Monday, November 12, 2012

*****All DDOS attack tool and softwares download *****


দেখেন আপনাদের জন্য কি নিয়ে আসছি। সকল DDOS অ্যাটাক টুল একসাথে। যার যার লাগবে ডাউনলোড করে নিন।



1.DDOS : http://motomastyle.com/pyloris/

2.HOIC : 

http://www.mediafire.com/?5su5vuj90cirm4p

3.LOIC : http://sourceforge.net/projects/loic/

4.Ddos notepad : http://www.mediafire.com/?76advu6rdckmuyv

5.DDOS V2 :https://sites.google.com/site/savsakorg/ddos/DDOSv2.rar?attredirects=1&d=1

6.rDos : http://www.mediafire.com/?p1y2j4gc27xszkf

7.JaniDOS: http://www.mediafire.com/?yxf19r3qyru4372

8.HttpAttack: http://www.mediafire.com/?a9gd8hqj1bgbito

9.Sprut: http://www.mediafire.com/?mvcajvxgv5aq1ts

10.OWASP – the Open Web Application Security Project :http://code.google.com/p/owasp-dos-http-post/downloads/list

11.GoodByeV5:http://www.mediafire.com/download.php?69b5rsv3at3ba93

12.goobye v3 :http://www.mnova.eu/torrent/3709032/Goodbye_3___52_Denial_of_Service_Tool.html

**Khorasan CyberArmy (KCA) DDoS Tool ver 1.0 - Prototype AnonCanon + XerXes Platform
----------------------------------
13. Download & Install >>> JRE (Java Runtime Environtment) or JDK (Java Development Kit) sini

http://download.cnet.com/Java-Runtime-Environment-JRE/3000-2378_4-10009607.html

14.Download (update) >>> www.mediafire.com/?fp6v614eh1c2dhe
**On Windows
Klik Run > Type "cmd" (command terminal) > type "java -jar AnonDDOS.jar"
On Linux
$ sudo chmod +x AnonDDOS.jar
$ java -jar AnonDDOS.jar

বিঃদ্রঃ দয়া করে ডাউনলোডের সময় আপনার এন্টি ভাইরাসটি বন্ধ করে নিন ।অনেক সময় এন্টি ভাইরাস এসব সফটওয়্যারকে ভাইরাস হিসেবে ডিটেক্ট করে।আর এটা যদি ভাইরাস হয় তাইলে আমাকে ধইরেন সবাই। 




****কম্পিউটারের গতি বাড়ানো যায় কিছু বিষয়ে খেয়াল রাখলে। তেমন কিছু বিষয় নিচে দেওয়া হলো***


১. কম্পিউটারে কখনো Theme ইনস্টল করা উচিত নয়।থিম কম্পিউটারকে অনেক ধীর করে দেয়।
২. কম্পিউটারে অ্যানিমেটেড ওয়ালপেপার, কথা বলা ঘড়ি (ভয়েস ঘড়ি) ইত্যাদি ইনস্টল করবেন না। এগুলো কম্পিউটারকে ধীর করে দেয়।
৩. Recycl

