Home
Search results “Cryptor definition of integrity”
Sécurité 1 : Introduction à la Cryptographie
 
12:05
Voici la première vidéo du module sur la sécurité informatique! J'y présente quelques notions fondamentales sur la sécurité et la cryptographie. Lien vers la vidéo suivante : https://www.youtube.com/watch?v=pxRU8vgzyq4&t=54s Contenu : - Propriétés liveness et safety - Définitions : confidentialité, authenticité et intégrité - Confidentialité : chiffrement de plaintexts/déchiffrement de ciphertexts - Chiffrement de César - Chiffrement de Vigenère - Principe de Kerckhoffs - Définitions : cryptographies symétrique/asymétrique
Views: 17899 L'informateur
Java md5 password encrypt
 
26:30
Java jdk 1.6 su dung giai thuat md5 de ma hoa password Neatbean 7.2, sql server 2005
MD5.pl Anlatımı
 
20:24
Views: 520 Ankebut Official
Old Software Review: AVG 5.0 Anti-Virus
 
19:25
This video is quite long, so expect insanely high amount of voice and confusion. I'll try to make it shorter next time, but in this case I'm just showing how AVG 5.0 Anti-Virus works in general. I've picked some viruses which were old enough to be detected and yet to show that they infect Windows 95. Download link of AVG 5.0 (Yeah, you probably want that Virus Demonstration program): https://app.box.com/s/osl5ikbuj4twdp8pr90kc50rswynqzij
Views: 2644 Tom.K
DEF CON 24 - Stephan Huber and Siegfried Rasthofer - Smartphone Antivirus and Apps
 
35:43
Today’s evil often comes in the form of ransomware, keyloggers, or spyware, against which AntiVirus applications are usually an end user’s only means of protection. But current security apps not only scan for malware, they also aid end users by detecting malicious URLs, scams or phishing attacks. Generally, security apps appear so self-evidently useful that institutions such as online-banking providers even require users to install anti-virus programs. In this talk, however, we show that the installation of security applications, at least in the context of smartphones, can sometimes open the phone to a number of attack vectors, making the system more instead of less vulnerable to attacks. In a recent research we conducted on Android security apps from renowned vendors such as Kaspersky, McAfee, Androhelm, Eset, Malwarebytes or Avira. When conducting a study of the apps’ security features (Antivirus and Privacy Protection, Device Protection, Secure Web Browsing, etc.) it came as a shock to us that every inspected application contained critical vulnerabilities, and that in the end no single of the promoted security features proved to be sufficiently secure. In a simple case, we would have been able to harm the app vendor’s business model by upgrading a trial version into a premium one at no charge. In other instances, attackers would be able to harm the end user by completely disabling the malware-scanning engine remotely. Or how about accessing confidential data by exploiting broken SSL communication, broken self-developed "advanced" crypto implementations or through SQL-injections? Yes, we can. On top, we were able to bypass the secure browsing protection and abuse it for code execution. The most alarming findings, however, were security applications that we were able to actually turn into a remote access trojan (RAT) or into ransomware. In light of all those findings, one must seriously question whether the advice to install a security app onto one’s smartphone is a wise one. In this talk, we will not only explain our findings in detail but also propose possible security fixes. Bios: Stephan Huber is a security researcher at the testlab mobile security group at the Fraunhofer Institute for Secure Information Technology (SIT). His main focus is Android application security testing and developing new static and dynamic analysis techniques for app security evaluation. He found different vulnerabilities in well-known Android applications and the AOSP. In his spare time he enjoys teaching students in Android hacking. Siegfried Rasthofer is a fourth year PhD student at the TU Darmstadt (Germany) and Fraunhofer SIT and his main research focus is on applied software security on Android applications. He developed different tools that combine static and dynamic code analysis for security purposes. He likes to break Android applications and found various AOSP exploits. Most of his research is published at top tier academic conferences and very recently he started publishing at industry conferences like BlackHat, VirusBulletin or AVAR.
Views: 2037 DEFCONConference
MD5 Decrypter  [HD]
 
