I Want To Share Computer Security Information To All Internet Netter:
1. Firewalls Torn Apart
2. Guide To Social Engineering
3. Social Engineering And Email Account Cracking
4. Network Firewall Security
5. Hijacking Hotmail Accounts For Newbies
6. Various Ways To Hack Or Over Ride Foolproof
7. Configuring ZoneAlarm Securely
8. IP Masquerading Tutorial
9. Interesting Things You Didnt Know About Your Computers Hardware
10. Advanced Number Systems Made Easy
11. Hacking Dictionary
12. Hacking The Bios
13. DNS The What The How And The Why
14. Exploit Mihirs Guide To Inserting Logo To System Properties
15. Getting Geographical Information Using An IP Address
16. Create A Lightweight E Mailer
17. Telnet Explained
18. Installing A Webserver For NewbiesI
19. The IP Address
20. Being A Hacker On The Meaning Of Being A Hacker
21. Well Known Port Numbers
22. Samba How To
23. Removing Banners
24. Port Numbers Part 1
25. Port Numbers Part 2
26. Port Numbers Part 3
27. Port Numbers Part 4
28. Port Numbers Part 5
29. Port Numbers Part 6
30. Port Numbers Part 7
31. Port Numbers Part 8
32. Port Numbers Part 9
33. The OSI Model
34. The Basic Elements Of Cracking
35. Beginners Step By Step Security Guide
36. Linking Rules For Hacking And Other Alternative Websites
37. Installing A Webserver For Newbies
38. Glossary
39. Wireless Security And Hacking
40. Wireless Network
41. Demystifying Remote Host Part 1
42. Exploiting Design Flaws In The Win32 API For Privilege Escalation
43. Wireless LAN Technologies and Windows XP
44. Understanding NetBIOS
45. The Complete Guide To Computers
46. Things You Need
47. How To Clear The Past Mapped Network Drives List
48. You Got This File From
49. Msn Tutorial Ugw Securtiy Information Base
50. The Basics Of Cryptography
51. PGP Encryption For Beginners Learn How PGP Works
52. Cryptography FAQ
53. Cryptography Split Wide Open
54. W2K File System
55. A More Indepth Article About The Basics To Encryption
56. Protecting Your Scripts
57. Breaking Script Encoder
58. Windows 2000 Encrypting File System And Disk Wipe Software
Vulnerability
59. Buffer Overflow Basics
60. Deadly Dos Attack
61. MS Office XP The More Money I Give To Microsoft The More
Vulnerable My Windows Computers Are
62. Dos Attacks Explained
63. Introduction To Denial Of Service
64. Miscellaneous Groups Publications
65. Documents About General Hardening
66. Documents About Unix Hardening
67. Basic Steps To Hardening A Standalone Windows 2000 Installation
68. Setting Up IIS And Securing Streamed Content
69. Articles On How To Securing Hardening BSD
70. Step By Step Guide To Secure Win2k
71. Documents About Windows9x ME Hardening
72. Documents About General Hardening
73. Securing Your Web Pages With Apache
74. Documents About Windows9x ME Hardening
75. Documents About IIS Hardening Securing
76. Basic Steps To Hardening A Standalone Windows 2000 Installation
77. Excellent Analysis Of The ICQ Trojans
78. The ICQ Security Tutorial
79. Backing Up Your ICQ Contact List And Settings
80. Hijacking ICQ Accounts in Spanish
81. ICQ Password Stealing Tutorial
82. The ICQ Password Securing Tutorial
83. Hijacking ICQ Accounts
84. Back Door Infecting Guide
85. Security Home
86. Get ICQ Passwords Using Share Programms
87. Snort On Windows 98/ME/NT4/2000 Using Mysql And Acid
88. Eggdrop Bots Tutorial Written by The Cyber God
89. Eggdrop Bots Tutorial
90. Getting Passwords Of Nicks In mIRC
91. IRC Spoofing
92. The IRC Warfare Tutorial Written
