|
|
Mấy thằng em học Aptech ở CT lên SG làm tốt. Bạn cố lên, nói chung còn đi học phải cố mà học, học vì tiếc tiền học phí, học để có thể làm được việc gì đó trong môi trường CNTT chuyên nghiệp.
|
|
|
@khongtinhky: bồ mua cái máy tính về sử dụng đi. Trong quá trình sử dụng sẽ phát sinh nhiều vấn đề và hãy tìm hiểu để giải quyết các vấn đề đó.
Best Regards
|
|
|
ason123 wrote:
tình cờ tải một cái game về thấy trong đó có mấy file có đuôi .atm. tò mò muốn mở nó ra nhưng chưa biết thông tin gì về nó cả. bạn nào biết thông tin gì về nó thì giúp mình với. xin cảm ơn rất nhiều.
Search Google với từ khoá .atm filetype
Best Regards
|
|
|
Nếu "đứng máy" thì dùng tổ hợp Ctrl + Alt + Delete để xem process nào chiếm nhiều tài nguyên nhất. Xác định lỗi đứng máy từ cái process đó và tìm cách khắc phục.
Best Regards
|
|
|
@hellangel202: bạn vào google gõ từ khoá Tool Format USB rồi thử từng cái xem.
Best Regards
|
|
|
Vì bạn không cho biết chính xác tên máy nên cũng khó giúp được nhiều. Bạn vào link này và điền thông tin chính xác về máy tính bạn đang dùng và tải drivers về:
http://www.sony.com.vn/section/downloads
Best Regards
|
|
|
Ngày nay máy tính cá nhân (laptops chẳng hạn) đã trở nên quá phổ biến và cần thiết. Để dữ liệu cá nhân trong máy tính được bảo vệ an toàn, cũng như khả năng truy xuất đơn giản với chi phí thấp là những yếu tố đầu tiên được người dùng cuối quan tâm nhất.
Linux đáp ứng được rất tốt việc bảo vệ dữ liệu an toàn do được bảo mật tốt hơn. Chi phí cho một distro linux cũng như các ứng dụng cũng thấp hơn nhiều so với windows.
Vấn đề duy nhất còn làm cho đại đa số người dùng vẫn chọn windows thay vì linux là thao tác trên Linux khó hơn nhiều.
Best Regards
|
|
|
Thực ra chẳng cần phải biết nội dung chat hay thông tin cá nhân của bạn. Người quản lý chỉ cần biết bạn có hay không chat trong giờ làm việc. Bạn hiểu không?
Best Regards
|
|
|
Mang cái USB đấy sang máy khác mà full format đi. Tớ chưa từng thấy thiết bị lưu trữ nào không thể format được cả.
Best Regards
|
|
|
Acunetix Web Vulnerability Scanner v7.0 | 17.3 MB
Audit your website security with Acunetix Web Vulnerability Scanner. As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists. Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases.
Firewalls, SSL and locked-down servers are futile against web application hacking!
Web application attacks, launched on port 80/443, go straight through the firewall, past operating system and network level security, and right in to the heart of your application and corporate data. Tailor-made web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers.
Acunetix - a world-wide leader in web application security
Acunetix has pioneered the web application security scanning technology: Its engineers have focused on web security as early as 1997 and developed an engineering lead in web site analysis and vulnerability detection. Acunetix Web Vulnerability Scanner includes many innovative features:
* An automatic Javascript analyzer allowing for security testing of Ajax and Web 2.0 applications
* Industries' most advanced and in-depth SQL injection and Cross site scripting testing
* Visual macro recorder makes testing web forms and password protected areas easy
* Extensive reporting facilities including VISA PCI compliance reports
* Multi-threaded and lightning fast scanner crawls hundreds of thousands of pages with ease
* Intelligent crawler detects web server type and application language
* Acunetix crawls and analyzes websites including flash content, SOAP and AJAX
Which Vulnerabilities does Acunetix WVS Check for?
