• Hack MySql database using kali linux. [full db access]

    Don't try it on public website. I have done this experiment on my own website. The aim of this video is to teach ethical hacking.

    published: 27 Oct 2015
  • How to hack a Facebook ID | reference by fb/uncensored db

    published: 28 Nov 2016
  • Introduction to the Google Hacking Database (GHDB)

    An introduction to the Google Hacking Database (GHDB) https://www.exploit-db.com/google-hacking-database/ Subscribe! http://goo.gl/0HBjNX Facebook: http://goo.gl/ja3Q7i Twitter (YouTube): http://goo.gl/ffC9az Personal Twitter: https://goo.gl/il2VdX Instagram: http://goo.gl/MXgYq6 Google+: http://goo.gl/m0zrwg ╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗ ║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣ ╠╗║╚╝║║╠╗║╚╣║║║║║═╣ ╚═╩══╩═╩═╩═╩╝╚╩═╩═╝ ┈┈┈┈┈┈▕▔╲┈┈┈┈┈┈ ┈┈┈┈┈┈┈▏▕┈┈┈┈┈┈ ┈┈┈┈┈┈┈▏▕▂▂▂┈┈┈ ▂▂▂▂▂▂╱┈▕▂▂▂▏┈┈ ▉▉▉▉▉┈┈┈▕▂▂▂▏┈┈ ▉▉▉▉▉┈┈┈▕▂▂▂▏┈┈ ▔▔▔▔▔▔╲▂▕▂▂▂ THUMBS UP!

    published: 24 Nov 2016
  • DB Hacking - Oracle

    Проверяем на прочность Oracle RDBMS ODAT (Oracle Database Attacking Tool) https://github.com/quentinhardy/odat

    published: 06 Nov 2015
  • Hacking with Google

    Visit https://bugcrowd.com/jackktutorials to get started in your security research career! Remember to Like, Comment and Subscribe if you enjoyed the video! Also share if you know someone who would also like this video! Please disable Adblock to help me and other YouTubers out! Want to ask me a question? Post it on my forum thread here: http://bit.ly/AskJackkTutorials - Every Saturday I do Ask Me! In this video we find potential targets with Google Dorks ▂▃▅▆▇█ Resources used in this video █▇▆▅▃▂ http://www.acunetix.com/websitesecurity/google-hacking/ http://www.informit.com/articles/article.aspx?p=170880 https://www.exploit-db.com/google-hacking-database/ ▂▃▅▆▇█ Contact Details █▇▆▅▃▂ Email (Jackk): admin@jackktutorials.com Website: http://www.jackktutorials.com Forums: http://w...

    published: 09 Nov 2016
  • Metasploit Tutorial-6 (download and run exploits from exploit-db)

    Hello guys. We are the hacking monks. Here is our blog – http://www.hackingmonks.net/p/home.html Here is our Facebook Page - https://www.facebook.com/Hacking-Monks-1589849474562976/?ref=settings

    published: 29 Nov 2016
  • [Hindi] Whatsapp Hack: Decrypt Database Read All MSG, Photos and Video,

    Today I will be showing to you that How We can decrypt our whatsapp's encrypt database[both Root & Unroot Phone] and read all massages, photos & videos. Please subscribe our channel https://goo.gl/SKDRBp Please follow me also on twitter: https://twitter.com/techchipnet facebook: https://facebook.com/techchip

    published: 21 Dec 2016
  • DB Xenoverse 2 - Hacker at Ranked... FUN

    well first time encountering a hacker... feeling bad it HAD to be a ranked match

    published: 31 Oct 2016
  • Whatsapp Hacking Reality | Can Whatsapp Hack ? Db Tech update