93. IRC Trading Security
94. Getting Passwords Of Nicks In mIRC
95. IRC Basic Commands
96. Never Be Banned In IRC
97. IRC FAQ Undergroundworld de vu the Secure-Net Search Lab
98. A Better Way To Get Hotmail Passwords - A Little Helpful Program
With A Short Tutorial
99. Newbie Keyloggers Toturial - How To Disable The Keyloggers
100. Tutorial To Make Your Folder (Any ) Secure And Inaccessible By
Others Without Using Any Program
101. A Trick To Get Access To Control Panel As A Restricted Network
User On Windows XP And 2000
102. Removing The Folder Having ASCII Character From The Drive
103. Getting Rid Of The Urls You Visited In The Url Bar Of IE
104. Exploring Windows
105. Create Your Own Logon Message
106. MSN Mesenger Tip
107. Writing MBR When Norton Antivirus2002 Has Auto-Protection Enable
108. Trick on CNN.COM or tricking minds via cnn.com
109. Access The Blocked Folder In WinNt
110. Various Methods Of Hacking Hotmail
111. Writing Bootable CD's With Nero
112. How To Protect A Folder From Access From Anyone, Even Your
Administrator
113. How To Change Product Key In XP With No Re-Install
114. No More Popups
115. Tips And Tricks On Burning
116. The Elite Symbols
117. Windows Xp Product Key Modifier
118. Hacking Hotmail
119. Kazaa As A Annonymous Emailer
120. Cracking Unix Password Files For Beginners
121. Exploiting Cisco Systems
122. Cracking Unix Password Files For Beginners
123. Poor Security On Default Windows 2000 Server Installation Could
Lead To Unauthorized Database Access
124. Remote Control Of IIS Windows
125. How To Become A Hacker
Cette action est irreversible, confirmez la suppression du commentaire ?
Signaler le commentaire
Veuillez sélectionner un problème
Nudité
Violence
Harcèlement
Fraude
Vente illégale
Discours haineux
Terrorisme
Autre
Gerard95
Dans son message précédent, a écrit :
I Want To Share Computer Security Information To All Internet Netter: 1. Firewalls Torn Apart 2. Guide To Social Engineering 3. Social Engineering And Email Account Cracking 4. Network Firewall Security 5. Hijacking Hotmail Accounts For Newbies 6. Various Ways To Hack Or Over Ride Foolproof 7. Configuring ZoneAlarm Securely 8. IP Masquerading Tutorial 9. Interesting Things You Didnt Know About Your Computers Hardware 10. Advanced Number Systems Made Easy 11. Hacking Dictionary 12. Hacking The Bios 13. DNS The What The How And The Why 14. Exploit Mihirs Guide To Inserting Logo To System Properties 15. Getting Geographical Information Using An IP Address 16. Create A Lightweight E Mailer 17. Telnet Explained 18. Installing A Webserver For NewbiesI 19. The IP Address 20. Being A Hacker On The Meaning Of Being A Hacker 21. Well Known Port Numbers 22. Samba How To 23. Removing Banners 24. Port Numbers Part 1 25. Port Numbers Part 2 26. Port Numbers Part 3 27. Port Numbers Part 4 28. Port Numbers Part 5 29. Port Numbers Part 6 30. Port Numbers Part 7 31. Port Numbers Part 8 32. Port Numbers Part 9 33. The OSI Model 34. The Basic Elements Of Cracking 35. Beginners Step By Step Security Guide 36. Linking Rules For Hacking And Other Alternative Websites 37. Installing A Webserver For Newbies 38. Glossary 39. Wireless Security And Hacking 40. Wireless Network 41. Demystifying Remote Host Part 1 42. Exploiting Design Flaws In The Win32 API For Privilege Escalation 43. Wireless LAN Technologies and Windows XP 44. Understanding NetBIOS 45. The Complete Guide To Computers 46. Things You Need 47. How To Clear The Past Mapped Network