Thursday, December 17, 2009

A Nice MP3 Player for web using XML

MP3 PLayer XML

Load mp3s files and their titles from xml file. Has auto play and automatic next song option in xml file. Comes with 2 different skins. Easily remove features by deleting their movie clips or setting their layer as a “guide”. Can also play any mp3 by calling a function listed in the help file

Demo: http://www.flashden.net/item/mp3-player-xml/15544

Download


http://rapidshare.com/files/218848853/flashden_mp3-player-xml_15544.rar

Cisco Press Routing Video Mentor DVD


Routing Video Mentor is a unique video product that provides you with more than six hours of personal, visual instruction from bestselling author and senior instructor Kevin Wallace. In the 15 videos presented on the DVD, Kevin walks you through common Cisco® router configuration and troubleshooting tasks. Designed to develop and enhance hands-on skills, each 15 to 40 minute video guides you through essential configuration tasks on Cisco routers and shows you how to verify that your network is working correctly.

Lab Layout:
Each video lab presents detailed objectives, lab diagrams, command tables, and video captures. Audio instruction throughout offers tips and shortcuts that truly make learning easy.

Network Animation:
Animated network diagrams show you lab setup, device addressing, and how traffic flows through the network.

Command-Line Interface (CLI) Video:
Video screencasts of router CLI demonstrate command entry, configuration techniques, and device response.


http://hotfile.com/dl/19679728/51e5d37/CPressMentor-.part1.rar.html
http://hotfile.com/dl/19679824/db5338a/CPressMentor-.part2.rar.html
http://hotfile.com/dl/19679885/7e19def/CPressMentor-.part3.rar.html
http://hotfile.com/dl/19679948/12d46f3/CPressMentor-.part4.rar.html
http://hotfile.com/dl/19680007/af2d909/CPressMentor-.part5.rar.html
http://hotfile.com/dl/19680080/160432d/CPressMentor-.part6.rar.html
http://hotfile.com/dl/19680191/49a8f12/CPressMentor-.part7.rar.html
http://hotfile.com/dl/19680207/bcc7d99/CPressMentor-.part8.rar.html

Wednesday, December 16, 2009

The Hacker’s Handbook: The Strategy Behind Breaking into And Defending Networks



This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. –This text refers to the Hardcover edition.

Uploading | Rapidshare

Playboy’s Complete Massage (2008)

Playboy’s Complete Massage (2008) | 900 MB

DVDRIP | English | 1h 02min | 640×480 | DivX, 1522 kbps | AC3, 2 ch, 32 kbits

Playboys Complete Massage – A how-to for erotic massage that’s almost as good to watch as to experience the actual techniques demonstrated. Includes methods from both Swedish and Asian practices to encourage shared sensual pleasure between couples.

Download

http://hotfile.com/dl/14020698/3763cc0/PC.Masge08.part01.rar.html
http://hotfile.com/dl/14020704/8716ea7/PC.Masge08.part02.rar.html
http://hotfile.com/dl/14020710/9d7741b/PC.Masge08.part03.rar.html
http://hotfile.com/dl/14020722/42f15aa/PC.Masge08.part04.rar.html
http://hotfile.com/dl/14020726/2de4289/PC.Masge08.part05.rar.html
http://hotfile.com/dl/14020733/9849dfd/PC.Masge08.part06.rar.html
http://hotfile.com/dl/14020799/76b440b/PC.Masge08.part07.rar.html
http://hotfile.com/dl/14020806/60f89c3/PC.Masge08.part08.rar.html
http://hotfile.com/dl/14020818/4fcd886/PC.Masge08.part09.rar.html
http://hotfile.com/dl/14020828/c0bdf2f/PC.Masge08.part10.rar.html
http://hotfile.com/dl/14020837/0cdeff8/PC.Masge08.part11.rar.html

23 Best Hacking Videos [High Quality Videos]

Click the image to open in full size.
Description :

This is a whole set of 23 videos showing how to hack!!!!!!!!

Thanks to the makers for their time and effort.You all are awesome.

Please use this videos only for study and research purposes.Don’t harm anyone.
==================================================
Part 1
Siffing Remote Router Traffic via GRE Tunnels (Hi-Res)
Buffer Overflows Pt. 3 by IDESpinner
Buffer Overflows Pt. 2 by IDEspinner

Part 2
Breaking WEP in 10 minutes
DoS attack against Windows FTP Server
How to sniff around switches using Arpspoof and Ngrep!

Part 3
Buffer Overflows pt1
Feauture Addition pt 1
Feauture Addition pt 2
DNS Poison Routing
Install VNC Remotely!
Internet Explorer Remote Command Execution Exploit Client Side Attack (Hi-Res)
Internet Explorer Remote Command Execution Exploit Client Side Attack (lo-Res)
MITM Hijacking
Sniffing logins and Passwords

Part 4
Sniffing Remote Router Traffic via GRE Tunnels (lo-res)
A Penetration Attack Reconstructed
Telnet Bruteforce
Tunneling Exploits through SSH
Bluesnarfing a Nokia 6310i hand set
Start a session and get the interactive commandline access to a remote windows box!
Use Brutus to crack a box running telnet!
Cain to ARP Poison and sniff passwords!
Screen-Shots :
Click the image to open in full size.
Click the image to open in full size.
Click the image to open in full size.
Click the image to open in full size.

D0wn10ad
http://uploading.com/files/7VP93WYQ/23_best_Hacking_Videos_AC_DC.part13.rar.html
http://uploading.com/files/70NJKG2W/23_best_Hacking_Videos_AC_DC.part12.rar.html
http://uploading.com/files/64MR2BXL/23_best_Hacking_Videos_AC_DC.part11.rar.html
http://uploading.com/files/BTC9A4LI/23_best_Hacking_Videos_AC_DC.part10.rar.html
http://uploading.com/files/PS2HEOEF/23_best_Hacking_Videos_AC_DC.part09.rar.html
http://uploading.com/files/0ZHHGOY0/23_best_Hacking_Videos_AC_DC.part08.rar.html
http://uploading.com/files/17RXDN0L/23_best_Hacking_Videos_AC_DC.part07.rar.html
http://uploading.com/files/3QLATK61/23_best_Hacking_Videos_AC_DC.part06.rar.html
http://uploading.com/files/R2Y7INL8/23_best_Hacking_Videos_AC_DC.part05.rar.html
http://uploading.com/files/T8FI7GLK/23_best_Hacking_Videos_AC_DC.part04.rar.html
http://uploading.com/files/13A9AG1O/23_best_Hacking_Videos_AC_DC.part03.rar.html
http://uploading.com/files/3GPJFZYM/23_best_Hacking_Videos_AC_DC.part02.rar.html
http://uploading.com/files/1QSXKXK6/23_best_Hacking_Videos_AC_DC.part01.rar.html

