Web Server Statistics for VM's sites

Program started at Sun-02-Apr-2023 00:39.
Analysed requests from Mon-02-Jan-2023 00:00 to Sun-02-Apr-2023 00:00 (90.00 days).

General Summary

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report contains overall statistics.

Figures in parentheses refer to the 7-day period ending 02-Apr-2023 00:39.

Successful requests: 778,682 (70,230)
Average successful requests per day: 8,652 (10,032)
Successful requests for pages: 484,793 (55,948)
Average successful requests for pages per day: 5,386 (7,992)
Failed requests: 13,853 (1,562)
Redirected requests: 21,311 (1,724)
Distinct files requested: 446,732 (52,083)
Distinct hosts served: 17,932 (3,848)
Corrupt logfile lines: 1,237
Unwanted logfile entries: 7,288,413
Data transferred: 87.22 gigabytes (5.79 gigabytes)
Average data transferred per day: 992.41 megabytes (847.10 megabytes)

Monthly Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the activity in each month.

Each unit (+) represents 6,000 requests for pages or part thereof.

monthreqspages 
Jan 2023285484200811++++++++++++++++++++++++++++++++++
Feb 202317157465763+++++++++++
Mar 2023311144208743+++++++++++++++++++++++++++++++++++
Apr 2023104809476++

Busiest month: Mar 2023 (208,743 requests for pages).

Weekly Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the activity in each week.

Each unit (+) represents 5,000 requests for pages or part thereof.

week beg.reqspages 
1/Jan/23382198400++
8/Jan/233369615845++++
15/Jan/23172667155999++++++++++++++++++++++++++++++++
22/Jan/232497510988+++
29/Jan/233663219194++++
5/Feb/232949713530+++
12/Feb/235817127122++++++
19/Feb/235019911143+++
26/Feb/233097612059+++
5/Mar/235147625075++++++
12/Mar/2310871081714+++++++++++++++++
19/Mar/237316247766++++++++++
26/Mar/237029655952++++++++++++
2/Apr/2366+

Busiest week: week beginning 15/Jan/23 (155,999 requests for pages).

Daily Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the activity in each day.

Each unit (+) represents 500 requests for pages or part thereof.

datereqspages 
20/Feb/2367611610++++
21/Feb/2371771360+++
22/Feb/2367941661++++
23/Feb/2352081267+++
24/Feb/2372041332+++
25/Feb/2383851597++++
    
26/Feb/2349381373+++
27/Feb/2335841242+++
28/Feb/2344801738++++
1/Mar/2330551268+++
2/Mar/2346511876++++
3/Mar/2344111545++++
4/Mar/2358573017+++++++
    
5/Mar/2350751674++++
6/Mar/23137549016+++++++++++++++++++
7/Mar/2370682131+++++
8/Mar/2370251765++++
9/Mar/2345301915++++
10/Mar/2336491423+++
11/Mar/23103757151+++++++++++++++
    
12/Mar/231436112332+++++++++++++++++++++++++
13/Mar/231627814038+++++++++++++++++++++++++++++
14/Mar/231651311999++++++++++++++++++++++++
15/Mar/23150179489+++++++++++++++++++
16/Mar/231654312041+++++++++++++++++++++++++
17/Mar/231451610661++++++++++++++++++++++
18/Mar/231548211154+++++++++++++++++++++++
    
19/Mar/231771513262+++++++++++++++++++++++++++
20/Mar/231850211675++++++++++++++++++++++++
21/Mar/23120308385+++++++++++++++++
22/Mar/231416710117+++++++++++++++++++++
23/Mar/2337391441+++
24/Mar/2332841344+++
25/Mar/2337251542++++
    
26/Mar/2329581103+++
27/Mar/2375534128+++++++++
28/Mar/2361182573++++++
29/Mar/2395437527++++++++++++++++
30/Mar/231563014331+++++++++++++++++++++++++++++
31/Mar/231802016820++++++++++++++++++++++++++++++++++
1/Apr/23104749470+++++++++++++++++++
    
2/Apr/2366+

Busiest day: 19/Jan/23 (54,802 requests for pages).

Daily Summary

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the total activity for each day of the week, summed over all the weeks in the report.

Each unit (+) represents 3,000 requests for pages or part thereof.

dayreqspages 
Sun8518051600++++++++++++++++++
Mon10782264331++++++++++++++++++++++
Tue11233065298++++++++++++++++++++++
Wed13935991817+++++++++++++++++++++++++++++++
Thu149959109517+++++++++++++++++++++++++++++++++++++
Fri9444851061++++++++++++++++++
Sat8958451169++++++++++++++++++

Hourly Summary

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the total activity for each hour of the day, summed over all the days in the report.

