skip to main | skip to sidebar

Thougts to Share! Share Some Thoughts!

PentestBox - Opensource PreConfigured Portable Penetration Testing Environment For The Windows

Related posts
  • Growth Hacking Libro
  • Blog Hacking
  • Elladodelmal
  • Chema Alonso Wikipedia
  • Informatico Hacker
  • Hacking Etico Pdf
  • Phone Hacking
  • Password Hacking
  • Growth Hacking Que Es

沒有留言:

張貼留言

較新的文章 較舊的文章 首頁
訂閱: 張貼留言 (Atom)

Acrostic Poems

An acrostic poem is very easy to write. It can be about any subject. This kind of poem can be written in different ways, but the simplest form is to put the letters that spell your subject down the side of your page. When you have done this then you go back to each letter and think of a word , phrase or sentence that starts with that letter and describes your subject. Here are some of the poems written by the students using their names.

Current Events

CE blogger is a place for readers to speak out about topics in the news. It is sponsored by Weekly Reader. There are a variety of topics for the students to choose, from news roundup to strange pictures. The senior 1 A/F students have been posting their comments since last December (2007). Here are some more of the well-written comments.

All About Harry Potter!

In our senior one textbook, there is a lesson introducing Ms. J. K. Rowling and her Harry Potter series. Most of the students have read the H.P.s and have vivid memory about the stories. At the same time, they are asked to comment on some of the issues mentioned in the books.

Heros

The first assignment for the students was to find a hero of his/her own. I hope these young people can visualize what a hero is like and realized their own potential to become great men and women too.

Thoughts to Share!

Students read and gave feedbacks to their friends' heroes. Many of the shared comments are surrounding the idea of courage and determination. One mentioned that it is the attitude makes a hero. Deep inside of you, there is a hero waiting to be awaken.