Mirror Easy-share
http://www.easy-share.com/f/1326006058/23_best_Hacking_Videos_AC_DC

Mirror Rapidshare
http://rapidshare.com/files/241260150/23_best_Hacking_Videos_AC_DC.part13.rar
http://rapidshare.com/files/241260200/23_best_Hacking_Videos_AC_DC.part11.rar
http://rapidshare.com/files/241260209/23_best_Hacking_Videos_AC_DC.part04.rar
http://rapidshare.com/files/241260210/23_best_Hacking_Videos_AC_DC.part10.rar
http://rapidshare.com/files/241260212/23_best_Hacking_Videos_AC_DC.part08.rar
http://rapidshare.com/files/241260231/23_best_Hacking_Videos_AC_DC.part01.rar
http://rapidshare.com/files/241260244/23_best_Hacking_Videos_AC_DC.part12.rar
http://rapidshare.com/files/241260257/23_best_Hacking_Videos_AC_DC.part05.rar
http://rapidshare.com/files/241260262/23_best_Hacking_Videos_AC_DC.part06.rar
http://rapidshare.com/files/241260270/23_best_Hacking_Videos_AC_DC.part02.rar
http://rapidshare.com/files/241260316/23_best_Hacking_Videos_AC_DC.part03.rar
http://rapidshare.com/files/241260321/23_best_Hacking_Videos_AC_DC.part07.rar
http://rapidshare.com/files/241260359/23_best_Hacking_Videos_AC_DC.part09.rar

Mirror Hotfile
http://hotfile.com/dl/5234940/9abcf18/23_best_Hacking_Videos_AC_DC.part01.rar.html
http://hotfile.com/dl/5234987/256700b/23_best_Hacking_Videos_AC_DC.part02.rar.html
http://hotfile.com/dl/5235039/155fa29/23_best_Hacking_Videos_AC_DC.part03.rar.html
http://hotfile.com/dl/5235079/63916a9/23_best_Hacking_Videos_AC_DC.part04.rar.html
http://hotfile.com/dl/5235120/a485b25/23_best_Hacking_Videos_AC_DC.part05.rar.html
http://hotfile.com/dl/5235184/3be9419/23_best_Hacking_Videos_AC_DC.part06.rar.html
http://hotfile.com/dl/5235282/3a7be67/23_best_Hacking_Videos_AC_DC.part07.rar.html
http://hotfile.com/dl/5235339/1bd7ec7/23_best_Hacking_Videos_AC_DC.part08.rar.html
http://hotfile.com/dl/5235401/ddc5657/23_best_Hacking_Videos_AC_DC.part09.rar.html
http://hotfile.com/dl/5235467/d815d5b/23_best_Hacking_Videos_AC_DC.part10.rar.html
http://hotfile.com/dl/5235540/c4e15c5/23_best_Hacking_Videos_AC_DC.part11.rar.html
http://hotfile.com/dl/5235616/4abd629/23_best_Hacking_Videos_AC_DC.part12.rar.html
http://hotfile.com/dl/5235657/16b05c3/23_best_Hacking_Videos_AC_DC.part13.rar.html

HSC Hackers Kit


Kit Includes following Sections
Hackers Center has selected for you hundreds among the newest papers and tools to let anyone,
in the middle of his internet security education, learn faster and from a black hat
perspective. We do believe into ethical hacking as the only way to be successful at
understanding and defending your network or your company from remote attacks.
Note: An ethical hacker is like a penetration tester. The ethical hacker is an individual
who is employed or contracted to undertake an attempted penetration test. These individuals
use the same methods employed by hackers. You must acquire written permission to avoid
braking the law. If you brake into a system you have committed a felony, any one that uses
these new acquired teachings will be held responsible for there own actions

Sec 1: Footprinting & Scanning

- Understanding Ethical Hacking
- Intro to reconnaissance phase
- Understanding footprinting
- Scanning & Footprinting Tools
- Scanning & Footprinting Books
- Understanding port scanning
- Discovering the OS system
- Discovering services running
- Understanding enumerations

Sec 2: Web Security

- Understanding Web Security
- Password Hacking & Security
- IIS web Server Security
- Web Security Tools
- Web Security Books
- Apache Web Server Security
- SQl injection & Security
- Cross-Site Scripting (XSS)
- Web Application Security
- Authentication & Sessions
- Prevention & Countermeasures

Sec 3: Win Hacking & Networking

- Windows System Security
- Cracking Passwords
- Password Recovery
- Hardware Security
- Registry Security
- Win & Networking Tools
- Win & Networking Books
- Cisco Security & Hacks
- Intrusion detection
- Firewalls & Honeypots
- Ip Changing & Security
- Spyware & Anti-Virus Sec

Sec 4: Sniffing & Hijacking

- Understanding sniffers
- Packet capturing
- MAC flooding & ARP poisoning
- How session hijacking works
- Sniffing & Hijacking Tools
- Sniffing & Hijacking Books
- Spoofing attacks & Security
- Many Sniffing countermeasures

Sec 5: Denial of Service

- Denial Of Service Attacks
- Distributed Denial Of Service
- Types of denial of attacks
- Tools for running DOS attacks
- Tools for running DDOS attacks
- Denial Of Service Books
- Denial of Service Countermeasures

6: Social Engineering

- What is Social Engineering
- Policies and Procedures
- Online Social Engineering
- Social Engineering Books
- Who is Kevin Mitnick
- The Common Types of Attack
- Best collection of Ezines
- Social Engineering Countermeasures

Sec 7: Wireless Security

- Understanding Wireless Security
- Introduction to 802.11
- 802.11 Wireless Networks
- Introduction to WEP
- How to Find WLANs
- Cracking WEP Keys
- Wireless DoS attacks
- Wireless Security Books
- Wireless Security Tools
- Wireless Hacking Tools
- WEP Key Encryption
- Securing Wireless Networks

