|
|
Exe Password v7.1.1.4
Exe Password
Lets you protect any EXE file with its own password. It does this by storing the password
directly in the EXE file. It is a simple matter to add a password to a file: Just select the desired file on the
desktop, in the start menu or in Explorer, open the context menu by right-clicking, select Password protection,
enter the password, and you’re done. From that time on, a password will be required to run the EXE file.
Install Notes:
1)Run Exe Password v7.1.1.4.exe
2)Use Keygen for ACTIVATION
3)Enjoy.
MEDIAFIRE LINK:
http://www.mediafire.com/?1x42y0m0y4k
RAPIDSHARE LINK:
http://rapidshare.com/files/93282072/Exe_Password.rar
Thân
|
|
|
Compress software Aio
If you need to unzip/compress something
this is the ultimate tool for you.
including all compress software's on the market!
Kgb Archiver included!
Download:
http://rapidshare.com/files/46732865/compression.rar
Thân
|
|
|
Vista converter
Like the look of Vista but hate the os?
Well now you can have the look of vista without the hassel of actually getting vista with this program!!!
Inside you can pick and edit diffrent bits of vista to mix with XP to create your perfect look
http://rapidshare.com/files/60197888/Xp_to_vista_transformation.rar
Thân
|
|
|
Pc boost
Always wanted to tune up your ram?
or make your computer run 300% faster?
with this aio you can do it all!!
Loads of boosting programs are included in this package!!
Really recomended!!
Download:
http://rapidshare.com/files/61381520/Pc_boost.rar
Thân
|
|
|
Wireless Hack Toolz!!
http://rapidshare.com/files/92814434/Wireless_-_www.cw-network.info.rar
Thân
|
|
|
Wireless Hack Toolz!!
http://rapidshare.com/files/92814434/Wireless_-_www.cw-network.info.rar
Thân
|
|
|
* Advanced Password Recovery
o AccessRecovery v1.0
+ file_id.diz 0 Mb
+ doomli.nfo 0 Mb
+ embrace.nfo 0 Mb
+ factory.nfo 0 Mb
+ e-ary1
+
# arsetup.exe 1 Mb
o Advanced ACE Password Recovery v1.01
+ FILE_ID.DIZ 0 Mb
+ archpr2.exe 1 Mb
+ DiSTiNCT.EXE 0 Mb
+ beatdiz.nfo 0 Mb
+ DiSTiNCT.NFO 0 Mb
+ doomli.nfo 0 Mb
+ DISTINCT.RAR 1 Mb
o Advanced Archive Password Recovery v1.0 Beta
+ FILE_ID.DIZ 0 Mb
+ archpr.exe 1 Mb
+ DiSTiNCT.EXE 0 Mb
+ DiSTiNCT.NFO 0 Mb
+ doomli.nfo 0 Mb
+ DISTINCT
+
# setup.exe 1 Mb
# file_id.diz 0 Mb
# order.frm 0 Mb
# license.txt 0 Mb
# order.txt 0 Mb
# readme.txt 0 Mb
# whatsnew.txt 0 Mb
o Advanced Excel 97 Password Recovery v1.31
+ FILE_ID.DIZ 0 Mb
+ ae97pr-cracked.exe 2 Mb
+ DiSTiNCT.EXE 0 Mb
+ DiSTiNCT.NFO 0 Mb
+ doomli.nfo 0 Mb
+ ae97pr.zip 1 Mb
o Advanced ICQ Password Recovery v1.0
+ FILE_ID.DIZ 0 Mb
+ Copy of acqpr2.exe 1 Mb
+ DiSTiNCT.EXE 0 Mb
+ DiSTiNCT.NFO 0 Mb
+ doomli.nfo 0 Mb
+ acqpr.zip 1 Mb
o Advanced Office 2000 Password Recovery v1.02
+ FILE_ID.DIZ 0 Mb
+ ao2000pr.exe 1 Mb
+ DiSTiNCT.EXE 0 Mb
+ DiSTiNCT.NFO 0 Mb
+ doomli.nfo 0 Mb
+ factory.nfo 0 Mb
+ DISTINCT.RAR 1 Mb
o Advanced Outlook Password Recovery v1.11
+ FILE_ID.DIZ 0 Mb
+ Aolpr2.exe 1 Mb
+ DiSTiNCT.EXE 0 Mb
+ beatdiz.nfo 0 Mb
+ DiSTiNCT.NFO 0 Mb
+ doomli.nfo 0 Mb
+ DISTINCT.RAR 1 Mb
o Advanced PDF Password Recovery v1.0
+ file_id.diz 0 Mb
+ oddcrc.exe 0 Mb
+ af.nfo 0 Mb
+ oddity.nfo 0 Mb
+ o-apdf10.rar 1 Mb
o Advanced PDF Password Recovery v1.21
+ FILE_ID.DIZ 0 Mb
+ apdfpr.exe 1 Mb
+ DiSTiNCT.EXE 0 Mb
+ DiSTiNCT.NFO 0 Mb
+ doomli.nfo 0 Mb
+ factory.nfo 0 Mb
+ DISTINCT.RAR 1 Mb
+ DISTINCT
+
# file_id.diz 0 Mb
# readme.txt 0 Mb
# license.txt 0 Mb
# order.txt 0 Mb
# whatsnew.txt 0 Mb
# setup.exe 1 Mb
# order.frm 0 Mb
o Advanced QuickBooks Password Recovery v1.05
+ FILE_ID.DIZ 0 Mb
+ Aqbpr.exe 1 Mb
+ DiSTiNCT.EXE 0 Mb
+ DiSTiNCT.NFO 0 Mb
+ doomli.nfo 0 Mb
+ aqbpr.zip 1 Mb
o Advanced Rar Password Recovery v1.11
+ FILE_ID.DIZ 0 Mb
+ arpr2.exe 0 Mb
+ beatdiz.nfo 0 Mb
+ DiSTiNCT.NFO 0 Mb
+ doomli.nfo 0 Mb
+ DISTINCT.RAR 1 Mb
Download:
http://rapidshare.com/files/92250061/adv__pass__rcvy_c.o.R.rar
Thân
|
|
|
Software DVD 2008 - Exclusive Release
Contents:
-----------------------------
Boot Magic 8.02Low Level Format
My Drivers 3.11.2600
Norton Ghost 10.0.0.8400
Norton GoBack 4.0
OS Selector 8.0.917
Partition Commander 9.01
Partition Manager 8.0 Professional
Recover My Files 3.98.5133
Undelete Plus 2.1
** CD Burners & rippers = 13
-----------------------------
Alcohol 120% 1.9.5.4521
Ashampoo Burning Studio 6.30
Audio Grabber 1.83.1
BlindWrite Suite 6.0.0.17
CloneCD 5.2.9.1
CloneDVD 2.9.0.1
Daemon Tools 4.08
Lavavo CD Ripper 4.14
Lavavo DVD Ripper 3.02
MagicISO 5.4
Nero Ultra Edition 7.5.9.1
power iso
Virtual CD 8.0.0.4 Network Management Server
** Compressor = 8
-----------------------------
Cabinet Manager 4.1.0.217
KGB Archiver 1.2.0.23
PowerArchiver 9.63.2.0
WebZIP 7.0.2.1028
WinAce 2.65
WinRAR 3.7 Final
WinZip Pro 11.0.7313
WinZip Self Extractor 3.0.7158
** Convertors = 16
-----------------------------
CHM2Word 3.0.9.15
Excel To PDF 3.0
Flash2Video 3.85.940
McFunSoft Audio Studio 6.6
McFunSoft Video Solution 7.8
MPEG4 Direct Maker 5.2.1.152
PDF2TXT 3.1
PDF2Word 2.0
Photo2DVD Studio 4.9.8.0
PicturesToExe 4.48
PowerCHM 5.5.0401
PowerPoint To Flash 2.0.1.736
PowerPoint To PDF 3.0
RM To MP3 Converter 1.48
Solid Converter PDF Professional 3.0.299
Word To PDF Converter 3.0
** Graphics = 33
-----------------------------
3D Studio Max 9.0
ACDSee Photo Manager 9.0.55
Adobe Acrobat Reader 8.0.0
Adobe Photoshop CS3 10.0
Adobe Premiere Pro 2.0
Advanced JPEG Compressor 5.0
Autoplay Media Studio
CoffeeCup Flash Website Search 5.0
CoffeeCup GIF Animator 7.5
CorelDRAW Graphics Suite X3 13.0 SP1
Flash ScreenSaver Builder 4.8
Flash Wallpaper Maker 2.00
FlipAlbum 6.0 Pro
Font Creator 5.0
Framing Studio 1.43
GIF Creator 3.35
GIF Movie Gear 4.1.2
Greeting Card Designer 4.1.1
IconCool Editor 5.30.61012
IconCool Studio 3.0
Macromedia Flash Pro 8.0