e bin সব সময় ফাঁকা রাখুন। Recycle bin-এ কোনো ফাইল রাখবেন না। Recycle bin-এ ফাইল রাখলে কম্পিউটারের গতি কমে যায়।
৪. Start থেকে Run-এ ক্লিক করে এক এক করে Prefetch, temp, %temp%, cookies, recent লিখে ok করুন। ফোল্ডারগুলো খুললে সবগুলো ফাইল মুছে ফেলুন (ডিলিট)। কোনো ফাইল না মুছলে সেটি বাদ দিয়ে বাকিগুলো মুছে ফেলুন।
৫. কিছু সময় পরপর Start থেকে Run-এ ক্লিক করে tree লিখে ok করুন। এতে র্যামের কার্যক্ষমতা বাড়বে।
৬. ডেস্কটপে মাউস রেখে ডান বাটনে ক্লিক করে Properties-এ যান। এখন ডান পাশ থেকে Settings-এ ক্লিক করে ১৬ বিট নির্বাচন করে ok করুন।
৭. আবার Start থেকে Run-এ ক্লিক করে msconfig লিখে ok করুন। এখন ডান পাশের Services-এ ক্লিক করুন। যে প্রোগ্রামগুলো সব সময় কাজে লাগে না, সেগুলোর বাঁ পাশ থেকে টিক চিহ্ন তুলে দিন। এখন Startup-এ ক্লিক করে বাঁ পাশের সবগুলো টিক চিহ্ন তুলে দিয়ে ok করুন। Restart দিতে বললে Restart দিন।
৮. এখন My Computer খুলে সি ড্রাইভের ওপর মাউস রেখে ডান বাটনে ক্লিক করে Properties-এ যান। তারপর Disk Cleanup-এ ক্লিক করে কিছু সময় অপেক্ষা করুন। নতুন উইন্ডো এলে বাঁ পাশের সবগুলো বক্সে টিক চিহ্ন দিয়ে ok করুন। এভাবে প্রত্যেকটি ড্রাইভ ক্লিন করতে পারেন।
৯. Start থেকে Control Panel-এ যান। Automatic Updates-এ ডবল ক্লিক করুন। Turn off Automatic Updates নির্বাচন করে ok তে ক্লিক করুন। যাঁরা কম্পিউটারে ইন্টারনেট ব্যবহার করেন, এটা তাঁদের জন্য প্রযোজ্য।
১০. My Computer-এর ওপর মাউস রেখে ডান বাটনে ক্লিক করে Properties-এ যান। এখন Advanced Settings সিলেক্ট করে Performance-এর নিচে Settings-এ ক্লিক করুন। এখন Customs সিলেক্ট করে সবার নিচের বক্সের ঠিক চিহ্নটি রেখে বাকি সবগুলো তুলে দিয়ে ok করুন।
১১. আবার My Computer-এর ওপর মাউস রেখে ডান বাটনে ক্লিক করে Properties-এ যান। এখন Advanced সিলেক্ট করে নৃিচে ডান পাশে Error Reporting-এ ক্লিক করুন। Disable সিলেক্ট করে ok করুন।

১২. My computer-এ মাউস রেখে ডান বাটনে ক্লিক করে Properties-এ যান। এখন System Restore-এ ক্লিক করে Turn off System Restore on all drives-এ ঠিক চিহ্ন দিয়ে ok তে ক্লিক করুন। নতুন একটি উইন্ডো এলে সেটির yes-এ ক্লিক করুন।
ডেস্কটপে যত কম আইকন রাখা যায় ততই ভালো।
১৩. Ctrl + Alt + Delete চেপে বা Task bar-এ রাইট ক্লিক করে Task Manager ওপেন করুন। তারপর Processes-এ ক্লিক করুন। অনেকগুলো প্রোগ্রামের তালিকা দেখতে পাবেন। এর মধ্যে বর্তমানে যে প্রোগ্রামগুলো কাজে লাগছে না, সেগুলো সিলেক্ট করে End Process-এ ক্লিক করে বন্ধ করে দেন। এই প্রোগ্রামগুলোর মধ্যে কিন্তু অপারেটিং সিস্টেমের প্রোগ্রামও আছে। যদি ভুল করে কোনো প্রোগ্রাম বন্ধ করে দেন এবং এতে যদি অপারেটিং সিস্টেমের কোনো সমস্যা হয়, তাহলে কম্পিউটার Restart দিন। ঠিক হয়ে যাবে।
১৪. কম্পিউটারের র্যাম কম থাকলে কম্পিউটার ধীরগতির হয়ে যায়। ভার্চুয়াল মেমোরি বাড়িয়ে কম্পিউটার কিছুটা ফাস্ট করা যায়। ভার্চুয়াল মেমোরি বাড়ানোর জন্য প্রথমে My computer-এ মাউস রেখে ডান বাটনে ক্লিক করে properties-এ যান। এখন Advance-এ ক্লিক করে performance-এর settings-এ ক্লিক করুন। আবার Advance-এ ক্লিক করুন। এখন change-এ ক্লিক করে নতুন উইন্ডো এলে সেটির Initial size ও Maximum size-এ আপনার ইচ্ছামতো size লিখে set-এ ক্লিক করে ok দিয়ে বেরিয়ে আসুন। তবে Initial size-এ আপনার কম্পিউটারের র্যামের size-এর দ্বিগুণ এবং Maximum size-এ র্যামের size-এর চারগুণ দিলে ভালো হয়।
১৫. প্রথমে Control panel-এ যান। Control panel থেকে Add or Remove-এ ডবল ক্লিক করুন। এখন বাঁ পাশ থেকে Add/Remove windows components-এ ক্লিক করুন। নতুন যে উইন্ডো আসবে সেটির বাঁ পাশ থেকে যে প্রোগ্রামগুলো আপনার কাজে লাগে না, সেগুলোর পাশের টিক চিহ্ন তুলে দিন, তারপর Accessories and Utilities নির্বাচন করে Details-এ ক্লিক করুন। নতুন যে উইন্ডো আসবে সেটি থেকে একই পদ্ধতিতে যে প্রোগ্রামগুলো আপনার কাজে লাগে না সেগুলোর পাশের টিক চিহ্ন তুলে দিয়ে ok করুন। এখন next-এ ক্লিক করুন। Successful massage এলে Finish-এ ক্লিক করুন। Restart করতে বললে Restart করুন।
১৬. শুধু আপনার প্রয়োজনীয় সফটওয়্যারগুলো ইনস্টল করুন। যে সফটওয়্যারগুলো সব সময় কাজে লাগে না, সেগুলো কাজ শেষ করে আবার আন-ইনস্টল করে দিন।
১৭. হার্ডডিস্কের ১৫ শতাংশ জায়গা ফাঁকা রাখলে এবং নিয়মিত ডিফ্রাগমেন্ট করলে কম্পিউটার অনেক ফাস্ট থাকে।
হার্ডডিস্কের ফাঁকা স্থানের পরিমাণ যত বেশি থাকে ততই ভালো।
১৮. সফটওয়্যার ইনস্টল করে ব্যবহার করার চেয়ে পোর্টেবল (বহনযোগ্য) সফটওয়্যার ব্যবহার করলে কম্পিউটার বেশি ফাস্ট থাকে।