Sec 8: Coding & Buffer Overflow

- Coding Skills Required
- Windows Programming
- What is API Coding
- Linux Programming
- Open Source Coding
- ASM, CGI & Perl
- C/C++, Java & PHP
- What is Secure Coding
- HSC Coding Library
- Reverse Engineering
- What is a Buffer Overflow
- Writing your own exploits
- Understanding Stacks
- Defense from Buffer Overflows
- Understanding shellcodes
- Writing Exploits
- Coders Professional Books

Sec 9: Worms & Virus

- Understanding Viruses
- Viruses different forms
- Viruses & Worms Books
- How Anti-Viruses Work
- How worms spread & infect
- Viruses Codes and Tools
- History of viruses & worms
- Protection against viruses

Sec 10: Linux Security

- Introduction to Linux
- Linux file structure
- Linux Networking
- Basic Linux commands
- How Linux is hacked
- Rootkits for Linux
- Compiling Programs on Linux
- IP Chains and IP Tables
- Linux Security Tools
- Linux Security Books
- Types of Platforms
- Linux Security Methods

Sec 11: Encryption

- Introduction to Encryption
- Encryption Cracking Techniques
- Types of Encryptions
- Understanding hashing
- Know how MD5 works
- Basic cryptographic attacks
- Art of steganography
- SSH, RSA, PGP, SSL & SHA
- Algorithm coding
- Rainbow Tables & Cracking
- Cryptographic Defence
- Cryptographic Tools
- Cryptographic Books
- Online anonymity
- Anonymous surfing Tools
- Understanding *****

Sec 12: Trojans & Rats

- Understanding Trojan horses
- Understanding Backdoors
- Understanding Rats
- Trojan infection mechanisms
- Intro to keyloggers
- Overview of Trojan tools
- Security Tools
- Trojan & Rats Books
- How to write your Trojan
- How to remove a Trojan
- What are logic Bombs
- Windows Rootkits
- Trojan & Rat Encryptions
- Types of Attack Methods
- Trojans & Rats Countermeasures

Sec 13: Miscellaneous

- Hackers Dictionary
- Hacking Questions
- Acrobat Reader
- mIRC (chat)
- Archivers
- FireFox 2 (Secure)
- Best Security & Hacking Links
- E.H Policy

Module.1.Ethical.Hacking.and.Penetration.Testing

http://rapidshare.com/files/208614372/UDK_01.zip.001
http://rapidshare.com/files/208618515/UDK_01.zip.002
http://rapidshare.com/files/208632595/UDK_01.zip.003
http://rapidshare.com/files/208632679/UDK_01.zip.004
http://rapidshare.com/files/208632697/UDK_01.zip.005
http://rapidshare.com/files/208632709/UDK_01.zip.006
http://rapidshare.com/files/208640410/UDK_01.zip.007
http://rapidshare.com/files/208640441/UDK_01.zip.008
http://rapidshare.com/files/208955075/UDK_01.zip.009
http://rapidshare.com/files/208960632/UDK_01.zip.010
http://rapidshare.com/files/208962690/UDK_01.zip.011

CODE

Module.2.Footprinting.and.Reconnaissance

http://rapidshare.com/files/208971586/UDK_02.zip.001
http://rapidshare.com/files/208984762/UDK_02.zip.002
http://rapidshare.com/files/208984947/UDK_02.zip.003
http://rapidshare.com/files/208984957/UDK_02.zip.004
http://rapidshare.com/files/208984968/UDK_02.zip.005
http://rapidshare.com/files/208988106/UDK_02.zip.006
http://rapidshare.com/files/208990283/UDK_02.zip.010
http://rapidshare.com/files/208996738/UDK_02.zip.007
http://rapidshare.com/files/208997229/UDK_02.zip.009
http://rapidshare.com/files/208997230/UDK_02.zip.008

CODE

Module.3.TCP.IP.Basics.and.Scanning

http://rapidshare.com/files/209000206/UDK_03.rar.001
http://rapidshare.com/files/209003277/UDK_03.rar.002
http://rapidshare.com/files/209006998/UDK_03.rar.003
http://rapidshare.com/files/209010544/UDK_03.rar.004
http://rapidshare.com/files/209014295/UDK_03.rar.005
http://rapidshare.com/files/209017281/UDK_03.rar.006
CODE
Module.4.Enumeration.and.Verification
http://rapidshare.com/files/209021253/UDK_04.zip.001
http://rapidshare.com/files/209027776/UDK_04.zip.002
http://rapidshare.com/files/209336788/UDK_04.zip.003
http://rapidshare.com/files/209343640/UDK_04.zip.004
http://rapidshare.com/files/209349261/UDK_04.zip.005
http://rapidshare.com/files/209355241/UDK_04.zip.006
http://rapidshare.com/files/209361779/UDK_04.zip.007

http://rapidshare.com/files/209365478/UDK_04.zip.008
http://rapidshare.com/files/209366884/UDK_04.zip.009

CODE
Module.5.Hacking.Defending.Wireless.Modems

http://rapidshare.com/files/207576697/UDK_05.zip

CODE
Module.6.Hacking.Defending.Web.Servers
http://rapidshare.com/files/209370683/UDK_06.zip.001
http://rapidshare.com/files/209374435/UDK_06.zip.002
http://rapidshare.com/files/209384348/UDK_06.zip.003
http://rapidshare.com/files/209384553/UDK_06.zip.004
http://rapidshare.com/files/209386036/UDK_06.zip.006
http://rapidshare.com/files/209386043/UDK_06.zip.005
http://rapidshare.com/files/209404586/UDK_06.zip.007

CODE
Module.7.Hacking.Defending.Web.Applications

UDK_07.zip

http://rapidshare.com/files/207581166/UDK_07.zip

CODE
Module.8.Sniffers.and.Session.Hijacking
UDK_08.zip

http://rapidshare.com/files/207577941/UDK_08.zip

CODE
Module.9.Hacking.Defending.Windows.Systems

UDK_09.zip

http://rapidshare.com/files/207583004/UDK_09.zip

CODE
Module.10.Hacking.Defending.Unix.Systems

UDK_10.zip

http://rapidshare.com/files/207579692/UDK_10.zip

CODE
Module.11.Rootkits.Backdoors.Trojans.Tunnels

UDK_11.zip

http://rapidshare.com/files/207581978/UDK_11.zip

CODE
Module.12.Denial.of.Service.and.Botnets

UDK_12.zip

http://rapidshare.com/files/207580560/UDK_12.zip

CODE
Module.13.Automated.Pen.Testing.Tools

UDK_13.zip

http://rapidshare.com/files/207577291/UDK_13.zip

CODE
Module.14.Intrusion.Detection.Systems

UDK_14.zip

http://rapidshare.com/files/207578538/UDK_14.zip

CODE
Module.15.Firewalls

http://rapidshare.com/files/209404825/UDK_15.zip.001
http://rapidshare.com/files/209404901/UDK_15.zip.002
http://rapidshare.com/files/209404905/UDK_15.zip.003
http://rapidshare.com/files/209412714/UDK_15.zip.007
http://rapidshare.com/files/209416979/UDK_15.zip.004
http://rapidshare.com/files/209417020/UDK_15.zip.005
http://rapidshare.com/files/209417044/UDK_15.zip.006

