banner

[Rule] Rules  [Home] Main Forum  [Portal] Portal  
[Members] Member Listing  [Statistics] Statistics  [Search] Search  [Reading Room] Reading Room 
[Register] Register  
[Login] Loginhttp  | https  ]
 
Messages posted by: BíchNgọc  XML
Profile for BíchNgọc Messages posted by BíchNgọc [ number of posts not being displayed on this page: 1 ]
 
AIO Longtion Softwares




File Type: exe
File Size: 26.3MB

Contents:

Audio CD Burner 2.0 - Full
AutoRun Pro 7.0.0.59 - Full
AutoRun Pro Enterprise 12.0.4.132 - Full
Data CD Burner 2.0.0.8 - Full
FlashDemo Pro 4.0.0.32 - Full
GIF Animator 5.0.0.32 - Full
Shell Controls ActiveX 2.0 - Full
SlideShow Pro 5.0.0.10 - Full

Download:

http://rapidshare.com/files/88864374/Longtion_AIO_www.Gold4Rum.net.rar

Or

http://www.megaupload.com/?d=41CSRT6G

Thân

80 Portable Utilities




An excellent set of portable programs and utilities.

Title: 80 portables
Category: portable
Developer: different
Year: 2005-2007
Call ... in CD | Type: 1
File Size: 120 MB
Call ... in desks: 2
Store at: Rapidshare.com
about: Great set of portable programs and utilities.

Download

http://rapidshare.com/files/81952455/portablesCM.part1.rar

http://rapidshare.com/files/81953277/portablesCM.part2.rar

Thân
Rapidshare Tools 2008 AIO




Contents

Briefcase Leecha V1.83

Easy File Search Plugin Maker V1.0

Get Rapidshare V6.0Link Grabber v3.1.4

MaC Rapid V1.6a

Premium Account Checker115

RS Premium AccountsRapget V0.9.6.

BetaRapid Leecher V4.5

BetaRapidmule

Rapidshare Downloader

RapidShare - the way YOU like it!

RapidShare Anti-Leech Decrypter 4.0

RapidShare Checker

Rapidshare Decoder

Rapidshare Hacking V1.0

Rapidshare Leeching Scripts

RapidShare Links Decoder

Rapidshare Time Resetter

Mega Leecher V1.0.4

US DownloaderUnlimited

Rapidshare with IE

Renew IP - Gigaset SE105

DSL CableRapidUp V1.1

Rapidshare, Megaupload Speeder


http://rapidshare.com/files/88132929/RSaio08.rar

Thân
Wireless Network Hacks & Mods for Dummies




Fun projects and valuable content join forces to enable readers to turn their wireless home network into a high-performance wireless infrastructure capable of entertainment networking and even home automation
Step-by-step instructions help readers find, buy, and install the latest and greatest wireless equipment
The authors are home tech gurus and offer detailed discussion on the next-generation wireless gear that will move the wireless LAN beyond computers and into telephony, entertainment, home automation/control, and even automotive networking
The number of wireless LAN users in North America is expected to grow from 4.2 million current users to more than 31 million by 2007


Download:

http://rapidshare.com/files/87687633/Wireless_Network_Hacks___Mods_for_Dummies.rar

Password:
ardan

Thân
Online Eye




























Onlineeye is a small, easy to use TCP/IP protocol monitor which can be used
to see your exact throughput on both incoming and outgoing data - whether
you're using a modem, cable modem, DSL, or even local network!

It doesn't just stop there, it lets you see how quickly your data goes from
your computer to another computer on the internet; it even will tell you how many
other computers your data must go through to get there! But wait - there's more!

A zoomable and printable graph shows time and speed history, allowing you to see
what Internet activity took place when you were away from the computer.

The active taskbar icon graphs the current speed. A networkmonitor shows
every internetactivity of your DSL connection and let you unmask all spys !