    Hack Whatsapp Account ?? Really How Youtuber Making fool of you ? Whatsapp Hacking Reality | Can Whatsapp Hack ? Db Tech update Hello Dosto Welcome back to Db Tech Update Aaj me apko btaonga ki aap kisi ka bhi whatsapp account hack kr sakte ho ya nhi aur nhi to kyu nhi kr sakte. Puri detailt in hindi i hope apko ye video pasand ayegi Related Keyword: Hack Whatsapp without scan Hack Whatsapp Messages without victim Phone Hack whatsapp account without qr code whatsapp hacker without sacn hack whatsapp account without qr code hack whatsapp account without human verification hack whatsapp account how to read friends whatsapp chat how to hack whatsapp account

    published: 18 Feb 2018
  • DB Hacking - MySQL

    MySQL под прицелом https://github.com/mysqludf/lib_mysqludf_sys

    published: 27 Nov 2015
  • Arbitrary File Upload Vulnerabilities - How to Use Them to Hack Website and How to Protect Your Site

    Reminder: DO NOT TRY THIS ON SITES YOU DON'T OWN! Weevely PHP Shell Tutorial: https://www.youtube.com/watch?v=Hogwye-vQqc&t=87s Exploit Database: http://www.exploit-db.com

    published: 10 Mar 2017
  • Roblox Phantom Forces - Playing with a Hacker

    Link to Sharktooth's channel: https://www.youtube.com/channel/UCtjBM5EMR7YPKUt7OCx53MA In this video, I run across a hacker. I've never seen anyone hack like this before. Music: Recession by Main Reaktor (https://youtu.be/8ciZGNmlWgo) Thanks for watching and I hope you enjoyed! :) If you did, I'd appreciate it if you'd leave a like and/or comment either giving feedback, suggestions for future videos, asking questions, or whatever else you feel like. I reply to every comment as soon as I can. :) Subscribe if you want more. I usually upload two videos a day. :) Follow AgentJohn2 on Roblox to keep up with what is going on with the channel! :D Play the game for yourself here: http://www.roblox.com/games/292439477/view?rbxp=13411843

    published: 12 Mar 2016
  • What is Exploit-db? | Hacker's favourite Website?

    In this video I've shown u what exploit-db is.. This site is very good to find exploits which will help in your Bug hunting :) Please Like and subscribe Visit my Channel for more tutorials: youtube.com/dhrubajyotidey KEYWORDS: exploit db tutorial, exploit db kali linux, exploit db google dorks, exploit db kali, exploit db metasploit, exploit db apache 2.4.7, exploit db joomla, exploit db, exploit db phpliteadmin, exploit db phpmyadmin

    published: 01 Dec 2017
  • Google Hacking Database - Exploit-DB

    Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. The Google Hacking Database (GHDB) is a database of queries that identify sensitive data. It is for educational purpose only.... Thanks for watching... Like share & subscribe.....

    published: 14 Mar 2017
  • DB Hacking - MongoDB

    Ситуация в мире NoSQL https://github.com/tcstool/NoSQLMap https://github.com/torque59/Nosql-Exploitation-Framework

    published: 04 Dec 2015
  • Database Hacking: Direct Database Access SQL Injection Attack

    SQL injection is usually a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands inside these parameters. The result is that the attacker can execute arbitrary SQL queries and/or commands on the backend database server through the Web application. In this example, the database is attacked directly by a non-privileged user through direct interaction with the database - not through a Web application.

    published: 13 Aug 2009
  • Hacking with Google and exploit-db.com.avi

    My first hacking video a brief tour of exploit-db.com and some of the things that can be found on exploit-db.com. Suprisingly it is amazingly easy to view confidential information on the inernet through google and exploit-db.com. Within minutes I was able to find usernames and passwords and confidential configuration information.

    published: 24 Jul 2012
  • SKILL Special Force 2 Amazing vs db' [HACKER LukasL]

    I mamy kolejne cw z odpałem no ale nie poddajemy się :) No i oczywiscie zostały bardzo szybko podjęte odpowiednie kroki co delikwenta :) Witaj, jeśli film ci się spodobał możesz ale nie musisz, dać tą łape w górę :) Jeśli chcesz zobaczyć więcej materiałów zasubskrybuj mój kanał. -- Fanpage: http://tnij.xyz/9bx

    published: 02 Jan 2017
  • How to hack a website database

    Get a website database with sql injections If someone need help, then just send me an email at: stavrinhack@yahoo.com In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment,or to evaluate those weaknesses to assist in removing them. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community. While other uses of the word hacker exist that are related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the longstanding hacker def...