ভাল লাগলে লাইক,কমেন্ট কিছু কইরেন আর না হলে আমার চৌদ্দ গুষ্ঠি উদ্ধার কইরেন গালিগালাজ কইরা।কারন আমাদের দেশের মানুষরা ফ্রি সার্ভিস দিলে গালাগালি দিয়ে হিরো সাজতেই বেশী পছন্দ করে।

HOW TO INCREASE LAPTOPS BATTERY LIFETIME

Laptops tend to lose their charm quickly when you’re constantly looking for the nearest power outlet to charge up. How do you keep your battery going for as long as possible? Here are 15 easy ways to do so.



1. Defrag regularly - The faster your hard drive does its w
ork – less demand you are going to put on the hard drive and your battery. Make your hard drive as efficient as possible bydefragging it regularly. (but not while it’s on battery of course!) Mac OSX is better built to handle fragmentation so it may not be very applicable for Apple systems.
2. Dim your screen – Most laptops come with the ability to dim your laptop screen. Some even come with ways to modify CPU and cooling performance. Cut them down to the lowest level you can tolerate to squeeze out some extra battery juice.
3. Cut down on programs running in the background. Itunes, Desktop Search, etc. All these add to the CPU load and cut down battery life. Shut down everything that isn’t crucial when you’re on battery.
4. Cut down external devices – USB devices (including your mouse) & WiFi drain down your laptop battery. Remove or shut them down when not in use. It goes without saying that charging other devices (like your iPod) with your laptop when on battery is a surefire way of quickly wiping out the charge on your laptop battery.
5. Add more RAM - This will allow you to process more with the memory your laptop has, rather than relying on virtual memory. Virtual memory results in hard drive use, and is much less power efficient. Note that adding more RAM will consume more energy, so this is most applicable if you do need to run memory intensive programs which actually require heavy usage of virtual memory.

6. Run off a hard drive rather than CD/DVD - As power consuming as hard drives are, CD and DVD drives are worse. Even having one in the drive can be power consuming. They spin, taking power, even when they?re not actively being used. Wherever possible, try to run on virtual drives using programs like Alcohol 120% rather than optical ones.
7. Keep the battery contacts clean: Clean your battery’s metal contacts every couple of months with a cloth moistened with rubbing alcohol. This keeps the transfer of power from your battery more efficient.
8. Take care of your battery – Exercise the Battery. Do not leave a charged battery dormant for long periods of time. Once charged, you should at least use the battery at least once every two to three weeks. Also, do not let a Li-On battery completely discharge. (Discharing is only for older batteries with memory effects)
9. Hibernate not standby – Although placing a laptop in standby mode saves some power and you can instantly resume where you left off, it doesn’t save anywhere as much power as the hibernate function does. Hibernating a PC will actually save your PC’s state as it is, and completely shut itself down.

