|
|
Chào các bạn.
Tớ mới mua được một bộ máy tính IBM cũ (1tr 300 ngàn vnd)
------------------
System Information
------------------
Operating System: Windows 2000 Professional (5.0, Build 2195) Service Pack 4
Language: English (Regional Setting: English)
System Manufacturer: IBM
System Model: 831947A
BIOS: IBM BIOS Ver 28KT18.0
Processor: Intel(R) Pentium(R) 4 CPU 2.40GHz, ~2.4GHz
Memory: 254MB RAM
Hiện máy cài win 2000. Tớ thì muốn bỏ đi cài cái Fedore Core. Nhưng mà không có đĩa driver đi kèm theo máy nên cần phải backup lại drivers.
Tớ có biết trong đĩa Hiren Boot có chương trình Backup Drivers nhưng dùng thực tế thì chưa làm lần nào. Bạn nào rành vụ này chỉ giúp tớ với.
Cảm ơn.
|
|
|
kegiaumat055 wrote:
Máy tính mình muốn tắt là máy tính trong trường học. Không có các chươg trình quản lý mạng lan, mình có thể lấy đựoc tài liệu bên máy khác. Vậy các bạn có thể chỉ cho mình cách nào mà thành công 100% không.
Thật lạ là rất nhiều người cứ thích ngồi máy mình Shutdown cho được máy kia trong LAN . Làm thế để chi???
Còn muốn lấy files trong LAN thì thử tìm ngay trên HVA này xem, hoặc google.
|
|
|
Chris Fry, Martin Nystrom, “Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks”
O'Reilly Media, Inc. | 2009-02-24 | ISBN: 0596518161 | 246 pages | CHM | 5,75 MB
How well does your enterprise stand up against today's sophisticated security threats? With this book, security experts from Cisco Systems demonstrate how you can detect damaging security incidents on your global network -first by discovering which assets you need to monitor closely, then by helping you develop targeted strategies and pragmatic techniques to identify security incidents.
Security Monitoring offers six steps to improve network monitoring, based on the authors' years of experience conducting incident response to keep Cisco's global network secure. These steps will guide you through the following:
Develop Policies: define the rules, regulations, and criteria against which to monitor
Know Your Network: build knowledge of your infrastructure with network telemetry
Select Your Targets: define the subset of infrastructure where you'll focus monitoring
Choose Event Sources: identify the event types needed to discover policy violations
Feed and Tune: collect data and generate alerts, tuning systems using context
Maintain Dependable Event Sources: prevent critical gaps in your event collection and monitoring
To help you understand this framework, Security Monitoring illustrates its recommendations using a fictional mobile telephony provider. Each chapter's approach and techniques are overlaid against this fictional example with diagrams and detailed examples. These recommendations will help you select and deploy the best techniques for monitoring your own enterprise network.
Download:
http://uploading.com/files/N24YNBCE/Security_Monitoring.rar.html
http://depositfiles.com/files/vcjzv3mmy
|
|
|
Dreamhacker wrote:
Mình cài win và khi set password cho admin vẫn cho phép. Nhưng khi khởi động thì không thấy nó đòi hỏi pass j cả. Mình cũng đã thử tạo trong Manager rồi nhưng vẫn không được. Anh em giúp mình với
Bạn cài win gì đấy? Kiểm tra lại nguồn gốc đĩa source. Nếu có thiết lập password thì chắc chắn khi login nó sẽ hỏi password.
|
|
|
http://bookilook.com/book/512F914D/DNS_in_Action
PS: xin lỗi vì mình post lên mà không kiểm tra. Mình đã thay link mới rồi.
Thêm một link ở http://rapidshare.com/files/194928882/Packt.Publishing.DNS.in.Action.Feb.2006.pdf.html nữa. Bác nào có quyền, upload files lên HVA cho các bạn khác dễ download.
Thanks.
|
|
|
Theo mình đoán thì 1 moderator có thể nhìn thấy IP của bất kỳ ai khi login vào forum HVA.
|
|
|
Christopher Negus, “Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users”
Wiley | 2007-11-28 | ISBN: 0470082933 | 332 pages | PDF | 1,6 MB
Aimed squarely at aspiring Linux power users and professional administrators, the Ubuntu Linux Toolbox offers more than 1000 examples of useful Linux command lines.
This compact, handy reference is made to carry with you, whether you are maintaining hundreds of Linux systems or just want to dig beneath the surface of your Ubuntu desktop system.