    published: 30 May 2013
  • DB Hacking - MS SQL

    Классическое противостояние MS SQL и Metasploit

    published: 13 Nov 2015
  • DB hacker cleanerTM

    published: 19 May 2015
  • syebrexv3 DB hacker

    published: 09 Jun 2015
  • SILENCE [dB] -- Coeur Hacker

    Maquette audio

    published: 16 May 2016
  • wordpress Site Hacking By Config php File

    This is Tutorial for Hacking Wordpress Site by config file .Its i did with Kali Linux , But its also can done with windows. With this method you can easily download wp-config.php files from these wordpress sites. This vulnerability is file download vulnerability . And with this exploit you can download config files from these types of website . And the config file is , wp-config.php , this is the main file which connected with wordpress database . I also give here the dork and exploit for use yourself . But Remember , these things are only for educational purpose , please never do any bad use. Dork : inurl:/wp-content/plugins/revslider/ Exploit : /wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php

    published: 17 Apr 2015
developed with YouTube
Hack  MySql database using kali linux. [full db access]

Hack MySql database using kali linux. [full db access]

  • Order:
  • Duration: 6:12
  • Updated: 27 Oct 2015
  • views: 33684
videos
Don't try it on public website. I have done this experiment on my own website. The aim of this video is to teach ethical hacking.
https://wn.com/Hack_Mysql_Database_Using_Kali_Linux._Full_Db_Access
How to hack a Facebook ID  | reference by fb/uncensored db

How to hack a Facebook ID | reference by fb/uncensored db

  • Order:
  • Duration: 19:38
  • Updated: 28 Nov 2016
  • views: 945
videos
https://wn.com/How_To_Hack_A_Facebook_Id_|_Reference_By_Fb_Uncensored_Db
Introduction to the Google Hacking Database (GHDB)

Introduction to the Google Hacking Database (GHDB)

  • Order:
  • Duration: 9:01
  • Updated: 24 Nov 2016
  • views: 7325
videos
An introduction to the Google Hacking Database (GHDB) https://www.exploit-db.com/google-hacking-database/ Subscribe! http://goo.gl/0HBjNX Facebook: http://goo.gl/ja3Q7i Twitter (YouTube): http://goo.gl/ffC9az Personal Twitter: https://goo.gl/il2VdX Instagram: http://goo.gl/MXgYq6 Google+: http://goo.gl/m0zrwg ╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗ ║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣ ╠╗║╚╝║║╠╗║╚╣║║║║║═╣ ╚═╩══╩═╩═╩═╩╝╚╩═╩═╝ ┈┈┈┈┈┈▕▔╲┈┈┈┈┈┈ ┈┈┈┈┈┈┈▏▕┈┈┈┈┈┈ ┈┈┈┈┈┈┈▏▕▂▂▂┈┈┈ ▂▂▂▂▂▂╱┈▕▂▂▂▏┈┈ ▉▉▉▉▉┈┈┈▕▂▂▂▏┈┈ ▉▉▉▉▉┈┈┈▕▂▂▂▏┈┈ ▔▔▔▔▔▔╲▂▕▂▂▂ THUMBS UP!
https://wn.com/Introduction_To_The_Google_Hacking_Database_(Ghdb)
DB Hacking - Oracle

DB Hacking - Oracle

  • Order:
  • Duration: 14:30
  • Updated: 06 Nov 2015
  • views: 8113
videos
Проверяем на прочность Oracle RDBMS ODAT (Oracle Database Attacking Tool) https://github.com/quentinhardy/odat
https://wn.com/Db_Hacking_Oracle
Hacking with Google