10. Keep operating temperature down - Your laptop operates more efficiently when it’s cooler. Clean out your air vents with a cloth or keyboard cleaner

11. Set up and optimize your power options – Go to ‘Power Options’ in your windows control panel and set it up so that power usage is optimized (Select the ‘max battery’ for maximum effect).
12. Don’t multitask – Do one thing at a time when you’re on battery. Rather than working on a spreadsheet, letting your email client run in the background and listening to your latest set of MP3′s, set your mind to one thing only. If you don’t you’ll only drain out your batteries before anything gets completed!
13. Go easy on the PC demands – The more you demand from your PC. Passive activities like email and word processing consume much less power than gaming or playing a DVD. If you’ve got a single battery charge – pick your priorities wisely.
14. Get yourself a more efficient laptop - Laptops are getting more and more efficient in nature to the point where some manufacturers are talking about all day long batteries. Picking up a newer more efficient laptop to replace an aging one is usually a quick fix.
15. Prevent the Memory Effect - If you’re using a very old laptop, you’ll want to prevent the ‘memory effect’ – Keep the battery healthy by fully charging and then fully discharging it at least once every two to three weeks. Exceptions to the rule are Li-Ion batteries (which most laptops have) which do not suffer from the memory effect.
Bonus Tip #1: Turn off the autosave function. MS-Word’s and Excel’s autosave functions are great but because they keep saving regular intervals, they work your hard driver harder than it may have to. If you plan to do this, you may want to turn it back on as the battery runs low. While it saves battery life in the beginning, you will want to make sure your work is saved when your battery dies.
Bonus Tip #2: Lower the graphics use. You can do this by changing the screen resolution and shutting off fancy graphic drivers. Graphics cards (video cards) use as much or more power today as hard disks – Thanks Andrew
Update 7/7/07: Bonus Tip #1 to give caution about turning off autosave, tip #8 to change information about discharging batteries – thanks to all who pointed it out. Added Bonus tip #2, Tip #1 to add in clause in regards to Mac OSX, Tip #1 about the spinning of hard drives – thanks to all who pointed it out

*****SQL INJECTION FULL VIDEO TUTORIAL*****


1.How to use Google Dorks for finding SQL injection Vulnerability
http://www.youtube.com/watch?feature=player_detailpage&v





Photo: ******SQL INJECTION FULL VIDEO TUTORIAL********
---------------------------------------------------------------------
1.How to use Google Dorks for finding SQL injection Vulnerability
http://www.youtube.com/watch?feature=player_detailpage&v=dzvSgJPPzzs
2.Basic SQL injection (Bypassing Login pages
http://www.youtube.com/watch?feature=player_detailpage&v=wDRCTy8tPUA
3.SQL injection tutorial (Union based/ Normal
http://www.youtube.com/watch?feature=player_detailpage&v=5o0wpdWXxZQ
4.Error Based-Double Query SQL injection
http://www.youtube.com/watch?feature=player_detailpage&v=oJkp5S9GBeg
------------------------------------------------------------------------
share and keep it on ur wall to watch later :)

How to secure your system from Keyloggers


Now a days keylogger is major problem for all. So we should learn to secure our computer from keylogger. This article will help for ethical hackers or who want to protect their pc.



What is Keylogger?

Keylogger is one of spyware which will what type you through the keyboard and send it to hac

ker

who send the keylogger. Hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. So whenever you type the username and password in gmail,online banking sites, it will send the username and password to hacker.

How to Protect?

In order to provide security for your system,you must have

Good AntiVirus:
This is basic and best step to protect your system from keylogger. So buy a licensed and best antivirus which is currently in market. My suggestion is Kaspersky, Norton or Mcafee. Don't forget to update regularly.
Note: Don't use trial or cracked pack ,it is worthless to use.

Good Spyware:
Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware.

Antilogger can be Handy

Antiloggers are programs that detect the presence of keyloggers on a given computer. Zemana Antilogger is the best antilogger.

Online Scanning

When ever you receive a suspicious file, you scan it with online scanners such as Multi engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.

Keyscrambler

Keyscrambler is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications

What is BackTrack & How to use


What is BackTrack & How to use ?
---------------------------------------------------



BackTrack-Is a Linux distribution distributed as Live cd or Usb for penetration testing.BackTrack provides penetration testers a comprehensive collection of security related tools, support live cd and live usb and permanent installation also.BackTrack provides Mozilla, Pidgin, K3B, XMMS .You can create personalize
d distributions by including customizable scripts, additional tools and configurable kernels.
BackTrack includes many well known security tools Like NMAP, KISMET and many more.
Get more information about BackTrack 5r2 from google.