Drives List 48. You Got This File From 49. Msn Tutorial Ugw Securtiy Information Base 50. The Basics Of Cryptography 51. PGP Encryption For Beginners Learn How PGP Works 52. Cryptography FAQ 53. Cryptography Split Wide Open 54. W2K File System 55. A More Indepth Article About The Basics To Encryption 56. Protecting Your Scripts 57. Breaking Script Encoder 58. Windows 2000 Encrypting File System And Disk Wipe Software Vulnerability 59. Buffer Overflow Basics 60. Deadly Dos Attack 61. MS Office XP The More Money I Give To Microsoft The More Vulnerable My Windows Computers Are 62. Dos Attacks Explained 63. Introduction To Denial Of Service 64. Miscellaneous Groups Publications 65. Documents About General Hardening 66. Documents About Unix Hardening 67. Basic Steps To Hardening A Standalone Windows 2000 Installation 68. Setting Up IIS And Securing Streamed Content 69. Articles On How To Securing Hardening BSD 70. Step By Step Guide To Secure Win2k 71. Documents About Windows9x ME Hardening 72. Documents About General Hardening 73. Securing Your Web Pages With Apache 74. Documents About Windows9x ME Hardening 75. Documents About IIS Hardening Securing 76. Basic Steps To Hardening A Standalone Windows 2000 Installation 77. Excellent Analysis Of The ICQ Trojans 78. The ICQ Security Tutorial 79. Backing Up Your ICQ Contact List And Settings 80. Hijacking ICQ Accounts in Spanish 81. ICQ Password Stealing Tutorial 82. The ICQ Password Securing Tutorial 83. Hijacking ICQ Accounts 84. Back Door Infecting Guide 85. Security Home 86. Get ICQ Passwords Using Share Programms 87. Snort On Windows 98/ME/NT4/2000 Using Mysql And Acid 88. Eggdrop Bots Tutorial Written by The Cyber God 89. Eggdrop Bots Tutorial 90. Getting Passwords Of Nicks In mIRC 91. IRC Spoofing 92. The IRC Warfare Tutorial Written 93. IRC Trading Security 94. Getting Passwords Of Nicks In mIRC 95. IRC Basic Commands 96. Never Be Banned In IRC 97. IRC FAQ Undergroundworld de vu the Secure-Net Search Lab 98. A Better Way To Get Hotmail Passwords - A Little Helpful Program With A Short Tutorial 99. Newbie Keyloggers Toturial - How To Disable The Keyloggers 100. Tutorial To Make Your Folder (Any ) Secure And Inaccessible By Others Without Using Any Program 101. A Trick To Get Access To Control Panel As A Restricted Network User On Windows XP And 2000 102. Removing The Folder Having ASCII Character From The Drive 103. Getting Rid Of The Urls You Visited In The Url Bar Of IE 104. Exploring Windows 105. Create Your Own Logon Message 106. MSN Mesenger Tip 107. Writing MBR When Norton Antivirus2002 Has Auto-Protection Enable 108. Trick on CNN.COM or tricking minds via cnn.com 109. Access The Blocked Folder In WinNt 110. Various Methods Of Hacking Hotmail 111. Writing Bootable CD's With Nero 112. How To Protect A Folder From Access From Anyone, Even Your Administrator 113. How To Change Product Key In XP With No Re-Install 114. No More Popups 115. Tips And Tricks On Burning 116. The Elite Symbols 117. Windows Xp Product Key Modifier 118. Hacking Hotmail 119. Kazaa As A Annonymous Emailer 120. Cracking Unix Password Files For Beginners 121. Exploiting Cisco Systems 122. Cracking Unix Password Files For Beginners 123. Poor Security On Default Windows 2000 Server Installation Could Lead To Unauthorized Database Access 124. Remote Control Of IIS Windows 125. How To Become A Hacker
--- Thank You ---
Source: http://www.security.fx-vista.com
126. How to be a good guy