Paint Shop Pro Photo XI 11.0
Paint.NET 2.72
Photo Screensaver Maker 3.6.6
PhotoWatermark Professional 6.1.3.5
Poster 7.9t
SnagIt 8.2.0.0
Sony Photo Go 1.0
Swift 3D 4.5.479
SWiSHmax 2006.06.29
Ulead Photo Express 6.0
Ulead PhotoImpact 12.0
VueScan Pro 8.3.63
** Internet
-----------------------------
** Download Tools = 8
-----------------------------
Download Accelerator Plus 8.1.2.1
FlashGet 1.8.0.1002
Flash FXP
Fresh Download 7.64
HiDownload Pro 6.94
Internet Download Accelerator 5.1.1.1045
Internet Download Manager 5.05.3
Mass Downloader 3.2.0.631
VideoGet 1.0
** Internet Browser = 7
-----------------------------
Acoo Browser 1.53.590
Avant Browser 11.0.25
Internet Explorer 7.0 Final
Mozilla Firefox 2.0 Final
Netscape 8.1.2
Opera 9.10.8679
Slim Browser 4.08.107
** Internet Messenger = 5
-----------------------------
AOL Messenger 4.7
Google Talk 1.0.0.100
IceChat 7.0 Final
MSN Live Messenger 8.0.0812
Yahoo! Messenger 8.1.0.209
** Internet Tools = 27
-----------------------------
Adobe Shockwave Player 10.1.4.020
Becky! Internet Mail 2.27.00
Best Mail Server 2.0
ChatBlocker 2.2.2
eMule Xtreme 5.3.1
Flash Player 9.0.16.0
GMail FS 1.0.10
Google Earth 4.0.2091
Google Video Player 1.0.3.3
Hide IP Platinum 3.21
Hotmail Plus 2.0
IE Cache View 2.7.00
MailWasher Pro 5.3
Modem Spy 3.41
Mozilla Thunderbird 2.0.1
Offline Explorer Enterprise 4.4.2478
Outlook Express Protector 1.8
Rss Builder 2.1.8
RssReader 1.0.88.0
SaveFlash 3.0.67
Super Internet TV 6.8.0.0
Teleport Pro 1.42
Weather Watcher 5.6.14
Website eXtractor 9.52
WebSite Watcher 4.02
WWW2Image 1.2
YPOPs! 0.8.7
** Microsoft = 5
-----------------------------
Microsoft DirectX 9.0c (Updated)
Microsoft Office 2007 Enterprise
Microsoft.NET Framework 1.1 SP1
Microsoft.NET Framework 2.0
Microsoft.NET Framework 3.0
** Multimedia = 21
-----------------------------
3D MP3 Sound Recorder G2 4.02
Adobe Audition 2.0.5306.2
All Media Fixer Pro 6.8
AutoRun Pro Enterprise 10.0.0.105
Camtasia Studio 4.0.0
CyberLink MagicSports 3.0
CyberLink Power2Go 5.5
CyberLink PowerDirector v6
DivX Create Bundle 6.4.0
JetAudio 6.2.6.8330 Plus VX
K-Lite Codec Pack 3.20 FULL
PowerDVD 7.0.1813.0 Deluxe
ProShow Producer 2.6.1777
QuickTime Pro 7.1.3.100
RealPlayer 10.6 Build 6.0.12.1741
Sony Sound Forge 8.0d
Sony Vegas 7.0b
Winamp Pro 5.3.2
Windows Media Player 11.0.5358
WinDVD Platinum 8.0.06.086
XP Codec Pack 2.0.5
** Security = 14
-----------------------------
Ashampoo AntiSpyWare 1.50
Ashampoo Firewall 1.10
AVG Internet Security 7.5.432.867
BitDefender Internet Security 10.0
eTrust Internet Security Suite 2007 3.0.0.176
Kaspersky Internet Security 6.0.1.411
McAfee Internet Security Suite 2007 9.0
McAfee VirusScan Enterprise 8.5.0i
PC Internet Firewall Security 2.0.0.0
Spyware Terminator 1.5.00.740
Sygate Firewall Pro 5.6.3408
Symantec Antivirus Corporate Edition 10.2.276 Vista
Tiny Firewall Pro 6.5.126
Trend Micro PC Cillin Internet Security 2007 15.00.1329
** Utility = 41
-----------------------------
Ace Utilities 3.0.0.4038
Active Desktop Calendar 6.4
Advanced CAB Repair 1.2
Advanced Office Repair 1.0
Advanced PDF Repair 1.1
Advanced RAR Repair 1.1
Advanced TAR Repair 1.4
Advanced Task Manager 3.0
Advanced ZIP Repair 1.8
Ashampoo UnInstaller Platinum 2.5.0.0
Atomic Alarm Clock 4.3
Babylon Pro 6.0.0.20 Final
Diskeeper 2007 Pro Premier 11.0.686
Dr.Hardware 2006 Build 7.5.0e
Driver Cleaner Professional 1.5.114
DSL Speed 3.7
Error Doctor 2007 1.4
Fix-It Utilities Professional 7.0.2.1
Hide & Protect Any Drives 2.2
History Sweeper 2.70
Java Runtime Environment 1.6.0.0
Lock My PC 4.0.5.577
Memory Analyzer 3.72.0
MemTest 3.5
Multi Timer 1.27
Oxford Dictionary 2006
Passware Kit Enterprise 7.9.2141
Password Generator 2.3
PDF Password Remover 2.5.0.1
RegCure 1.0.0.43
RegDoctor 1.70
Registry Clean Expert 4.31
Registry Mechanic 6.00.750
Registry Optimizer 2.8
Registry Repair 1.7
System Mechanic 7.0.3
Talisman Desktop 2.98.2980
TuneUp Utilities 2006 5.3.2341
Visual Basic RunTime 6.0 SP6
WinCleaner One Click 10.1.0.0
Windows Password Expert 1.1
--------------------------------------------
TOTAL = 210
http://www.megaupload.com/?f=K7ZO28HZ
Thân
|
|
|
Contents:
-----------------------------
Boot Magic 8.02Low Level Format
My Drivers 3.11.2600
Norton Ghost 10.0.0.8400
Norton GoBack 4.0
OS Selector 8.0.917
Partition Commander 9.01
Partition Manager 8.0 Professional
Recover My Files 3.98.5133
Undelete Plus 2.1
** CD Burners & rippers = 13
-----------------------------
Alcohol 120% 1.9.5.4521
Ashampoo Burning Studio 6.30
Audio Grabber 1.83.1
BlindWrite Suite 6.0.0.17
CloneCD 5.2.9.1
CloneDVD 2.9.0.1
Daemon Tools 4.08
Lavavo CD Ripper 4.14
Lavavo DVD Ripper 3.02
MagicISO 5.4
Nero Ultra Edition 7.5.9.1
power iso
Virtual CD 8.0.0.4 Network Management Server
** Compressor = 8
-----------------------------
Cabinet Manager 4.1.0.217
KGB Archiver 1.2.0.23
PowerArchiver 9.63.2.0
WebZIP 7.0.2.1028
WinAce 2.65
WinRAR 3.7 Final
WinZip Pro 11.0.7313
WinZip Self Extractor 3.0.7158
** Convertors = 16
-----------------------------
CHM2Word 3.0.9.15
Excel To PDF 3.0
Flash2Video 3.85.940
McFunSoft Audio Studio 6.6
McFunSoft Video Solution 7.8
MPEG4 Direct Maker 5.2.1.152
PDF2TXT 3.1
PDF2Word 2.0
Photo2DVD Studio 4.9.8.0
PicturesToExe 4.48
PowerCHM 5.5.0401
PowerPoint To Flash 2.0.1.736
PowerPoint To PDF 3.0
RM To MP3 Converter 1.48
Solid Converter PDF Professional 3.0.299
Word To PDF Converter 3.0
** Graphics = 33
-----------------------------
3D Studio Max 9.0
ACDSee Photo Manager 9.0.55
Adobe Acrobat Reader 8.0.0
Adobe Photoshop CS3 10.0
Adobe Premiere Pro 2.0
Advanced JPEG Compressor 5.0
Autoplay Media Studio
CoffeeCup Flash Website Search 5.0
CoffeeCup GIF Animator 7.5
CorelDRAW Graphics Suite X3 13.0 SP1
Flash ScreenSaver Builder 4.8