Reset password on Win XP and Vista-
Start->Backtrack -> priviledge escalation ->password attacks-> chntpw
Chntpw: -i /mnt/hda1/windows/system32/config/SAM
1 (Enter)
Username (Enter)
1 (Enter)
Username (Enter)
4 (Enter)
1 (Enter)
Q (Enter)
Y (Enter)

WINDOWS 8 PRO FULL VERSION

WINDOWS 8 PRO FULL VERSION (TORRENT DOWNLOAD)



Microsoft Windows 8 Professional (X86|X64) Final Retail AIO
Language: English

Dowenload Here


Hacking And Security Video Tutorials Collection

Hacking And Security Video Tutorials Collection


http://videos.securitytube.net/Public-Key-Cryptography.flv
http://videos.securitytube.net/Symmetric-Key-Cryptography.flv
http://videos.securitytube.net/CryptoAnalysis-(Types-of-attacks-on-Cryptography).flv
http://videos.securitytube.net/IEEE-802.11W-and-Cisco-MFP-II.flv
http://videos.securitytube.net/IEEE-802.11W-and-Cisco-MFP-I.flv
http://vid
eos.securitytube.net/War-Driving-is-so-2000,-Here-comes-war-shipping.flv
http://videos.securitytube.net/RSA-2006-Keynote-Bill-Gates.flv
http://videos.securitytube.net/Cryptography-(Introduction).flv
http://videos.securitytube.net/Cold-Boot-Encryption-Attack.flv
http://videos.securitytube.net/Fatal-DNS-Attack-Discovered.flv
http://videos.securitytube.net/Cool-Computer-Program.flv
http://videos.securitytube.net/WEP-Tutorial-3.flv
http://videos.securitytube.net/WEP-Tutorial-2.flv
http://videos.securitytube.net/WEP-Tutorial-1.flv
http://videos.securitytube.net/CSMA-CA.flv
http://videos.securitytube.net/Access-Control-(CSMA-CD).flv
http://videos.securitytube.net/Analyzing-Robots.txt-for-Fun-and-Profit.flv
http://videos.securitytube.net/Automated-Mining-of-FTP-Sites-for-Fun-and-Profit.flv
http://videos.securitytube.net/SSL-MITM-Attack-Over-Wireless-Demo.flv
http://videos.securitytube.net/SSL-MITM-Attack-Over-Wireless.flv
http://videos.securitytube.net/Install-Vista-in-2-mins-(funny).flv
http://videos.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-3.flv
http://videos.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-2.flv
http://videos.securitytube.net/How-Spammers-Abuse-Whois-and-SMTP-Part-1.flv
http://videos.securitytube.net/USB-Beer-(-Funny-Video-).flv
http://videos.securitytube.net/User-Information-Leakage-on-P2P-Networks.flv
http://videos.securitytube.net/Changing-your-Firefox-User-Agent-to-Emulate-Googlebot.flv
http://videos.securitytube.net/Virtual-carrier-sensing-(NAV)-mechanism.flv
http://videos.securitytube.net/WiFi-State-Machine-(Part-3).flv
http://videos.securitytube.net/WiFi-State-Machine-(Part-2).flv
http://videos.securitytube.net/WiFi-State-Machine-(Part-1).flv
http://videos.securitytube.net/WiFi-MAC-header-(Part-2).flv
http://videos.securitytube.net/WiFi-MAC-header-(Part-1).flv
http://videos.securitytube.net/Wireless-Frames--Format-and-Types.flv
http://videos.securitytube.net/Connecting-wireless-station-to-AP.flv
http://videos.securitytube.net/fping-(Part-4).flv
http://videos.securitytube.net/fping-(Part-3).flv
http://videos.securitytube.net/fping-(Part-2).flv
http://videos.securitytube.net/fping-(Part-1).flv
http://videos.securitytube.net/RC4-Basics-Presentation-(2).flv
http://videos.securitytube.net/Macchanger.flv
http://videos.securitytube.net/Pcap2air.flv
http://videos.securitytube.net/Netstumbler-(Part-2).flv
http://videos.securitytube.net/Netstumbler-(Part-1).flv
http://videos.securitytube.net/AireplayNG-(Part-5).flv
http://videos.securitytube.net/AireplayNG-(Part-4).flv
http://videos.securitytube.net/AireplayNG-(Part-3).flv
http://videos.securitytube.net/AireplayNG-(Part-2).flv
http://videos.securitytube.net/AireplayNG-(Part-1).flv
http://videos.securitytube.net/ARP-Packet-Injection-Programming.flv
http://videos.securitytube.net/TCP-Packet-Injection-(2).flv
http://videos.securitytube.net/TCP-Packet-Injection.flv
http://videos.securitytube.net/IP-Packet-Injection-(2).flv
http://videos.securitytube.net/IP-Packet-Injection.flv
http://videos.securitytube.net/Ethernet-Packet-Injection.flv
http://videos.securitytube.net/Generic-Packet-Injection-Program-(2).flv
