moga2 bisa menambah wawasan para mastah disini :)
Langsung aja cekibrot....
Explain The Program
THE EXPLAIN OF PROGRAM IN THREE PARTS :
1- Data Base Generation
2- Data Base Activation
3- Decryption
Step-Step :
1. The Program
2. Data Base Generation
3. Data Base Activation
LANGKAH SELANJUTNYA LANJUT DI KOMENT BAWAH ( Katanya kepanjangan
)Dan Link DownLoad :
http://rapidshare.com/files/273879300/Ra...HeLoNy.rar
Pass : megaturks.net
maaf kalo kepanjangan...soalnya ini sumber ane ambil dari tetangga sebelah hasil dari googling.... TQ bgt mbah gugle ..hehehe
Buat mastah-mastah...silahkan di kembangin, semoga wawasannya bertambah.... amin
DC Is The Best :)
LANGKAH LANJUTAN BOSS... Maaf Ga Cukup Disana :(
4. Decryption
Semoga Berguna.... amin
![[Image: security-shell0.jpg]](http://islamlee.jeeran.com/security-shell0.jpg)
![[Image: security-shell1.jpg]](http://islamlee.jeeran.com/security-shell1.jpg)
![[Image: security-shell2.jpg]](http://islamlee.jeeran.com/security-shell2.jpg)
![[Image: security-shell3.jpg]](http://islamlee.jeeran.com/security-shell3.jpg)
![[Image: security-shell4.jpg]](http://islamlee.jeeran.com/security-shell4.jpg)
![[Image: security-shell5.jpg]](http://islamlee.jeeran.com/security-shell5.jpg)
![[Image: security-shell6.jpg]](http://islamlee.jeeran.com/security-shell6.jpg)
![[Image: security-shell7.jpg]](http://islamlee.jeeran.com/security-shell7.jpg)
![[Image: security-shell8.jpg]](http://islamlee.jeeran.com/security-shell8.jpg)
![[Image: security-shell9.jpg]](http://islamlee.jeeran.com/security-shell9.jpg)
![[Image: security-shell10.jpg]](http://islamlee.jeeran.com/security-shell10.jpg)
![[Image: security-shell11.jpg]](http://islamlee.jeeran.com/security-shell11.jpg)
![[Image: security-shell12.jpg]](http://islamlee.jeeran.com/security-shell12.jpg)
![[Image: security-shell13.jpg]](http://islamlee.jeeran.com/security-shell13.jpg)
![[Image: security-shell14.jpg]](http://islamlee.jeeran.com/security-shell14.jpg)
![[Image: security-shell15.jpg]](http://islamlee.jeeran.com/security-shell15.jpg)
![[Image: security-shell16.jpg]](http://islamlee.jeeran.com/security-shell16.jpg)
![[Image: security-shell17.jpg]](http://islamlee.jeeran.com/security-shell17.jpg)
![[Image: security-shell18.jpg]](http://islamlee.jeeran.com/security-shell18.jpg)
![[Image: security-shell19.jpg]](http://islamlee.jeeran.com/security-shell19.jpg)
![[Image: security-shell20.jpg]](http://islamlee.jeeran.com/security-shell20.jpg)
![[Image: security-shell21.jpg]](http://islamlee.jeeran.com/security-shell21.jpg)
![[Image: security-shell22.jpg]](http://islamlee.jeeran.com/security-shell22.jpg)
![[Image: security-shell23.jpg]](http://islamlee.jeeran.com/security-shell23.jpg)
![[Image: security-shell24.jpg]](http://islamlee.jeeran.com/security-shell24.jpg)
![[Image: security-shell25.jpg]](http://islamlee.jeeran.com/security-shell25.jpg)
Tidak ada komentar:
Posting Komentar