Acunetix WVS automatically checks for the following vulnerabilities among others:
* Version Check
*
o Vulnerable Web Servers
o Vulnerable Web Server Technologies – such as “PHP 4.3.0 file disclosure and possible code execution.
*
* CGI Tester
*
o Checks for Web Servers Problems – Determines if dangerous HTTP methods are enabled on the web server (e.g. PUT, TRACE, DELETE)
o Verify Web Server Technologies
*
* Parameter Manipulation
*
o Cross-Site Scripting (XSS) – over 40 different XSS variations are tested.
o SQL Injection
o Code Execution
o Directory Traversal
o File Inclusion
o Script Source Code Disclosure
o CRLF Injection
o Cross Frame Scripting (XFS)
o PHP Code Injection
o XPath Injection
o Full Path Disclosure
o LDAP Injection
o Cookie Manipulation
o Arbitrary File creation (AcuSensor Technology)
o Arbitrary File deletion (AcuSensor Technology)
o Email Injection (AcuSensor Technology)
o File Tampering (AcuSensor Technology)
o URL wwwection
o Remote XSL inclusion
*
* MultiRequest Parameter Manipulation
*
o Blind SQL/XPath Injection
+ DNS Server vulnerabilities (Open zone transfer, Open recursion, cache poisoning)
+ FTP server checks (list of writable FTP directories, weak FTP passwords, anonymous access allowed)
+ Security and configuration checks for badly configured proxy servers
+ Checks for weak SNMP community strings and weak SSL cyphers
+ and many other network level vulnerability checks!
Other vulnerability tests may also be preformed using the manual tools provided, including:
* Input Validation
* Authentication attacks
* Buffer overflows
* Blind SQL injection
* Sub domain scanning
http://hotfile.com/dl/74893451/cf8c5ed/Acunetix.Web.Vulnerability.Scanner.v7.0.Cracked-MESMERiZE.rar.html
Best Regards
|
|
|
I. Link không có password, dung lượng file ebook 12Mb: http://hotfile.com/dl/77095225/ba59c9b/CEH_Certified_Ethical_Hanker_Study_Guide.rar.html
II. Link ebook + CD: http://hotfile.com/dl/76863515/f3b4f80/cehwithcd.rar.html
Password unrar:
Code:
Best Regards
|
|
|
hvthang wrote:
KingHTVpr0 wrote:
pass giải nén đâu
www.AvaxHome.ru
Cảm ơn hvthang. Password UnRar là: www.AvaxHome.ru
More links: http://www.fileserve.com/file/Rtgtz4v/cehwithcd.rar
|
|
|
Kimberly Graves, “CEH Certified Ethical Hacker Study Guide (with CD)”
Publisher: Sybex | April 2010 | ISBN: 0470525207 | 432 pages | PDF & ISO | 76 MB
Prepare for the new version of CEH certification with this advanced guide. Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That’s the philosophy behind ethical hacking, and it’s a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book pres full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice.
Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
* Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
* Includes a CD with review questions, bonus exams, and more study tools
This is the ideal guide to prepare you for the new CEH certification exam.
http://hotfile.com/dl/76863515/f3b4f80/cehwithcd.rar.html
Password unrar:
Code:
Best Regards
|
|
|
Dear Hacker: Letters to the Editor of 2600 By Emmanuel Goldstein
Publisher: Wiley 2010 | 576 Pages | ISBN: 0470620064 | PDF | 5 MB
Actual letters written to the leading hackers’ magazine
For 25 years, 2600: The Hacker Quarterly has given voice to the hacker community in all its manifestations. This collection of letters to the magazine reveals the thoughts and viewpoints of hackers, both white and black hat, as well as hacker wannabes, technophiles, and people concerned about computer security. Insightful and entertaining, the exchanges illustrate 2600′s vast readership, from teenage rebels, anarchists, and survivalists to law enforcement, consumer advocates, and worried parents.
Dear Hacker is must reading for technology aficionados, 2600′s wide and loyal audience, and anyone seeking entertainment well laced with insight into our society.