http://videos.securitytube.net/Packet-Injection-Basics-Presentation.flv
http://videos.securitytube.net/Packet-Sniffing-using-Wireshark.flv
http://videos.securitytube.net/Packet-Sniffing-using-Tcpdump.flv
http://videos.securitytube.net/Data-Packet-Sniffer-Programming-.flv
http://videos.securitytube.net/TCP-Packet-Sniffer-Programming-.flv
http://videos.securitytube.net/IP-Packet-Sniffer-Programming-.flv
http://videos.securitytube.net/Ethernet-Packet-Sniffer-Programming-.flv
http://videos.securitytube.net/Generic-Packet-Sniffer-Programming-(2).flv
http://videos.securitytube.net/Generic-Packet-Sniffer-Programming.flv
http://videos.securitytube.net/Raw-Sockets-Basics-Presentation-(2).flv
http://videos.securitytube.net/Raw-Sockets-Basics-Presentation.flv
http://videos.securitytube.net/Internet-Worm-IP-Scanning-Programming-(2).flv
http://videos.securitytube.net/Internet-Worm-IP-Scanning-Programming.flv
http://videos.securitytube.net/Internet-Worm-Basics-Presentation-(2).flv
http://videos.securitytube.net/Internet-Worm-Basics-Presentation.flv
http://videos.securitytube.net/Programming-an-ARP-DoS-Tool-(2).flv
http://videos.securitytube.net/Programming-an-ARP-DoS-Tool.flv
http://videos.securitytube.net/Sending-Messages-using-IPC-Framework.flv
http://videos.securitytube.net/Programming-the-Framework.flv
http://videos.securitytube.net/Architecture-of-Security-Tools-Presentation-(2).flv
http://videos.securitytube.net/Architecture-of-Security-Tools-Presentation.flv
http://videos.securitytube.net/RC4-File-Encrypt-Decrypt-Program.flv
http://videos.securitytube.net/RC4-Simulation-using-C.flv
http://videos.securitytube.net/RC4-Basics-Presentation.flv
http://videos.securitytube.net/VMWare-Hacking-at-Defcon-15.flv
http://videos.securitytube.net/Bruice-Schneier-at-Defcon-15.flv
http://videos.securitytube.net/Home-using-WEP-gets-Hacked.flv
http://videos.securitytube.net/History-of-Hacking-Part-5.flv
http://videos.securitytube.net/History-of-Hacking-Part-4.flv
http://videos.securitytube.net/History-of-Hacking-Part-3.flv
http://videos.securitytube.net/History-of-Hacking-Part-2.flv
http://videos.securitytube.net/History-of-Hacking-Part-1.flv
http://videos.securitytube.net/Prism-Strip.flv
http://videos.securitytube.net/Simple-Replay.flv
http://videos.securitytube.net/AirodumpNG-Basics-(Part-II).flv
http://videos.securitytube.net/AirodumpNG-Basics-(Part-I).flv
http://videos.securitytube.net/AirdecapNG.flv
http://videos.securitytube.net/AirmonNG.flv
http://videos.securitytube.net/TCP-Echo-Client-using-Sockets.flv
http://videos.securitytube.net/TCP-Echo-Server-using-Sockets.flv
http://videos.securitytube.net/Hello-World-TCP-Server-using-Sockets-(2).flv
http://videos.securitytube.net/Socket-Programming-Basics-Presentation-(3).flv
http://videos.securitytube.net/Socket-Programming-Basics-Presentation-(2).flv
http://videos.securitytube.net/Hello-World-TCP-Server-using-Sockets.flv
http://videos.securitytube.net/Socket-Programming-Basics-Presentation.flv
http://videos.securitytube.net/Vehicular-Communication-Basics-(3).flv
http://videos.securitytube.net/Vehicular-Communication-Basics-(2).flv
http://videos.securitytube.net/Vehicular-Communication-Basics.flv
http://videos.securitytube.net/Wireshark-Basics-(3).flv
http://videos.securitytube.net/Wireshark-Basics-(2).flv
http://videos.securitytube.net/Wireshark-Basics-(1).flv
http://videos.securitytube.net/Nmap-(-OS-and-Service-Fingerprinting).flv
http://videos.securitytube.net/Nmap-Usage-Basics.flv
http://videos.securitytube.net/Network-Grep-(Ngrep)-Basics.flv
http://videos.securitytube.net/Netcat-Basics-(Bind-Remote-Shell).flv
http://videos.securitytube.net/Netcat-Basics-(Server-Mode).flv
http://videos.securitytube.net/Netcat-Basics-(Client-Mode).flv
http://videos.securitytube.net/Netbios-Basics-using-SMBClient-Part-2.flv
http://videos.securitytube.net/Netbios-Basics-using-SMBClient-Part-1-.flv
http://videos.securitytube.net/DNS-Zone-Transfer-using-DIG.flv
http://videos.securitytube.net/Domain-Information-Groper-(-DIG-)-Basics.flv

