giải cho mình đối với những thắc mắc như trên.
Ví dụ, bạn muốn biết các bước thành lập một website? Hãy hỏi google với từ khóa: How to Build a Website?
|
|
|
quanlavip wrote:
mình đc cô cho 1 trương trình nhưng khi giải nén ra thì thiếu 1 file dll tìm mãi không thấy ai có post lên cho mình với:
tên file đó là: pcre3.dll
cho mình cảm ơn trước nha
Bạn thân mến, mở google.com lên và gõ vào chính xác thế này: "pcre3.dll" và enter.
PS: topic loại này nên chọn là [Hỏi - Đáp].
|
|
|
crc32 wrote:
Mình mới vừa download xong Centos. Ở đây cấu hình máy mình là Celeron 1ghz + 3 thanh 128mb và không có ổ ghi. Vậy cho mình hỏi bây giờ phải làm sao để cài Centos bây giờ?
P/s Mình có 3 ổ cứng, và 1 hdd đang chạy windows XPsp3. ( 1 hdd chứa dữ liệu và 1 hdd còn trống).
Hì, giờ còn sài cái máy cấu hình "khủng" nhỉ
Bạn hỏi google với từ khóa là "cài đặt linux từ ổ cứng" và làm theo, chắc chắn cài được.
|
|
|
Richard Blum, "Ubuntu Linux Secrets "
Wiley | 2009 | ISBN: 0470395087 | 840 pages | PDF | 14,4 MB
The everyday Linux user can easily get overwhelmed by the complexity of the new software that exists when creating an Ubuntu system. This book covers the basics of creating a new system from scratch and explains what software is installed. You’ll take a tour of installing the Ubuntu Linux distribution system in most environments, including nontraditional situations such as dual-boot and text-based installations. Plus, clear explanations of each of the installed applications show you how to get the most out of each application, rather than simply using them as they exist.
From the Back Cover
Packed with valuable advice and secrets on every aspect of the Ubuntu Linux Distribution, this comprehensive guide delivers in-depth information on the Ubuntu workstation, server, and applications, and provides detailed coverage of Ubuntu Linux as a software development platform. The featured tips and tricks delve into the underlying applications and features of the Ubuntu Linux system so that you can get the most out of every application and system feature.
The Insider's Guide to:
Handling Files and File Properties (see Chapter 5)
Understanding the OpenOffice Suite (see Chapter 7)
Watching Web Clips and Editing Videos (see Chapter 12)
Connecting to the Network (see Chapter 14)
Working with Ubuntu Web Servers (see Chapter 21)
Programming in Python® (see Chapter 26)
Working with Ruby code (see Chapter 29)
http://depositfiles.com/files/2quat1ofk
http://rapidshare.com/files/251877449/UbuntuLinuxSecrets.rar
|
|
|
Cách gởi bài của cậu không xứng đáng nhận được câu trả lời. Nên cẩn trọng hơn nữa nếu muốn nhận được sự giứp đỡ từ phía cộng đồng.
PS: nên hỏi google trước đã.
|
|
|
James Turnbull, Peter Lieverdink, Dennis Matotek "Pro Linux System Administration"
Apress | English | 2009-06-22 | ISBN: 1430219122 | 1080 pages | PDF | 48 MB
We can all be Linux experts, provided we invest the time in learning the craft of Linux administration. Pro Linux System Administration makes it easy for small to medium–sized businesses to enter the world of zero–cost software running on Linux and covers all the distros you might want to use, including Red Hat, Ubuntu, Debian, and CentOS. Authors, and systems infrastructure experts James Turnbull, Peter Lieverdink, and Dennis Matotek take a layered, component–based approach to open source business systems, while training system administrators as the builders of business infrastructure.
If you want to implement a SOHO or SMB Linux infrastructure, Pro Linux System Administration clearly demonstrates everything you need. You’ll find this book also provides a solid framework to move forward and expand your business and associated IT capabilities, and you’ll benefit from the expertise and experienced guidance of the authors. Pro Linux System Administration covers
• An introduction to using Linux and free and open source software to cheaply and efficiently manage your business
• A layered model that allows your infrastructure to grow with your business
• Easy and simple–to–understand instructions including configurations, examples, and extensive real–world hints and tips
What you’ll learn
This book will explain and demonstrate
• Linux architecture
• How to build, back up, and recover Linux servers
• Creating basic networks and network services with Linux
• Building and implementing Linux infrastructure and services including mail, web, databases, and file and print
• Implementing Linux security
• Understanding Linux performance and capacity planning issues
Who is this book for
This book is for small to medium–sized business owners looking to run their own IT, system administrators considering migrating to Linux, and IT systems integrators looking for an extensible Linux infrastructure management approach.
About the Apress Pro Series
The Apress Pro series books are practical, professional tutorials to keep you on and moving up the professional ladder.
You have gotten the job, now you need to hone your skills in these tough competitive times. The Apress Pro series expands your skills and expertise in exactly the areas you need. Master the content of a Pro book, and you will always be able to get the job done in a professional development project. Written by experts in their field, Pro series books from Apress give you the hard–won solutions to problems you will face in your professional programming career.
http://uploading.com/files/N4E4SWLE/1430219122.rar.html
http://www.megaupload.com/?d=YK28M5VC
|
|
|
Linux 101 Hacks
Publisher: Ramesh Natarajan 2009 | 140 Pages | ISBN n/a | PDF | 1.2 MB
There are total of 101 hacks in this book that will help you build a strong foundation in Linux. All the hacks in this book are explained with appropriate Linux command examples that are easy to follow. This book contains 12 chapters. Hacks mentioned in 6 chapters are based on the articles that I’ve already posted on my blog. Hacks mentioned in rest of the 6 chapters are brand new.
Linux 101 Hacks
Table of Contents:
Introduction
Foreword
Version
Ch. 1: Powerful CD Command Hacks
Ch. 2: Date Manipulation
Ch. 3: SSH Client Commands
Ch. 4: Essential Linux Commands
Ch. 5: PS1, PS2, PS3, PS4 and PROMPT_COMMAND
Ch. 6: colorful and Functional Shell Prompt Using PS1
Ch. 7: Archive and Compression
Ch. 8: Command Line History
Ch. 9: System Administration Tasks
Ch. 10: Apachectl and Httpd Examples
Ch. 11: Bash Scripting
Ch. 12: System Monitoring and Performance
Amazing and Essential Linux Books
http://uploading.com/files/4G0VB62W/L101H.zip.html
http://bitroad.net/download/8b99656bd4b9d5c8cfc69b72061ee62bb/L101H.zip.html
http://d1.xlget.com/download/3446?language=english
http://www.megaupload.com/?d=QBGIYPIJ
Extended Reading
Your Feedback and Support
|
|
|
Hacking Exposed, 6 Ed: Network Security SecretsAnd Solutions
Stuart McClure, Joel Scambray, George Kurtz, "Hacking Exposed, 6 Ed: Network Security Secrets And Solutions"
McGraw-Hill Osborne Media | 2009 | ISBN: 0071613749 | 720 pages | PDF | 7,8 MB
Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.
New and updated material:
- New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
- Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
- The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
- New wireless and RFID security tools, including multilayered encryption and gateways
- All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
- Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
- VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
- Fully updated chapters on hacking the Internet user, web hacking, and securing
http://depositfiles.com/files/b3km1vhbu
http://uploading.com/files/WH680MJ7/HackinExpos.rar.html
http://rapidshare.com/files/248212631/HackinExpos.rar
|
|
|
Virtualization with VMware ESX Server
463 pages | Syngress; 1 edition (June 1, 2005) | 1597490199 | PDf | 7 Mb
This book will detail the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort.
Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how VMware eases administration and lowers overall IT costs.
Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual
* A detailed resource on the default and custom installation of VMware's ESx server
* Covers all the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort
* Delivers a thorough understanding of the virtual evolution occuring in the IT industry
http://depositfiles.com/files/bfp4yi6fw
http://uploading.com/files/HGFJE892/1597490199.zip.html
|
|
|
200 Ways to Recover a Hard Drive
Publisher: techrepublic.com | ISBN: N\A | edition 2008 | PDF | 74 pages | 1,8 mb
Did you loose all your important data on your hard drive? Did it stop working? Well here try one of these 200 methods and you are sure that you will get your data back.
http://uploading.com/files/TCABMNRH/1262.rar.html
http://saveqube.com/getfile/0248c721a277bf662b7b8c62861175b3febfcd3921c0c11f0e/1262.rar.html
http://www.filefactory.com/file/ag6ac99/n/1262_rar%20
|
|
|
Secrets Of A Super Hacker
Publisher: Loompanics Unlimited | ISBN: 1559501065 | edition 1994 | PDF | 205 pages | 1,9 mb
The Knightmare is the sort of Super Hacker who keeps security guards from sleeping at night. He's not motivated by money or malice. He's in it for the hack. If your computer has any link whatever to the outside world, there is not question. The Knightmare can break in; the only question is whether he wants to. Secrets of a Super Hacker is an extraordinary manual on the methods of hacking.
http://uploading.com/files/9DTB8PNW/1279.rar.html
http://saveqube.com/getfile/02bfe29d92f21ac11a3244c4c47f6a2864bfcd3921c0c11f0e/1279.rar.html
http://www.megaupload.com/?d=XPBTM29S
|
|
|
t.xuan96 wrote:
hầu hết các pass đều rất dễ bị hack nên tốt nhất là tháo HDH và cất đi một chỗ nào kín kín một tí rồi khóa lại
Làm thế có khả thi không? Hay chỉ là nói cho sướng miệng???
|
|
|
|
|
|
|