Code:

http://www.pmasoft.net/download/onlineeye.exe

Fix:

http://rapidshare.com/files/87297605/keygen.rar

http://www.mediafire.com/?8w1ha2yntpn

http://www.megaupload.com/?d=J3TCKSMI

Thân



Online Eye




























Onlineeye is a small, easy to use TCP/IP protocol monitor which can be used
to see your exact throughput on both incoming and outgoing data - whether
you're using a modem, cable modem, DSL, or even local network!

It doesn't just stop there, it lets you see how quickly your data goes from
your computer to another computer on the internet; it even will tell you how many
other computers your data must go through to get there! But wait - there's more!

A zoomable and printable graph shows time and speed history, allowing you to see
what Internet activity took place when you were away from the computer.

The active taskbar icon graphs the current speed. A networkmonitor shows
every internetactivity of your DSL connection and let you unmask all spys !

Code:

http://www.pmasoft.net/download/onlineeye.exe

Fix:

http://rapidshare.com/files/87297605/keygen.rar

http://www.mediafire.com/?8w1ha2yntpn

http://www.megaupload.com/?d=J3TCKSMI

Thân



UnHackMe 4.5.282 Final




UnHackMe allows you to detect and remove a new generation of Trojan programs - invisible Trojans. They are called rootkits. A rootkit is a collection of programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network. The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. It hides their files, registry keys, and process names, and network connections from your eyes. Your antivirus could not detect such programs because they use compression and encryption of its files.

Code:

http://rapidshare.com/files/59580199/UnHackMe_4.5.rar

Thân
ftp://ftp.freenet.de/pub/filepilot/windows/

Thân
Linux Kernel Development (2nd Edition)




Linux Kernel Development (2nd Edition) (Novell Press)
By Robert Love

* Publisher: Novell Press
* Number Of Pages: 432
* Publication Date: 2005-01-22
* ISBN-10 / ASIN: 0672327201
* ISBN-13 / EAN: 9780672327209
* Binding: Paperback

Book Description:

The Linux kernel is one of the most important and far-reaching open-source projects. That is why Novell Press is excited to bring you the second edition of Linux Kernel Development, Robert Love’s widely acclaimed insider’s look at the Linux kernel. This authoritative, practical guide helps developers better understand the Linux kernel through updated coverage of all the major subsystems as well as new features associated with the Linux 2.6 kernel. You’ll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development.

http://rapidshare.com/files/2757460/linuxkd2.rar

Thân
Wi-Fi Toys 15 Cool Wireless Projects




409 pages | PDF | 8.9 Mb | RS $ MU

This ultra-cool volume invites readers to tap into your inner geek and build seventeen ultra-cool wireless devices including a solar powered access point, a wireless picture frame that dynamically changes its own photos, and even a wireless car-to-car audio and video system.

Code:

http://www.megaupload.com/?d=TYTPZIL7

Code:

Password: www.BayW.org

Thân
PDF Word Processing AIO




Convert PDF to Text, Text to PDF, and PDF to Word

Download

http://rapidshare.com/files/87301587/Wdpg.rar

Thân

CCNA Exam Prep (Exam 640-802) (2nd Edition) (Exam Prep)




CCNA Exam Prep (Exam 640-802) (2nd Edition) (Exam Prep)
By Jeremy Cioara, David Minutella, Heather Stevenson

* Publisher: Que
* Number Of Pages: 1008
* Publication Date: 2007-12-28
* ISBN-10 / ASIN: 0789737132
* ISBN-13 / EAN: 9780789737137
* Binding: Paperback

Book Description:

The CCNA Exam Prep, Second Edition, is an in-depth training guide for the new CCNA (Cisco Certified Network Associate) certification from Cisco. Published in the popular Exam Prep series, the book incorporates all the topics tested in this newly-revised exam, including new security, VPN, wireless, IPv6, and troubleshooting coverage. The authors emphasize sub-netting concepts because this is historically a difficult roadblock for Cisco certification candidates. This Exam Prep covers all the exam objectives and will give you a thorough understanding of each testable concept in addition to real-world configuration examples for configuring a wide range of Cisco devices. The Prep begins with an objectives quick reference and includes chapter summaries with a list of key terms, exercises, review questions, and an exam on chapter content with detailed answers. Exam Preps include notes, tips, cautions, and exam alerts to help you focus on important issues. If you are preparing for this exam you will find the Exam Prep series to be the complete certification solution for the CCNA exam.

