-
Couldn’t lie yourself
I had done with girls till my career wealthy, but this just simply lie to me, and there’s one girl that only stuck in my mind even I busying myself but… I Just Love her mor than whoever in this world. awkwardly when seeing her, i guess she might put interest to me too but…
-
Existing?

Many Years till now, I’m still asked to myself and what does really existed? I uncertainly anxious about this question just because it’s not that simple as you look. it’s god what I’m looking for, does he really exist? he made all of us and who create him? still curious but still worshiping him, do…
-
Sharing Network Access from Exploited Router

as seen project from https://blog.exploiter.id/2019/06/why-dont-share-out-network-access-from-exploited-router/ that i think should be illegal, but in one case there several condition that might be legal to done: the most legal are owner has permitting you(moreover they ask you to patch it then allowing you to use them) the network are public already people being volunteer to share out…
-
Read Binary Number as Alpha-Numeric

Sources: Fray117 Before Continue, Check the Parameter first that might be useful later. Example of Binary: 01000110 01110010 01100001 01111001 Now let we try to translate the first byte 01000110, in binary there is quick way to calculate the results. Binary: 01000110 Values: 64, 32 ,16, 8, 4, 2, 1 in alphabets, calculate from behind.…
-
Binary

Source: Fray117 What is Binary? Binary is one of two digits (0 or 1) in a binary system of notation, it’s written exactly in 1 bytes (8 bit). Identifying When the first 3 bit containing 011 it’s mean Lowercase, if the first 3 bit containing 010 so it’s mean Uppercase, and when the first 4…
-
Anon Cyber Team Indonesia

seems it just organization that talking about computer that have many geeks in there, but did you realize if they would be greater than that? unfortunately in first statement is true and in the second statement is also true. well you would not get that in your mind, but today I want to post article…
-
Simple Fix for Login Bypass Vulnerability on PHP Application

Before we’re started, let’s getting know about this vulnerability and this bug is almost same with SQL Injection, so this vulnerability letting user directly login to sites without exploiting any other vulnerability. Several Injection Strings: ‘=”or’ ‘ or 1=1 or ”=’ ‘ or 1=1- ‘ or 1=1# Then, how we patching that vulnerability? I will…