Each unit (+) represents 600 requests for pages or part thereof.

hourreqspages 
03333822375++++++++++++++++++++++++++++++++++++++
13850126310++++++++++++++++++++++++++++++++++++++++++++
23632722767++++++++++++++++++++++++++++++++++++++
33313220321++++++++++++++++++++++++++++++++++
43369519896++++++++++++++++++++++++++++++++++
53276319673+++++++++++++++++++++++++++++++++
62883316976+++++++++++++++++++++++++++++
72979617453++++++++++++++++++++++++++++++
82972618251+++++++++++++++++++++++++++++++
93330317789++++++++++++++++++++++++++++++
103385818404+++++++++++++++++++++++++++++++
113175618503+++++++++++++++++++++++++++++++
123276619192++++++++++++++++++++++++++++++++
133240419531+++++++++++++++++++++++++++++++++
142882918419+++++++++++++++++++++++++++++++
153061618818++++++++++++++++++++++++++++++++
163354418602++++++++++++++++++++++++++++++++
172846418060+++++++++++++++++++++++++++++++
183173421326++++++++++++++++++++++++++++++++++++
193122921127++++++++++++++++++++++++++++++++++++
203171321294++++++++++++++++++++++++++++++++++++
213374522770++++++++++++++++++++++++++++++++++++++
223522922484++++++++++++++++++++++++++++++++++++++
233338124452+++++++++++++++++++++++++++++++++++++++++

Domain Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the countries of the computers which requested files.

Listing domains, sorted by the amount of traffic.

reqs%bytesdomain
778682100%[unresolved numerical addresses]

Organisation Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the organisations of the computers which requested files.

Listing the top 20 organisations by the number of requests, sorted by the number of requests.

reqs%bytesorganisation
27276619.35%88
94371 7.19%216.244
75739 5.87%64.124
71290 7.04%114
18371 0.80%54
16768 2.32%52
12702 0.83%65.21
12545 0.84%135.181
12258 8.46%66.249
11026 0.76%217.113
10690 0.73%23
10666 1.21%3
8841 2.81%40
7020 0.46%81.170
5158 0.68%207.46
3769 0.28%64.62
3757 1.27%77
3358 0.26%45
3254 1.42%95
3167 0.54%157.55
12116636.88%[not listed: 2,133 organisations]

Host Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the computers which requested files.

Listing the top 50 hosts by the number of requests, sorted alphabetically.

reqs%byteshost
9858 0.67%3.224.220.101
635 1.38%14.97.145.94
10013 0.68%23.22.35.162
887 0.08%40.77.167.161
737 0.09%40.77.167.221
858 0.10%40.77.167.232
1289 0.19%40.77.167.251
2492 0.13%45.63.53.35
9883 0.67%52.70.240.171
1103 0.13%52.167.144.26
727 0.20%52.167.144.43
645 0.12%52.167.144.94
1302 0.12%64.62.252.162
728 0.06%64.62.252.163
1133 0.09%64.62.252.174
2922 0.20%64.124.8.23
1222 0.08%64.124.8.25
3201 0.27%64.124.8.28
8896 0.69%64.124.8.29
3263 0.23%64.124.8.30
2782 0.20%64.124.8.31
3447 0.25%64.124.8.48
9358 0.71%64.124.8.49
4484 0.41%64.124.8.50
3342 0.24%64.124.8.51
5151 0.39%64.124.8.52
6169 0.49%64.124.8.53
4162 0.36%64.124.8.54
7670 0.59%64.124.8.55
3218 0.27%64.124.8.56
3869 0.34%64.124.8.57
12499 0.82%65.21.35.231
811 0.07%66.160.140.183
778 0.06%66.160.140.184
663 0.43%66.249.70.59
640 0.50%66.249.70.61
1358 0.28%79.174.34.117
7020 0.46%81.170.128.52
7331 0.97%88.99.244.56
26456918.24%88.198.158.233
12497 0.82%135.181.137.62
783 157.90.181.146
2168 0.01%157.90.181.219
2495 0.13%167.172.182.251
681 0.08%194.187.251.155
658 0.01%199.47.82.20
852 199.47.82.21
813 0.95%211.249.246.182
1958 0.56%213.208.173.66
94367 7.19%216.244.66.243
25029557.97%[not listed: 17,882 hosts]

Referrer Report

(Go To: Top | General Summary | Monthly Report | Weekly Report | Daily Report | Daily Summary | Hourly Summary | Domain Report | Organisation Report | Host Report | Referrer Report | Search Query Report | Search Word Report | Browser Summary | Operating System Report | Status Code Report | File Size Report | File Type Report | Directory Report | Failure Report | Request Report)

This report lists the referrers (where people followed links from, or pages which included this site's images).