Sharings

  • ►  2025 (53)
    • ►  7月 (2)
    • ►  6月 (1)
    • ►  5月 (3)
    • ►  4月 (4)
    • ►  3月 (6)
    • ►  2月 (6)
    • ►  1月 (31)
  • ►  2024 (51)
    • ►  11月 (1)
    • ►  10月 (2)
    • ►  9月 (1)
    • ►  8月 (2)
    • ►  6月 (3)
    • ►  5月 (1)
    • ►  2月 (3)
    • ►  1月 (38)
  • ►  2023 (69)
    • ►  12月 (1)
    • ►  10月 (1)
    • ►  9月 (1)
    • ►  8月 (6)
    • ►  7月 (7)
    • ►  6月 (20)
    • ►  5月 (33)
  • ►  2022 (2)
    • ►  9月 (1)
    • ►  8月 (1)
  • ►  2021 (20)
    • ►  12月 (3)
    • ►  11月 (6)
    • ►  10月 (3)
    • ►  9月 (8)
  • ▼  2020 (438)
    • ►  9月 (5)
    • ►  8月 (98)
    • ►  7月 (103)
    • ►  6月 (24)
    • ▼  5月 (90)
      • Johney Gerald Lopez mentioned you on Facebook
      • 📄 Franco Stefanelli posted an update
      • 📷 Petrus Setyoprabowo added a new photo
      • 📷 Becthiano Lopez added a new photo
      • 🔔 See Vito Battista's photo tag and other notific...
      • 🔔 See Vito Battista's photo tag and other notific...
      • Romina Pergolesi Due is a new friend suggestion fo...
      • The OWASP Foundation Has Selected The Technical Wr...
      • CEH: Gathering Host And Network Information | Scan...
      • Top 20 Best Free Hacking Apps For Android |2019|
      • Cataldo D'amico is a new friend suggestion for you
      • RenApp: The Ultimate File Renaming App
      • Nmap: Getting Started Guide
      • What Is Keylogger? Uses Of Keylogger In Hacking ?
      • SANS SEC575 Mentor Class
      • Hacking PayPal's Express Checkout
      • S2 Dynamic Tracer And Decompiler For Gdb
      • Learning Web Pentesting With DVWA Part 1: Installa...
      • HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSIO...
      • $$$ Bug Bounty $$$
      • Hacking Facebook By Using PHP Script | Social Engi...
      • 💬 Claudio Centenaro commented on Franco Cirillo's...
      • PentestBox - Opensource PreConfigured Portable Pen...
      • SigPloit SS7 Tool
      • HTML5 Games On Android
      • Antonio Masi is a new friend suggestion for you
      • HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAIL
      • How Block Chain Technology Can Help Fight Wuhan Co...
      • Lockdoor-Framework: A PenTesting Framework With Cy...
      • 5 Free Online Courses To Learn Artificial Intellig...
      • Vsftpd Backdoor - Ekoparty Prectf - Amn3S1A Team
      • U.S Defence Warns Of 3 New Malware Used By North K...
      • Vlang Binary Debugging
      • TLS V1.2 Sigalgs Remote Crash (CVE-2015-0291)
      • EasySploit: A Metasploit Automation Bash Scripts T...
      • You're now friends with Laura Airo! See her photos...
      • Extending Your Ganglia Install With The Remote Cod...
      • BeEF: Browser Exploitation Framework
      • Change Passwords Regularly - A Myth And A Lie, Don...
      • Many Ways Of Malware Persistence (That You Were Al...
      • Samurai: Web Testing Framework
      • Android SSHControl V1.0 Relased!!!
      • Antonio Forleo is a new friend suggestion for you
      • The RastaLabs Experience
      • Learning Web Pentesting With DVWA Part 2: SQL Inje...
      • Learning Web Pentesting With DVWA Part 5: Using Fi...
      • OWASP Announcement
      • Over 4000 Android Apps Expose Users' Data Via Misc...
      • CEH: 10 Hacking Tools For Hackers
      • $$$ Bug Bounty $$$
      • Linux Stack Protection By Default
      • "I Am Lady" Linux.Lady Trojan Samples
      • 📄 Maurizio Meggiato posted an update
      • Wafw00F: The Web Application Firewall Fingerprinti...
      • Wafw00F: The Web Application Firewall Fingerprinti...
      • Linux Command Line Hackery Series - Part 6
      • Reversing Some C++ Io Operations
      • How To Insert Data Into Database | Tutorial 3
      • How To Recover Files That Are Deleted From Recycle...
      • PHASES OF HACKING
      • DOWNLOAD BLACKMART ANDROID APP – DOWNLOAD PLAYSTOR...
      • 📄 Aldo Liuzzi posted an update
      • OSIF: An Open Source Facebook Information Gatherin...
      • $$$ Bug Bounty $$$
      • DOWNLOAD BLACK STEALER V2.1 FULL
      • OWASP-ZSC: A Shellcode/Obfuscate Customized Code G...
      • DOWNLOAD SENTRY MBA V1.4.1 – AUTOMATED ACCOUNT CRA...
      • FOOTPRITING AND INFORMATION GATHERING USED IN HACKING
      • Linux Command Line Hackery Series - Part 6
      • Learning Web Pentesting With DVWA Part 4: XSS (Cro...
      • Wafw00F: The Web Application Firewall Fingerprinti...
      • 📷 Hamit Cotto added a new photo
      • PDFex: Major Security Flaws In PDF Encryption
      • How I Hacked My IP Camera, And Found This Backdoor...
      • wpCrack - Wordpress Hash Cracker
      • WHY WE DO HACKING?
      • Spaghetti: A Website Applications Security Scanner
      • HOW TO BECOME A CERTIFIED ETHICAL HACKER
      • HOW TO BECOME A CERTIFIED ETHICAL HACKER
      • 🔔 See Vito Battista's photo tag and other notific...
      • Best Hacking Tools
      • CORS Misconfigurations On A Large Scale
      • Aircrack-ng: The Next Generation Of Aircrack
      • Novell Zenworks MDM: Mobile Device Management For ...
      • Snmpcheck
      • KillShot: A PenTesting Framework, Information Gath...
      • 📷 Antonio Caforio added a new photo
      • 📄 Judika Lumban Toruan shared Purba Pa Gio's post
      • Download Here They Lie For PS4
      • The Black Gate: Wee Britain
    • ►  4月 (66)
    • ►  3月 (32)
    • ►  2月 (20)
  • ►  2019 (1130)
    • ►  12月 (10)
    • ►  11月 (63)
    • ►  10月 (1)
    • ►  9月 (173)
    • ►  8月 (311)
    • ►  7月 (282)
    • ►  6月 (223)
    • ►  5月 (52)
    • ►  4月 (3)
    • ►  3月 (12)
  • ►  2018 (6)
    • ►  6月 (3)
    • ►  4月 (1)
    • ►  1月 (2)
  • ►  2017 (46)
    • ►  12月 (12)
    • ►  11月 (4)
    • ►  10月 (13)
    • ►  9月 (9)
    • ►  8月 (1)
    • ►  7月 (6)
    • ►  6月 (1)
  • ►  2016 (5)
    • ►  7月 (1)
    • ►  1月 (4)
  • ►  2015 (2)
    • ►  4月 (2)
  • ►  2014 (8)
    • ►  4月 (2)
    • ►  3月 (4)
    • ►  1月 (2)
  • ►  2013 (3)
    • ►  8月 (2)
    • ►  1月 (1)
  • ►  2012 (1)
    • ►  9月 (1)
  • ►  2009 (3)
    • ►  10月 (1)
    • ►  9月 (1)
    • ►  6月 (1)
  • ►  2008 (97)
    • ►  10月 (4)
    • ►  9月 (11)
    • ►  5月 (37)
    • ►  3月 (31)
    • ►  2月 (14)
  • ►  2007 (77)
    • ►  11月 (49)
    • ►  10月 (5)
    • ►  9月 (23)