CODE
Module.16.Honeypots.and.Honeynets

UDK_16.zip

http://rapidshare.com/files/207578337/UDK_16.zip

CODE
Module.17.Ethics.and.Legal.Issues

UDK_17.zip

http://rapidshare.com/files/207577599/UDK_17.zip

pass: KELCYRA4EVER@UDK

Password default : shytex.com

Holiday Workout in 4 Minutes for Complete Fat Burn

XoaX C++ Videos

XoaX Learn C++ 2008 Videos Full | 420 MB

C++ is a statically typed, free-form, multi-paradigm, compiled, general-purpose programming language. It is regarded as a middle-level language, as it comprises a combination of both high-level and low-level language features. It was developed by Bjarne Stroustrup starting in 1979 at Bell Labs as an enhancement to the C programming language and originally named “C with Classes”. It was renamed to C++ in 1983.

C++ Video Tutorials
Watch our free C++ tutorials below. Our C++ tutorials cover the C++ language from the very first steps, including how to download a free compiler to begin programming. We are always adding more video tutorials, so check back frequently. Please refer questions to our Forum.

For C++ Beginners
Following our C++ Console series of video tutorials is the best way to begin learning C++. These tutorials start at the very beginning by showing you step-by-step how to install a free compiler. Then the videos build up programming concepts gradually.

1. Console C++ Video Tutorials
Watch our free Console C++ video tutorials. Check back frequently for more. Please refer your questions to our Forum. See our C++ Computer Terminology page for information on specific computer terms.

How These C++ Tutorials Are Structured

This series is intended to be a starting point for beginners to C++ as well as a refresher for experienced programmers. The videos give a sequential presentation of standard C++ starting from the very basics of the language. Most of the video tutorials present a single C++ concept and require a single main.cpp file, with each code sample fitting entirely on the screen. There is no download for these lessons as the whole program is extremely short. Every few lessons, like 9, 13, 20, etc., the material from the previous lessons is brought together to make a longer program to illustrate general usage. These lessons have a single substantial program and include downloadable code.

* Lesson 0: Installing Visual C++ 2008 Express
* Lesson 1: Creating a Console Application
* Lesson 2: Basic Input and Output
* Lesson 3: Variables and Constants
* Lesson 4: Basic Data Types
* Lesson 5: Logical Operators
* Lesson 6: Relational Operators
* Lesson 7: If, Else If, Else
* Lesson 8: While and Do While Loops
* Lesson 9: Tic Tac Toe
* Lesson 10: One-Dimensional Arrays
* Lesson 11: Global and Local Scope
* Lesson 12: Basic Functions
* Lesson 13: Perceptron Training
* Lesson 14: Increment and Decrement
* Lesson 15: Namespace Essentials
* Lesson 16: For Loops
* Lesson 17: References and Pointers
* Lesson 18: Arguments and Return Values
* Lesson 19: Function Templates
* Lesson 20: Sorting with Bubblesort
* Lesson 21: Arithmetical Operators
* Lesson 22: Using the rand() Function
* Lesson 23: Blackjack
* Lesson 24: Fundamental Data Types
* Lesson 25: Type Conversion Operators
* Lesson 26: Enumerations
* Lesson 27: Switch Statements
* Lesson 28: Multi-Dimensional Arrays
* Lesson 29: Fifteen Puzzle
* Lesson 30: Simple Classes
* Lesson 31: Member Functions
* Lesson 32: Constructors and Destructors
* Lesson 33: Built-in Class Behavior
* Lesson 34: Public and Private Members
* Lesson 35: A Simple Role-Playing Game
* Lesson 36: Dynamic Memory Allocation
* Lesson 37: Preprocessor Directives
* Lesson 38: Simple Inheritance
* Lesson 39: Function Pointers

2. C++ OpenGL Video Tutorials
Watch our free C++ OpenGL programming video tutorials. Check back frequently for more. Please refer your questions to our Forum. Please see our C++ Computer Terminology page for information on specific computer terms.

* Lesson 1: A Simple OpenGL Project
* Lesson 2: Drawing Geometric Primitives
* Lesson 3: Using Geometric Primitives
* Lesson 4: Basic Lighting
* Lesson 5: Shading Models

3. C++ MFC Video Tutorials
Watch our free C++ MFC programming video tutorials. Check back frequently for more. Please refer your questions to our Forum. Please see our C++ Computer Terminology page for information on specific computer terms.

* Lesson 1: Creating a Simple SDI Application
* Lesson 2: The Document/View Architecture
* Lesson 3: Application & FrameWnd Classes
* Lesson 4: Drawing with MFC

4. C++ Win32 Video Tutorials
Watch our free C++ Win32 programming video tutorials. Check back frequently for more. Please refer your questions to our Forum. Please see our C++ Computer Terminology page for information on specific computer terms.

* Lesson 1: Creating a Simple Win32 Application
* Lesson 2: The Message Loop
* Lesson 3: Messages
* Lesson 4: Drawing Lines and Ellipses with GDI
* Lesson 5: Adding Menu Items
* Lesson 6: Message Boxes
* Lesson 7: Responding to Mouse Clicks
* Lesson 8: Tic Tac Toe
* Lesson 9: Loading and Displaying Bitmaps

5. Visual C++ Video Tutorials
Watch our free Visual C++ 2008 video tutorials. Check back frequently for more. Please refer your questions to our Forum. See our C++ Computer Terminology page for information on specific computer terms.

For more information on what is available in each edition of Visual Studio, see Visual Studio 2008 Product Comparison.

* Installing Visual Studio 2008 (Standard edition)
* Adding a New Header (.h) File to a Project
* Adding a New Source (.cpp) File to a Project
* Creating an Executable (.exe) File
* Enabling Line Numbering

6. C++ Miscellaneous Video Tutorials
Watch our free C++ Miscellaneous video tutorials. Check back frequently for more. Please refer your questions to our Forum. See our C++ Computer Terminology page for information on specific computer terms.