Dans son message précédent, agne.suma.com.use@gmail.com a écrit :
I Want To Share Computer Security Information To All Internet Netter:
1. Firewalls Torn Apart
2. Guide To Social Engineering
3. Social Engineering And Email Account Cracking
4. Network Firewall Security
5. Hijacking Hotmail Accounts For Newbies
6. Various Ways To Hack Or Over Ride Foolproof
7. Configuring ZoneAlarm Securely
8. IP Masquerading Tutorial
9. Interesting Things You Didnt Know About Your Computers Hardware
10. Advanced Number Systems Made Easy
11. Hacking Dictionary
12. Hacking The Bios
13. DNS The What The How And The Why
14. Exploit Mihirs Guide To Inserting Logo To System Properties
15. Getting Geographical Information Using An IP Address
16. Create A Lightweight E Mailer
17. Telnet Explained
18. Installing A Webserver For NewbiesI
19. The IP Address
20. Being A Hacker On The Meaning Of Being A Hacker
21. Well Known Port Numbers
22. Samba How To
23. Removing Banners
24. Port Numbers Part 1
25. Port Numbers Part 2
26. Port Numbers Part 3
27. Port Numbers Part 4
28. Port Numbers Part 5
29. Port Numbers Part 6
30. Port Numbers Part 7
31. Port Numbers Part 8
32. Port Numbers Part 9
33. The OSI Model
34. The Basic Elements Of Cracking
35. Beginners Step By Step Security Guide
36. Linking Rules For Hacking And Other Alternative Websites
37. Installing A Webserver For Newbies
38. Glossary
39. Wireless Security And Hacking
40. Wireless Network
41. Demystifying Remote Host Part 1
42. Exploiting Design Flaws In The Win32 API For Privilege Escalation
43. Wireless LAN Technologies and Windows XP
44. Understanding NetBIOS
45. The Complete Guide To Computers
46. Things You Need
47. How To Clear The Past Mapped Network Drives List
48. You Got This File From
49. Msn Tutorial Ugw Securtiy Information Base
50. The Basics Of Cryptography
51. PGP Encryption For Beginners Learn How PGP Works
52. Cryptography FAQ
53. Cryptography Split Wide Open
54. W2K File System
55. A More Indepth Article About The Basics To Encryption
56. Protecting Your Scripts
57. Breaking Script Encoder
58. Windows 2000 Encrypting File System And Disk Wipe Software
Vulnerability
59. Buffer Overflow Basics
60. Deadly Dos Attack
61. MS Office XP The More Money I Give To Microsoft The More
Vulnerable My Windows Computers Are
62. Dos Attacks Explained
63. Introduction To Denial Of Service
64. Miscellaneous Groups Publications
65. Documents About General Hardening
66. Documents About Unix Hardening
67. Basic Steps To Hardening A Standalone Windows 2000 Installation
68. Setting Up IIS And Securing Streamed Content
69. Articles On How To Securing Hardening BSD
70. Step By Step Guide To Secure Win2k
71. Documents About Windows9x ME Hardening
72. Documents About General Hardening
73. Securing Your Web Pages With Apache
74. Documents About Windows9x ME Hardening
75. Documents About IIS Hardening Securing
76. Basic Steps To Hardening A Standalone Windows 2000 Installation
77. Excellent Analysis Of The ICQ Trojans
78. The ICQ Security Tutorial
79. Backing Up Your ICQ Contact List And Settings
80. Hijacking ICQ Accounts in Spanish
81. ICQ Password Stealing Tutorial
82. The ICQ Password Securing Tutorial
83. Hijacking ICQ Accounts
84. Back Door Infecting Guide
85. Security Home
86. Get ICQ Passwords Using Share Programms
87. Snort On Windows 98/ME/NT4/2000 Using Mysql And Acid
88. Eggdrop Bots Tutorial Written by The Cyber God
89. Eggdrop Bots Tutorial
90. Getting Passwords Of Nicks In mIRC