Flash Wallpaper Maker 2.00
FlipAlbum 6.0 Pro
Font Creator 5.0
Framing Studio 1.43
GIF Creator 3.35
GIF Movie Gear 4.1.2
Greeting Card Designer 4.1.1
IconCool Editor 5.30.61012
IconCool Studio 3.0
Macromedia Flash Pro 8.0
Paint Shop Pro Photo XI 11.0
Paint.NET 2.72
Photo Screensaver Maker 3.6.6
PhotoWatermark Professional 6.1.3.5
Poster 7.9t
SnagIt 8.2.0.0
Sony Photo Go 1.0
Swift 3D 4.5.479
SWiSHmax 2006.06.29
Ulead Photo Express 6.0
Ulead PhotoImpact 12.0
VueScan Pro 8.3.63
** Internet
-----------------------------
** Download Tools = 8
-----------------------------
Download Accelerator Plus 8.1.2.1
FlashGet 1.8.0.1002
Flash FXP
Fresh Download 7.64
HiDownload Pro 6.94
Internet Download Accelerator 5.1.1.1045
Internet Download Manager 5.05.3
Mass Downloader 3.2.0.631
VideoGet 1.0
** Internet Browser = 7
-----------------------------
Acoo Browser 1.53.590
Avant Browser 11.0.25
Internet Explorer 7.0 Final
Mozilla Firefox 2.0 Final
Netscape 8.1.2
Opera 9.10.8679
Slim Browser 4.08.107
** Internet Messenger = 5
-----------------------------
AOL Messenger 4.7
Google Talk 1.0.0.100
IceChat 7.0 Final
MSN Live Messenger 8.0.0812
Yahoo! Messenger 8.1.0.209
** Internet Tools = 27
-----------------------------
Adobe Shockwave Player 10.1.4.020
Becky! Internet Mail 2.27.00
Best Mail Server 2.0
ChatBlocker 2.2.2
eMule Xtreme 5.3.1
Flash Player 9.0.16.0
GMail FS 1.0.10
Google Earth 4.0.2091
Google Video Player 1.0.3.3
Hide IP Platinum 3.21
Hotmail Plus 2.0
IE Cache View 2.7.00
MailWasher Pro 5.3
Modem Spy 3.41
Mozilla Thunderbird 2.0.1
Offline Explorer Enterprise 4.4.2478
Outlook Express Protector 1.8
Rss Builder 2.1.8
RssReader 1.0.88.0
SaveFlash 3.0.67
Super Internet TV 6.8.0.0
Teleport Pro 1.42
Weather Watcher 5.6.14
Website eXtractor 9.52
WebSite Watcher 4.02
WWW2Image 1.2
YPOPs! 0.8.7
** Microsoft = 5
-----------------------------
Microsoft DirectX 9.0c (Updated)
Microsoft Office 2007 Enterprise
Microsoft.NET Framework 1.1 SP1
Microsoft.NET Framework 2.0
Microsoft.NET Framework 3.0
** Multimedia = 21
-----------------------------
3D MP3 Sound Recorder G2 4.02
Adobe Audition 2.0.5306.2
All Media Fixer Pro 6.8
AutoRun Pro Enterprise 10.0.0.105
Camtasia Studio 4.0.0
CyberLink MagicSports 3.0
CyberLink Power2Go 5.5
CyberLink PowerDirector v6
DivX Create Bundle 6.4.0
JetAudio 6.2.6.8330 Plus VX
K-Lite Codec Pack 3.20 FULL
PowerDVD 7.0.1813.0 Deluxe
ProShow Producer 2.6.1777
QuickTime Pro 7.1.3.100
RealPlayer 10.6 Build 6.0.12.1741
Sony Sound Forge 8.0d
Sony Vegas 7.0b
Winamp Pro 5.3.2
Windows Media Player 11.0.5358
WinDVD Platinum 8.0.06.086
XP Codec Pack 2.0.5
** Security = 14
-----------------------------
Ashampoo AntiSpyWare 1.50
Ashampoo Firewall 1.10
AVG Internet Security 7.5.432.867
BitDefender Internet Security 10.0
eTrust Internet Security Suite 2007 3.0.0.176
Kaspersky Internet Security 6.0.1.411
McAfee Internet Security Suite 2007 9.0
McAfee VirusScan Enterprise 8.5.0i
PC Internet Firewall Security 2.0.0.0
Spyware Terminator 1.5.00.740
Sygate Firewall Pro 5.6.3408
Symantec Antivirus Corporate Edition 10.2.276 Vista
Tiny Firewall Pro 6.5.126
Trend Micro PC Cillin Internet Security 2007 15.00.1329
** Utility = 41
-----------------------------
Ace Utilities 3.0.0.4038
Active Desktop Calendar 6.4
Advanced CAB Repair 1.2
Advanced Office Repair 1.0
Advanced PDF Repair 1.1
Advanced RAR Repair 1.1
Advanced TAR Repair 1.4
Advanced Task Manager 3.0
Advanced ZIP Repair 1.8
Ashampoo UnInstaller Platinum 2.5.0.0
Atomic Alarm Clock 4.3
Babylon Pro 6.0.0.20 Final
Diskeeper 2007 Pro Premier 11.0.686
Dr.Hardware 2006 Build 7.5.0e
Driver Cleaner Professional 1.5.114
DSL Speed 3.7
Error Doctor 2007 1.4
Fix-It Utilities Professional 7.0.2.1
Hide & Protect Any Drives 2.2
History Sweeper 2.70
Java Runtime Environment 1.6.0.0
Lock My PC 4.0.5.577
Memory Analyzer 3.72.0
MemTest 3.5
Multi Timer 1.27
Oxford Dictionary 2006
Passware Kit Enterprise 7.9.2141
Password Generator 2.3
PDF Password Remover 2.5.0.1
RegCure 1.0.0.43
RegDoctor 1.70
Registry Clean Expert 4.31
Registry Mechanic 6.00.750
Registry Optimizer 2.8
Registry Repair 1.7
System Mechanic 7.0.3
Talisman Desktop 2.98.2980
TuneUp Utilities 2006 5.3.2341
Visual Basic RunTime 6.0 SP6
WinCleaner One Click 10.1.0.0
Windows Password Expert 1.1
--------------------------------------------
TOTAL = 210
http://www.megaupload.com/?f=K7ZO28HZ
Thân
|
|
|
Windows XP Tweaks
http://downtown.vc/7FGSRH6OVME4/xp tweaks.rar.html
Thân
|
|
|
Hiren's Boot CD is a boot CD containing various diagnostic programs such as partitioning agents, system performance benchmarks, disk cloning and imaging tools, data recovery tools, MBR tools, BIOS tools, and many others for fixing various computer problems. It is a Bootable CD; thus, it can be useful even if the primary operating system cannot be booted. Hiren's Boot CD has an extensive list of software. Utilities with similar functionality on the CD are grouped together and seem redundant; however, they present choices through UI differences.
Dos Bootable CD contains these utilities:
Code:
http://www.hiren.info/pages/bootcd
Download (91,8 MB):
http://rapidshare.com/files/92787173/1119DHOHOMEVI.rar
Thân
|
|
|
IP Hiders - Ultimate Tools Collection
THESE ARE SOME OF THE BEST SOFTWARES WHICH WILL HIDE UR IP ADRESS FROM THE WORLD
KEYGENS AND CRACKS INCLUDED OF COURSE.
1# EASY HIDE IP
2#HIDE IP PLATINUM
3#HIDE IP PLATINUM 3.42
4#HIDE MY IP 2007
5#HIDE THE IP
Key Features and Benefits provided by Easy-Hide-IP
Easy-Hide-IP - Secures and Anonymizes all your internet connections and allows you to: Surf any Web Sites, Instant Messenger and Chat services, Web-based Email services, Newsgroups, Web Blogs and Forums. Your Identity is Secure, Protected, and Anonymized.