Download

http://rapidshare.com/files/85241760/0789737132.rar

Thân
Crypto




Crypto
By Stephen Levy

* Publisher: Allen Lane
* Number Of Pages: 352
* Publication Date: 2001-01-25
* ISBN-10 / ASIN: 0713993464
* ISBN-13 / EAN: 9780713993462
* Binding: Hardcover

Download Description:

“Crypto is about privacy in the information age and about the nerds and visionaries who, nearly twenty years ago, predicted that the Internet’s greatest virtue–free access to information–was also its most perilous drawback: a possible end to privacy. Levy explores what turned out to be a decisive development in the crypto wars: the unlikely alliance between the computer geeks and big business as they fought the government’s stranglehold on the keys to information in a networked world. The players come alive here in a narrative that reads like the best of futuristic spy fiction. There is Whit Diffie, the long-haired Newton of crypto who invented the astounding “”public key”" solution; David Chaum, whose “”anonymous digital money”" actually threatened the global financial infrastructure; and “”cypherpunks”" like Phil Zimmermann, who freely distributed military-strength codes under the nose of the U. S. government. There is also the first behind-the-scenes account of what the secretive National Security Agency really had in mind when it created the controversial “”clipper chip”"–and how the Clinton administration bungled the operation. Sure to appeal to everyone who kept David Kahn’s sweeping The Codebreakers in print for more than thirty years and readers who are making Neal Stephenson’s Cryptonomicon, Mark’s Between Silk and Cyanide, and Singh’s The Code Book bestsellers, Crypto will soon be the new classic of its subject. Crypto is a bestselling book and winner in the category of best Non-Fiction eBooks for the International eBook Award Foundation 2001 eBook awards ceremony in Frankfurt, Germany.”

pass : bigthing

http://www.filefactory.com/file/c40468/

Thân
Absolute FreeBSD: The Complete Guide to FreeBSD




Book description
FreeBSD—the powerful, flexible, and free Unix-like operating system—is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.

Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas considers this completely revised and rewritten second edition of his landmark work to be his best work ever; a true product of his love for FreeBSD and the support of the FreeBSD community. Absolute FreeBSD, 2nd Edition covers installation, networking, security, network services, system performance, kernel tweaking, filesystems, SMP, upgrading, crash debugging, and much more, including coverage of how to:

* Use advanced security features like packet filtering, virtual machines, and host-based intrusion detection
* Build custom live FreeBSD CDs and bootable flash
* Manage network services and filesystems
* Use DNS and set up email, IMAP, web, and FTP services for both servers and clients
* Monitor your system with performance-testing and troubleshooting tools
* Run diskless systems
* Manage schedulers, remap shared libraries, and optimize your system for your hardware and your workload
* Build custom network appliances with embedded FreeBSD
* Implement redundant disks, even without special hardware
* Integrate FreeBSD-specific SNMP into your network management system.

Whether you're just getting started with FreeBSD or you've been using it for years, you'll find this book to be the definitive guide to FreeBSD that you've been waiting for.

About the Author
Michael W. Lucas is a network/security engineer with extensive experience working with high-availability systems. He is the author of the critically acclaimed Absolute BSD, Absolute OpenBSD, Cisco Routers for the Desperate, and PGP & GPG, all from No Starch Press.

Quote:
Date: Nov 2007
Filesize: ~7,12 MB
Format: PDF
Author: Michael W. Lucas
Publisher: No Starch Press

http://rapidshare.com/files/87729110/NSPAFTCGtF.rar.html

Thân
Linux System Programming




Book description
This book is about writing software that makes the most effective use of the system you're running on -- code that interfaces directly with the kernel and core system libraries, including the shell, text editor, compiler, debugger, core utilities, and system daemons. The majority of both Unix and Linux code is still written at the system level, and Linux System Programming focuses on everything above the kernel, where applications such as Apache, bash, cp, vim, Emacs, gcc, gdb, glibc, ls, mv, and X exist.