Games Zone:- Medal of Honor: Warfighter Limited Edition - Black Box



Medal of Honor: Warfighter Limited Edition - Black Box


Medal of Honor: Warfighter | 11.2 GBRelease Date: October 28, 2012
Language: English
Platform: PC
Developer: Danger Close
Publisher: Electronic Arts
Genre: Action (Shooter) / 3D / 1st Person
Written by active U.S. Tier 1 operatives sent to overseas mission and inspired by real world threats, Medal of Honor Warfighter provides aggressive, edgy and authentic experience that puts you in the role of the most disciplined and precise fighters to date. Medal of Honor Warfighter lets you look closely battlefield and fight the constant threat of global terrorism. Following in the footsteps of the Medal of Honor in 2010, which launched a series of game themes of the Second World War and I met the most elite U.S. soldiers, Medal of Honor Warfighter takes you beyond Afghanistan to continue operation missions in places where there are real conflicts. This is a Tier 1 global, including real hotspots worldwide and international Tier 1 operatives in multiplayer. Limited Edition Includes: The Limited Edition Includes the US Navy SEAL Sniper and McMillan TAC-300 sniper rifle for use in multiplayer from Day 1 . Plus, you'll Unlock the British SAS Spec Ops Special as a pre-order bonus.
Key features:
BATTLE THROUGH REAL-WORLD EVENTS
From rescuing hostages in Abu Sayyafs stronghold in Basilan, Philippines, to assaulting Al-Shabaabs Pirate Town on the Somali Coast, gamers step into the boots of Tier 1 Operators as they hunt down the global threat of PETN. Medal of Honor Warfighter has a dotted line to real-world events and lets players experience the action as it might have unfolded.
EXPERIENCE AUTHENTIC ACTION
Medal of Honor Warfighter delivers incredible video and audio fidelity by leveraging the power of the best-in-class Frostbite 2 engine. Every detail from the sound of the weapons to the landscapes of actual locations is as authentic as it gets.
PLAY AS ELITE WARFIGHTERS FROM AROUND THE GLOBE
Gamers can represent their nations Special Operations forces on the multiplayer battlefield where the worlds best-of-the-best warriors go head-to-head in online competition. Medal of Honor Warfighter showcases 12 different Tier 1 units from 10 nations including the British SAS, Australian SASR, German KSK, Canadian JTF2 and Polish GROM.
FIGHT TODAYS GLOBAL TERROR THREAT
As with every Medal of Honor game, the soldiers story is at the heart of the experience. Medal of Honor Warfighter tells the story of U.S. Tier 1 Operator, Preacher as he returnshome from overseas only to find his family torn apart from years of deployment. When a deadly explosive penetrates civilian borders and his two worlds collide, Preacher and his fellow teammates take the fight to the enemy and do whatever it takes to protect their loved ones from harm .



Screenshot

Medal of Honor: Warfighter Limited Edition - Black Box

Medal of Honor: Warfighter Limited Edition - Black Box

Download Link:-P1,P2,P3,P4,P5,P6,P7,P8,P9,P10,P11,P12,P13




Android Jelly Bean Skin Pack For Windows 7 Turns Your PC Into An Android Like Tablet


I’ll be brutally honest about it: I am not a fan of transformation / skin packs on both desktops and mobile devices. I have two reasons for this. Firstly, using these packs usually has a dramatic effect on system performance. Secondly, if your reason to transform one operating system into another is for looks and looks alone: it’s going to be a big disappointment because no matter how much work is done on a transformation pack, it is not going to look as good as the source. What happens is that you get a operating system that looks like an ugly mix of the worst of both worlds.