01:31
▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰ MD5 Decrypter Download Link ▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰ Download : http://adf.ly/1KJSjq Alternative download : http://adf.ly/1KJTwM Virustotal : http://adf.ly/1KJUGE Online MD5 decrypt : http://adf.ly/1KLGTk please like facebook page :)) : http://adf.ly/1KLGOq
Views: 3435 Condor Programlama
comment décrypté pleins de mots de passe crypte en MD5
 
01:19
---------------- ► Info De La Vidéo ---------------- ► ET BIEN SALUT A TOUS ► on se retrouve pour une nouvelle vidéo se qui arrivera prochainement 10 like possible ? ► voila sur se bonne vidéo c’était opex ---------------- ► Pour Moi & Vous ---------------- ► Mon shop Lobby pas cher Payement PayPal (site internet) ►https://steven383812.wixsite.com/opex-modding-team ---------------- ► Me rejoindre & Me Contacter ici ---------------- ► Mon Facebook : https://www.facebook.com/steven.diassousa ► Mon Skype : steven38530dias ---------------- ► Ma dernière vidéo ---------------- ► https://www.youtube.com/watch?v=x9J72l-A704&t=36s
Views: 92 OpeX--ModdinG-TeaM
vidéo_1: vérifiez checksum avec windows (sha1sum, md5sum, ....)
 
03:02
L'empreinte numérique sert a vérifié que ce que vous téléchargez a correctement été écrit sur votre disque dur et ainsi, vous permettre de savoir que le fichier peut donc être utilisé sans souci. La commande de la vidéo a été faite avec une empreinte (checksum) calculé en sha1sum. Il vous sufit de copier cette procédure avec le fichier md5sum.exe pour avoir votre empreinte en md5 si elle vous est fournit ainsi par le site ... etc avec les autres checksum. Sources: Fichiers md5, sha1, sha224 etc: http://www.tux-planet.fr/public/software/windows/sums/ fichier zip avec tout les fichiers sur médiafire: http://www.mediafire.com/download/bv6kzqa578pn62j/checksum.zip
Views: 645 Wh1t3F0x
Files Protector
 
01:29
إن الغرض من هذا المشروع تشفير الملفات باستخدام خوارزمية AES مع التخلص من ثبات حجم مفتاح التشفير واستخدمنا لهذا الغرض خوارزمية البصمة MD5 . عمل الطلاب : بتول جيعان مهند فاخوري ورود جبيرة اشراف : د.يحيى نجار رابط البرنامج https://app.box.com/s/5jj0r7102rztblj4mimq الاطروحة https://app.box.com/s/4jlgh9khva08rwnqf14t العرض https://app.box.com/s/uwrl1ebjz3i7ym8f6n1f
Views: 239 Fakhouri Muhannad
ASP.NET MVC #10 : Custom password hasher with ASP.NET Identity | FoxLearn
 
04:54
Custom encrypt password hasher with ASP.NET Identity MVC 5 step-by-step using C# Entity Framework Code First for Beginners Encrypt Password in Login Form with ASP.NET MVC and Entity Framework c# - Identity Framework and Custom Password Hasher security - Asp.net Identity password hashing c# - asp.net identity with custom password hasher c# - Secure custom password hashing ASP.NET 4.5 MVC5 Custom Identity With Stronger Password C# Salting & Hashing Passwords
Views: 11175 Fox Learn
MD5
 
03:05
MD5
Algorithme MD5
Views: 49 Amine Aounzou
Passe le message à ton voisin (MD5)
 
05:19
Je pouvais pas regarder ce petit projet se mettre en place et ne pas y participer. Même si on est que 3 ou même 4 ou 5. ALors j'aime pas montrer ma tête sur internet, du moins pour l'instant, donc je tourne masqué. Désolé pour la qualité pas terrible la vidéo. Ps : j'ai modifié ma voix au passage. Ps2 (non pas la console) : Petit coucou a Franck Dessans (CVLD -très mal-) et A Dorian (dodo trotrorigolo) qui sont pour moi des types sincères qui redonnent un souffle plus sérieux à cette "dissidence" (ou désobéissance) en train de s'écraser. Page facebook : https://www.facebook.com/pages/Passe-Le-Message-A-Ton-Voisin/219503028227163?ref=ts&fref=ts
Views: 468 MD5
How To Encrypt Data And Decrypt Data Through MD5
 