Listing referring URLs with at least 20 requests, sorted by the number of requests.

reqsURL
18958http://www.vad1.com/lab/pictures.html
13822http://www.vad1.com/
10  http://www.vad1.com/?fbclid=IwAR0dPKmm0fWKka6VMzcRu6duPFrGdAOrxgWBQSaGUACrnoHTa_SAfMmDC0k
10  http://www.vad1.com/?fbclid=IwAR1EegBOg-TZJld-CtY-h_R9QzMFhR2QM2Rd-SnRO6eNDE45OQvm9bpV-XU
11993http://www.vad1.com/lab/
3581http://www.vad1.com/photo/dirty-scanner/ls2000-cleaning/
3308http://www.vad1.com/lab/people.html
2986http://www.vad1.com/photo/dirty-scanner/
2694https://www.google.com/
1958http://www.vad1.com/c/lqpc/
1289http://www.vad1.com/stats/vad1.com.html
872http://www.russia.no/
828http://www.vad1.com/c/lqpc/6/
765http://www.vad1.com/photo/folldal/
758http://www.vad1.com/korean-blog/index-ru.html
704http://www.vad1.com/lab/hacking-commercial-quantum-cryptography-2010/
698http://www.vad1.com/lab/presentations/
624http://www.vad1.com/photo/family-archive/
620http://www.vad1.com/lab/publications.html
587http://66.39.24.47/
560http://www.vad1.com/photo/x-ray-exper.html
548http://www.vad1.com/lab/press/
539http://www.vad1.com/lab/full-eavesdropping-2011/
528http://www.vad1.com/c/qcomm/
456http://www.vad1.com/lab/news-archive.html
422http://www.vad1.com/lab/other.html
391http://www.vad1.com/c/lqpc/1/
377http://www.vad1.com/photo/lights-trondheim/
360http://www.vad1.com/spam.html
355http://www.vad1.com/continfo.html
348http://www.vad1.com/c/lqpc/3/
330http://www.vad1.com/publications/
292http://www.vad1.com/lab/publications/Lydersen-PhD-thesis-20110919.pdf
290http://www.vad1.com/c/qcommce/2022/Makarov/
253http://www.vad1.com/tcp-throughput-limit.html
249https://yandex.ru/
237http://www.vad1.com/photo/ultimate-photo-shoot/
235http://www.vad1.com/photo/
231http://www.vad1.com/photo/stock/
216http://www.vad1.com/hosting.html
203http://www.vad1.com/photo/stock/2000.html
197http://www.vad1.com/bio.html
196http://www.vad1.com/lab/torbjoern/
190http://www.vad1.com/photo/stock/1998.html
190http://www.vad1.com/photo/stock/1999.html
189http://vad1.com/
186http://www.vad1.com/photo/stock/hi-res.html
178http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/
174http://www.vad1.com/adhoc/20230320hnw/VID_20230318_185000.mp4
174http://www.vad1.com/photo/stock/2003.html
172http://www.vad1.com/c/lqpc/4/
168http://www.vad1.com/photo/lights-trondheim/pg3.html
158http://www.vad1.com/c/
151http://www.vad1.com/photo/lights-trondheim/pg2.html
139http://www.vad1.com/photo/autodof.html
129http://www.vad1.com/lab/conferences.html
127http://www.vad1.com/listfirm/
125http://www.vad1.com/photo/ultimate-photo-shoot/group.html
125http://www.vad1.com/favicon.ico
124http://www.vad1.com/listfirm/optcomp.html
104http://www.vad1.com/photo/stock/2001.html
103http://vad1.com/robots.txt
101http://www.vad1.com/c/qcommce/2022/Makarov/slides/
98https://darknetnews24.com/
97https://scholar.google.com/
97https://torplanets.net/
95http://www.vad1.com/c/qcomm/archive.html
95http://www.vad1.com/photo/moncal.html
93http://www.vad1.com/lab/pictures/
72  http://www.vad1.com/lab/pictures/?C=N;O=D
10  http://www.vad1.com/lab/pictures/?C=M;O=D
85http://baidu.com/
84https://www.google.ru/
81http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/presentations/conferences.html
81http://www.vad1.com/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-05.html
71http://10.130.201.67:6060/
71http://www.vad1.com/photo/folldal/index-ru.html
71http://www.vad1.com/c/qcommce/2022/
68http://www.vad1.com/photo/dirty-scanner/nikon-ls-2000-lubrication-guide.pdf
65http://www.vad1.com/c/lqpc/4/QRate-lab-manual-QKD-plug-and-play-v20200710.pdf
62https://duckduckgo.com/
61http://www.vad1.com/c/lqpc/4/lab-manual.pdf
61http://www.vad1.com/photo/dirty-scanner/minolta-dscd2-hotpixel.html
60http://www.vad1.com/photo/sky/
59http://www.pearsonimaging.com/
58http://www.vad1.com/photo/stock/2002.html
56http://www.vad1.com/c/lqpc/3/PM400-manual.pdf
55https://torplanets.com/
54http://www.vad1.com/qcr/
52http://www.vad1.com/administrator/
51http://www.vad1.com/dvd-buying-experience.html
50http://www.vad1.com/photo/winners/
50http://www.vad1.com/photo/stock/n65-35.html
49https://74foto.ru/raznoe/oczifrovka-plenki-35-mm-v-domashnih-usloviyah-skanirovanie-i-drugie-sposoby-kachestvennoj-oczifrovki-plenki-v-domashnih-usloviyah-svoimi-rukami.html
48http://www.vad1.com/photo/foundview/
45http://www.vad1.com/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-11.html
45http://www.vad1.com/photo/family-archive/vm-20081016-adresseavisen-1.html
43https://www.bing.com/
41http://www.shtengel.com/
41http://www.vad1.com/photo/stock/PerkinElmer-SPCM-AQR-13-FC-sn7272-manuf20011005-photos20080603-10.html
39http://www.vad1.com/photo/spotmeter.html
39http://www.vad1.com/photo/family-archive/20121212-Makarov.html
39http://www.vad1.com/c/lqpc/1/lab-manual.pdf
38http://www.vad1.com/photo/phd-defence-20070430/
38http://www.vad1.com/photo/stock/n65-35flare.html
36http://www.vad1.com/c/qcommce/
36http://66.39.24.47/favicon.ico
36https://www.youtube.com/
35http://www.vad1.com/photo/framing.html
35http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/
34http://freephotosh0p.net/
34http://vad1.com/favicon.ico
34http://www.vad1.com/photo/services-exper.html
34http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/press/
33http://www.vad1.com/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/press/
33http://www.vad1.com/photo/esn/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/pictures/press/full-eavesdropping-2011/