Hacking with Google

  • Order:
  • Duration: 12:00
  • Updated: 09 Nov 2016
  • views: 219179
videos
Visit https://bugcrowd.com/jackktutorials to get started in your security research career! Remember to Like, Comment and Subscribe if you enjoyed the video! Also share if you know someone who would also like this video! Please disable Adblock to help me and other YouTubers out! Want to ask me a question? Post it on my forum thread here: http://bit.ly/AskJackkTutorials - Every Saturday I do Ask Me! In this video we find potential targets with Google Dorks ▂▃▅▆▇█ Resources used in this video █▇▆▅▃▂ http://www.acunetix.com/websitesecurity/google-hacking/ http://www.informit.com/articles/article.aspx?p=170880 https://www.exploit-db.com/google-hacking-database/ ▂▃▅▆▇█ Contact Details █▇▆▅▃▂ Email (Jackk): admin@jackktutorials.com Website: http://www.jackktutorials.com Forums: http://www.jackktutorials.com/forums ▂▃▅▆▇█Music used in this video █▇▆▅▃ Intro - Mr Robot Main Theme - https://www.youtube.com/watch?v=sBRrwgQLP2g
https://wn.com/Hacking_With_Google
Metasploit Tutorial-6 (download and run exploits from exploit-db)

Metasploit Tutorial-6 (download and run exploits from exploit-db)

  • Order:
  • Duration: 5:28
  • Updated: 29 Nov 2016
  • views: 13223
videos
Hello guys. We are the hacking monks. Here is our blog – http://www.hackingmonks.net/p/home.html Here is our Facebook Page - https://www.facebook.com/Hacking-Monks-1589849474562976/?ref=settings
https://wn.com/Metasploit_Tutorial_6_(Download_And_Run_Exploits_From_Exploit_Db)
[Hindi] Whatsapp Hack: Decrypt Database Read All MSG, Photos and Video,

[Hindi] Whatsapp Hack: Decrypt Database Read All MSG, Photos and Video,

  • Order:
  • Duration: 8:10
  • Updated: 21 Dec 2016
  • views: 131475
videos
Today I will be showing to you that How We can decrypt our whatsapp's encrypt database[both Root & Unroot Phone] and read all massages, photos & videos. Please subscribe our channel https://goo.gl/SKDRBp Please follow me also on twitter: https://twitter.com/techchipnet facebook: https://facebook.com/techchip
https://wn.com/Hindi_Whatsapp_Hack_Decrypt_Database_Read_All_Msg,_Photos_And_Video,
DB Xenoverse 2 - Hacker at Ranked... FUN

DB Xenoverse 2 - Hacker at Ranked... FUN

  • Order:
  • Duration: 1:51
  • Updated: 31 Oct 2016
  • views: 2578
videos
well first time encountering a hacker... feeling bad it HAD to be a ranked match
https://wn.com/Db_Xenoverse_2_Hacker_At_Ranked..._Fun
Whatsapp Hacking Reality | Can Whatsapp Hack ? Db Tech update

Whatsapp Hacking Reality | Can Whatsapp Hack ? Db Tech update

  • Order:
  • Duration: 3:25
  • Updated: 18 Feb 2018
  • views: 22
videos
Hack Whatsapp Account ?? Really How Youtuber Making fool of you ? Whatsapp Hacking Reality | Can Whatsapp Hack ? Db Tech update Hello Dosto Welcome back to Db Tech Update Aaj me apko btaonga ki aap kisi ka bhi whatsapp account hack kr sakte ho ya nhi aur nhi to kyu nhi kr sakte. Puri detailt in hindi i hope apko ye video pasand ayegi Related Keyword: Hack Whatsapp without scan Hack Whatsapp Messages without victim Phone Hack whatsapp account without qr code whatsapp hacker without sacn hack whatsapp account without qr code hack whatsapp account without human verification hack whatsapp account how to read friends whatsapp chat how to hack whatsapp account
https://wn.com/Whatsapp_Hacking_Reality_|_Can_Whatsapp_Hack_Db_Tech_Update
DB Hacking - MySQL