07:03
Data Encryption and Decryption. Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to plaintext. To encrypt more than a small amount of data, symmetric encryption is used. डेटा एन्क्रिप्शन और डिक्रिप्शन एन्क्रिप्शन सादा पाठ डेटा (सादा टेक्स्ट) का अनुवाद करने की प्रक्रिया है जो यादृच्छिक और अर्थहीन (सिफरटेक्स्ट) प्रतीत होता है। डिक्रिप्शन सिफरटेक्स्ट को वापस सादे टेक्स्ट में बदलने की प्रक्रिया है। डेटा की एक छोटी राशि से अधिक एन्क्रिप्ट करने के लिए, सममित एन्क्रिप्शन का उपयोग किया जाता है। Cryptage et décryptage des données. Le cryptage consiste à traduire les données en texte brut (texte en clair) en quelque chose qui semble être aléatoire et sans signification (texte chiffré). Le décryptage consiste à convertir le texte chiffré en texte clair. Pour crypter plus qu'une petite quantité de données, le cryptage symétrique est utilise. Datenverschlüsselung und Entschlüsselung. Verschlüsselung ist der Prozess der Übersetzung von Klartextdaten (Klartext) in etwas, das zufällig und sinnlos erscheint (Chiffretext). Entschlüsselung ist der Prozess der Umwandlung von Chiffretext wieder in Klartext. Um mehr als eine kleine Datenmenge zu verschlüsseln, wird eine symmetrische Verschlüsselung データの暗号化と復号化。暗号化は、プレーンテキストのデータ(平文)を無作為かつ無意味なもの(暗号文)に変換するプロセスです。解読は、暗号文を平文に変換するプロセスです。少量のデータを暗号化するには、対称暗号化が使用されます。 数据加密和解密。加密是将纯文本数据(明文)转换成似乎是随机和无意义(密文)的过程。解密是将密文转换为纯文本的过程。为了加密超过少量的数据,使用对称加密。
Views: 822 Geeks Techo
BitNinja Server Security - How it works
 
02:01
BitNinja is an all in one server security tool mixing the most powerful defence techniques. It is super-easy to install, requires virtually no maintenance. It is able to protect against 99% of automated attacks - like XSS, DDoS, malware, scans, script injection, CMS hacks, enumeration, brute force, etc. Servers protected by BitNinja learn from each attack and inform each other about malicious IPs. This result is a global defense network that counteracts botnet attacks with a shield of protection for all servers running BitNinja, while also reducing the number of false positives each server encounters
Views: 2093 BitNinja
CHIFFRER ET DÉCHIFFRER EN MD5
 
03:19
Le chiffrement MD5 n'aura plus de secret pour vous après avoir suivi cette vidéo. N'oublies pas de t'abonner à ma chaîne et de lâcher un pouce bleu en passant ^^ site hachage: http://md5decrypt.net/ ►Facebook: https://www.facebook.com/wakedxy/ Musique: Carefree Melody par Twin Musicom est distribué sous la licence Creative Commons Attribution (https://creativecommons.org/licenses/by/4.0/) Source : http://www.twinmusicom.org/song/302/carefree-melody Artiste : __url_artiste__
Views: 4385 Waked XY
MD5 Encrypter (Perl)
 
01:08
Vídeo básico pra n deixa o canal parado, pois estou estudando. http://pastebin.com/Hi5ajAzK
Views: 267 Sr. K1ller
Cracking ZIP/RAR Password With John The Ripper | Kali Linux
 
02:16
Hi Friends, in this video, we will be looking at Linux and encrypted password cracking with John the Ripper. John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version. I Hope you enjoy/enjoyed the video. More:http://www.openwall.com/john/ ----------------------------------------------------------------------------------------------- ☑️Subscribe for More Videos: https://goo.gl/MrTQ5r Education Purpose Only !! 🌍Get More Tutorials Here: https://www.patreon.com/theshadowbrokers Follow Me: Face-book: https://goo.gl/ScNuSH Twitter: https://goo.gl/TTYpMR Stumble-upon: https://goo.gl/M5DnF6 Tumber: https://goo.gl/dzuhE9 -The NSA Hackers Thanks !
Views: 16936 The Shadow Brokers
how to make php registration and login page with md5 (encrypt) password and how md5 works in php
 