91. IRC Spoofing
92. The IRC Warfare Tutorial Written
93. IRC Trading Security
94. Getting Passwords Of Nicks In mIRC
95. IRC Basic Commands
96. Never Be Banned In IRC
97. IRC FAQ Undergroundworld de vu the Secure-Net Search Lab
98. A Better Way To Get Hotmail Passwords - A Little Helpful Program
With A Short Tutorial
99. Newbie Keyloggers Toturial - How To Disable The Keyloggers
100. Tutorial To Make Your Folder (Any ) Secure And Inaccessible By
Others Without Using Any Program
101. A Trick To Get Access To Control Panel As A Restricted Network
User On Windows XP And 2000
102. Removing The Folder Having ASCII Character From The Drive
103. Getting Rid Of The Urls You Visited In The Url Bar Of IE
104. Exploring Windows
105. Create Your Own Logon Message
106. MSN Mesenger Tip
107. Writing MBR When Norton Antivirus2002 Has Auto-Protection Enable
108. Trick on CNN.COM or tricking minds via cnn.com
109. Access The Blocked Folder In WinNt
110. Various Methods Of Hacking Hotmail
111. Writing Bootable CD's With Nero
112. How To Protect A Folder From Access From Anyone, Even Your
Administrator
113. How To Change Product Key In XP With No Re-Install
114. No More Popups
115. Tips And Tricks On Burning
116. The Elite Symbols
117. Windows Xp Product Key Modifier
118. Hacking Hotmail
119. Kazaa As A Annonymous Emailer
120. Cracking Unix Password Files For Beginners
121. Exploiting Cisco Systems
122. Cracking Unix Password Files For Beginners
123. Poor Security On Default Windows 2000 Server Installation Could
Lead To Unauthorized Database Access
124. Remote Control Of IIS Windows
125. How To Become A Hacker
I Want To Share Computer Security Information To All Internet Netter: 1. Firewalls Torn Apart 2. Guide To Social Engineering 3. Social Engineering And Email Account Cracking 4. Network Firewall Security 5. Hijacking Hotmail Accounts For Newbies 6. Various Ways To Hack Or Over Ride Foolproof 7. Configuring ZoneAlarm Securely 8. IP Masquerading Tutorial 9. Interesting Things You Didnt Know About Your Computers Hardware 10. Advanced Number Systems Made Easy 11. Hacking Dictionary 12. Hacking The Bios 13. DNS The What The How And The Why 14. Exploit Mihirs Guide To Inserting Logo To System Properties 15. Getting Geographical Information Using An IP Address 16. Create A Lightweight E Mailer 17. Telnet Explained 18. Installing A Webserver For NewbiesI 19. The IP Address 20. Being A Hacker On The Meaning Of Being A Hacker 21. Well Known Port Numbers 22. Samba How To 23. Removing Banners 24. Port Numbers Part 1 25. Port Numbers Part 2 26. Port Numbers Part 3 27. Port Numbers Part 4 28. Port Numbers Part 5 29. Port Numbers Part 6 30. Port Numbers Part 7 31. Port Numbers Part 8 32. Port Numbers Part 9 33. The OSI Model 34. The Basic Elements Of Cracking 35. Beginners Step By Step Security Guide 36. Linking Rules For Hacking And Other Alternative Websites 37. Installing A Webserver For Newbies 38. Glossary 39. Wireless Security And Hacking 40. Wireless Network 41. Demystifying Remote Host Part 1 42. Exploiting Design Flaws In The Win32 API For Privilege Escalation 43. Wireless LAN Technologies and Windows XP 44. Understanding NetBIOS 45. The Complete Guide To Computers 46. Things You Need 47. How To Clear The Past Mapped Network Drives List 48. You Got This File From 49. Msn Tutorial Ugw Securtiy Information Base 50. The Basics Of Cryptography 51. PGP Encryption For Beginners Learn How PGP Works 52. Cryptography FAQ 53. Cryptography