DB Hacking - MySQL

  • Order:
  • Duration: 9:09
  • Updated: 27 Nov 2015
  • views: 6080
videos
MySQL под прицелом https://github.com/mysqludf/lib_mysqludf_sys
https://wn.com/Db_Hacking_Mysql
Arbitrary File Upload Vulnerabilities - How to Use Them to Hack Website and How to Protect Your Site

Arbitrary File Upload Vulnerabilities - How to Use Them to Hack Website and How to Protect Your Site

  • Order:
  • Duration: 9:19
  • Updated: 10 Mar 2017
  • views: 3186
videos
Reminder: DO NOT TRY THIS ON SITES YOU DON'T OWN! Weevely PHP Shell Tutorial: https://www.youtube.com/watch?v=Hogwye-vQqc&t=87s Exploit Database: http://www.exploit-db.com
https://wn.com/Arbitrary_File_Upload_Vulnerabilities_How_To_Use_Them_To_Hack_Website_And_How_To_Protect_Your_Site
Roblox Phantom Forces - Playing with a Hacker

Roblox Phantom Forces - Playing with a Hacker

  • Order:
  • Duration: 8:02
  • Updated: 12 Mar 2016
  • views: 340782
videos
Link to Sharktooth's channel: https://www.youtube.com/channel/UCtjBM5EMR7YPKUt7OCx53MA In this video, I run across a hacker. I've never seen anyone hack like this before. Music: Recession by Main Reaktor (https://youtu.be/8ciZGNmlWgo) Thanks for watching and I hope you enjoyed! :) If you did, I'd appreciate it if you'd leave a like and/or comment either giving feedback, suggestions for future videos, asking questions, or whatever else you feel like. I reply to every comment as soon as I can. :) Subscribe if you want more. I usually upload two videos a day. :) Follow AgentJohn2 on Roblox to keep up with what is going on with the channel! :D Play the game for yourself here: http://www.roblox.com/games/292439477/view?rbxp=13411843
https://wn.com/Roblox_Phantom_Forces_Playing_With_A_Hacker
What is Exploit-db? | Hacker's favourite Website?

What is Exploit-db? | Hacker's favourite Website?

  • Order:
  • Duration: 10:55
  • Updated: 01 Dec 2017
  • views: 285
videos
In this video I've shown u what exploit-db is.. This site is very good to find exploits which will help in your Bug hunting :) Please Like and subscribe Visit my Channel for more tutorials: youtube.com/dhrubajyotidey KEYWORDS: exploit db tutorial, exploit db kali linux, exploit db google dorks, exploit db kali, exploit db metasploit, exploit db apache 2.4.7, exploit db joomla, exploit db, exploit db phpliteadmin, exploit db phpmyadmin
https://wn.com/What_Is_Exploit_Db_|_Hacker's_Favourite_Website
Google Hacking Database - Exploit-DB

Google Hacking Database - Exploit-DB

  • Order:
  • Duration: 4:20
  • Updated: 14 Mar 2017
  • views: 2268
videos
Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. The Google Hacking Database (GHDB) is a database of queries that identify sensitive data. It is for educational purpose only.... Thanks for watching... Like share & subscribe.....
https://wn.com/Google_Hacking_Database_Exploit_Db
DB Hacking - MongoDB

DB Hacking - MongoDB

  • Order:
  • Duration: 10:00
  • Updated: 04 Dec 2015
  • views: 4717
videos
Ситуация в мире NoSQL https://github.com/tcstool/NoSQLMap https://github.com/torque59/Nosql-Exploitation-Framework
https://wn.com/Db_Hacking_Mongodb
Database Hacking:  Direct Database Access SQL Injection Attack

Database Hacking: Direct Database Access SQL Injection Attack

  • Order:
  • Duration: 2:50
  • Updated: 13 Aug 2009
  • views: 91688
videos
SQL injection is usually a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a backend database. Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands inside these parameters. The result is that the attacker can execute arbitrary SQL queries and/or commands on the backend database server through the Web application. In this example, the database is attacked directly by a non-privileged user through direct interaction with the database - not through a Web application.
https://wn.com/Database_Hacking_Direct_Database_Access_Sql_Injection_Attack
Hacking with Google and exploit-db.com.avi