Coverage Includes:
Question Upon Questio
Tales from the Retail Front
The Challenges of Life as a Hacker
Technology
The Magic of the Corporate World
Our Biggest Fans
Behind the Walls
A Culture of Rebels
Strange Ramblings
About the Author
Emmanuel Goldstein (emmanuel@goldste.in) has been publishing 2600 Magazine, The Hacker Quarterly, since 1984. He traces his hacker roots to his high school days in the late ’70s, when he first played with a distant computer over highspeed, 300-baud phone lines. It didn’t take long for him to get into trouble by figuring out how to access something he wasn’t supposed to access. He continued playing with various machines in his college days at the State University of New York at Stony Brook. This resulted in an FBI raid, as he once again gained access to something he really shouldn’t have. It was in the midst of all this excitement that he cofounded 2600 Magazine, an outlet for hacker stories and tutorials from all over the world. The rapid growth and success of the magazine was both shocking and scary to Goldstein, who to this day has never taken a course in computers. Since 1988, he has also hosted Off The Hook, a hacker-themed technology talk show on WBAI 99.5 FM in New York City. In addition to making the hacker documentary Freedom Downtime, Goldstein hosts the Hackers On Planet Earth (HOPE) conferences in New York City every two years, drawing thousands of hackers from all over the world.
http://depositfiles.com/files/e7d42jclz
|
|
|
B 0 0 B wrote:
Môn thi:Quản lý hành chính Nhà nước
môn này học ở đâu vậy ta?
Thi công chức đó bạn. Thường cán bộ Sở Nội Vụ hoặc giảng viên trường chính trị dạy.
|
|
|
Managing Information Security By John R. Vacca
Publisher: Syngress 2010 | 320 Pages | ISBN: 1597495336 | PDF | 4 MB
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors' respective areas of expertise.
Chapters contributed by leaders in the field covering foundational and practical aspects of information security management, allowing the reader to develop a new level of technical expertise found nowhere else.
Comprehensive coverage by leading experts allows the reader to put current technologies to work.
Presents methods of analysis and problem solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
http://depositfiles.com/files/02kig6y5q
|
|
|
Tuyển dụng mà "vài ba người", "Thành thạo: 1 vài mã nguồn mở về Web hiện này"... Cũng chẳng đề cập chế độ lương bổng, chế độ.
Viết cái Tuyển dụng không xong, ai mà làm cho bạn!
|
|
|
Jason Buffington, "Data Protection for Virtual Data Centers"
Sybex | 2010 | ISBN: 0470572140 | 528 pages | PDF | 11 MB
Essential information on how to protect data in virtual environments!
Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach, protect, and manage data in a virtualized environment. You'll get up to speed on data protection problems, explore the data protection technologies available today, see how to adapt to virtualization, and more. The book uses a "good, better, best" approach, exploring best practices for backup, high availability, disaster recovery, business continuity, and more.
* Covers best practices and essential information on protecting data in virtualized enterprise environments
* Shows you how to approach, protect, and manage data while also meeting such challenges as return on investment, existing service level agreements (SLAs), and more
* Helps system and design architects understand data protection issues and technologies in advance, so they can design systems to meet the challenges
* Explains how to make absolutely critical services such as file services and e-mail more available without sacrificing protection
* Offers best practices and solutions for backup, availability, disaster recovery, and others
This is a must-have guide for any Windows server and application administrator who is charged with data recovery and maintaining higher uptimes.
http://uploading.com/files/72eeem3m/0470572140DataProtection.rar/
|
|
|
tranvanminh wrote:
HVA đã trở lại, lợi hại gấp đôi
Hồi trưa này vô HVA bị đẩy ra cái Index:
Giờ thì đã trở lại, còn lợi hay hại bao nhiêu thì còn phải xem lại
|
|
|
Đây là lần thứ bao nhiêu HVA bị soi vào cái domain rồi nhỉ?