* Simple Sounds
* A High-Resolution Timer
* Creating a Thread

Install Instructions :
1.Unrar.
2.Mount with Poweriso or other emulator wich support .daa extension.
3.Enjoy
D0wn1oad
http://hotfile.com/dl/20774463/1d05b17/XoaX_Learn_C_2008.part01.rar.html
http://hotfile.com/dl/20774464/4f91a54/XoaX_Learn_C_2008.part02.rar.html
http://hotfile.com/dl/20774518/f00e883/XoaX_Learn_C_2008.part03.rar.html
http://hotfile.com/dl/20774520/4a06770/XoaX_Learn_C_2008.part04.rar.html
http://hotfile.com/dl/20774573/387fae8/XoaX_Learn_C_2008.part05.rar.html
http://hotfile.com/dl/20774604/b6ab95a/XoaX_Learn_C_2008.part06.rar.html
http://hotfile.com/dl/20774634/2d5bd86/XoaX_Learn_C_2008.part07.rar.html
http://hotfile.com/dl/20774672/eb07654/XoaX_Learn_C_2008.part08.rar.html
http://hotfile.com/dl/20774685/bed0ad1/XoaX_Learn_C_2008.part09.rar.html

Ethical Hacking Video Training DVD (CEH)


The latest version of the Certified Ethical Hacker (CEH) Courseware is due to be released and presented for the first time at Hacker Halted USA 2008 in June. Many small details of CEH Version 6 have been peppered on the Internet, as well as snippets of teaser copy on EC-Council’s own web site.

“With a total of 28 new and never seen before modules, covering the latest concepts, featuring more real life cases, and showcasing the latest hacking and security tools, the Certified Ethical Hacker (Version 6) will be the most advanced course ever.”

So I requested an interview with EC-Council to see if we could get confirmation as well as clarification. The questions are compiled from my own list as well as some others that were suggested by readers of The Ethical Hacker Network (EH-Net). EC-Council replied in a very timely manner with answers from both Haja Mohideen, co-founder of EC-Council, and Chuck Swanson, the instructor scheduled to teach the very first v6 offering of the course.

http://www.rapidspread.com/file.jsp?id=0pblp65jdl
http://www.rapidspread.com/file.jsp?id=foiyd0oued
http://www.rapidspread.com/file.jsp?id=5hxrbrciam
http://www.rapidspread.com/file.jsp?id=34oetnjnh1
http://www.rapidspread.com/file.jsp?id=1pdyt5r22a
http://www.rapidspread.com/file.jsp?id=nkhbqwkbu4
http://www.rapidspread.com/file.jsp?id=w0ap5afxm1
http://www.rapidspread.com/file.jsp?id=ljy5zp13ty
http://www.rapidspread.com/file.jsp?id=uqcozb1ynv
http://www.rapidspread.com/file.jsp?id=k9fo2s3lrr
http://www.rapidspread.com/file.jsp?id=xabubhrf1t
http://www.rapidspread.com/file.jsp?id=gzfvqpvgd5
http://www.rapidspread.com/file.jsp?id=v8kq6eco4s
http://www.rapidspread.com/file.jsp?id=icy6uu3pio
http://www.rapidspread.com/file.jsp?id=evp5gtm9vy
http://www.rapidspread.com/file.jsp?id=yjwcqzdugz

Password: www.softprovn.net


Source: [DL] Ethical Hacking Video Training DVD (CEH)

Thursday, December 3, 2009

VTC TCP-IP Packet Analysis

Both network administrators and IT security professionals must have the fundamental knowledge of TCP/IP to do their jobs. With that comes a necessity to be able to analyze TCP/IP traffic in order to troubleshoot network problems, analyze attacks, and better understand and secure their systems. Veteran VTC author, Bobby Rogers, will provide in-depth explanations for beginners and seasoned network professionals alike to enable them to understand the complex techniques of TCP/IP traffic analysis. To begin learning, simply click on the TCP/IP Packet Analysis movie links.


Megaupload:
http://www.megaupload.com/?d=D05JV7ZP
http://www.megaupload.com/?d=IEV1DG8J
http://www.megaupload.com/?d=YIE204ON

Rapidshare:
http://rapidshare.com/files/151574925/VTC.TCP.pm.part1.rar
http://rapidshare.com/files/151575014/VTC.TCP.pm.part2.rar
http://rapidshare.com/files/151575125/VTC.TCP.pm.part3.rar

filefactory
http://www.filefactory.com/file/c3308a/n/VTC_TCP_pm_txt
265 MB
Password default : shytex.com

Monday, November 30, 2009

URL Rewriting for Beginners






Introduction



URL rewriting can be one of the best and quickest ways to improve the usability and search friendliness of your site. It can also be the source of near-unending misery and suffering. Definitely worth playing carefully with it - lots of testing is recommended. With great power comes great responsibility, and all that.



There are several other guides on the web already, that may suit your needs better than this one.



Before reading on, you may find it helpful to have the mod_rewrite cheat sheet and/or the regular expressions cheat sheet handy. A basic grasp of the concept of regular expressions would also be very helpful.



What is "URL Rewriting"?



Most dynamic sites include variables in their URLs that tell the site what information to show the user. Typically, this gives URLs like the following, telling the relevant script on a site to load product number 7.



  1. http://www.pets.com/show_a_product.php?product_id=7


The problems with this kind of URL structure are that the URL is not at all memorable. It's difficult to read out over the phone (you'd be surprised how many people pass URLs this way). Search engines and users alike get no useful information about the content of a page from that URL. You can't tell from that URL that that page allows you to buy a Norwegian Blue Parrot (lovely plumage). It's a fairly standard URL - the sort you'd get by default from most CMSes. Compare that to this URL:



  1. http://www.pets.com/products/7/


Clearly a much cleaner and shorter URL. It's much easier to remember, and vastly easier to read out. That said, it doesn't exactly tell anyone what it refers to. But we can do more:



  1. http://www.pets.com/parrots/norwegian-blue/


Now we're getting somewhere. You can tell from the URL, even when it's taken out of context, what you're likely to find on that page. Search engines can split that URL into words (hyphens in URLs are treated as spaces by search engines, whereas underscores are not), and they can use that information to better determine the content of the page. It's an easy URL to remember and to pass to another person.