» Easy-Hide-IP - Secures and Anonymizes all your internet connections and allows you to: Surf any Web Sites, Instant Messenger and Chat services, Web-based Email services, Newsgroups, Web Blogs and Forums. Your Identity is Secure, Protected, and Anonymized.
» Easy-Hide-IP protects your identity by replacing your real IP address with a different one. You will appear to access the internet from a different location, not your own. Your real location is never revealed.
» You can bypass virtually any form of censorship or internet traffic blocking imposed on you by your ISP, by your company, or by some other third parties. All your internet traffic is routed through remote servers. On your ISP's log file, only the IPs of the remote servers will be shown, not the sites you have visited.
» You do not need to worry about your ISP or some other Entities monitoring your internet activities, see what you are doing, which Newsgroups, Blogs or Forums you have visited and which messages you have posted.
How Easy-Hide-IP Works
Find out how Easy-Hide-IP Works
» We use servers located strategically around the world. You can easily connect to any of the worldwide servers anytime, anywhere. Each time you press the Hide IP Now button one of the servers will be selected for use. The location is selected randomly. Each time your press Get a new IP – the server is use will be changed with a new one. Read More
» Through the secure anonymous network, you can surf the web with total anonymity and security!
» Easy-Hide-IP is designed for sensitive browsing. Use it anytime you want to protect your privacy with full confidence. What Easy-Hide-IP won't do for you is: enhance your download speed (while using Easy-Hide-IP your download speed might decrease) and will not allow you to access SSL (Secure Socket Layer) web sites so you will not be able to do online shopping.
Hide IP Platinum is the software you are looking for! Keeping your privacy is simple and easy: the only thing you need to do is open Hide IP Platinum. Hide IP Platinum will find the proxy server available to you and set it as your proxy server automatically. There is nothing need you to concern. Hide IP Platinum have done everything for you! Key Features of Hide IP Platinum:
- Hide IP Platinum searches for HIGH anonymous proxy server and makes you complete invisible to any websites you are surfing
- Protect you from any website that wants to monitor your reading interests and spy upon you through your unique IP address - your ID in the Internet
- Avoid your personal information be used to send you spam and junk emails by many marketers and advertising agencies who having information about your interests and knowing your IP address as well as your email
- Keeping your computer away from hacker attacks by hiding your IP address as well as information about your operation system
- Ability to frequently change IP addresses increases privacy
- Enable and disable Hide IP Platinum as your wish with a single click
- Bypass the restrictions by some owners of Internet resources on users from certain countries or geographical regions
- Post on bulletin boards without displaying your real IP address
- Use with a web based mail service to send anonymous email
- Doesn't like oher services force you to pay a monthly fee for anonymous surfing. For a low one-time price, you can visit whatever web sites without anyone ever finding out
INSTALLATION
1. Install the software,.
2. Use keygen to Register.
3. Enjoy.
Conceal your online identity with the click of a button. Surf anonymously, hide your IP while surfing the Internet, posting on forums, sending E-mails, instant messaging, playing games, and much more. Hiding your IP address is as simple as clicking the "Hide IP" button, which automatically configures your web browser or other application to use a proxy server from our proxy network. You can even change your IP address automatically every few minutes or automatically use an anonymous proxy when you start your computer. Select from dozens of our private network IPs or open network IPs from all over the world. Version 2007 supports the Premium High-Speed Service, providing fast IPs based in the United States, United Kingdom, and Canada. Redirect all your Web traffic through our high-speed servers with 128-bit SSL encryption support to make your browsing both secure and anonymous.
Easily Conceal Your IP Address - Just click "Hide IP" and your IP is instantly hidden! Other people see a fake IP, which is not associated with your real IP. Click here to read how it works.
Hie My IP 2007 Released March 19, 2007. More features and more IPs! Anonymous Web Surfing - Protect your privacy and cover your tracks! Select from one of our many fake proxy IP addresses for totally anonymous browsing.
Advanced Application Support - Hide My IP 2007 now works with all major browsers and dozens of instant messengers, E-mail clients, games, and more!
Protect Your Identity and Stop Hackers - Identity thieves can use your IP addresses to compromise your computer. Installing keyloggers, Trojans, and other tools to aid their crime. Stop them at the source by hiding your IP!
Send Anonymous Emails - Hide your IP in E-mail headers. Supports Webmail services like Yahoo, Hotmail, and GMail. Mail clients supported with a Premium account include Outlook, Outlook Express, Eudora, and more!
Un-ban Yourself From Forums, Blogs, Etc... - By faking your IP you can often access many sites you were banned from. Combine with Cookie Crumble for the most effectiveness.
http://rapidshare.com/files/69588067/BEST_IP_HIDERS.rar
Thân
|
|
|
Acronis Disk Director Suite 10.0 Build 2117
Acronis Disk Director Suite is the only disk partitioning software that allows you to automatically or manually resize, copy, and move partitions without losing data.
It also lets you reorganize the hard disk drive structure and optimize disk space usage. Acronis
Disk Director Suite is a software that allows you to automatically or manually resize, copy, and move partitions.
If you use your computer for different purposes or wish to try a new operating system, it is safer and more convenient to use an operating environment that is completely separate from your business applications, entertainment, children’s files and other data.
Acronis Disk Director Suite provides a powerful, reliable, and easy-to-use way to manage booting of multiple operating systems on a single PC.
In the event of the accidental loss of a partition, Acronis Disk Director Suite allows you to automatically recover any deleted or lost partition with any file system by booting from a special recovery CD or diskette, even if your operating system fails to boot.
Protected Message:
http://rapidshare.com/files/91786129/ADDS.crostuff.net.rar
Thân
|
|
|
Norton Ghost 14
Norton Ghost 14.0 protects PCs-including all applications, settings, folders, and files-with advanced backup and recovery. It provides powerful protection with new features such as offsite backups and Symantec ThreatCon integration, as well as enhanced performance, one-to-one remote management, LightsOut Restore capability, and more.
With Norton Ghost 14.0, you have a choice of backup types: full system (disk image) or specific files and folders. Backups include encryption and error checking to help keep your data safe, while compression, incremental backups, and automatic backup file management minimize storage space. Plus, you can now copy recovery points to a FTP site for easier offsite backup management.
Features:
* Full system backup (disk image)—Backs up your hard drive or partition.
* File and folder backup—Backs up only the specific files and folders you choose rather than saving an entire drive.
* File backup search—Finds and backs up specified file types such as photos, MP3 files, and documents.
* Incremental and differential backup—Backs up only files that have changed.
* Customisable, event-based backup—Triggers backups based on key events such as new program installations or sudden increases in data storage.
* NEW!: FTP backup—Copies recovery points to a FTP site for easier offsite backup management.
* NEW!: Offsite backup—backs up your files to network-attached storage devices.
* NEW!: Symantec ThreatCon integration—Leverages intelligence from Symantec’s industry-leading security research organisation by triggering incremental backups whenever ThreatCon reaches a specified threat level.
* Advanced compression and encryption—Minimises storage space and helps keep sensitive documents safe.
* System protection—Recovers your system and data even when you can’t restart the operating system.
* EXCLUSIVE!: Google Desktop™ integration—Makes data recovery even faster with searchable backup indexes.
* LightsOut Restore—Restores your system with an on-disk software recovery environment—no bootable CD required.
http://rapidshare.com/files/91447645/Symantec_Norton_Ghost_14.0_Incl_Serial.rar
Thân
|
|
|
Norton Ghost 14
Norton Ghost 14.0 protects PCs-including all applications, settings, folders, and files-with advanced backup and recovery. It provides powerful protection with new features such as offsite backups and Symantec ThreatCon integration, as well as enhanced performance, one-to-one remote management, LightsOut Restore capability, and more.
With Norton Ghost 14.0, you have a choice of backup types: full system (disk image) or specific files and folders. Backups include encryption and error checking to help keep your data safe, while compression, incremental backups, and automatic backup file management minimize storage space. Plus, you can now copy recovery points to a FTP site for easier offsite backup management.
Features:
* Full system backup (disk image)—Backs up your hard drive or partition.
* File and folder backup—Backs up only the specific files and folders you choose rather than saving an entire drive.
