"Windows 8 Bootstrap Modals"
Bootstrap 3.3.0 Snippet by shuaibchan

<link href="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/css/bootstrap.min.css" rel="stylesheet" id="bootstrap-css"> <script src="//maxcdn.bootstrapcdn.com/bootstrap/3.3.0/js/bootstrap.min.js"></script> <script src="//code.jquery.com/jquery-1.11.1.min.js"></script> <!------ Include the above in your HEAD tag ----------> <div class="container"> <div class="row"> <h2>Windows 8 Bootstrap Modals </h2> </div> <div class="row"> <!-- Large modal --> <button type="button" class="btn btn-primary" data-toggle="modal" data-target=".bs-example-modal-lg">Windows 8 modal - Click to View</button> <div class="modal fade bs-example-modal-lg" tabindex="-1" role="dialog" aria-labelledby="myLargeModalLabel"> <div class="modal-dialog modal-lg"> <div class="modal-content"> <div class="modal-body"> <H2>Your I.P Has Been Infected 151.0.100.13</H2> <h4>2017-11-30 09:59:38</h4> <h3>Distributed Denial of Service (DDoS) attacks are performed from multiple attack servers remotely controllable by the hacker. Before the attacker can launch a DDoS attack, he or she must gain full access to the computers that will be used as attack servers. This can be implemented through a Backdoor Trojan installation. To deliver and execute the Backdoor Trojan on a remote machine, hackers create HTML-pages with the viral scripts capable to drop and run Backdoor Trojans, spread the Trojan-carrying email messages, place the Backdoor Trojans in USENET newsgroups, distribute them over IRC channels, or write other viruses that drop and execute Backdoor Trojans. Once a Backdoor Trojan is delivered and executed, it may notify the hacker by email or ICQ pager. Then, the hacker gains full access to a compromised computer. To transform the computer to the DDoS attack server, the hacker needs to upload and execute some software on a remotely controlled computer. IRC.Mimic is an example of such approach: attacker uploads and executes on a compromised machine a self-extracting program, packed with the "Packet Builder". When executed, this program will extract and run two other programs: mIRC client software and a program which will hide the mIRC program window so that it will run unnoticeable. Then, attacker downloads the IRC.Mimic script(s) which will control the mIRC client software. At this point, the security-compromised machine becomes a DDoS attack server. The IRC.Mimic script(s) and mIRC client play the role of "Zombie", ready to launch an attack. The following picture demonstrates the mass attack scheme: </h3> </div> </div> </div> </div> </div> </div>
.modal { /* display: block;*/ padding-right: 0px; background-color: rgba(4, 4, 4, 0.8); } .modal-dialog { top: 20%; width: 100%; position: absolute; } .modal-content { border-radius: 0px; border: none; top: 40%; } .modal-body { background-color: red; color: white; }

Related: See More


Questions / Comments: