banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Messages posted by: napoleon_tq  XML
Profile for napoleon_tq Messages posted by napoleon_tq [ number of posts not being displayed on this page: 0 ]
 
Networking For Dummies, 7th Edition




Product Description
Networking For Dummies has long been the leading networking beginner book. The 7th Edition provides valuable updates on the latest tools and trends in networking, including updates to Windows XP (through Service Pack 2), Windows Server 2003, Linux, Mac OS X, and Novell Netware Server 6.5 plus the latest information on broadband technologies. A must-have reference for network administrators and novices who want to set up a network in their home or office, this covers all the bases and basics, including:

* Using a network printer and sharing files and printers
* Using Microsoft Office on a network
* Network operating systems
* Setting up a wireless network
* Configuring client computers

Written by Doug Lowe, a seasoned For Dummies author who has demystified everything from Microsoft Office to networking to creating Web pages and written more than 50 computer books, including Networking All-in-One Desk Reference For Dummies, this guide includes whole new chapters on:

* Wireless networking
* IP addressing
* Common security problems
* Troubleshooting

Indexed to help you find answers fast and written in plain English instead of technotalk, this keeps you from getting all shook up while youre getting all hooked up!

About the Author
Doug Lowe has written a whole bunch of computer books, including more than 35 For Dummies books (such as PowerPoint 2003 For Dummies, Word 2003 All-In-One Desk Reference For Dummies, Networking All-In-One Desk Reference For Dummies, and Internet Explorer 6 For Dummies). He lives in that sunny All-American City of Fresno, California, which isn’t nearly as close to San Francisco as most people think, with his wife and two of his daughters (the other one’s away at college). He’s one of those obsessive-compulsive decorating nuts who puts up tens of thousands of lights at Christmas and creates computer-controlled Halloween decorations that rival Disney’s Haunted Mansion. Maybe his next book should be Tacky Holiday Decorations For Dummies.

http://rapidshare.com/files/131555493/Netw0rking_For_Dumm_es__7th_Ed_tion_Rilwis.tk.rar


Network Troubleshooting Tools




Book description
Network Troubleshooting Tools helps you sort through the thousands of tools that have been developed for debugging TCP/IP networks and choose the ones that are best for your needs. It also shows you how to approach network troubleshooting using these tools, how to document your network so you know how it behaves under normal conditions, and how to think about problems when they arise so you can solve them more effectively.

Over the years, thousands of tools have been developed for debugging TCP/IP networks. They range from very specialized tools that do one particular task, to generalized suites that do just about everything except replace bad Ethernet cables. Even better, many of them are absolutely free. There’s only one problem: who has time to track them all down, sort through them for the best ones for a particular purpose, or figure out how to use them? Network Troubleshooting Tools does the work for you–by describing the best of the freely available tools for debugging and troubleshooting. You can start with a lesser-known version of ping that diagnoses connectivity problems, or take on a much more comprehensive program like MRTG for graphing traffic through network interfaces. There’s tkined for mapping and automatically monitoring networks, and Ethereal for capturing packets and debugging low-level problems. This book isn’t just about the tools available for troubleshooting common network problems. It also outlines a systematic approach to network troubleshooting: how to document your network so you know how it behaves under normal conditions, and how to think about problems when they arise, so you can solve them more effectively. The topics covered in this book include:

* Understanding your network
* Connectivity testing
* Evaluating the path between two network nodes
* Tools for capturing packets
* Tools for network discovery and mapping
* Tools for working with SNMP
* Performance monitoring
* Testing application layer protocols
* Software sources

If you’re involved with network operations, this book will save you time, money, and needless experimentation.

http://rapidshare.com/files/131554382/Netw0rk_Tr0ubl3shoot_ng_T00ls_Rilwis.tk.rar


Network Calculus: A Theory of Deterministic Queuing Systems for the Internet (Lecture Notes in Computer Science)




Product Description
Network Calculus is a set of recent developments that provide deep insights into flow problems encountered in the Internet and in intranets. The first part of the book is a self-contained, introductory course on network calculus. It presents the core of network calculus, and shows how it can be applied to the Internet to obtain results that have physical interpretations of practical importance to network engineers. The second part serves as a mathematical reference used across the book. It presents the results from Min-plus algebra needed for network calculus. The third part contains more advanced material. It is appropriate reading for a graduate course and a source of reference for professionals in networking by surveying the state of the art of research and pointing to open problems in network calculus and its application in different fields, such as mulitmedia smoothing, aggegate scheduling, adaptive guarantees in Internet differential services, renegotiated reserved services, etc.

http://rapidshare.com/files/131553903/Netw0rk_C_lculus_Rilwis.tk.rar





http://rapidshare.com/files/131647567/H_F_.AIO_Rilwis.tk.rar








http://rapidshare.com/files/131619974/AIOTVOnPC_Rilwis.tk.rar




Once connected to a another phone via bluetooth you can:
- read his messages
- read his contacts
- change profile
- play his ringtone even if phone is on silent
- play his songs(in his phone)
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And here comes the best
“Call from his phone” it includes all call functions like hold etc.
Super Bluetooth Hack for S60 2nd-3rd devices.

http://rapidshare.com/files/131598779/AIOMob_BlueToothH_cking_Extras_Rilwis.tk.rar


MySQL/PHP Database Applications




Product Description
More businesses and ambitious individuals are trying to bring applications to the Web but they are bewildered with the array of components and concepts needed to create a data-driven site. The cost, stability and ease of development using the Open Source PHP 4 scripting language and a MySQL database makes this combination the best choice for small and mid-size Web-based applications. PHP4/MySQL Database Applications demonstrates web-application development by presenting seven real, ready-to-use examples starting with a simple guess book and ending with a fully-functional e-commerce site with a shopping cart. Inexperienced users will learn the essentials of working with PHP4 and MySQL so they can start building and customizing database applications for the web right away!

From the Back Cover
MySQL/PHP Database Applications Affordable Open Source Solutions to E-Commerce Challenges In this unique guide, two Web development gurus show you how to harness the open source power of MySQL and PHP — and create high-performance Web database applications that won’t break the bank. Using plenty of ready-to-run code and seven concrete examples — from a simple guestbook to a not-so-simple shopping cart — they walk you step-by-step through the process of building a MySQL database and writing real-world PHP applications. Best of all, they provide you with MySQL, PHP, and all their examples on the CD-ROM — which means that you’re holding in your hands everything you need to jump-start an e-commerce project. Create High-Performance Database Applications for the Web

* Find out what MySQL offers — and doesn’t
* Get up to speed on normal forms and other MySQL basics
* Build MySQL tables with Structured Query Language
* Extract database information with MySQL selects and functions
* Work with PHP variables, control structures, and functions
* Get tips on writing good code and using object-oriented techniques
* Create simple applications: a guestbook and a survey
* Develop more sophisticated applications: a catalog, a content manager, a threaded discussion, a problem tracking system, and a shopping cart
* Discover helpful appendixes on HTML forms, MySQL utilities, PHP functions, and more

About the Author
Jay Greenspan, a writer and database developer, was most recently a producer at Wired Digital’s Webmonkey, where he wrote about PHP, ASP, XML, and other topics. Brad Bulger, a seasoned software developer who previously worked at Ingres (now part of Computer Associates) and Wired magazine, is currently a software engineer at Wired Digital.


http://rapidshare.com/files/131553208/My_QLPHP_Dat_base_Appl_cations_Rilwis.tk.rar


MySQL Bible




Product Description

* Organization: The book is divided into five parts: Getting Starated with MySQL and Relational Databases; Understanding SQL Through MySQL; MySQL Administration; MySQL Developer Guide; and Advanced and Specialized MySQL Topics.
* Comprehensive coverage: This Bible covers both beginning-level and advanced topics. Topics covered include: introduction to relational database management; installing and configuring MySQL on the Linux, Windows 2000, and Mac OS X operating systems; MySQL security; debugging and repairing MySQL databases and servers; MySQL performance tuning; and developing MySQL applications with Perl and PHP.
* Coverage of NuSphere MySQL: Due to the growing popularity of the NuSphere MySQL package, this book covers its enhancements and how to install and develop with NuSphere MySQL.
* Running database application: This book builds an e-commerce sample database application throughout to demonstrate concepts and topics.

About the Author
Steve Suehring (Stevens Point, Wisconsin) is currently a Systems Engineer at CoreComm, a 350,000-user Internet Provider. In addition to his other responsibilities, Steve maintains authentication infrastructure using MySQL as the database backend. Steve has built numerous applications with both the Oracle and MySQL databases. He is a Microsoft Certified Systems Engineer, Cisco Certified Design Associate, and Cisco Certified Network Professional. Steve has also written articles for Linux Magazine.

http://rapidshare.com/files/131552249/My_QL_B_ble_Rilwis.tk.rar


MySQL & PHP From Scratch




Product Description
Apache, MySQL, PHP3, and IMP<193> the pieces exist. Each piece has been described ad nauseam. What does not exist is a guide to the marriage of these software technologies into a useful book, until now. This book puts together information on installing, setting up, and troubleshooting each of these technologies into one complete volume. You also learn how each piece is part of a whole by learning, step-by-step, how to create a web-based e-mail system. Learn to run the Linux equivalent of Active Server Pages (ASP) using PHP3, set up an e-commerce site using a database and the Apache web server, and create a data entry system (such as sales, product quality tracking, customer preferences, etc) that requires no installation in the PC.

http://rapidshare.com/files/131550269/My_QL___PHP_From_Scr_tch_Rilwis.tk.rar


Microsoft Windows XP Networking Inside Out




Product Description
Hey, you know your way around a desktop-now dig into the Windows XP operating system and really put its networking features to work! This supremely organized reference packs hundreds of timesaving networking solutions, checklists, network troubleshooting tips, and workarounds-all in concise, fast-answers format. Learn the tools and techniques for configuring and managing networking with Windows XP-including workgroup, domain, Internet, and remote networking, plus every network component and feature in between.

http://rapidshare.com/files/131549739/Microsoft_W_nd0ws_XP_Netw0rking_Ins_de_Out_Rilwis.tk.rar


Maximum Security: A Hacker’s Guide to Protecting Your Computer Systems and Network, 4th Edition




Book Description
Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.

Amazon.com
Written by an anonymous hacker, Maximum Security details hundreds of ways in which invaders may be able to penetrate your system and the steps that you can take to stop them. Before he was arrested, the author used his considerable talents to crack ATMs. Drawing on his vast experience, the author takes you on a journey of the tools that crackers have at their disposal, the ways in which they exploit holes in popular operating systems, and what protective measures are available for each.

At nearly 900 pages, this volume is not only an excellent reference source, but also a testimony to the sheer volume of techniques available to those who wish to illicitly gain access to systems. If you’re a system administrator, this book will, quite simply, scare you silly–and it should. It will also help you take preventative steps that will ultimately allow you a well-deserved peace of mind. An included CD-ROM contains a selection of security utilities, such as SAFEsuite, a demo of PORTUS Secure Firewall, and the famous SATAN (Security Administrator Tool for Analyzing Networks), which are all discussed within the book. –This text refers to an out of print or unavailable edition of this title.

About the Author
Anonymous is an experienced computer hacker who specializes in testing security of various networking platforms. He was convicted of a series of financial crimes in the late 1980s and now works as a writer, trainer, and security consultant.

Billy Barron (billy@metronet.com) is an architect and developer of security products for Avatier Corporation. Previously, he worked as the architect of a storage resource management product,as a Java/OO consultant and as a Unix/VMS system administrator. He founded the Java Metroplex User Group (JavaMUG javamug.org/) and was the first webmaster in the Dallas/Fort Worth area. He has co-authored and tech edited numerous books including Maximum Security, Web Programming Unleashed, Tricks of the Internet Gurus, Maximum Java 1.1, Web Commerce Unleashed, Creating Web Applets with Java, and Internet Unleashed.

Greg Shipley is CTO for Neohapsis, an information security consultancy. He is a contributing editor with Network Computing magazine.
Jonathan Feldman is a contributing editor with Network Computing magazine, where he writes a column and frequently contributes technical workshops.,
Robert Blader works at the Naval Surface Warfare Center, where he performs intrusion detection, security training, and network forensics. He has contributed to SANS GIAC courses and SysAdmin magazine.
Chad Cook has worked for ten years in security, with emphasis on secure product architecture, network and operating system security, and new security technologies.
David Harley maintains a number of virus and security related information resources and writes regularly for Virus Bulletin.
Joe Jenkins is a system administrator/security consultant with NoWalls, Inc. and writes for magazines such as SecurityFocus.
L.J. Locher is a network adminstrator, programmer, and security consultant who has written articles for Windows 2000 Magazine.
Toby Miller is a security engineer for Advanced Systems Development and is the author of several papers published for SecurityFocus and the SANS Institute.
Brooke Paul works as an information technology and security consultant.
Nicholas Raba is a well-known expert on Macintosh security.
Gregory White is Vice President of profession services at SecureLogix, and is a former professor of computer science at the US Air Force Academy.

http://rapidshare.com/files/131545849/M_x_mum_S3cur_ty__Fourth_Edition_Rilwis.tk.rar


Chào các anh em thân bằng cố hữu gần xa, hiện mình đang gặp trường hợp "chuối cả nải" cụ thể như sau:

Chỗ mình đợt vừa rồi có nhập rất nhiều modem Postef 8820U 2+ do nhà máy VLBĐ sản xuất để cung cấp cho khách hàng, tuy nhiên một số lượng lớn hiện đang gặp tình trạng oái oăm là chỉ chạy đựoc trên DSLAM ATM (Huawei) mà không thể chạy đựoc trên IP DSLAM(cũng Huawei), số modem này không nằm trên một lô nhập mà xuất hiện dải rác các đợt nhập hàng khác nhau. Nhưng nếu lấy con khác cùng hộp hàng đó mà lắp trên Port IP DSLAM đó thì lại chạy đựoc, trong một thùng có con chạy đựoc, con không chạy đựoc (các thông số về account hay port đều không hề thay đổi). Sau đây là hình minh họa:

Hình chụp trên Port mà không vào đựoc mạng: (Port của IP DSLAM)











Hình chụp khi đưa chính modem này sang Port khác nắm trên Port khác của DSLAM ATM









Trong số những con modem giở chứng đó họa hoằn có 1, 2 con chạy Port khác trên IP DSLAM lại đựoc ?!, không hiểu là sao nữa.

Nếu ai am hiẻu về vấn đề này mong chia sẻ kinh nghiệm dùm, chân thành cảm ơn.


smilie
To mralone4e: Quyển đó mình chưa tìm được.
To nlfb: Đích danh quyển đó mình chưa có, song có quyển này về joomla bạn xem có dùng đựoc không:

Professional Joomla




As a major force in the world of affordable, advanced web site deployment, Joomla! has become the most important noncommercial Content Management System (CMS) in the world. The number of Joomla! downloads and add-ons continues to grow at lightning pace, spurring the need for a resource that explores the diverse needs of professional Joomla! developers. This book fills that void by covering the two main areas of the Joomla! field–development and deployment–with a focus on the new Joomla! version 1.5 and all the features it provides.

Seasoned author Dan Rahmel walks you through the process of creating all three types of Joomla! extensions (modules, components, and plug-ins), explains how best to use Ajax technology, and shows you how to adopt design patterns and incorporate source code control. You’ll examine the underlying technologies (PHP, Apache, etc.) that can be tuned to offer the best system performance, and you’ll explore interfacing with outside content, Lightweight Directory Access Protocol (LDAP) setup, and much more. You’ll even delve into the internal structure of the Joomla! framework, and obtain a unique behind-the-scenes education so that you can modify and extend Joomla! to meet the needs of you and your customers.

http://rapidshare.com/files/132087574/Professional_Joomla_Rilwis.tk.rar


Linux Socket Programming by Example




Product Description
Linux Socket Programming by Example begins with a very basic introduction to the fundamentals of socket level programming. As the chapters progress, you are introduced to related concepts, such as forming network addresses, Ipv6, the TCP/IP protocol suite and options, writing servers, and creating secure applications. You will also learn about socket fundamentals, domains and addresses, address conversion functions, socket types and protocols, Internet sockets, types and protocols, binding an address to a socket, using Datagram oriented protocols, and much more.

About the Author
Warren Gay is the bestselling author of Sams Teach Yourself Linux Programming in 24 Hours. He is the supervisor of Investment Management Systems at Mackenzie Financial Corporation. He has been programming professionally since 1980, programming for UNIX since 1986 and Linux since 1994. He has written many popular Internet-based Linux packages, including an ftp Backup program and a .wav player program.

http://rapidshare.com/files/131544608/L_nux_S0cket_Pr0gr_mming_by_Ex_mple_Rilwis.tk.rar

TQN wrote:
Napoleon có sách nào về Stone, đá hoa cương, granite không ? 


Chà, thể loại này lạ quá smilie
Rất tiếc mình không có rùi !

Securing-Optimizing Linux:The Ultimate Solution v2.0




http://rapidshare.com/files/131544085/Secur_ng_Optim_zing_L_nux_Rilwis.tk.rar
Intermediate System Administration for the Solaris 9 Operating System (SA-239) and (SA-299)




The Intermediate System Administration for the Solaris 9 Operating System (Solaris 9 OS) course provides students with the necessary knowledge and skills to perform essential system administration tasks in the Solaris 9 OS, such as installing software, managing file systems, performing system boot procedures, performing user and security administration, managing network printers and system processes, and performing system backups and restores. This course is the first of a two-part series that individuals take in preparation for Part I of the Sun Certified System Administration for Solaris examination.

http://rapidshare.com/files/131529209/Interm3diate_Sy_tem__Rilwis.tk.rar


Inside Linux




Product Description
With in-depth complete coverage on the installation process, editing and typesetting, graphical user interfaces, programming system administration, and managing Internet sites, Inside Linux is the only book “smart users” new to Linux will need. Many of the users new to Linux have an understanding of computer technology and will be looking for just the right reference to fit their sophisticated needs. This book guides users to a high level of proficiency with all the flavors of Linux, and help them with crucial system administration chores. Inside Linux is different than other books available because it’s a unique blend of a how-to and a reference guide.

Amazon.com
The author of Inside Linux acknowledges that adequately teaching how to use Linux involves more than communicating a series of recipes. For that reason, he goes to considerable effort to explain what’s going on when the user executes various commands. He uses procedures to expose facts about Linux’s innards, rather than as mere strategies for achieving desired effects. Therefore, his prose–particularly his extended coverage of the bash shell–reads like a scientist’s journal: If we do this, here’s what happens (and by the way, here’s why). The approach is more leisurely than that of many introductory Linux books, and it leads to a deeper understanding of what’s going on under the shell.

The author shows how to configure and use XFree86, the K Desktop Environment (KDE), and GNOME. These are handy skills to have, even if most distributions will more or less automate those processes and some readers may wish instead for information on more obscure aspects of the operating system. Coverage of network configuration, where an intimate knowledge of the command line and configuration files is critical, suits this book’s experiment-and-observe format very well. The reader gets to see lots of important pieces of software in action. There’s nothing about Apache, but the sections on setting up FTP and Unix-to-Unix Copy Protocol (UUCP) services are particularly detailed. –David Wall

Topics covered: Linux for those unfamiliar with the operating system, with particular focus on the Caldera OpenLinux 2.2, Red Hat Linux 6, Slackware Linux 4, and SuSE Linux 6.1 distributions. Installation of XFree86, KDE, and GNOME are covered, as are the mechanics of setting up a TCP/IP network at the command line. Coverage of FTP and UUCP services conclude this book.

http://rapidshare.com/files/131527669/Ins_de_L_nux_Rilwis.tk.rar




Books of Einstein AIO




http://rapidshare.com/files/131525986/Books_of_Ein_tein_AIO_Rilwis.tk.rar








Windows XP Professional x64 Edition uses version 5.2.3790.1830 of core files, the same version used by Windows XP 64-bit Edition 2003 and Windows Server 2003 SP1 as they were the latest versions during the operating system’s development. It is designed to use the expanded 64-bit memory address space provided by the x86-64 architecture.

The primary benefit of moving to 64-bit is the increase in the maximum allocatable system memory (RAM). Windows XP 32-bit is limited to a total of 4 GB, which is, by default, equally divided between Kernel and application usage. Using the /3GB switch in the boot.ini file forces Windows to limit the kernel to the upper 1GB and provides up to 3GB for applications. Windows XP x64 can support much more memory; although the theoretical memory limit a 64-bit computer can address is about 16 exbibytes (16 billion Gibabytes), Windows XP x64 is currently limited to 128 GB of physical memory and 16 TiB of virtual memory. Microsoft claims this limit will be increased as hardware capabilities improve.

Windows XP Professional x64 Edition is not to be confused with Windows XP 64-bit Edition, as the latter was designed for Intel Itanium processors, although they both are commonly referred to as ‘64-bit Windows’ by Microsoft due to their similarities from developer’s point of view.

Both Windows 2003 x64 and XP x64 use identical kernels and codebase. This is evident when the System Information tool reports the current OS as Windows Server 2003 x64 and not Windows XP.

Compatibility with 32-bit applications

Windows XP Professional x64 Edition uses a technology named Windows-on-Windows 64-bit (WOW64), which permits the execution of 32-bit x86 applications. It was first employed in Windows XP 64-bit Edition (for the Itanium), but then reused for the “x64 Editions” of Windows XP and Windows Server 2003.

Since the X86-64 architecture includes hardware-level support for 32-bit instructions, WOW64 simply switches the process between 32- and 64-bit modes. As a result, X86-64 architecture microprocessors suffer no performance loss when executing 32-bit Windows applications. On the Itanium architecture, WOW64 was required to translate 32-bit x86 instructions into their 64-bit Itanium equivalents—which in some cases were implemented in quite different ways—so that the processor could execute them. All 32-bit processes are shown with *32 in the task manager, while 64-bit processes have no extra text present.

Although 32-bit applications can be run transparently, the mixing of the two types of code within the same process is not allowed. A 64-bit application cannot link against a 32-bit library (DLL) and similarly a 32-bit application cannot link against a 64-bit library. This may lead to the need for library developers to provide both 32- and 64-bit binary versions of their libraries. Windows XP x64 Edition includes both 32- and 64-bit versions of Internet Explorer 6, in order to allow for the possibility that some third-party browser plugins or ActiveX controls may not yet be available in 64-bit versions.

Older 32-bit drivers and services are not supported by 64-bit Windows, but video and audio codecs such as XviD or OggDS (which are in fact 32-bit DLLs), are supported as long as the media player that uses them is 32-bit as well.

No Act!v@t!on - Original MSDN ISO

md5: 33a35e7544201ea47fee6cac6a52153b

Download:
http://anonymz.com/?http://rapidshare.com/files/130862587/W_n.XP.Pr0.x64.Ed.SP2.Rilwis.tk.part1.rar
http://anonymz.com/?http://rapidshare.com/files/131683348/W_n.XP.Pr0.x64.Ed.SP2.Rilwis.tk.part2.rar
http://anonymz.com/?http://rapidshare.com/files/130925021/W_n.XP.Pr0.x64.Ed.SP2.Rilwis.tk.part3.rar
http://anonymz.com/?http://rapidshare.com/files/130936782/W_n.XP.Pr0.x64.Ed.SP2.Rilwis.tk.part4.rar
http://anonymz.com/?http://rapidshare.com/files/130944664/W_n.XP.Pr0.x64.Ed.SP2.Rilwis.tk.part5.rar
http://anonymz.com/?http://rapidshare.com/files/130949771/W_n.XP.Pr0.x64.Ed.SP2.Rilwis.tk.part6.rar


mr.khungxox wrote:
anh napoleon_tq : coi lại hộ em cái link của cuốn :
+HACKERS BEWARE: Defending your Network from the Wiley Hacker
+How to Cheat in Flash CS3: The art of design and animation in Adobe Flash CS3
+Java in a Nutshell (Fourth Edition) 


Đã up lại hai quyển:
HACKERS BEWARE: Defending your Network from the Wiley Hacker
Java in a Nutshell (Fourth Edition)

Ngày 24/7/2008: Đã sửa link How to Cheat in Flash CS3: The art of design and animation in Adobe Flash CS3

PS: Các bạn yêu cầu up lại link nhớ kèm theo sách ở trang nào nhé, để dễ tìm lại smilie

Portable USB Disk Security V5.0.0.90




USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. USB Disk Security is the best antivirus software to permanently protect offline computer without the need for signature updates, but other antivirus software should update signature database regularly, and they cannot effectively protect offline computer. This light and easy to use solution is 100% compatible with all software and doesn’t slow down your computer at all. You pay USB Disk Security once and get it all, however, other antivirus products should be paid for updates every year.

Product Highlights:

- 100% protection against any malicious programs via USB storage

USB Disk Security uses innovative proactive technology to block any threats via USB drive. There are relatively few products available in shops or on the Internet which offer even close to 100% protection against any malicious programs via USB drive. The majority of products are unable even to guarantee 90% protection. USB Disk Security is the world’s best software to block threats via USB drive.

- The best solution to protect offline computer

Other antivirus software should update signature database regularly, and they cannot effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences. USB Disk Security uses advanced proactive detection techniques, requires no signature updates, and closes the window of vulnerability left open by other reactive, signature-based responses.

- The world’s fastest and smallest antivirus software

With USB Disk Security, it’s not necessary to sacrifice speed for detection and scanning. Compare antivirus software and you’ll discover that USB Disk Security is by far one of the smallest applications in the industry. For example, the v5.0 of USB Disk Security installer is just 1 MB. The program utilizes approximately 1 to 7 MB of RAM.

- 100% compatible with all software

Incompatibility between antivirus programs is an issue. In the vast majority of cases, installing two antivirus programs from different vendors on one machine (for increased protection) is technically impossible, as the two programs will disrupt each other’s functioning. However, USB Disk Security is 100% compatible with all software, including Windows Vista.

- Simple to use

USB Disk Security has been specifically designed to perform effectively regardless of the user’s level of computer expertise. Just install and forget it.

- System Requirement

100MHz Processor or more, 16MB RAM or more. The operating system should be Windows 95, Windows 98, Windows 2000, Windows XP, Windows NT 4.0, Windows ME, or Vista.

http://rapidshare.com/files/131753595/Port_U_B_D_sk_Security_V5.0.0.90_Rilwis.tk.rar


Game Programming with Python, Lua, and Ruby (Game Development)






Product Description
Get ready to dive headfirst into the world of programming! “Game Programming with Python, Lua, and Ruby” offers an in-depth look at these three flexible languages as they relate to creating games. No matter what your skill level as a programmer, this book provides the guidance you need. Each language is covered in its own section?you’ll begin with the basics of syntax and style and then move on to more advanced topics. Follow along with each language or jump right to a specific section! Similar features in Python, Lua, and Ruby?including functions, string handling, data types, commenting, and arrays and strings?are examined. Learn how each language is used in popular game engines and projects, and jumpstart your programming expertise as you develop skills you’ll use again and again!

About the Author
Tom Gutschmidt has been a freelance technical writer for the past two years, with articles mainly appearing on Earthweb, Gamelan, and Developer.com. He also worked as an editor for the RPG website GameBanshee for the year 2001. Currently he is the youngest member of a small development team in an encryption and key management company (Widevine Technologies). Gutschmidt has worked on a number of open source game projects, do freelance work currently making web based games, and actively work on mod development.

His current projects include running an online gaming site that focuses on NWN mods and flash game development. The site has a small but regular following. He is wrapping up production on a full length NWN game mod that is in the late stages of beta testing.

http://rapidshare.com/files/131526425/G_me_Pr0gr_mming_with_Pyth0n__Lu___and_Ruby_Rilwis.tk.rar


[b]Ansi/Iso C++ Professional Programmer’s Handbook (Que Professional Series)[/b]




Book Description
The ANSI/ISO C++ Professional Programmers Handbook is a concise professional C++ reference tool that presents all of the changes and addenda to the language specification. It contains tips and guidelines for exerting the full potential of C++ as a multi-purpose object-oriented programming language. The new Standard Briefing component provides coverage of the latest version of the C++ language including additions and modifications to the language, new constructs such as built-in bool type, namespaces, RTTI, new header file conventions, internalization, memory management and new cast notation. Additionally, we’ve included a Manual of Programming Style, a Compatibility Compendium, and Future Directions overview.

About the Author
Danny Kalev is a certified system analyst and software engineer with 10 years of experience, specializing in C++ and object-oriented analysis and design. Danny’s technical interests involve networking, distributed data systems, compiler technology, and embedded systems. He is currently working towards an MA degree in Applied Linguistic at the University of Tel Aviv, Israel and is a contributing columnist for the C/C++ User’s Journal. As a member of the ANSI/ISO C++ committee, Danny has been involved with every aspect of the language, deciding the rationale behind every new feature of the language and the recommended ways of using it. He has taken part in C++ projects in such diverse fields as data processing, networking, real-time programming, virtual machines, GUI, AI, automated speech synthesis and processing, compilers and parsers.

http://rapidshare.com/files/131525443/Ans_Iso_C___Pr0fess_onal_Rilwis.tk.rar


UNIX User’s Handbook (2nd Edition)




Back Cover Copy

The in-depth UNIX guide for every end-user: completely updated and full of examples!