Written primarily for engineers looking to program (better) at the low level, this book is an ideal teaching tool for any programmer. Even with the trend toward high-level development, either through web software (such as PHP) or managed code (C#), someone still has to write the PHP interpreter and the C# virtual machine. Linux System Programming gives you an understanding of core internals that makes for better code, no matter where it appears in the stack. Debugging high-level code often requires you to understand the system calls and kernel behavior of your operating system, too.

Key topics include:

* An overview of Linux, the kernel, the C library, and the C compiler
* Reading from and writing to files, along with other basic file I/O operations, including how the Linux kernel implements and manages file I/O
* Buffer size management, including the Standard I/O library
* Advanced I/O interfaces, memory mappings, and optimization techniques
* The family of system calls for basic process management
* Advanced process management, including real-time processes
* File and directories-creating, moving, copying, deleting, and managing them
* Memory management -- interfaces for allocating memory, managing the memory you have, and optimizing your memory access
* Signals and their role on a Unix system, plus basic and advanced signal interfaces
* Time, sleeping, and clock management, starting with the basics and continuing through POSIX clocks and high resolution timers

With Linux System Programming, you will be able to take an in-depth look at Linux from both a theoretical and an applied perspective as you cover a wide range of programming topics.

About the Author
Robert Love has been a Linux user and hacker since the early days. He is active in, and passionate about, both the Linux kernel and GNOME desktop communities. His recent contributions to the Linux kernel include work on the kernel event layer and inotify. GNOME-related contributions include Beagle, GNOME Volume Manager, NetworkManager, and Project Utopia. Currently Robert works in the Open Source Program Office at Google.

As an author, Robert is responsible for Linux Kernel Development (SAMS), now in its second edition, and Linux System Programming (O'Reilly). He is also a coauthor of the fifth edition of O'Reilly's Linux in a Nutshell. He's a Contributing Editor for Linux Journal, has written numerous articles, and has been invited to speak around the world on Linux.

Robert graduated from the University of Florida with a B.A. in Mathematics and a B.S. in Computer Science. Hailing from South Florida, he currently calls Boston home.
Quote:
Date: Sep 2007
Filesize: ~2,36 Mb
Format: PDF
Author: Robert Love
Publisher: O'Reilly Media, Inc.

http://rapidshare.com/files/86882851/OLSP.rar.html

Thân
The Best Damn Server Virtualization Book Period




Book description
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot.

Virtualization allows you to consolidate many servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs. Readers of this book will easily be able to plan and deploy VMware, Microsoft Virtual Server, and Xen.

Key Features:

* Create a virtual network to exchange information or provide a service to other virtual machines or computers.
* Use virtualization to support removable media such as CD or DVD optical disks
* Reduce server costs, administration overhead, and complexity

Biography
David Rule Jr. (VMware VCP, VAC, MCP, Citrix CCEA, CCA) is a Senior Consultant for Choice Solutions LLC, an Overland Park, KS-based systems integrator that provides IT design, project management, and support for enterprise computing systems. David's primary role is in developing virtualization strategies for Choice Solutions' clients.

Quote:
Date: Nov 2007
Filesize: ~34,6 Mb
Format: PDF
Authors: Rogier Dittner, David Rule
Publisher: Syngress Publishing

http://rapidshare.com/files/86613854/STBDSVBP.rar.html

Thân
WIFI Hack Re Upload

http://rapidshare.com/files/47770930/WiFi_Hack.rar

http://www.megaupload.com/?d=5E2YKBRJ

Thân
PC Security Tweaker 7.4





PC Security Tweaker is a security tweaking utility you can use to tweak Windows-based computers. It is compatible with all Windows versions and lets you control which users are allowed to access your PC and the level of access each user may have. You can choose to tweak access to lots of Control Panel applet functions, including Display, Network, Passwords, Printers, System, Add/Remove Programs, etc. You can enforce users to use separate system profile folders and provide them with their own custom shell folders such as Desktop, Start Menu, Favorites, My documents.