|
|
|
Ananda, Ph.d. Mitra, "Digital Security: Cyber Terror and Cyber Security"
Chelsea House Publications | 2010 | ISBN: 0816067910 | 120 pages | PDF | 11,2 MB
Since the advent of widespread Internet use, digital technology has been used for criminal intent. From computer viruses capable of shutting down and destroying infected computers to recruiting members online for hate groups, the ways the Internet can be used for nefarious purposes is practically limitless. But there is hope. Those in the digital industry are working to increase safeguards from cyber terrorists, such as heading off viruses before they can infect computers, and increasing cyber security. Digital Security: Cyber Terror and Cyber Security describes how computers are used both to commit crimes and to prevent them and concludes with a discussion of the future of digital crime and stopping its spread.
http://uploading.com/files/2ccde3cm/0816067910Sec.rar/
|
|
|
“CISSP Study Guide” by Eric Conrad, Seth Misenar, Joshua Feldman
Syngress | 2010 | ISBN: 1597495638 | 566 pages | PDF | 10 Mb
The CISSP certification is the very first and most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 60,000 professionals are certified worldwide with many more joining their ranks. This new study guide is aligned to cover all of the material included in the exam complete with special attention to recent updates.
http://ifile.it/oncsxhe/CISSPStudyGuide10.rar
The ten domains are covered completely and as concisely as possible with an eye to acing the exam.
Each of the ten domains has its own chapter that includes specially designed pedagogy to aid the test-taker in passing the exam like:
• Clearly Stated Exam Objectives
• Unique Terms/Definitions
• Exam Warnings
• Learning by Example
• Chapter Ending Questions
Table of Contents
Acknowledgments
About the authors
Introduction
Domain 1: Information security governance and risk management
Domain 2: Access control
Domain 3: Cryptography
Domain 4: Physical (Environmental) security
Domain 5: Security architecture and design
Domain 6: Business continuity and disaster recovery planning
Domain 7: Telecommunications and network security
Domain 8: Application development security
Domain 9: Operations security
Domain 10: Legal, regulations, investigations, and compliance
Self test
Glossary
Index
|
|
|
Metrics and Methods for Security Risk Management
Publisher: Syngress | pages: 296 | 2010 | ISBN: 1856179788 | PDF | 6,3 mb
Metrics and Methods for Security Risk Management offers powerful analytic tools that have been absent from traditional security texts. This easy-to-read text provides a handy compendium of scientific principles that affect security threats, and establishes quantitative security metrics that facilitate the development of effective security solutions. Most importantly, this book applies these foundational concepts to information protection, electromagnetic pulse, biological, chemical and radiological weapons, theft, and explosive threats. In addition, this book offers a practical framework for assessing security threats as well as a step-by-step prescription for a systematic risk mitigation process that naturally leads to a flexible model for security standards and audits. This process helps ensure consistency and coherence in mitigating risk as well as in managing complex and/or global security programs. This book promises to be the standard reference in the field and should be in the library of every serious security professional.
http://sharingmatrix.com/file/13852639/Metrics_and_Methods_for_Security_Risk_Management.rar
|
|
|
Programming Python + Source Code
Publisher: O'Reilly Media | ISBN: 0596009259 | edition 2006 | CHM | 1596 pages | 22 mb
Completely revised and improved, the second edition of Programming Python is an excellent compendium of material geared toward the more knowledgeable Python developer. It includes dozens of reusable scripts for common scripting tasks, and is one of the best available sources of information for this popular object-oriented scripting language. In over 1,200 pages of material, this book offers an extremely comprehensive guide to Python development. Though his book is densely packed with information, Mark Lutz is a lively and witty writer whose focus is on getting things done using the natural strengths of the Python language. To that end, after an introduction and history of the language, the book shows how to use Python for performing automated tasks with files and directories (for example, for doing backups both locally and on Web servers). Not only will this book teach you more about Python, but it will also give you a library of code that you can use as is or adapt for your own projects.
http://depositfiles.com/files/7ne4dvf9b
|
|
|
Cái này trong windows có sẵn mà bạn.
|
|
|
http://en.wikipedia.org/wiki/Command_Prompt
Bạn phải tự tìm hiểu cái này qua tài liệu thôi. Đọc và thể nghiệm nó trên máy, chưa hiểu chỗ nào mới hỏi. Kiên nhẫn tự tìm tòi trước, hỏi khi nào mình thực sự bó tay.