But, of course, that is my own opinion. You may have an altogether different one and I will completely respect that.



With that in mind, let’s discuss a new Windows to Android transformation pack we came across earlier today. Simply named the Android Jelly Bean Skin Pack for Windows 7, the transformation pack includes a bunch of different programs that, when used together, give Windows 7 an Android 4.1 Jelly Bean-like look.
The programs in question are: RocketDock (skinnable Windows equivalent to OS X’s Dock), Xwidget for Jelly Bean-like widgets, extra icons, Win7BootUpdater for changing the boot screen, ResourceHacker for modifying .res files in Windows, Moveex for replacing / moving .dll files, and a Universal Theme Patcher.

android
20120805171510989
You just have to download the installer and follow the on-screen instructions. It will guide you through different settings with ease. After that, you have to restart your PC to enjoy the Jelly Bean-like experience. Everything from the boot screen, login page to the desktop and Window UI gets a different look. You also get a really nice set of widgets for Time, Weather, Google Search and Music.
android - Copy

android


Android Jelly Bean Skin is available in the form of a free download. It works on Windows 7 Home Premium (and above) 32 / 64 bit; for Starter and Home Basic, you need to install a separate patch to enable Aero.

Download Link:-Android Jelly Bean Skin Pack For 7


Xilisoft Online Video Downloader 3.3.3 Build 20120810

Xilisoft Online Video Downloader 3.3.3 Build 20120810 freedownload free software


Convenient and easy-to-operate, Xilisoft Online Video Downloader provides you the best solution to view online videos and download interested ones instantly and quickly. Embedded with a built-in web browser, Xilisoft Online Video Downloader enables you to visit most popular online video websites in the application and click to download online videos in high speed. Support downloading online HD videos in resolution of 1080P or 720P as well.
No more downloading software is needed, Xilisoft Online Video Downloader qualifies you to logon the homepages of several popular online video websites and download favored videos while viewing them in the application. Multiple popular online video websites are supported, including YouTube, Metacafe, Dailymotion, Break, Vimeo, Revver, Blip, Vidilife and Stickam. Batch downloading is available as well to boost the performance. View and download online videos to local machine.
Built-in web browser to log on and look through online video websites directly.
Provide the most popular online video websites.
Support downloading online HD videos in resolution of 1080P or 720P.
Speedy batch downloading is available as well.

Download Link:-Xilisoft Online Video Downloader 3.3.3

Microsoft Office 2011 Business Edition Mac OSX

Microsoft Office 2011 Business Edition Mac OSX Free download & full download,free software download filehunk.com


Microsoft Office 2011 Business Edition Mac OSX | 955 MB
MICROSOFT.OFFICE.FOR.MAC.2011(Final RTM BUSINESS Volume and Retail) with Product Key
With Office Communicator as well
The Mac version of the popular productivity software will make its debut in three flavors: Office for Mac Home and Student 2011, Office for Mac Home and Business 2011 and Office for Mac Academic 2011.
Home and Student 2011, which includes Word, PowerPoint, Excel and Messenger, will retail for $119 for an individual install and $149 for a Family Pack (three installs).
Office for Mac Home and Business 2011 will retail for a higher price: $199 for one install and $279 for two installs.
However, it comes with a significant addition: Outlook for Mac, which replaces the less capable Entourage e-mail client.
The Academic edition of Office, which includes all of the features of the Home and Business version, will cost $99, but is only available for students, faculty and staff of higher education institutions.
Office for Mac 2011 comes in 13 languages, including two new ones: Polish and Russian.
This is on top of the English, Danish, Dutch, Finnish, French, German, Italian, Japanese, Norwegian, Spanish and Swedish versions, most of which will be released by the end of the year.
MICROSOFT.OFFICE.FOR.MAC.2011.RTM.BUSINESS.VOLUME. ENGLISH-WZT
BUILD: 14.0.0.100825.3
FILE: office_bus_enu_14.0.0_100825.3_ship_volume_build.d mg
SIZE: 955,088,986 byte
SHA1: 3834853A973B27781683CAB275E499C5353F7B69
MD5: 6B97DC2BD1D020BBAF41F1C244F6A044
CRC: 7AE845CB

Download Link:-Microsoft Office 2011 For Mac

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Online Project management