Split Wide Open 54. W2K File System 55. A More Indepth Article About The Basics To Encryption 56. Protecting Your Scripts 57. Breaking Script Encoder 58. Windows 2000 Encrypting File System And Disk Wipe Software Vulnerability 59. Buffer Overflow Basics 60. Deadly Dos Attack 61. MS Office XP The More Money I Give To Microsoft The More Vulnerable My Windows Computers Are 62. Dos Attacks Explained 63. Introduction To Denial Of Service 64. Miscellaneous Groups Publications 65. Documents About General Hardening 66. Documents About Unix Hardening 67. Basic Steps To Hardening A Standalone Windows 2000 Installation 68. Setting Up IIS And Securing Streamed Content 69. Articles On How To Securing Hardening BSD 70. Step By Step Guide To Secure Win2k 71. Documents About Windows9x ME Hardening 72. Documents About General Hardening 73. Securing Your Web Pages With Apache 74. Documents About Windows9x ME Hardening 75. Documents About IIS Hardening Securing 76. Basic Steps To Hardening A Standalone Windows 2000 Installation 77. Excellent Analysis Of The ICQ Trojans 78. The ICQ Security Tutorial 79. Backing Up Your ICQ Contact List And Settings 80. Hijacking ICQ Accounts in Spanish 81. ICQ Password Stealing Tutorial 82. The ICQ Password Securing Tutorial 83. Hijacking ICQ Accounts 84. Back Door Infecting Guide 85. Security Home 86. Get ICQ Passwords Using Share Programms 87. Snort On Windows 98/ME/NT4/2000 Using Mysql And Acid 88. Eggdrop Bots Tutorial Written by The Cyber God 89. Eggdrop Bots Tutorial 90. Getting Passwords Of Nicks In mIRC 91. IRC Spoofing 92. The IRC Warfare Tutorial Written 93. IRC Trading Security 94. Getting Passwords Of Nicks In mIRC 95. IRC Basic Commands 96. Never Be Banned In IRC 97. IRC FAQ Undergroundworld de vu the Secure-Net Search Lab 98. A Better Way To Get Hotmail Passwords - A Little Helpful Program With A Short Tutorial 99. Newbie Keyloggers Toturial - How To Disable The Keyloggers 100. Tutorial To Make Your Folder (Any ) Secure And Inaccessible By Others Without Using Any Program 101. A Trick To Get Access To Control Panel As A Restricted Network User On Windows XP And 2000 102. Removing The Folder Having ASCII Character From The Drive 103. Getting Rid Of The Urls You Visited In The Url Bar Of IE 104. Exploring Windows 105. Create Your Own Logon Message 106. MSN Mesenger Tip 107. Writing MBR When Norton Antivirus2002 Has Auto-Protection Enable 108. Trick on CNN.COM or tricking minds via cnn.com 109. Access The Blocked Folder In WinNt 110. Various Methods Of Hacking Hotmail 111. Writing Bootable CD's With Nero 112. How To Protect A Folder From Access From Anyone, Even Your Administrator 113. How To Change Product Key In XP With No Re-Install 114. No More Popups 115. Tips And Tricks On Burning 116. The Elite Symbols 117. Windows Xp Product Key Modifier 118. Hacking Hotmail 119. Kazaa As A Annonymous Emailer 120. Cracking Unix Password Files For Beginners 121. Exploiting Cisco Systems 122. Cracking Unix Password Files For Beginners 123. Poor Security On Default Windows 2000 Server Installation Could Lead To Unauthorized Database Access 124. Remote Control Of IIS Windows 125. How To Become A Hacker
--- Thank You ---
Source: http://www.security.fx-vista.com
126. How to be a good guy
Olivier Miakinen
Le 21/10/2007 15:13, Gerard95 répondait à un spammeur :
Dans son message précédent, a écrit :
[ 125 lignes de pub citées ]
126. How to be a good guy
Voici le résumé du bouquin numéro 126.