PS: mấy cái này chẳng có gì là thâm nhập cả, chú ý sinh hoạt đúng nội quy để học hỏi được nhiều hơn.
Thân mến.
|
|
|
Jon Loeliger, "Version Control with Git"
OReilly | 2009 | ISBN: 0596520123 | 330 pages | PDF | 6,3 MB
Version Control with Git takes you step-by-step through ways to track, merge, and manage software projects, using this highly flexible, open source version control system. Git permits virtually an infinite variety of methods for development and collaboration. Created by Linus Torvalds to manage development of the Linux kernel, it's become the principal tool for distributed version control. But Git's flexibility also means that some users don't understand how to use it to their best advantage. Version Control with Git offers tutorials on the most effective ways to use it, as well as friendly yet rigorous advice to help you navigate Git's many functions.
With this book, you will:
* Learn how to use Git in several real-world development environments
* Gain insight into Git's common-use cases, initial tasks, and basic functions
* Understand how to use Git for both centralized and distributed version control
* Use Git to manage patches, diffs, merges, and conflicts
* Acquire advanced techniques such as rebasing, hooks, and ways to handle submodules (subprojects)
* Learn how to use Git with Subversion Git has earned the respect of developers around the world. Find out how you can benefit from this amazing tool with Version Control with Git.
http://uploading.com/files/88f7dmcm/0596520123Git.rar/
|
|
|
Ingrid M.R. Verbauwhede, "Secure Integrated Circuits and Systems"
Springer | 2010 | ISBN: 0387718273 | 246 pages | PDF | 7,1 MB
On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area, or power consumption. It is therefore difficult to attain the delicate balance between the extra cost of security measures and the added benefits.
http://uploading.com/files/m7aefa88/0387718273SecureCircuits.rar/
|
|
|
Crimeware: Understanding New Attacks and Defenses By Markus Jakobsson, Zulfikar Ramzan
Publisher: Addison-Wesley Professional 2008 | 608 Pages | ISBN: 0321501950 | CHM | 11 MB
There’s a new breed of online predators—serious criminals intent on stealing big bucks and top-secret information—and their weapons of choice are a dangerous array of tools called “crimeware.” With an ever-growing number of companies, organizations, and individuals turning to the Internet to get things done, there’s an urgent need to understand and prevent these online threats.
Crimeware: Understanding New Attacks and Defenses will help security professionals, technical managers, students, and researchers understand and prevent specific crimeware threats. This book guides you through the essential security principles, techniques, and countermeasures to keep you one step ahead of the criminals, regardless of evolving technology and tactics. Security experts Markus Jakobsson and Zulfikar Ramzan have brought together chapter contributors who are among the best and the brightest in the security industry. Together, they will help you understand how crimeware works, how to identify it, and how to prevent future attacks before your company’s valuable information falls into the wrong hands. In self-contained chapters that go into varying degrees of depth, the book provides a thorough overview of crimeware, including not only concepts prevalent in the wild, but also ideas that so far have only been seen inside the laboratory.
With this book, you will
Understand current and emerging security threats including rootkits, bot networks, spyware, adware, and click fraud
Recognize the interaction between various crimeware threats
Gain awareness of the social, political, and legal implications of these threats
Learn valuable countermeasures to stop crimeware in its tracks, now and in the future
Acquire insight into future security trends and threats, and create an effective defense plan
With contributions by Gary McGraw, Andrew Tanenbaum, Dave Cole, Oliver Friedrichs, Peter Ferrie, and others.
Download: http://depositfiles.com/files/zzrn6d3k0
|
|
|
Bản windows 7 Ultimate của bạn là bản bẻ khoá? Nếu vậy có thể là bạn bẻ khoá chưa ngon.
PS: email chỉ dùng khi PM thôi nhé.
|
|
|
|
|
|
|