10:49
Need Help Or Need code? Feel Free To Contact Us Here http://www.noblecomputer.co.in/support.php This technique work 100%.Now no one can hack your password .using this tutorial you can understand easily that how you can create register and login page with md5 password means encrypt password.
Views: 12547 Amit Andipara
الدرس الأول: كيفية التشفير بال MD5 و SHA1 وفك تشفيره | How To Coded Your Password With MD5 & SHA1
 
07:10
How to crypte your password or your subject with cryptage SHA1 and MD5 link script : http://www.mediafire.com/download/7f3ohc37qpuvppt/Md5.php and how to decode it online with site : link : https://hashkiller.co.uk --------------------------------------------------------------------------
Views: 1175 Ayyoub Jowker
GMASK VIDEO
 
03:28
Views: 271 regie capili
Szyfrowanie danych za pomocą AxCrypt. Chroń swoje pliki.
 
06:03
Pobieranie i instalacja programu szyfrującego AxCrypt. Szyfrowanie plików.
Views: 251 Jimmy Tester
Generate Secure Password with MD5 and SHA1 in Java
 
05:29
In this video, I will demo how to Generate Secure Password with MD5 and SHA1 in Java ====================================================== You can see and download source code demo from my Apps at https://play.google.com/store/apps/developer?id=PMK+Lab ====================================================== You also can buy my apps in http://codecanyon.net/user/octopuscodes/portfolio ====================================================== You also can read my blog in http://learningprogramming.net/ ====================================================== You also can learn Microsoft Office in https://www.youtube.com/channel/UCFrMOR6KF4cpa92OOPRyOng ====================================================== TODAY IS A GREAT DAY TO LEARN SOMETHING NEW! ====================================================== Finding Software videos help you watch reviews for Open Sources:Joomla, wordpress, drupal, magento, html template, free admin template, free bootstrap admin templates, SilverStripe, Cake PHP, CodeIgniter, Concrete5, Modx, ExpressionEngine, Alfresco,TYPOlight, laravel, magento, angularjs, node.js, html, css, javascript, jquery, java, .net, wamp server, xampp, php, mysql, sql server, oracle, open sources, android, hibernate, jpa, html5, jquery
Views: 12598 Learning Programming
Windows MD5 Hashing v5
 
01:01
Step-by-step instructions on how to use the MD5 hashing function
Views: 71 Jeremy Yu
Using MD5 Encryption - Visual Basic Tutorial
 
13:00
This tutorial covers using the MD5 encryption method using Visual Basic (Visual Studio 2010). The MD5 Encryption allows you to encrypt text strings into unreadable data (to humans) and can be used to encrypt passwords for login systems etc. Paste Bin URL: (For Source Codes) http://pastebin.com/ie0XmtYP As always please comment, rate and subscribe.
Views: 9993 Bit Byte
MD5 String Cracker - Version 1
 
06:34
In this video I show my new project that's under development. This is a php engine that is capable of rapidly dictionary attacking MD5 encrypted strings. So many more features to come, as well as aesthetics. View the project and it's latest release here: hashcache.netau.net/ Dont forget to rate comment and subscribe!
Views: 167 WinTech94
Comment lire un pneu - Décryptage
 
02:54
http://www.quechoisir.org/auto/piece-detachee/decryptage-pneus-que-signifient-les-references-d-un-pneu À première vue, ils sont tous pareils. Pourtant, il existe une multitude de pneus différents. À chacun leur taille, leurs performances et même leur capacité à rouler sur la neige. Avant de changer vos pneus, il est donc important de bien savoir comment les choisir. Notre vidéo vous donnera les clefs pour décrypter les inscriptions portées sur les pneus de votre voiture afin de disposer de tous les éléments pour bien les choisir.
Views: 324897 UFC-Que Choisir
MD5 : algorithme de hachage password (security informatique)
 
00:28
cette chaine est spécialisée en les cours de bureautique et la sécurité informatique
Keyless Fuzzy Search on Masked Data by Alexandra Boldyreva
 