* For every key UNIX platform: practical examples, real depth!
* Covers all basic UNIX commands, plus sed, grep, awk, vi, and more
* Complete shell programming coverage—plus NEW programming section covering C/C++, Java(tm), and Internet development
* KornShell, Bash, C Shell, and Shell Programming
* Windows interoperability, in depth: Samba, NFS, Windows 2000 Services for UNIX, and much more

UNIX end-users desperately need an up-to-date reference guide with real depth: one that teaches UNIX commands and doesn’t just list them! In UNIX User’s Handbook, Second Edition, best-selling UNIX author Marty Poniatowski covers every topic UNIX users need to master—with exceptional clarity and practical, real-world examples. Part I brings together thorough coverage of virtually every key aspect of day-to-day UNIX operation and end-user administration. Part II presents an in-depth programming reference. Part III covers every leading option for Windows interoperability. You’ll find fast, easy answers for all this and more:

* Getting started: login, mail, Internet access, and key UNIX file management commands
* All basic UNIX commands and a complete UNIX file system overview (cd, cp, file, ls, mv, pwd, rm, rmdir, cut, paste, split, sort, diff, and more)
* Key UNIX tools—including in-depth coverage of find, vi, find, grep, sed, and awk
* Shells and shell programming: Bash, Korn, and C
* Full programming section—including a NEW user-centered introduction to C/C++ and Java
* End-user administration: processes, startup, shutdown, users/groups, backup, software management, printing, and more
* Networking and Internet protocols
* UNIX/Windows interoperability: Samba, X Window, NFS, Posix, Windows 2000 Services for UNIX, and other alternatives
* Performance and monitoring

This new edition has been updated throughout and redesigned for even faster, easier access to information. Whatever your experience, whatever UNIX version you use, you won’t find a more useful reference!

About the Author

MARTY PONIATOWSKI, a technical consultant for Hewlett-Packard in the New York metropolitan area, has worked with UNIX systems since 1981. His best-selling books include HP-UX 11i System Administration Handbook and Toolkit and HP-UX 11.x System Administration “How To” Book (Prentice Hall PTR).

http://rapidshare.com/files/130809389/UNIX_User_s_H_ndbook__2nd_Edition__Rilwis.tk.rar




Hãy thử http://rilwis.tk/software/download-portable-password-protect-usb.html xem sao !

UNIX Fault Management: A Guide for System Administrators




Book Info
Designed to help you maximize system integrity and availability on any Unix system-including clusters, monitor systems, disks, networks applications, and databases, with tips for recovery and prevention. Provides quick reference diagnostics and recovery section for systems operators. Softcover. DLC: UNIX (Computer file).

From the Inside Flap
Preface

This book is intended for system administrators and operators who are responsible for maintaining the integrity and availability of mission-critical UNIX systems. The book provides a description of the fault monitoring tools and techniques available for UNIX servers, including systems that are configured as high availability clusters.

This book can therefore be a handy quick reference for an operator trying to troubleshoot a problem in the customer environment, by pointing out where to find key diagnostic messages and describing how to take recovery actions.

A system administrator responsible for the initial configuration and administration of UNIX systems will also find this book useful because it describes the procedures to follow to set up the appropriate levels of system monitoring. The product descriptions can also help in making purchasing decisions as the customer determines the appropriate amount of event monitoring needed in their environment.

An overview of the tasks performed by an operator is provided, with details on how events are received and processed. The remainder of the book focuses on the types of events that can be received, how they are detected, how operators receive event notifications, and how problems can be investigated and recovery performed. The goal is to introduce the necessary tools, but not to show how every possible problem can be solved.

This book provides numerous descriptions of how fault management tools and products can be used to solve a variety of problems. Many of the chapters are focused on specific computer components, such as disks or databases, to be helpful to operators with specific roles. Here is a description of the individual chapters:

Chapter 1, “Analyzing the Role of System Operators,” describes the tasks performed by a system operator and the evolution of fault management.
Chapter 2, “Enumerating Possible Events,” describes the various types of events that are interesting to monitor on a UNIX system.
Chapter 3, “Using Monitoring Frameworks,” describes monitoring frameworks and the administrative tasks that must be done before they can be used.
Chapter 4, “Monitoring the System,” describes the tools and products used to monitor the UNIX server.
Chapter 5, “Monitoring the Disks,” describes the tools and products used to monitor external disk devices.
Chapter 6, “Monitoring the Network,” provides an overview of the many tools available for detecting problems and events related to the use of the network.
Chapter 7, “Monitoring the Application,” describes methods for monitoring the response times and availability of critical applications.
Chapter 8, “Monitoring the Database,” focuses specifically on tools to detect problems and events related to database usage.
Chapter 9, “Enterprise Management,” discusses the problems with trying to deal with fault management for the large-scale customer enterprise.
Chapter 10, “UNIX Futures,” discusses the future plans of some of the major UNIX system vendors in the area of fault management.
Appendix A, “Standards,” describes fault management standards that have emerged and how you can benefit from them.