* File backup search—Finds and backs up specified file types such as photos, MP3 files, and documents.
* Incremental and differential backup—Backs up only files that have changed.
* Customisable, event-based backup—Triggers backups based on key events such as new program installations or sudden increases in data storage.
* NEW!: FTP backup—Copies recovery points to a FTP site for easier offsite backup management.
* NEW!: Offsite backup—backs up your files to network-attached storage devices.
* NEW!: Symantec ThreatCon integration—Leverages intelligence from Symantec’s industry-leading security research organisation by triggering incremental backups whenever ThreatCon reaches a specified threat level.
* Advanced compression and encryption—Minimises storage space and helps keep sensitive documents safe.
* System protection—Recovers your system and data even when you can’t restart the operating system.
* EXCLUSIVE!: Google Desktop™ integration—Makes data recovery even faster with searchable backup indexes.
* LightsOut Restore—Restores your system with an on-disk software recovery environment—no bootable CD required.
http://rapidshare.com/files/91447645/Symantec_Norton_Ghost_14.0_Incl_Serial.rar
Thân
|
|
|
CuteFTP Pro 8.1.0
CuteFTP Professional is a software tool for transferring files between your PC and remote computers anywhere on the Internet, securely and efficiently, over multiple Internet protocols. Its built-in Connection Wizard will walk you through connecting to an FTP site in seconds and its user-friendly interface will have you transferring files in no time, even if you are a beginner. Whether publishing a Web page, downloading the latest digital images, software and music or transferring high-volume files between branch offices. CuteFTP Professional provides simple yet powerful tools for tackling the complex challenges of data management and helps achieve HIPAA, GLBA and Sarbanes-Oxley compliance.
http://www.midload.com/en/file/23139/CuteFTP-8-Professional-Edition-Prinks-rar.html
PW:
Prinks
Thân
|
|
|
29,000 drivers for Windows
o more need to spend hours on-line browsing for drivers .
Just pop the Universal Driver CD in
and Windows will automatically search the comprehensive drivers.
This CD, (Iso format) contains software drivers for over
25,000 hardware components
from brands such as Dell, HP, Compaq, IBM, Sony, Toshiba, Panasonic,
as well as hardware component manufacturers Intel,
3Com, VIA, nVidia, ATI, SoundMax, and many more...
Protected Message:
http://rapidshare.com/files/89845929/U_D_by_Skenderbej.part1.rar
http://rapidshare.com/files/89845919/U_D_by_Skenderbej.part2.rar
http://rapidshare.com/files/89845885/U_D_by_Skenderbej.part3.rar
http://rapidshare.com/files/89845655/U_D_by_Skenderbej.part4.rar
MIRROR
http://fileegg.com/files/8301B965166ACBB
http://fileegg.com/files/55E3BDAEF585B64
http://fileegg.com/files/27FAD23957955DA
http://fileegg.com/files/8924A711AB37C45
Thân
|
|
|
TuneUp Utilities 2008 7.0.7991
Professional assistance for your Windows PC
Improve your system's performance, thoroughly clean up your hard drives, solve your PC problems with a few clicks, and customize windows to your personal requirements. All in one program, simple and intuitive - TuneUp Utilities 2008.
10 fundamental reasons for using TuneUp Utilities 2008
* Powerful hard drive defragmentation
* Optimum start-up, Internet, and Windows acceleration
* Quick and extensive clean-up for hard drives
* Effective elimination of junk data
* Fully-automatic clean-up and improvement of your PC
* Extensive clean-up of the registry
* Effective help in solving standard Windows problems
* Secure data recovery and data elimination
* Simple custom Windows configuration
* Individual Windows styling
Download:
http://rapidshare.com/files/91263392/tuu.rar
Password:
smforum.net
Thân
|
|
|
Tracing Utilities AIO
Tracing Utilities AIO
Visual Route 2006 Server
SmartWhois
Visual IP Trace 2006
VisualWhois
CallerIP
CommView
Visual Route 2006 Server
VisualRoute helps determine if a connectivity problem is due to an ISP, the Internet, or the web site you -- or your customers -- are trying to reach, and pinpoints the network where a problem occurs.
VisualRoute 2006 is available in six specialized editions, enabling on-demand and continuous connectivity analysis from a single computer, a remote customer desktop, a remote server, or multiple points on a global network.
All editions include integrated traceroute, ping tests, reverse DNS and Whois lookups, and display the actual route of connections and IP address locations on a global map.
SmartWhois
SmartWhois is a useful network information utility that allows you to look up all the available information about an IP address, hostname or domain, including country, state or province, city, name of the network provider, administrator and technical support contact information. It helps you find answers to these important questions:
* Who is the owner of the domain?
* When was the domain registered and what is the owner's contact information?
* Who is the owner of the IP address block?
With SmartWhois you can focus on your work; the program will unmistakably choose the right database from over 60 whois databases all over the world and fetch the most complete results within a few seconds.
Features:
* Smart operation: The program always looks up whois data in the right database; you don't have to waste your time trying them all.
* Integration with Mcft Internet Explorer and Mcft Outlook. Look up domain owners and IP addresses in e-mail headers instantly!
* Saving results into an archive: you can build your own database that can be viewed offline.
* Batch processing of IP addresses or domain lists.
* Caching of obtained results.
* Hostname resolution and DNS caching.
* Integration with CommView Network Monitor: Can be accessed from CommView for quick, easy lookup.
* Calling SmartWhois directly from your application. See SmartWhois FAQ.
* Wildcard queries.
* Whois console for custom queries.
* Country code reference.
* Customizable interface.
* SOCKS5 firewall support.
Visual IP Trace 2006
Trace and report hackers, investigate web sites with Visual IP Trace:
Knowing where a suspect intruder is located, where a malicious email originated, or validating the location of a website is key information to identify security threats, track and report abusers.
While many IP lookup tools only provide network provider locations, Visual IP Trace's unique IP address location technology provides a much higher level of accuracy by identifying the actual physical city and country location of servers and routers, key forensics information for investigating hackers or suspects. In addition, by seeing the actual route path to the destination point, the locations of last few network hops provide valuable clues to the end-point's true location.
VisualWhois
Visual WhoIs allows you to find relevant information about domains, ip addresses and email addresses. The program retrieves the WHOIS information, Network details and displays the country location on a 3D globe. In addition, it integrates with Internet Explorer, so you can quickly trace any web site by simply clicking a button in the IE toolbar.
CallerIP
Similar to Caller ID for your telephone, CallerIP shows you who is connecting to your system, so you can protect your privacy and confidential information.
* Receive instant alerts for high risk connections and back doors
* Identify spyware and suspicious connections to your system
* Report abuse and illicit activity
KEY FEATURES:
# NEW! CallerIP Server (Professional Edition only) allows you to monitor your machine from a remote location.
# NEW! Plot all connections feature that plots all current connections on the world map to allow for easy analysis of where connections reside.
# NEW! New look table which includes gradient fill depending on the threat of the connection.
# NEW! Improved logging technique means searching large log files is literally hundreds of times faster!
# Realtime monitoring instantly identifies suspect activity and spyware
# Identifies the country of origin for all connections
# Worldwide Whois reports
# Network Provider reports with abuse contact information
# Automated alerts of high-risk connections
# Detailed log of connection history with search options
CommView
CommView, a product of Tamosoft, is a powerful network monitor and packet analyzer designed for LAN administrators, security professionals, network programmers, home users … virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment.
* Maintain efficient network data transmission, test firewalls and intrusion detection systems
* See what, where, and how information leaves and enters your systems and network -- critical information for secure Internet computing
* Quickly troubleshoot and debug network-based applications
KEY FEATURES:
* Captures all data packets flowing through a PC or LAN segment
* Automated alarms notify you about important events
* Protocol decoding
* Generates traffic reports in real time
* Reconstructs TCP data streams
* Enables real-time browsing of captured and decoded packets
size=22mb
DOWNLOAD
http://rapidshare.com/files/90854636/AIO_Tracing_Utilities.rar
Thân
|
|
|
Anti-Hacker Expert 2008
Anti-Hacker Expert Trojan can scan and kill hacker program and trojans.Actually
Anti-Hacker Expert includes more than 12000 hacker program and trojan signatures.
Use manifold scan,fast and reliable detects your computer.