34:24
Alexandra Boldyreva from Georgia Institute of Technology presents her talk for the DIMACS/Northeast Big Data Hub Workshop on Privacy and Security for Big Data April 24 - 25, 2017 DIMACS Center, CoRE Building, Rutgers University Organizing Committee: René Bastón, Columbia University Joseph Lorenzo Hall, The Center for Democracy and Technology Adam Smith, Pennsylvania State University Sean Smith, Dartmouth College Rebecca Wright, Rutgers University Moti Yung, Snapchat Presented under the auspices of the DIMACS Big Data Initiative on Privacy and Security, the DIMACS Special Focus on Cybersecurity and in collaboration with the Northeast Big Data Innovation Hub. http://dimacs.rutgers.edu/Workshops/BigDataHub/
Views: 77 Rutgers University
server security using tool for IBM,
 
04:57
I am going to show you and explain the server security using tool for IBM
Views: 29 Musaad Almuqati
Facebook hack free 2017
 
05:06
Hack zone
Views: 69 hack zone
MD5 Decrypter - BGSecurity
 
03:17
Facebook Page: https://www.facebook.com/pages/BGSecurity/767482796705598?fref=nf Download: http://dox.bg/files/dw?a=fac8482e3e BGSecurity - Hacking Tutorials ! :)
Views: 190 darco03
HACKLOG 1x17 - Guida alla Crittografia PGP & GPG
 
24:49
La diciassettesima puntata dell'Hacklog si concentra su Pretty Good Privacy, un software pensato per semplificare la vita a chi ha bisogno di comunicare in totale sicurezza tramite la crittografia asimmetrica. Parleremo di chiavi pubbliche e private, quindi di GPG, il fork ideato per mantenere vivo il progetto. ### SE HAI BISOGNO DI AIUTO ### Cercheremo di rispondere ai commenti sul canale nel modo più veloce possibile: se hai un account Inforge.net, potrai discutere con l'intera community di questa puntata al seguente link: https://www.inforge.net/xi ### MAGGIORI INFO ### Informazioni di distribuzione e di pubblicazione sono disponibili al nostro sito www.hacklog.it, dove potrai scaricare l'ebook gratuitamente oppure acquistare il formato cartaceo e riceverlo direttamente a casa.
Views: 12978 Inforge.net
crack md5 hash super fast only in one second
 
02:13
cracking md5 hashses super fast with millions words persecond. add me on facebook https://www.facebook.com/ahmadraju
Views: 1075 Ahmad Saleh
Brute-Force MD5 c++
 
01:50
Criptatore/Decriptatore md5 scritto in C++
Views: 2696 Fabio Mazza
Evil 2 Dead MD5 Hash Python
 
03:39
Evil 2 Dead MD5 Hash Python كان أول تمنيتك يا إخوان لابد يكون في أجهزتكم مترجم بايثون لكي يشتغل السكريبت لأصحاب الويندوز الموقع الرسمي http://www.python.org/download/ Scribt : http://sh.st/udl18
Views: 816 أبو رانيا
Hash MD5  (hachage decrypter)
 
02:28
L'algorithme MD5, pour Message Digest 5, est une fonction de hachage cryptographique qui permet d'obtenir l'empreinte numérique d'un fichier (on parle souvent de message). Il a été inventé par Ronald Rivest en 1991. L'utilisation de cette fonction de hachage dans les signatures numériques peut conduire à de multiples scénarios d'attaque1 et n'est plus considérée comme un composant fiable de l'infrastructure à clés publiques. http://hackerfree.fr
Views: 1829 Cyberhackers blink
[ Tuto VB ] Encrypteur MD5 [FR]
 