Hacking with Google and exploit-db.com.avi

  • Order:
  • Duration: 14:50
  • Updated: 24 Jul 2012
  • views: 13499
videos
My first hacking video a brief tour of exploit-db.com and some of the things that can be found on exploit-db.com. Suprisingly it is amazingly easy to view confidential information on the inernet through google and exploit-db.com. Within minutes I was able to find usernames and passwords and confidential configuration information.
https://wn.com/Hacking_With_Google_And_Exploit_Db.Com.Avi
SKILL Special Force 2  Amazing vs db' [HACKER LukasL]

SKILL Special Force 2 Amazing vs db' [HACKER LukasL]

  • Order:
  • Duration: 20:45
  • Updated: 02 Jan 2017
  • views: 707
videos
I mamy kolejne cw z odpałem no ale nie poddajemy się :) No i oczywiscie zostały bardzo szybko podjęte odpowiednie kroki co delikwenta :) Witaj, jeśli film ci się spodobał możesz ale nie musisz, dać tą łape w górę :) Jeśli chcesz zobaczyć więcej materiałów zasubskrybuj mój kanał. -- Fanpage: http://tnij.xyz/9bx
https://wn.com/Skill_Special_Force_2_Amazing_Vs_Db'_Hacker_Lukasl
How to hack a website database

How to hack a website database

  • Order:
  • Duration: 5:00
  • Updated: 30 May 2013
  • views: 143145
videos
Get a website database with sql injections If someone need help, then just send me an email at: stavrinhack@yahoo.com In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment,or to evaluate those weaknesses to assist in removing them. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community. While other uses of the word hacker exist that are related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the longstanding hacker definition controversy about the term's true meaning. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone who breaks into computers, whether computer criminal (black hats) or computer security expert (white hats). is more appropriately called a cracker instead. Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called "crackers". how to hack a website sql injections tutorial mysql database website database
https://wn.com/How_To_Hack_A_Website_Database
DB Hacking - MS SQL

DB Hacking - MS SQL

  • Order:
  • Duration: 5:06
  • Updated: 13 Nov 2015
  • views: 2699
videos
Классическое противостояние MS SQL и Metasploit
https://wn.com/Db_Hacking_Ms_Sql
DB hacker cleanerTM

DB hacker cleanerTM

  • Order:
  • Duration: 1:36
  • Updated: 19 May 2015
  • views: 180
videos
https://wn.com/Db_Hacker_Cleanertm
syebrexv3 DB hacker

syebrexv3 DB hacker

  • Order:
  • Duration: 0:12
  • Updated: 09 Jun 2015
  • views: 8
videos
https://wn.com/Syebrexv3_Db_Hacker
SILENCE [dB] -- Coeur Hacker

SILENCE [dB] -- Coeur Hacker

  • Order:
  • Duration: 3:34
  • Updated: 16 May 2016
  • views: 53
videos
Maquette audio
https://wn.com/Silence_Db_Coeur_Hacker
wordpress Site Hacking By Config php File

wordpress Site Hacking By Config php File

  • Order:
  • Duration: 8:21
  • Updated: 17 Apr 2015
  • views: 129636
videos
This is Tutorial for Hacking Wordpress Site by config file .Its i did with Kali Linux , But its also can done with windows. With this method you can easily download wp-config.php files from these wordpress sites. This vulnerability is file download vulnerability . And with this exploit you can download config files from these types of website . And the config file is , wp-config.php , this is the main file which connected with wordpress database . I also give here the dork and exploit for use yourself . But Remember , these things are only for educational purpose , please never do any bad use. Dork : inurl:/wp-content/plugins/revslider/ Exploit : /wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
https://wn.com/Wordpress_Site_Hacking_By_Config_Php_File
×