Use the portscan to find open ports for hacker and trojan on your PC,
and delete hacker program andtrojan. The registry-scan is highspeed scan
for autorun-entries. It scans the system registry by using known trojan filenames.
If a trojan is identified by the registry-scan, it will be removed from disk.
The memory scan is scan all system process,if found hacker program and trojan,
in a minute kill it and delete interrelated file. The diskscan also removes
unwanted hacker program and trojan files from your harddisks. This is the most
important search method. You can select wheter you want to scan whole drives or
specified folders. The Firewall can background-guard watches for active hacker
program and trojans while you are working on your PC. We time publish new edition
to scan more hacker program and trojan,with Internet Online update to get
new edition.
Code:
http://rapidshare.com/files/89384761/AH2008.rar
Thân
|
|
|
Portable TechSmith SnagIt 8.2.3
SnagIt, the award-winning screen-capture software. Using SnagIt, you can select and capture anything on your screen, then easily add text, arrows, or effects, and save the capture to a file or share it immediately by e-mail or IM. Capture and share an article, image, or Web page directly from your screen. Or, capture and share any part of any application that runs on your PC. Automatically save in one of 23 file formats, or send to the printer, to your e-mail, or to the clipboard. Use SnagIt's built-in editors to modify, annotate, and enhance your images and the Catalog Browser to organize your files. Increase your productivity while quickly creating professional presentations and flawless documentation.
With powerful new features that allow you to edit previously placed objects, capture embedded links and add interactivity to your captures, SnagIt 8 makes it easier than ever before to capture, edit, and share anything on your screen.
F e a t u r e s of SnagIt:
- SnagIt’s New Design
You’ll notice we’ve incorporated a new look into SnagIt 8, as well as design changes, based on some simple goals. We’ve used icons to take a visual approach to the capture process, making it easier to identify what you want to capture, yet keeping the workflow the same as always. Just select a profile or your favorite capture settings, and click the Capture button. So if you’re a longtime user, rest assured that the familiar capture options are all still there, plus some great new ones to make you even more efficient at performing your daily tasks with SnagIt.
- Smarter Editing of Objects and Text
With SnagIt’s powerful Editor at your fingertips, there’s no need to open another application to add the finishing touches to your captures. SnagIt 8’s Editor has been enhanced to include vector editing, so the callouts, arrows, shapes and text that you place on your capture remain editable. You can reselect any object you’ve previously placed on the capture to delete or edit it anytime. Save time making your images look exactly the way you want them to, the first time. Later, you can come back and modify those images for different audiences, or update them with new information, without going through the hassle of taking additional screen captures.
- Capture Web Pages with Links
Now you can capture a Web page with SnagIt and all of the links remain clickable. Use SnagIt to capture the part of the Web page that has the links you want to keep intact. Then, save the capture in a format that supports embedded links: Web page with image (.mht), Adobe PDF, (.pdf) or Macromedia Flash (.swf). The links will be embedded in the capture and clickable, just as they were on the original Web page. Send the capture by email and simply indicate where to click.
- Add Interactivity to your Captures
With SnagIt’s new hotspot feature, adding interactivity is easy. Capture an image, and then use SnagIt’s hotspot feature to specify parts of the image that, when moused over, will display text or images, or when clicked upon, will open a Web page. Add helpful hints and explanatory illustrations, or even create a functioning prototype of a Web page. Because textual comments only appear when hovered over, the entire image doesn’t end up cluttered with text.
- Save as PDF
Now you can share your captured images in the universally accepted format – PDF. No need to worry whether people can open the images you’ve sent them. The PDF format is perfect for saving and printing scrolling Web pages. You can also go paperless – capture your onscreen or scanned documents, and save them as PDF files.
Code:
http://rapidshare.com/files/89886959/Portable_SnagIt_v.8.2.3.rar
Thân
|
|
|
Mastering UNIX Shell Scripting
Mastering UNIX Shell Scripting
By Randal K. Michael
* Publisher: Wiley
* Number Of Pages: 640
* Publication Date: 2003-01-31
* ISBN-10 / ASIN: 0471218219
* ISBN-13 / EAN: 9780471218210
* Binding: Paperback
Book Description:
* Provides readers with end-to-end shell scripts that can be used to automate repetitive tasks and solve real-world system administration problems
* Targets the specific command structure for four popular UNIX systems: Solaris, Linux, AIX, and HP-UX
* Illustrates dozens of example tasks, presenting the proper command syntax and analyzing the performance gain or loss using various control structure techniques
* Web site includes all the shell scripts used in the book
URL:
Code:
http://www.amazon.com/Mastering-Shell-Scripting-Randal-Michael/dp/0471218219
Download:
Code:
http://rapidshare.com/files/29807871/mastunxsscr.rar
Thân
|
|
|
WiMAX: A Wireless Technology Revolution
WiMAX: A Wireless Technology Revolution
By G.S.V. Radha Krishna Rao, G. Radhamani
* Publisher: AUERBACH
* Number Of Pages: 400
* Publication Date: 2007-10-19
* ISBN-10 / ASIN: 0849370590
* ISBN-13 / EAN: 9780849370595
* Binding: Hardcover
Book Description:
The demand for broadband connectivity is growing rapidly, but cannot be met effectively by existing wireline technology. WiMAX has the potential to provide widespread Internet access that can usher in economic growth, better education and healthcare, and improved entertainment services. Examining the technology’s global development and deployment activities, WiMAX: A Wireless Technology Revolution presents its unique features and evaluates its revolutionary approach over contemporary technologies. The book covers the mission, product, and services of WiMAX, as well as specific features such as security and mobility. It discusses the implementation of the IEEE 802.16 standard and also explores how WiMax stacks up to 3G and 4G and the economic and opportunity costs. This reference also analyzes the future prospects of WiMAX and its contribution to the wireless and mobile communication technology field. It is a must-have resource for those who are either intrigued or involved with this standards-based technology that has the ability to provide high-throughput broadband connections over long distances.
URL:
Code:
http://www.amazon.com/WiMAX-G-S-V-Radha-Krishna-Rao/dp/0849370590
Download:
Code:
Thân
|
|
|
PC World is a global computer magazine published monthly by IDG. It offers advice on various aspects of PCs and related items, the Internet, and other personal-technology products and services.
Each month PC World runs tests on various areas of the IT world from new pre-built computers, LCD monitors, graphic cards, motherboards, PDAs, wireless network routers and many more. The magazine also includes many reviews from products across the IT board including phones and accessories, cameras, and software from a wide range of vendors as well.
http://rapidshare.com/files/83449121/PC.World.February.2008.rar
Thân
|
|
|
# Paperback: 410 pages
# Publisher: O'Reilly Media, Inc. (November 21, 2006)
# Language: English
# ISBN-10: 0596527993
Whether you're running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. The book offers 100 hacks -- unique tips and tools -- that bring you the knowledge of experts who apply what they know in the real world to help you take full advantage of the expressive power of SQL. You'll find practical techniques to address complex data manipulation problems. Learn how to:
* Wrangle data in the most efficient way possible
* Aggregate and organize your data for meaningful and accurate reporting
* Make the most of subqueries, joins, and unions
* Stay on top of the performance of your queries and the server that runs them
* Avoid common SQL security pitfalls, including the dreaded SQL injection attack
Let SQL Hacks serve as your toolbox for digging up and manipulating data. If you love to tinker and optimize, SQL is the perfect technology and SQL Hacks is the must-have book for you.
Download Link:
http://rapidshare.com/files/30630784/SQLHack_Uploaded_By_DK_4_www.theynd.com.rar
Thân
|
|
|
Hacking with BIOS tutorial
Introduction
1. Welcome to the basic NETBIOS document created by aCId_rAIn. This document will teach you some simple things about NETBIOS, what it does, how to use it, how to hack with it, and some other simple DOS commands that will be useful to you in the future. THIS DOCUMENT IS FOR NEWBIEZ ONLY!!! If you are NOT a newbie then don't go any farther reading this because if you're smart enough you probably already know it all. So don't waste yourt time reading something that you already know.
1. Hardware and Firmware
1a. The BIOS
The BIOS, short for Basic Input/Output Services, is the control program of the PC. It is responsible for starting up your computer, transferring control of the system to your operating system, and for handling other low-level functions, such as disk access.
NOTE that the BIOS is not a software program, insofar as it is not purged from memory when you turn off the computer. It's
firmware, which is basically software on a chip.