Chapitre 1 : Ne jamais répondre aux spammeurs Chapitre 2 : http://www.usenet-fr.net/fur/usenet/repondre-sur-usenet.html
Le 21/10/2007 15:13, Gerard95 répondait à un spammeur :
Dans son message précédent, agne.suma.com.use@gmail.com a écrit :
[ 125 lignes de pub citées ]
126. How to be a good guy
Voici le résumé du bouquin numéro 126.
Chapitre 1 :
Ne jamais répondre aux spammeurs
Chapitre 2 :
http://www.usenet-fr.net/fur/usenet/repondre-sur-usenet.html
129. How to mettre le .invalid à la fin de son adresse et pas en plein milieu (oui, je sais, je suis nul en anglais, désolé, mais ce groupe est francophone).
Donc : Ou bien : Ou encore : Mais pas :
Voir par exemple : http://www.gattaca.org/antispam/usenet/
Le 22/10/2007 10:07, Rémy a écrit :
"Dc" <dc@ctc-soft.com> a écrit dans le message de news:
mn.b2577d7ae0f04d32.72477@ctc-soft.com...
127. how not quote like a pig
128. How to have a valid signature
129. How to mettre le .invalid à la fin de son adresse et pas en plein
milieu (oui, je sais, je suis nul en anglais, désolé, mais ce groupe est
francophone).
Donc : remy81@ifrance.com.invalid
Ou bien : remy81@ifrance.invalid
Ou encore : nospam@remy81.invalid
Mais pas : remy81@ifrance.invalid.com
Voir par exemple :
http://www.gattaca.org/antispam/usenet/
129. How to mettre le .invalid à la fin de son adresse et pas en plein milieu (oui, je sais, je suis nul en anglais, désolé, mais ce groupe est francophone).
Donc : Ou bien : Ou encore : Mais pas :
Voir par exemple : http://www.gattaca.org/antispam/usenet/
Harpo
Olivier Miakinen wrote:
129. How to mettre le .invalid à la fin de son adresse et pas en plein milieu
Autant le mettre partout, c'est plus simple a se rappeler. De plus, il y a un intérêt a avoir une adresse invalide utilisée par d'autres personnes. N'hésitez pas a plagier mon champ From:
Olivier Miakinen wrote:
129. How to mettre le .invalid à la fin de son adresse et pas en plein
milieu
Autant le mettre partout, c'est plus simple a se rappeler.
De plus, il y a un intérêt a avoir une adresse invalide utilisée par
d'autres personnes. N'hésitez pas a plagier mon champ From:
129. How to mettre le .invalid à la fin de son adresse et pas en plein milieu
Autant le mettre partout, c'est plus simple a se rappeler. De plus, il y a un intérêt a avoir une adresse invalide utilisée par d'autres personnes. N'hésitez pas a plagier mon champ From:
Dc
Bjr,
Rémy vient de nous annoncer :
128. How to have a valid signature
Oui mais moi, y a une bonne raison :-)) et c'est quand meme moins long que son quotage...
-- ------------------------------------------------------------- www.ctc-soft.com Gestion biblo-documentaire (free-share) Comptabilité shareware Logiciels de Gestion de saisie terrain Spécialisé Tournées de boulangers -------------------------------------------------------------
Bjr,
Rémy vient de nous annoncer :
128. How to have a valid signature
Oui mais moi, y a une bonne raison :-))
et c'est quand meme moins long que son quotage...
--
-------------------------------------------------------------
www.ctc-soft.com
Gestion biblo-documentaire (free-share)
Comptabilité shareware
Logiciels de Gestion de saisie terrain
Spécialisé Tournées de boulangers
-------------------------------------------------------------