32http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/publications.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
32http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/pictures/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/conferences.html
32http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/people.html
32http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/conferences.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/press/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/full-eavesdropping-2011/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/
32http://www.vad1.com/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/pictures/press/press/hacking-commercial-quantum-cryptography-2010/presentations/people.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/pictures/hacking-commercial-quantum-cryptography-2010/
32http://www.vad1.com/lab/pictures.html/presentations/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
32http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/people.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/pictures/full-eavesdropping-2011/press/full-eavesdropping-2011/presentations/presentations/people.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/pictures/hacking-commercial-quantum-cryptography-2010/presentations/publications.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/pictures/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/conferences.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/pictures/conferences.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/presentations/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/pictures/full-eavesdropping-2011/conferences.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/full-eavesdropping-2011/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/pictures/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/people.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/publications.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/pictures/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/full-eavesdropping-2011/conferences.html
32http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/publications.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/full-eavesdropping-2011/people.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
32http://www.vad1.com/lab/pictures.html/press/press/presentations/press/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/presentations/
32http://www.vad1.com/lab/pictures.html/press/press/presentations/presentations/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/conferences.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/publications.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/full-eavesdropping-2011/
32http://www.vad1.com/photo/stock/200807-id3110-alice_sn08008F030-bob_sn08008F130.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/presentations/pictures/press/other.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/pictures/press/presentations/full-eavesdropping-2011/other.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/other.html
32http://www.vad1.com/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
32http://www.vad1.com/lab/pictures.html/press/press/presentations/full-eavesdropping-2011/
32http://www.vad1.com/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/hacking-commercial-quantum-cryptography-2010/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/press/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/pictures/presentations/press/conferences.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/presentations/press/press/full-eavesdropping-2011/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/
32http://www.vad1.com/lab/pictures.html/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/full-eavesdropping-2011/press/press/
32http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/publications.html
32http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/publications.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/pictures/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/other.html
32http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/press/pictures/people.html
31https://www.google.co.uk/
31https://forensicaccountingcorp.com/
31http://www.vad1.com/c/qcommce/2022/Sych/
30http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/
30http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/people.html
30http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/conferences.html
30http://www.vad1.com/lab/pictures.html/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/people.html
30http://www.vad1.com/c/qcommce/2021/Makarov/slides/
29https://pokerdom-cv3.top/
29http://webcache.googleusercontent.com/
28http://www.vad1.com/lab/pictures.html/presentations/press/presentations/pictures/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
28http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/
28https://www.google.de/
28https://pokerdom-cu4.top/
28http://www.vad1.com/photo/stock/2009.html
28http://www.vad1.com/c/lqpc/3/Grandway-series-manuals.pdf
28http://www.vad1.com/c/qcommce/2022/Kazieva/
27http://away.vk.com/
27https://omgomg1-ssylka.com/
27http://www.vad1.com/c/qcommce/2021/
27http://www.vad1.com/lab/alexey/
27http://www.vad1.com/c/qcommce/2021/Makarov/
26http://blog.laptop.org/
26http://www.vad1.com/c/qcommce/2022/Rodimin/
25http://www.vad1.com/lab/pictures.html/presentations/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/hacking-commercial-quantum-cryptography-2010/