This is the Linux reference book you need to step up to the next level.
Download:
http://uploading.com/files/JCDJF425/Ubunt_Linux.rar.html
http://depositfiles.com/files/rvkcfkzob
http://uploadbox.com/files/ddc03d3964
|
|
|
Tặng bác một cái link, chúc bác thành công.
http://avaxhome.ws/ebooks/security_info/CompTIA_Security.html
|
|
|
Nhờ bạn chuyển giùm mình 2 link này:
Learning C++ Tutorial (Retail ESD Version)
links:
http://rapidshare.com/files/193369061/Learning_C___Tutorial__Retail_ESD_Version_.part1.rar
http://uploading.com/files/XKEPOURZ/Learning C++ Tutorial (Retail ESD Version).part2.rar.html
PS: nó còn có 2 cái link mirror, nhưng mình không download được.
http://www.easy-share.com/1903494438/Learning C++ Tutorial (Retail ESD Version).part1.rar
http://www.easy-share.com/1903494444/Learning C++ Tutorial (Retail ESD Version).part2.rar
Cảm ơn bạn rất nhiều.
|
|
|
Xin source code của game đó về xem lolz
|
|
|
Là bạn dịch hai ai dịch ra vậy bạn? Bạn nên tham khảo cách trình bày một bài tutorials ở trong Box "Thủ thuật reverse engineering" để trình bài viết của mình tốt hơn.
|
|
|
VTC_A1 wrote:
Em cũng có học về python cơ bản ở http://www.vithon.org/tutorial/2.5/tut.html
Không biết giờ nên học tiếp ebooks nào.
Mong được giúp đỡ!!!
Thực hành, thực hành và thực hành
|
|
|
@FourLeafClover: trong link ở reply trên bạn có thể tìm thấy mấy quyển dành cho Beginner (người mới bắt đầu).
|
|
|
VTC_A1 wrote:
Em thấy trong mấy cuốn tài liệu ít có bài tập về python quá.Bác cho em tài liệu về bài tập python được không.
http://avaxhome.ws/search?q=%22Python%22&commit=Go
|
|
|
Pack 1: For General Users
5 ebooks | 28.20 MB
#1: iPhone: The Missing Manual: Covers the iPhone 3G (2nd Edition)
Pogue Press, 376 pages | PDF | ISBN: 0596521677
#2: iPhone For Dummies
For Dummies, 256 pages | PDF | ISBN: 0470423420
#3: Taking Your iPhone to the Max
Apress, 182 pages | PDF with bookmarks | ISBN: 1590599268
#4: iPhone 3G Portable Genius
Wiley, 267 pages | PDF | ISBN: 047042348X
#5: Macworld iPhone SuperGuide
Macworld iPhone SuperGuide, 92 pages | PDF | ISBN: 0978981332
Pack 2: For Developers
5 ebooks | 29. 40 MB
#1: Beginning iPhone Development: Exploring the iPhone SDK
Apress, 536 pages | PDF | ISBN: 1430216263
#2: The iPhone Developer's Cookbook: Building Applications with the iPhone SDK
Addison-Wesley Professional, 384 pages | PDF | ISBN: 0321555457
#3: iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
O'Reilly Media, 280 pages | CHM | ISBN: 0596518552
#4: iPhone in Action: Introduction to Web and SDK Development
Manning Publications, 350 pages | PDF | ISBN: 193398886X
#5: Professional iPhone and iPod touch Programming: Building Applications for Mobile Safari
Wrox, 284 pages | PDF | ISBN: 0470251557
Download:
Rapidshare:
http://rapidshare.com/files/184109560/iPhone_eBook_Pack1_-_UDS.rar
http://rapidshare.com/files/184109586/iPhone_eBook_Pack2_-_UDS.rar
Megaupload:
http://www.megaupload.com/?d=KPVC02SH
http://www.megaupload.com/?d=MNGX41XG
|
|
|
http://avaxhome.ws/search?category_id=5&sort=date_desc&commit=Go&q=Firewall+checkpoint
|
|
|
Tarek Ziadé, “Expert Python Programming”
Packt Publishing | 2008-09-20 | ISBN: 184719494X | 372 pages | PDF | 5,55 MB
Expert Python Programming shows how Python development should be done with best practices and expert design tips. This book is for Python developers who are already building applications, but want to build better ones by applying best practices and new development techniques to their projects. The reader is expected to have a sound background in Python programming.