Additionally, by tweaking, you can: disable selected Start Menu items, lock and protect disk drives in My Computer, disable the DOS and command prompt, interruption boot keys, real DOS mode, Registry editing, taskbar, task manager, and network access, hide desktop icons, and much more. You can password-protect Windows and restrict users to running specific applications only. Security tweaks can be applied universally or just to specific users. This software also lets you tweak Internet Explorer to secure web browsing.

http://rapidshare.com/files/86922644/PC_SecTweaker_7.4.smforum.net.rar.rar

Thân
PC Tools Complete Software




The award winning software firm, PC Tools. All there current software up to date in one AIO file.

Spyware Doctor
Spyware Doctor with Antivirus
Registry Mechanic
Desktop Maestro
Privacy Guardian
Spam Monitor
File Recover


Download


http://rapidshare.com/files/87316853/Pctl.rar

THân

Securing & Optimizing Linux: The Hacking Solution




PDF, 6 MB

The book provides through its 47 chapters, a comprehensive collection of Linux security products and explains in the most simple and structured manner how to safely and easily configure and run many popular Linux-based applications and services, including Exim, Qmail, Apache 2, DHCP, Anti-Virus, Anti-Spam, Anti-Relaying, ProFTPD, and many others. The author of the book relentlessy searches and document new hacking solutions to bring you in this manual the most up-to-date security developments.

download:

http://rapidshare.com/files/87257740/Securing_Optimizing_linux_borneo.pdf

Thân
Ultimate Registry Tools AIO




An AIO containing all the must have registry tools. Cleaners, bug fixes, doctors etc there all here.

Download

http://rapidshare.com/files/87295305/RgyaI.rar

Thân

CoffeeCup 39 in 1 AIO




Download

http://rapidshare.com/files/87353899/Cfe1.rar

http://rapidshare.com/files/87350942/Cfe2.rar

Thân

Download Managers AIO




All the best download managers on the market, AIO'd by optimusrhyme for your convenience.

AIO Includes

Flash Get
Get Right
Re-get Pro
Internet Download Manager
Neo Downloader Lite
Star Downloader Pro
Download Accelerator Plus
YouTube Downloader

Download

http://rapidshare.com/files/87305091/Dlmr.rar

Thân

Vista Tweakers AIO




Tuneup Vista 2008
MAC Makeup
TweakVista v0.85
Vista Manager x64
Vista Manager x86

Download

http://rapidshare.com/files/87308903/Vtks.rar

Thân

TCP/IP Analysis and Troubleshooting Toolkit




Paperback: 416 pages
Publisher: Wiley; 1st edition (July 18, 2003)
Language: English
ISBN-10: 0471429759
ISBN-13: 978-0471429753

A must-have guide for troubleshooting and analyzing TCP/IP on the Internet and corporate network
Follows a practical approach to ensure that TCP/IP stays up and running
Describes problems based on actual scenarios in the field and presents proven solutions to deal with them
Explains how to use available tools and utilities to their maximum advantage
Companion Web site includes samples scenarios and code from the book

File Size : 12.57 MB

Download Ebook :

http://w13.easy-share.com/15249781.html

Thân
"How to Cheat at Securing Linux"




James Stanger, "How to Cheat at Securing Linux"
Syngress | ISBN 1597492078 | September 30, 2007 | 546 Pages | PDF | 8.2 MB

“ Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. But this was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact OPPOSITE story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers. ”


CODE

http://rapidshare.com/files/73395195/Syngress.How.to.Cheat.at.Securing.Linux.Sep.2007.eBook-BBL.rar