The Glossary contains the important terms used in the book, and their definitions.
Although it is assumed that most customers concerned about fault management will implement high availability solutions, this book does not describe how to create highly available computing environments. Readers needing additional information on high availability may check Hewlett-PackardÕs external Web site on high availability (hp/go/ha) or read Clusters for High Availability by Peter Weygant.

In general, this book does not discuss the configuration and installation of the hardware and software components of your UNIX system. You should rely on your vendorsÕ product manuals for this.

Many of the examples used in this book were created on HP-UX servers. Other UNIX platforms behave similarly, and we note when tools are supported only on certain UNIX platforms.

http://rapidshare.com/files/130836598/UNIX_Fault_Management_Rilwis.tk.rar

BEA WebLogic Server Administration Kit (Prentice Hall PTR Advanced Web Development)




From the Back Cover
* The definitive guide to administering WebLogic Server 7!
* Maximizing performance, reliability, and efficiency
* Covers architecture, domains, clustering, JDBC, JMS, monitoring, and much more
* Includes 90-day trial version of WebLogic Server 7

WebLogic Server 7 administration complete: Maximizing efficiency, reliability, and performance.

BEA WebLogic Server Administration Kit is the definitive guide to administering BEA WebLogic Server 7! Scott Hawkins starts where the documentation leaves off, illuminating crucial concepts and offering practical guidance for maximizing the performance, reliability, and efficiency of any WebLogic Server system. Unlike previous books on BEA WebLogic Server, this book is 100% focused on administration—and it presents essential techniques you simply won’t find anywhere else. Coverage includes:

* Installing, starting, and stopping WebLogic Servers
* Defining effective Web Logic Server architectures
* Establishing and managing WebLogic Server domains
* Managing HTTP services
* Creating and working with WebLogic Server clusters
* Configuring and managing JDBC and JMS
* In-depth coverage of monitoring and performance tuning
About the Author

SCOTT HAWKINS is a computer consultant living in Atlanta, GA. His books include Linux Desk Reference, Second Edition (Prentice Hall PTR) and Apache Web Server Administration & E-Commerce Handbook. With Ellie Quigley, he is co-author of The Complete Linux Shell Programming Training Course (PTG Interactive).

http://rapidshare.com/files/130835497/BEA_W3bL0gic_S3rver_Adm_nistr_tion_K_t__Rilwis.tk.rar


Windows XP for Power Users: Power Pack




Product Description
* Shows power users how to take Windows XP to the next level, focusing on functionality, networking, and overall performance
* Features to-the-point coverage that skips introductory explanations and focuses instead on the real-world tips and tricks power users need to become more productive
* Written in a friendly, approachable style by experienced XP author and power user Curt Simmons
* Topics covered include scripting, managing applications, making the most of digital media, power management, hardware management, the registry and file systems, security, auditing, backup and data storage, system performance, system recovery, Microsoft’s popular download XP Power Toys, networking, and wireless

From the Back Cover
Everything you need to know about

* Using third-party interface and application compatibility tools
* Working with digital media applications
* Managing power, security, hardware, and software
* Auditing files and restoring data
* Setting up wireless, workgroup, and remote networks
* Applying Service Pack 1 for improved security, compatibility, and stability
* Maximizing system performance
* Having fun with Windows XP Power Toys

Learn how you can harness all the power of Windows XP

If you’re ready to use all the features of Windows XP to your best advantage, here’s how to sharpen your skills as a power user. This book enables you to take control of the system, configure operating system services, build and manage networks, handle the interface, expand XP’s capabilities with scripting, enhance security features, experiment with Power Toys, and a whole lot more. Packed with step-by-step instructions and thorough coverage of configuration and performance, it takes you to a new level of Windows expertise.

About the Author
Curt Simmons is a technical trainer and author of more than thirty books on Microsoft® and Internet technologies, including several bestsellers. Considered an expert on Microsoft Office and Windows, he recently penned Windows XP Secrets, Windows XP Headaches, Windows XP Networking Inside Out and How to Do Everything with Windows XP.

http://rapidshare.com/files/130817792/Windows_XP_for_Power_Users_Power_Pack_Rilwis.tk.rar

The Oxford Essential Guide to Writing




Writing is my most time-consuming hobby and I have found that this book is a great introduction to the basic skills involved in writing. Whether you are a professional or a beginner, it’s helpful to have this guide to establish a basic foundation for writing effectively. It is also a great reference tool in case you happen to forget one of the basic techniques.

TITLE: The Oxford Essential Guide to Writing
Author: Thomas S. Kate
Paperback: 464 pages
Publisher: Berkley (July 10, 2000)
Language: English
ISBN-10: 0425176401
ISBN-13: 978-0425176405

http://rapidshare.com/files/130800073/The.Oxford.Essential.Guide.to.Writing_Rilwis.tk.rar


 
Go to Page:  First Page Page 1 2 3 4 6 7 8 Page 9 Last Page

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|