Download:
http://uploading.com/files/Y7KTUXBG/Expert_python_programming.rar.html
http://depositfiles.com/files/7j8jiri2d
|
|
|
Oh, hay thật, cảm ơn các bác nhiều lắm.
@Z0rr0: em nghĩ là bác nên cho thêm một cái button Minimize nữa để cho nó có thể nằm dưới Taskbar sẽ đẹp trời hơn.
PS: nếu được, các bác có thể sticky topic này lên để các soft trên được cập nhật thường xuyên
|
|
|
- Bạn thử mang máy in sang một máy khác và in xem có vấn đề gì không?
- Kiểm tra lại driver của máy in.
|
|
|
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
McGraw-Hill Osborne | December 17, 2007 | ISBN: 0071494618 | 258 pages | PDF | 3.8 MB
Lock down next-generation Web services
"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings.
* Plug security holes in Web 2.0 implementations the proven Hacking Exposed way
* Learn how hackers target and abuse vulnerable Web 2.0 applications, browsers, plug-ins, online databases, user inputs, and HTML forms
* Prevent Web 2.0-based SQL, XPath, XQuery, LDAP, and command injection attacks
* Circumvent XXE, directory traversal, and buffer overflow exploits
* Learn XSS and Cross-Site Request Forgery methods attackers use to bypass browser security controls
* Fix vulnerabilities in Outlook Express and Acrobat Reader add-ons
* Use input validators and XML classes to reinforce ASP and .NET security
* Eliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct Web Remoting, Sajax, and GWT Web applications
* Mitigate ActiveX security exposures using SiteLock, code signing, and secure controls
*
Find and fix Adobe Flash vulnerabilities and DNS rebinding attacks
About the Author
Rich Cannings is a senior information security engineer at Google.
Himanshu Dwivedi is a founding partner of iSEC Partners, an information security organization, and the author of several security books.
Zane Lackey is a senior security consultant with iSEC Partners.
http://rapidshare.com/files/178232014/hew2.rar
|
|
|
Roger R. Dube, “Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography”
Wiley | 2008-08-25 | ISBN: 0470193395 | 256 pages | PDF | 12,4 MB
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security technologies. It is an invaluable source for computer engineers, computer security specialists, electrical engineers, software engineers, IT professionals, and advanced undergraduate and graduate students in computer engineering and computer science.
http://uploading.com/files/6YY6W0NP/Hardware_based_Computer_Security_Techniques.rar.html
http://depositfiles.com/files/w3wy60wrv
|
|
|
Author: Joseph Lowery | Publisher: Wiley | 2005 | ISBN: 0764579851 | PDF | 289 pages | English | 4.2 MB
CSS Hacks and Filters follows, roughly, an old-to-new, simple-to-complex structure. The oldest browsers CSS designers are still struggling with are covered first, followed by more up-to-date, standards-based browsers. Internet Explorer’s proprietary conditional comment technology is important enough (given Internet Explorer’s continued prevalence and CSS bugs) to deserve a chapter by itself. In all these early chapters, I tackled real-world CSS problems and explained how the hacks covered can solve them. Later chapters explore the intersection of CSS with other Web technologies such as JavaScript, the Document Object Model (DOM), and application servers. Graphics and other visual media weigh heavily in the modern Web, and manipulating them properly with CSS is the subject of Chapter 7. Accessibility is a well-deserved hot button and techniques for applying CSS in a responsible fashion are explored in Chapter 8.
The latter portion of the book is intended to offer practical examples for designers trying to put it all together—and keep it there. You’ll find separate chapters on CSS layouts, navigations systems, and debugging. My ongoing work with Dreamweaver persuaded me to present a couple of additional real-world chapters to address the use of CSS in Macromedia’s world-class and widely used authoring tool: one chapter is on core CSS use in Dreamweaver and the other concerns Dreamweaver templates and CSS. This “getting-it-done” attitude is carried over into the two appendixes. The resources listed in Appendix A should give you a full spectrum of jumpingoff places, and the tables in Appendix B are intended to help you find a safe place to land.
http://rapidshare.com/files/181854485/ghfjkdjdnhfbhjks.rar
|
|
|
minhlam wrote:
Em đang làm một cái forum dạng vbb, và up lên tại một cái host free byethost.com, giờ đây em muốn add cái forum này lên bộ mấy search của google.com.vn và yahoo.com thì phải làm sao ?
Chuẩn bị nội dung thật tốt cho forum của bạn
|
|
|
|
|
|
|