Unfortunately, the last URL cannot be easily understood by a server without some work on our part. When a request is made for that URL, the server needs to work out how to process that URL so that it knows what to send back to the user. URL rewriting is the technique used to "translate" a URL like the last one into something the server can understand.



Platforms and Tools



Depending on the software your server is running, you may already have access to URL rewriting modules. If not, most hosts will enable or install the relevant modules for you if you ask them very nicely.



Apache is the easiest system to get URL rewriting running on. It usually comes with its own built-in URL rewriting module, mod_rewrite, enabled, and working with mod_rewrite is as simple as uploading correctly formatted and named text files.



IIS, Microsoft's server software, doesn't include URL rewriting capability as standard, but there are add-ons out there that can provide this functionality. ISAPI_Rewrite is the one I recommend working with, as I've so far found it to be the closest to mod_rewrite's functionality. Instructions for installing and configuring ISAPI_Rewrite can be found at the end of this article.



The code that follows is based on URL rewriting using mod_rewrite.



Basic URL Rewriting



To begin with, let's consider a simple example. We have a website, and we have a single PHP script that serves a single page. Its URL is:



  1. http://www.pets.com/pet_care_info_07_07_2008.php


We want to clean up the URL, and our ideal URL would be:



  1. http://www.pets.com/pet-care/


In order for this to work, we need to tell the server to internally redirect all requests for the URL "pet-care" to "pet_care_info_07_07_2008.php". We want this to happen internally, because we don't want the URL in the browser's address bar to change.



To accomplish this, we need to first create a text document called ".htaccess" to contain our rules. It must be named exactly that (not ".htaccess.txt" or "rules.htaccess"). This would be placed in the root directory of the server (the same folder as "pet_care_info_07_07_2008.php" in our example). There may already be an .htaccess file there, in which case we should edit that rather than overwrite it.



The .htaccess file is a configuration file for the server. If there are errors in the file, the server will display an error message (usually with an error code of "500"). If you are transferring the file to the server using FTP, you must make sure it is transferred using the ASCII mode, rather than BINARY. We use this file to perform 2 simple tasks in this instance - first, to tell Apache to turn on the rewrite engine, and second, to tell apache what rewriting rule we want it to use. We need to add the following to the file:



  1. RewriteEngine On # Turn on the rewriting engine
  2. RewriteRule ^pet-care/?$ pet_care_info_01_02_2003.php [NC,L] # Handle requests for "pet-care"


A couple of quick items to note - everything following a hash symbol in an .htaccess file is ignored as a comment, and I'd recommend you use comments liberally; and the "RewriteEngine" line should only be used once per .htaccess file (please note that I've not included this line from here onwards in code example).



The "RewriteRule" line is where the magic happens. The line can be broken down into 5 parts:



  • RewriteRule - Tells Apache that this like refers to a single RewriteRule.
  • ^/pet-care/?$ - The "pattern". The server will check the URL of every request to the site to see if this pattern matches. If it does, then Apache will swap the URL of the request for the "substitution" section that follows.
  • pet_care_info_01_02_2003.php - The "substitution". If the pattern above matches the request, Apache uses this URL instead of the requested URL.
  • [NC,L] - "Flags", that tell Apache how to apply the rule. In this case, we're using two flags. "NC", tells Apache that this rule should be case-insensitive, and "L" tells Apache not to process any more rules if this one is used.
  • # Handle requests for "pet-care" - Comment explaining what the rule does (optional but recommended)


The rule above is a simple method for rewriting a single URL, and is the basis for almost all URL rewriting rules.



Patterns and Replacements



The rule above allows you to redirect requests for a single URL, but the real power of mod_rewrite comes when you start to identify and rewrite groups of URLs based on patterns they contain.



Let's say you want to change all of your site URLs as described in the first pair of examples above. Your existing URLs look like this:



  1. http://www.pets.com/show_a_product.php?product_id=7


And you want to change them to look like this:



  1. http://www.pets.com/products/7/


Rather than write a rule for every single product ID, you of course would rather write one rule to manage all product IDs. Effectively you want to change URLs of this format:



  1. http://www.pets.com/show_a_product.php?product_id={a number}


And you want to change them to look like this:



  1. http://www.pets.com/products/{a number}/


In order to do so, you will need to use "regular expressions". These are patterns, defined in a specific format that the server can understand and handle appropriately. A typical pattern to identify a number would look like this:



  1. [0-9]+


The square brackets contain a range of characters, and "0-9" indicates all the digits. The plus symbol indicates that the pattern will idenfiy one or more of whatever precedes the plus - so this pattern effectively means "one or more digits" - exactly what we're looking to find in our URL.



The entire "pattern" part of the rule is treated as a regular expression by default - you don't need to turn this on or activate it at all.



  1. RewriteRule ^products/([0-9]+)/?$ show_a_product.php?product_id=$1 [NC,L] # Handle product requests


The first thing I hope you'll notice is that we've wrapped our pattern in brackets. This allows us to "back-reference" (refer back to) that section of the URL in the following "substitution" section. The "$1" in the substitution tells Apache to put whatever matched the earlier bracketed pattern into the URL at this point. You can have lots of backreferences, and they are numbered in the order they appear.



And so, this RewriteRule will now mean that Apache redirects all requests for domain.com/products/{number}/ to show_a_product.php?product_id={same number}.



Regular Expressions



A complete guide to regular expressions is rather beyond the scope of this article. However, important points to remember are that the entire pattern is treated as a regular expression, so always be careful of characters that are "special" characters in regular expressions.



The most instance of this is when people use a period in their pattern. In a pattern, this actually means "any character" rather than a literal period, and so if you want to match a period (and only a period) you will need to "escape" the character - precede it with another special character, a backslash, that tells Apache to take the next character to be literal.



For example, this RewriteRule will not just match the URL "rss.xml" as intended - it will also match "rss1xml", "rss-xml" and so on.