A convenient little feature that most BIOS manufacturers include is a startup password. This prevents access to the system until you enter the correct password.
If you can get access to the system after the password has been entered, then there are numerous software-based BIOS password extractors available from your local H/P/A/V site.
NETBIOS/NBTSTAT - What does it do?
2. NETBIOS, also known as NBTSTAT is a program run on the Windows system and is used for identifying a remote network or computer for file sharing enabled. We can expoit systems using this method. It may be old but on home pc's sometimes it still works great. You can use it on your friend at home or something. I don't care what you do, but remember, that you are reading this document because you want to learn. So I am going to teach you. Ok. So, you ask, "How do i get to NBTSTAT?" Well, there are two ways, but one's faster.
Method 1:Start>Programs>MSDOS PROMPT>Type NBTSTAT
Method 2:Start>Run>Type Command>Type NBTSTAT
(Note: Please, help your poor soul if that isn't like feeding you with a baby spoon.)
Ok! Now since you're in the DOS command under NBTSTAT, you're probably wondering what all that crap is that's on your screen. These are the commands you may use. I'm only going to give you what you need to know since you are striving to be l33t. Your screen should look like the following:
NBTSTAT [ [-a RemoteName] [-A IP address] [-c] [-n]
[-r] [-R] [-RR] [-s] [-S] [interval] ]
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
-c (cache) Lists NBT's cache of remote [machine] names and their IP addresses
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP addresses to computer NETBIOS names.
-RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts Refresh
RemoteName Remote host machine name.
IP address Dotted decimal representation of the IP address.
interval Redisplays selected statistics, pausing interval seconds between each display. Press Ctrl+C to stop redisplaying
statistics.
C:\WINDOWS\DESKTOP>
The only two commands that are going to be used and here they are:
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
Host Names
3. Now, the -a means that you will type in the HOST NAME of the person's computer that you are trying to access. Just in case you don't have any idea what a Host Name looks like here's an example.
123-fgh-ppp.internet.com
there are many variations of these adresses. For each different address you see there is a new ISP assigned to that computer. look at the difference.
abc-123.internet.com
ghj-789.newnet.com
these are differnet host names as you can see, and, by identifying the last couple words you will be able to tell that these are two computers on two different ISPs. Now, here are two host names on the same ISP but a different located server.
123-fgh-ppp.internet.com
567-cde-ppp.internet.com
IP Addresses
4. You can resolce these host names if you want to the IP address (Internet Protocol)
IP addresses range in different numbers. An IP looks like this:
201.123.101.123
Most times you can tell if a computer is running on a cable connection because of the IP address's numbers. On faster connections, usually the first two numbers are low. here's a cable connection IP.
24.18.18.10
on dialup connections IP's are higher, like this:
208.148.255.255
notice the 208 is higher than the 24 which is the cable connection.
REMEMBER THOUGH, NOT ALL IP ADDRESSES WILL BE LIKE THIS.
Some companies make IP addresses like this to fool the hacker into believing it's a dialup, as a hacker would expect something big, like a T3 or an OC-18. Anyway This gives you an idea on IP addresses which you will be using on the nbtstat command.
Getting The IP Through DC (Direct Connection)
5. First. You're going to need to find his IP or host name. Either will work. If you are on mIRC You can get it by typing /whois (nick) ...where (nick) is the persons nickname without parenthesis. you will either get a host name or an IP. copy it down. If you do not get it or you are not using mIRC then you must direct connect to their computer or you may use a sniffer to figure out his IP or host name. It's actually better to do it without the sniffer because most sniffers do not work now-a-days. So you want to establish a direct connection to their computer. OK, what is a direct connection? When you are:
Sending a file to their computer you are directly connected.
AOL INSTANT MESSENGER allows a Direct Connection to the user if accepted.
ICQ when sending a file or a chat request acception allows a direct connection.
Any time you are sending a file. You are directly connected. (Assuming you know the user is not using a proxy server.)
Voice Chatting on Yahoo establishes a direct connection.
If you have none of these programs, either i suggest you get one, get a sniffer, or read this next statement.
If you have any way of sending thema link to your site that enables site traffic statistics, and you can log in, send a link to your site, then check the stats and get the IP of the last visitor. It's a simple and easy method i use. It even fool some smarter hackers, because it catches them off guard. Anyway, once you are directly connected use either of the two methods i showed you earlier and get into DOS. Type NETSTAT -n. NETSTAT is a program that's name is short for NET STATISTICS. It will show you all computers connected to yours. (This is also helpful if you think you are being hacked by a trojan horse and is on a port that you know such as Sub Seven: 27374.) Your screen should look like this showing the connections to your computer:
------------------------------------------------------------------------------------------------
C:\WINDOWS\DESKTOP>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED
TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED
TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT
TCP 172.255.255.82:1413 205.188.8.7:26778 ESTABLISHED
TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED
C:\WINDOWS\DESKTOP>
------------------------------------------------------------------------------------------------
The first line indicated the Protocol (language) that is being used by the two computers.
TCP (Transfer Control Protocol) is being used in this and is most widely used.
Local address shows your IP address, or the IP address of the system you on.
Foreign address shows the address of the computer connected to yours.
State tells you what kind of connection is being made ESTABLISHED - means it will stay connected to you as long as you are on the program or as long as the computer is allowing or is needing the other computers connection to it. CLOSE_WAIT means the connection closes at times and waits until it is needed or you resume connection to be made again. One that isn't on the list is TIME_WAIT which means it is timed. Most Ads that run on AOL are using TIME_WAIT states.
the way you know the person is directly connected to your computer is because of this:
------------------------------------------------------------------------------------------------
C:\WINDOWS\DESKTOP>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED
TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED
TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT
TCP 172.255.255.82:1413 abc-123-ppp.webnet.com ESTABLISHED
TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED
C:\WINDOWS\DESKTOP>
------------------------------------------------------------------------------------------------
Notice the host name is included in the fourth line instead of the IP address on all. This is almost ALWAYS, the other computer that is connected to you. So here, now, you have the host name:
abc-123-ppp.webnet.com
If the host name is not listed and the IP is then it NO PROBLEM because either one works exactly the same. I am using abc-123-ppp.webnet.com host name as an example. Ok so now you have the IP and/or host name of the remote system you want to connect to. Time to hack!
Open up your DOS command. Open up NBTSTAT by typing NBTSTAT. Ok, there's the crap again. Well, now time to try out what you have leanred from this document by testing it on the IP and/or host name of the remote system. Here's the only thing you'll need to know.
IMPORTANT, READ NOW!!!
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
Remember this?
Time to use it.
-a will be the host name
-A will be the IP
How do i know this?
Read the Statements following the -a -A commands. It tells you there what each command takes.
So have you found which one you have to use?
GOOD!
Time to start.
Using it to your advantage
6. Type this if you have the host name only.
NBTSTAT -a (In here put in hostname without parenthesis)
Type this is you have the IP address only.
NBTSTAT -A (In here put in IP address without parenthesis)
Now, hit enter and wait. Now Either one of two things came up
1. Host not found
2. Something that looks like this:
--------------------------------------------
NetBIOS Local Name Table
Name Type Status
---------------------------------------------
GMVPS01 <00> UNIQUE Registered
WORKGROUP <00> GROUP Registered
GMVPS01 <03> UNIQUE Registered
GMVPS01 <20> UNIQUE Registered
WORKGROUP <1E> GROUP Registered
---------------------------------------------
If the computer responded "Host not found" Then either one of two things are the case:
1. You screwed up the host name.
2. The host is not hackable.
If number one is the case you're in great luck. If two, This system isn't hackable using the NBTSTAT command. So try another system.
If you got the table as above to come up, look at it carefully as i describe to you each part and its purpose.
Name - states the share name of that certain part of the computer
<00>, <03>, <20>, <1E> - Are the Hexidecimal codes giving you the services available on that share name.
Type - Is self-explanatory. It's either turned on, or activated by you, or always on.
Status - Simply states that the share name is working and is activated.
Look above and look for the following line:
GMVPS01 <20> UNIQUE Registered
See it?