13:33
http://bases-informatiques.leforum.eu/index.php Codes sources : Fonction Generatehash : Private Function GenerateHash(ByVal strToHash As String) As String Dim md5Obj As New Security.Cryptography.MD5CryptoServiceProvider Dim bytesToHash() As Byte = System.Text.Encoding.ASCII.GetBytes(strToHash) bytesToHash = md5Obj.ComputeHash(bytesToHash) Dim strResult As String = "" For Each b As Byte In bytesToHash strResult += b.ToString("x2") Next Return strResult End Function Timer 1 : Private Sub Timer1_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer1.Tick ProgressBar1.Increment(1) Label4.Text = ProgressBar1.Value If ProgressBar1.Value = ProgressBar1.Maximum Then TextBox2.Text = GenerateHash(TextBox1.Text) 'Output = MD5Hash(Input) Timer1.Stop() MsgBox("Votre texte est encrypter", MsgBoxStyle.Exclamation, "Information") End If End Sub Bouton 1 : Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles PictureBox1.Click If TextBox1.Text = "" Then MsgBox("Il n'y a pas de texte à encrypter", MsgBoxStyle.Critical, "Information") Timer1.Stop() Else Timer1.Start() End If End Sub Bouton 2 : Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click TextBox1.Text = "" TextBox2.Text = "" Timer1.Stop() ProgressBar1.Value = 0 Label4.Text = "" MsgBox("Vous avez tout effacer !", MsgBoxStyle.Exclamation, "Information") End Sub Voilà ! By 3n!gM4t!k & Souishiro !
Views: 1270 Tut0pr0gProduction
Battlefield 4 Aimbot Updated!
 
03:29
Note- Hack Is Updated Now :) Works on x64 Bit only. Use windows areo as the overlay needs the transparency. Set BF4 on widowed mode before starting the hack. Also, modify the MD5 with a MD5 changer/crypter/whatever so it's harder to detect Use at your own risk! Please note the hack drawing hides itself when BF4 isn't active, so after starting the hack, click on the BF4 window to see the menu Turning off the antivirus can also help if the hack says it can't find the process. Download Link- https://www.mediafire.com/?55tl9f9a6xoa3s7 Features: -Box ESP -Line ESP -Healthbars -Name/Distance -Radar -Enemy visible warning -Visible ESP check -Crosshair -Hardcode mode Stats (Your Health, Ammo) -No Spread -No Recoil Enjoy Happy Gaming :) And Sub Me!!
Views: 457 laneblitzwolf x7
MD5 Hash Lookup & DB storage tool
 
01:23
Code for this is up at: http://sdet.us/tool-md5-dictionary-seed-and-md5-hash-lookup/ Following the concept in the book Violent Python, I built a tool in Grails to give a UI, where a person could enter text to add to the dictionary (word entered is converted to MD5 and stored in the database), and then in another controller it handles the lookup feature, user inputs MD5 hash and gets back the matched plain text word in the database. Useful for testing your test environments to make sure that (if you use MD5) it's salted and you should not get matches to existing/known words.
Views: 234 Brian Warner
Decrypt MD5 Hashes .
 
01:11
This video is talking about hash .. md5 .. decrypt .. http://www.md5decrypt.org/ Subscribe For More Videos .
Views: 595 ProScout97
hash cracker MD5 in Kali Linux 2017.1
 
02:01
https://github.com/ikkebr/PyBozoCrack.git
Views: 643 Tutorials On Hack
Kurs Ruby #12 : Hashowanie MD5 i SHA1
 
02:42
W tej lekcji pokazę jak hashować dane algorytmami MD5 i SHA1
Views: 607 Narzew
como descobri email e senhas facebook md5 (novo)
 
05:49
servicos hacker https://www.facebook.com/robertt.rocha.967
Views: 516 alien hacker
Md5 Cracking
 
01:12
~DarkSec Md5 Cracking Test
Views: 47 Ethical Exploiter
MD5 Mass Reverser [Reverse MD5 to real string]
 
01:42
Latest Version of MD5 Mass Reverser: v1.3 Release: 30 June 2014 (NEW) + Require .NET Framework v4 (New output encoding) + Fixed output case + Added more server + Added more hash in DB + Updated language for English and Bahasa Indonesia v1.3 Download Link: http://adf.ly/pyZDY Virus Scan: https://www.virustotal.com/en/file/64d6db9c9646a69955a51c9b1ab27a00841087c32ddfc5a26849992afeb1950e/analysis/1404143100/ my Page on Facebook : http://adf.ly/pmXU8 sorry for the adfly :3
Views: 1999 Angki Ang