  1. RewriteRule ^rss.xml$ rss.php [NC,L] # Change feed URL


This does not usually present a serious problem, but escaping characters properly is a very good habit to get into early. Here's how it should look:



  1. RewriteRule ^rss\.xml$ rss.php [NC,L] # Change feed URL


This only applies to the pattern, not to the substitution. Other characters that require escaping (referred to as "metacharacters") follow, with their meaning in brackets afterwards:



  • . (any character)
  • * (zero of more of the preceding)
  • + (one or more of the preceding)
  • {} (minimum to maximum quantifier)
  • ? (ungreedy modifier)
  • ! (at start of string means "negative pattern")
  • ^ (start of string, or "negative" if at the start of a range)
  • $ (end of string)
  • [] (match any of contents)
  • - (range if used between square brackets)
  • () (group, backreferenced group)
  • | (alternative, or)
  • \ (the escape character itself)


Using regular expressions, it is possible to search for all sorts of patterns in URLs and rewrite them when they match. Time for another example - we wanted earlier to be able to indentify this URL and rewrite it:



  1. http://www.pets.com/parrots/norwegian-blue/


And we want to be able to tell the server to interpret this as the following, but for all products:



  1. http://www.pets.com/get_product_by_name.php?product_name=norwegian-blue


And we can do that relatively simply, with the following rule:



  1. RewriteRule ^parrots/([A-Za-z0-9-]+)/?$ get_product_by_name.php?product_name=$1 [NC,L] # Process parrots


With this rule, any URL that starts with "parrots" followed by a slash (parrots/), then one or more (+) of any combination of letters, numbers and hyphens ([A-Za-z0-9-]) (note the hyphen at the end of the selection of characters within square brackets - it must be added there to be treated literally rather than as a range separator). We reference the product name in brackets with $1 in the substitution.



We can make it even more generic, if we want, so that it doesn't matter what directory a product appears to be in, it is still sent to the same script, like so:



  1. RewriteRule ^[A-Za-z-]+/([A-Za-z0-9-]+)/?$ get_product_by_name.php?product_name=$1 [NC,L] # Process all products


As you can see, we've replaced "parrots" with a pattern that matches letter and hyphens. That rule will now match anything in the parrots directory or any other directory whose name is comprised of at least one or more letters and hyphens.



Flags



Flags are added to the end of a rewrite rule to tell Apache how to interpret and handle the rule. They can be used to tell apache to treat the rule as case-insensitive, to stop processing rules if the current one matches, or a variety of other options. They are comma-separated, and contained in square brackets. Here's a list of the flags, with their meanings (this information is included on the cheat sheet, so no need to try to learn them all).



  • C (chained with next rule)
  • CO=cookie (set specified cookie)
  • E=var:value (set environment variable var to value)
  • F (forbidden - sends a 403 header to the user)
  • G (gone - no longer exists)
  • H=handler (set handler)
  • L (last - stop processing rules)
  • N (next - continue processing rules)
  • NC (case insensitive)
  • NE (do not escape special URL characters in output)
  • NS (ignore this rule if the request is a subrequest)
  • P (proxy - i.e., apache should grab the remote content specified in the substitution section and return it)
  • PT (pass through - use when processing URLs with additional handlers, e.g., mod_alias)
  • R (temporary redirect to new URL)
  • R=301 (permanent redirect to new URL)
  • QSA (append query string from request to substituted URL)
  • S=x (skip next x rules)
  • T=mime-type (force specified mime type)


Moving Content



  1. RewriteRule ^article/?$ http://www.new-domain.com/article/ [R,NC,L] # Temporary Move


Adding an "R" flag to the flags section changes how a RewriteRule works. Instead of rewriting the URL internally, Apache will send a message back to the browser (an HTTP header) to tell it that the document has moved temporarily to the URL given in the "substitution" section. Either an absolute or a relative URL can be given in the substitution section. The header sent back includea a code - 302 - that indicates the move is temporary.



  1. RewriteRule ^article/?$ http://www.new-domain.com/article/ [R=301,NC,L] # Permanent Move


If the move is permanent, append "=301" to the "R" flag to have Apache tell the browser the move is considered permanent. Unlike the default "R", "R=301" will also tell the browser to display the new address in the address bar.



This is one of the most common methods of rewriting URLs of items that have moved to a new URL (for example, it is in use extensively on this site to forward users to new post URLs whenever they are changed).



Conditions



Rewrite rules can be preceded by one or more rewrite conditions, and these can be strung together. This can allow you to only apply certain rules to a subset of requests. Personally, I use this most often when applying rules to a subdomain or alternative domain as rewrite conditions can be run against a variety of criteria, not just the URL. Here's an example:



  1. RewriteCond %{HTTP_HOST} ^addedbytes\.com [NC]
  2. RewriteRule ^(.*)$ http://www.addedbytes.com/$1 [L,R=301]


The rewrite rule above redirects all requests, no matter what for, to the same URL at "www.addedbytes.com". Without the condition, this rule would create a loop, with every request matching that rule and being sent back to itself. The rule is intended to only redirect requests missing the "www" URL portion, though, and the condition preceding the rule ensures that this happens.



The condition operates in a similar way to the rule. It starts with "RewriteCond" to tell mod_rewrite this line refers to a condition. Following that is what should actually be tested, and then the pattern to test. Finally, the flags in square brackets, the same as with a RewriteRule.



The string to test (the second part of the condition) can be a variety of different things. You can test the domain being requested, as with the above example, or you could test the browser being used, the referring URL (commonly used to prevent hotlinking), the user's IP address, or a variety of other things (see the "server variables" section for an outline of how these work).



The pattern is almost exactly the same as that used in a RewriteRule, with a couple of small exceptions. The pattern may not be interpreted as a pattern if it starts with specific characters as described in the following "exceptions" section. This means that if you wish to use a regular expression pattern starting with <, >, or a hyphen, you should escape them with the backslash.



Rewrite conditions can, like rewrite rules, be followed by flags, and there are only two. "NC", as with rules, tells Apache to treat the condition as case-insensitive. The other available flag is "OR". If you only want to apply a rule if one of two conditions match, rather than repeat the rule, add the "OR" flag to the first condition, and if either match then the following rule will be applied. The default behaviour, if a rule is preceded by multiple conditions, is that it is only applied if all rules match.