GOOD! Now this is important so listen up. The Hexidecimanl code of <20> means that file sharing is enabled on the share name that is on that line with the hex number. So that means GMVPS01 has file sharing enabled. So now you want to hack this. Here's How to do it. (This is the hard part)
LMHOST File
7. There is a file in all Windows systems called LMHOST.sam. We need to simply add the IP into the LMHOST file because LMHOST basically acts as a network, automatically logging you on to it. So go to Start, Find, FIles or Folders. Type in LMHOST and hit enter. when it comes up open it using a text program such as wordpad, but make sure you do not leave the checkmark to "always open files with this extension" on that. Simply go through the LMHOST file until you see the part:
# This file is compatible with ********* LAN Manager 2.x TCP/IP lmhosts
# files and offers the following extensions:
#
# #PRE
# #DOM:
# #INCLUDE
# #BEGIN_ALTERNATE
# #END_ALTERNATE
# \0xnn (non-printing character support)
#
# Following any entry in the file with the characters "#PRE" will cause
# the entry to be preloaded into the name cache. By default, entries are
# not preloaded, but are parsed only after dynamic name resolution fails.
#
# Following an entry with the "#DOM:" tag will associate the
# entry with the domain specified by . This affects how the
# browser and logon services behave in TCP/IP environments. To preload
# the host name associated with #DOM entry, it is necessary to also add a
# #PRE to the line. The is always preloaded although it will not
# be shown when the name cache is viewed.
#
# Specifying "#INCLUDE " will force the RFC NetBIOS (NBT)
# software to seek the specified and parse it as if it were
# local. is generally a UNC-based name, allowing a
# centralized lmhosts file to be maintained on a server.
# It is ALWAYS necessary to provide a mapping for the IP address of the
# server prior to the #INCLUDE. This mapping must use the #PRE directive.
# In addtion the share "public" in the example below must be in the
# LanManServer list of "NullSessionShares" in order for client machines to
# be able to read the lmhosts file successfully. This key is under
# \machine\system\currentcontrolset\services\lanmans erver\parameters\nullsessionshares
# in the registry. Simply add "public" to the list found there.
#
# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
# statements to be grouped together. Any single successful include
# will cause the group to succeed.
#
# Finally, non-printing characters can be embedded in mappings by
# first surrounding the NetBIOS name in quotations, then using the
# \0xnn notation to specify a hex value for a non-printing character.
Read this over and over until you understand the way you want your connection to be set. Here's an example of how to add an IP the way I would do it:
#PRE #DOM:255.102.255.102 #INCLUDE
Pre will preload the connection as soon as you log on to the net. DOM is the domain or IP address of the host you are connecting to. INCLUDE will automaticall set you to that file path. In this case as soon as I log on to the net I will get access to 255.102.255.102 on the C:/ drive. The only problem with this is that by doin the NETSTAT command while you are connected, and get the IP of your machine. That's why it only works on simple PC machines. Because people in these days are computer illiterate and have no idea of what these commands can do. They have no idea what NETSTAT is, so you can use that to your advantage. Most PC systems are kind of hard to hack using this method now because they are more secure and can tell when another system is trying to gain access. Also, besure that you (somehow) know whether they are running a firewall or not because it will block the connection to their computer. Most home systems aren't running a firewall, and to make it better, they don't know how operate the firewall, therefore, leaving the hole in the system. To help you out some, it would be a great idea to pick up on some programming languages to show you how the computer reads information and learn some things on TCP/IP (Transfer Control Protocol/Internet Protocol) If you want to find out whether they are running a firewall, simply hop on a Proxy and do a port scan on their IP. You will notice if they are running a firewall because most ports are closed. Either way, you still have a better chance of hacking a home system than hacking *********.
Gaining Access
7. Once you have added this to you LMHOST file. You are basically done. All you need to do is go to:
Start
Find
Computer
Once you get there you simply type the IP address or the host name of the system. When it comes up, simply double click it, and boom! There's a GUI for you so you don't have to use DOS anymore. You can use DOS to do it, but it's more simple and fun this way, so that's the only way i put it. When you open the system you can edit, delete, rename, do anything to any file you wish. I would also delete the command file in C:/ because they may use it if they think someone is in their computer. Or simply delete the shortcut to it. Then here's when the programming comes in handy. Instead of using the NBTSTAT method all the time, you can then program you own trojan on your OWN port number and upload it to the system. Then you will have easier access and you will also have a better GUI, with more features. DO NOT allow more than one connection to the system unless they are on a faster connection. If you are downloading something from their computer and they don't know it and their connection is being slow, they may check their NETSTAT to see what is connected, which will show your IP and make them suspicious. Thats it. All there is to it. Now go out and scan a network or something and find a computer with port 21 or something open.
(Sưu Tầm)
Thân
|
|
|
CRACKING COLLECTION
Audio theme:
Maylynne - Catch Me
NOTE:
This AIO Need Password to Run
PASS: dreatica.CL
Contents:
PROXY TOOLS:
PROXYHUNTER
CHARON
PROXYRAMA
A.P.L
FORUM PROXY LEECHER
AA TOOLS
WORD LIST TOOLS:
ATHENA
PARSLEY
RAPTOR
VLSTRIP
LOG SUCKER
S WORDTOOL
VCU
ALS NOVICE
STAPH
HORNY STRIPPER
XXX PASSWORD FINDER
CRACKING TOOLS:
ACCESS DIVER
SENTRY
CFORCE
XFACTOR
FORM @
CAECUS 1.2
SPOOFING TOOLS:
SPLOOF
ZSPOOF
SUPER MEGA SPOOF
HYPERSPOOF
VIDEO TUTORIALS:
FORM@
PROXYHUNTER
CFORCE
CHARON
SENTRY2
ACCESS DIVER
RAPTOR WORDLIST CREATING
http://www.ftp2share.com/file/e4d04bca-ffe4-4646-b522-af10925919f6/Password_Hacking_-34in1-__AIO_.rar.html
Thân
|
|
|
The Hackers Dictionary
http://www.filefactory.com/file/fea6fc
http://netload.in/datei6f9b603bc6758986c25ec0100b1d13c0/The_Hacker_s_Dictionary_eBooK_latestdlz-com_.pdf.htm
http://rapidshare.com/files/79612800/The_Hacker_s_Dictionary_eBooK.pdf
http://uploaded.to/?id=e8ymb9
http://www.zshare.net/download/7002056833e504/
http://rapidshare.com/files/87682376/The_Hacker_s_Dictionary_eBooK_latestdlz-com_.pdf
Thân
|
|
|
Advanced Windows Debugging
Addison-Wesley Professional | 2007-11-08 | ISBN: 0321374460 | 840 pages | PDF | 8.05 MB
For Windows developers, few tasks are more challenging than debugging—-or more crucial. Reliable and realistic information about Windows debugging has always been scarce. Now, with over 15 years of experience two of Microsoft’s system-level developers present a thorough and practical guide to Windows debugging ever written.
Mario Hewardt and Daniel Pravat cover debugging throughout the entire application lifecycle and show how to make the most of the tools currently available—-including Microsoft’s powerful native debuggers and third-party solutions.
To help you find real solutions fast, this book is organized around real-world debugging scenarios. Hewardt and Pravat use detailed code examples to illuminate the complex debugging challenges professional developers actually face. From core Windows operating system concepts to security, Windows® Vista™ and 64-bit debugging, they address emerging topics head-on—and nothing is ever oversimplified or glossed over!
This book enables you to
Master today’s most powerful Windows debugging tools, including NTSD, CDB, WinDbg, KD, and ADPlus
Debug code that wasn’t designed or written for easy debugging
Understand debuggers “under the hood,” and manage symbols and sources efficiently
Debug complex memory corruptions related to stacks and heaps
Resolve complex security problems
Debug across processes: identity tracking, RPC debugger extensions, and tracking IPCs with Ethereal
Find and fix resource leaks, such as memory and handle leaks.
Debug common thread synchronization problems
Learn when and how to write custom debugger extensions
Perform “postmortem debugging” using crash dumps and Windows Error Reporting
Automate debugging with DebugDiag and the Analyze Debugger command
Download:
http://rapidshare.com/files/88492149/2134AWD.rar
Mirror1:
http://w13.easy-share.com/1698870251.html
Mirror2:
http://www.megaupload.com/?d=LCYT5WOD
Mirror3:
http://www.mediafire.com/?15h1gwgj0xv
Pass: www.dl4all.com
Thân
|
|
|
|
|
|
|