25http://www.vad1.com/lab/full-eavesdropping-2011
25http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
25http://www.vad1.com/photo/perfect-slide-exp.html
25http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/presentations/
25http://www.vad1.com/c/qcommce/2022/Shakhovoy/
25http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
25http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/
25http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
25http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/
25http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/
25https://infomagaz.xyz/
25http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/
25android-app://org.telegram.messenger/
25http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/
25http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/pictures/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/press/pictures/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/pictures/hacking-commercial-quantum-cryptography-2010/presentations/presentations/other.html
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/pictures/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/presentations/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/pictures/press/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/pictures/presentations/press/press/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/pictures/press/full-eavesdropping-2011/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/pictures/press/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/pictures/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/publications.html
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/pictures/presentations/press/full-eavesdropping-2011/full-eavesdropping-2011/presentations/press/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/pictures/press/press/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/press/presentations/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/
24http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/pictures/press/press/hacking-commercial-quantum-cryptography-2010/presentations/press/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/
24http://www.vad1.com/photo/dirty-scanner/scan-comparo.html
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/pictures/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
24referer: http://www.vad1.com/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/presentations/press/hacking-commercial-quantum-cryptography-2010/presentations/
24http://www.vad1.com/photo/stock/a8-31.html
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/press/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/people.html
24http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/pictures/presentations/press/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/press/full-eavesdropping-2011/press/hacking-commercial-quantum-cryptography-2010/presentations/presentations/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/pictures/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
24https://pro-groshi.info/kredyty/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/pictures/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/pictures/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/press/
24http://www.vad1.com/lab/pictures.html/press/presentations/hacking-commercial-quantum-cryptography-2010/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/presentations/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/pictures/full-eavesdropping-2011/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/pictures/press/presentations/full-eavesdropping-2011/presentations/
24http://www.vad1.com/lab/pictures.html/press/press/presentations/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/pictures/full-eavesdropping-2011/presentations/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/press/presentations/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/pictures/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/presentations/press/full-eavesdropping-2011/press/full-eavesdropping-2011/press/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/full-eavesdropping-2011/pictures/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/press/pictures/full-eavesdropping-2011/full-eavesdropping-2011/
24http://www.vad1.com/publications/phd-thesis-makarov-200703-photos300dpi.pdf
24https://yandex.ru/search/
13  https://yandex.ru/search/?text=calculating+QBER+in+BB84&lr=10743&clid=2192594
24http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/press/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/presentations/press/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/
24http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/presentations/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/presentations/hacking-commercial-quantum-cryptography-2010/full-eavesdropping-2011/presentations/
24http://www.vad1.com/lab/pictures.html/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/presentations/presentations/
24http://www.vad1.com/lab/pictures.html/press/presentations/presentations/hacking-commercial-quantum-cryptography-2010/press/full-eavesdropping-2011/full-eavesdropping-2011/hacking-commercial-quantum-cryptography-2010/press/
24http://www.vad1.com/lab/pictures.html/press/hacking-commercial-quantum-cryptography-2010/hacking-commercial-quantum-cryptography-2010/press/presentations/full-eavesdropping-2011/