Thân
Upgrading And Repairing Networks




Related news:
# Ethernet Networks - Design, Implementation, Operation, Management
# Avanquest Pure Networks Network Magic 2
# Home Networking Bible
# Upgrading and Repairing PCs 17th Edition
# Configuring and Troubleshooting Windows XP Professional

Upgrading and Repairing Networks, Fifth Edition is the definitive guide for anyone with a network, from home networking enthusiasts to professional network administrators. The book explains network architectures and protocols using plain English and real-world examples, and gives valuable insight for fixing network problems. This updated edition includes the latest on network planning and design, and building a network using wired, wireless, or both technologies. It covers the latest updates in Windows XP Service Pack 2, as well as Gigabit Ethernet, virtual LANs, Bluetooth, WAP, security, firewalls, and VPN use.

download:

http://rapidshare.com/files/87255322/Upgrading_And_Repairing_Networks_up_by-borneo.rar


Thân
The Java Web Services by SUN

The Java Tutorials are practical guides for programmers who want to use the Java programming language to create applications. They include hundreds of complete, working examples, and dozens of lessons. Groups of related lessons are organized into “trails”.

For the most up-to-date version, see java.sun.com/docs/books/tutorial.

The Java Tutorials describe features that are new for Java SE 6. For best results, download JDK 6.
Trails Covering the Basics
These trails are available in book form as The Java Tutorial. To buy this book, refer to the box to the right.

* Getting Started — An introduction to Java technology and lessons on installing Java development software and using it to create a simple program.
* Learning the Java Language — Lessons describing the essential concepts and features of the Java Programming Language.
* Essential Java Classes — Lessons on exceptions, basic input/output, concurrency, regular expressions, and the platform environment.
* Collections — Lessons on using and extending the Java Collections Framework.
* Swing — An introduction to the Swing GUI toolkit, with an overview of features and a visual catalog of components. See below for a more comprehensive tutorial on Swing.
* Deployment — How to package applications and applets using JAR files, and deploy them using Java Web Start and Java Plug-in.

Creating Graphical User Interfaces
This trail is available in book form as The JFC Swing Tutorial. To buy this book, refer to the box to the right.

* Creating a GUI with JFC/Swing — A comprehensive introduction to GUI creation on the Java platform.

Specialized Trails and Lessons
These trails and lessons are only available as web pages. Note that some of this material is currently undergoing revision.

* Custom Networking — An introduction to the Java platform’s powerful networking features.
* The Extension Mechanism — How to make custom APIs available to all applications running on the Java platform.
* Full-Screen Exclusive Mode API — How to write applications that more fully utilize the user’s graphics hardware.
* Generics — An enhancement to the type system that supports operations on objects of various types while providing compile-time type safety. Note that this lesson is for advanced users. The Java Language trail contains a Generics lesson that is suitable for beginners.
* Internationalization — An introduction to designing software so that it can be easily be adapted (localized) to various languages and regions.
* JavaBeans — The Java platform’s component technology.
* JDBC Database Access — Introduces an API for connectivity between the Java applications and a wide range of databases and a data sources.
* RMI — The Remote Method Invocation API allows allows an object to invoke methods of an object running on another Java Virtual Machine.
* Reflection — An API that represents (”reflects”) the classes, interfaces, and objects in the current Java Virtual Machine.
* Security — Java platform features that help protect applications from malicious software.
* Sound — An API for playing sound data from applications.
* 2D Graphics — How to display and print 2D graphics in applications.

http://rapidshare.com/files/741106/SuN___-_THe_JaVa_WeB_SeRViCeS_TuToRiaL_.rar

Thân
Hacking Tools




















Code:

http://rapidshare.com/files/74817194/UHT2007.part1.rar

Code:

http://rapidshare.com/files/74817758/UHT2007.part2.rar

Thân
 
Go to Page:  First Page Page 2 3 4 5 7 8 9 Page 10 Last Page

Powered by JForum - Extended by HVAOnline
 hvaonline.net  |  hvaforum.net  |  hvazone.net  |  hvanews.net  |  vnhacker.org
1999 - 2013 © v2012|0504|218|