Exceptions and Special Cases



Rewrite conditions can be tested in a few different ways - they do not need to be treated as regular expression patterns, although this is the most common way they are used. Here are the various ways rewrite conditons can be processed:



  • <Pattern (is test string lower than pattern)
  • >Pattern (is test string greater than pattern)
  • =Pattern (is test string equal to pattern)
  • -d (is test string a valid directory)
  • -f (is test string a valid file)
  • -s (is test string a valid file with size greater than zero)
  • -l (is test string a symbolic link)
  • -F (is test string a valid file, and accessible (via subrequest))
  • -U (is test string a valid URL, and accessible (via subrequest))


Server Variables



Server variables are a selection of items you can test when writing rewrite conditions. This allows you to apply rules based on all sorts of request parameters, including browser identifiers, referring URL or a multitude of other strings. Variables are of the following format:



  1. %{VARIABLE_NAME}


And "VARIABLE_NAME" can be replaced with any one of the following items:



  • HTTP Headers
    • HTTP_USER_AGENT
    • HTTP_REFERER
    • HTTP_COOKIE
    • HTTP_FORWARDED
    • HTTP_HOST
    • HTTP_PROXY_CONNECTION
    • HTTP_ACCEPT
  • Connection Variables
    • REMOTE_ADDR
    • REMOTE_HOST
    • REMOTE_USER
    • REMOTE_IDENT
    • REQUEST_METHOD
    • SCRIPT_FILENAME
    • PATH_INFO
    • QUERY_STRING
    • AUTH_TYPE
  • Server Variables
    • DOCUMENT_ROOT
    • SERVER_ADMIN
    • SERVER_NAME
    • SERVER_ADDR
    • SERVER_PORT
    • SERVER_PROTOCOL
    • SERVER_SOFTWARE
  • Dates and Times
    • TIME_YEAR
    • TIME_MON
    • TIME_DAY
    • TIME_HOUR
    • TIME_MIN
    • TIME_SEC
    • TIME_WDAY
    • TIME
  • Special Items
    • API_VERSION
    • THE_REQUEST
    • REQUEST_URI
    • REQUEST_FILENAME
    • IS_SUBREQ


Working With Multiple Rules



The more complicated a site, the more complicated the set of rules governing it can be. This can be problematic when it comes to resolving conflicts between rules. You will find this issue rears its ugly head most often when you add a new rule to a file, and it doesn't work. What you may find, if the rule itself is not at fault, is that an earlier rule in the file is matching the URL and so the URL is not being tested against the new rule you've just added.



  1. RewriteRule ^([A-Za-z0-9-]+)/([A-Za-z0-9-]+)/?$ get_product_by_name.php?category_name=$1&product_name=$2 [NC,L] # Process product requests
  2. RewriteRule ^([A-Za-z0-9-]+)/([A-Za-z0-9-]+)/?$ get_blog_post_by_title.php?category_name=$1&post_title=$2 [NC,L] # Process blog posts


In the example above, the product pages of a site and the blog post pages have identical patterns. The second rule will never match a URL, because anything that would match that pattern will have already been matched by the first rule.



There are a few ways to work around this. Several CMSes (including wordpress) handle this by adding an extra portion to the URL to denote the type of request, like so:



  1. RewriteRule ^products/([A-Za-z0-9-]+)/([A-Za-z0-9-]+)/?$ get_product_by_name.php?category_name=$1&product_name=$2 [NC,L] # Process product requests
  2. RewriteRule ^blog/([A-Za-z0-9-]+)/([A-Za-z0-9-]+)/?$ get_blog_post_by_title.php?category_name=$1&post_title=$2 [NC,L] # Process blog posts


You could also write a single PHP script to process all requests, which checked to see if the second part of the URL matched a blog post or a product. I usually go for this option, as while it may increase the load on the server slightly, it gives much cleaner URLs.



  1. RewriteRule ^([A-Za-z0-9-]+)/([A-Za-z0-9-]+)/?$ get_product_or_blog_post.php?category_name=$1&item_name=$2 [NC,L] # Process product and blog requests


There are certain situations where you can work around this issue by writing more precise rules and ordering your rules intelligently. Imagine a blog where there were two archives - one by topic and one by year.



  1. RewriteRule ^([A-Za-z0-9-]+)/?$ get_archives_by_topic.php?topic_name=$1 [NC,L] # Get archive by topic
  2. RewriteRule ^([A-Za-z0-9-]+)/?$ get_archives_by_year.php?year=$1 [NC,L] # Get archive by year


The above rules will conflict. Of course, years are numeric and only 4 digits, so you can make that rule more precise, and by running it first the only type of conflict you cound encounter would be if you had a topic with a 4-digit number for a name.



  1. RewriteRule ^([0-9]{4})/?$ get_archives_by_year.php?year=$1 [NC,L] # Get archive by year
  2. RewriteRule ^([A-Za-z0-9-]+)/?$ get_archives_by_topic.php?topic_name=$1 [NC,L] # Get archive by topic


mod_rewrite



Apache's mod_rewrite comes as standard with most Apache hosting accounts, so if you're on shared hosting, you are unlikely to have to do anything. If you're managing your own box, then you most likely just have to turn on mod_rewrite. If you are using Apache1, you will need to edit your httpd.conf file and remove the leading '#' from the following lines:



  1. #LoadModule rewrite_module modules/mod_rewrite.so
  2. #AddModule mod_rewrite.c


If you are using Apache2 on a Debian-based distribution, you need to run the following command and then restart Apache:



  1. sudo a2enmod rewrite


Other distubutions and platforms differ. If the above instructions are not suitable for your system, then Google is your friend. You may need to edit your apache2 configuration file and add "rewrite" to the "APACHE_MODULES" list, or edit httpd.conf, or even download and compile mod_rewrite yourself. For the majority, however, installation should be simple.



ISAPI_Rewrite



ISAPI_Rewrite is a URL rewriting plugin for IIS based on mod_rewrite and is not free. It performs most of the same functionality as mod_rewrite, and there is a good quality ISAPI_Rewrite forum where most common questions are answered. As ISAPI_Rewrite works with IIS, installation is relatively simple - there are installation instructions available.



ISAPI_Rewrite rules go into a file named httpd.ini. Errors will go into a file named httpd.parse.errors by default.



Leading Slashes



I have found myself tripped up numerous times by leading slashes in URL rewriting systems. Whether they should be used in the pattern or in the substitution section of a RewriteRule or used in a RewriteCond statement is a constant source of frustration to me. This may be in part because I work with different URL rewriting engines, but I would advise being careful of leading slashes - if a rule is not working, that's often a good place to start looking. I never include leading slashes in mod_rewrite rules and always include them in ISAPI_Rewrite.



Sample Rules



To redirect an old domain to a new domain:



  1. RewriteCond %{HTTP_HOST} old_domain\.com [NC]
  2. RewriteRule ^(.*)$ http://www.new_domain.com/$1 [L,R=301]


To redirect all requests missing "www" (yes www):



  1. RewriteCond %{HTTP_HOST} ^domain\.com [NC]
  2. RewriteRule ^(.*)$ http://www.domain.com/$1 [L,R=301]


To redirect all requests with "www" (no www):



  1. RewriteCond %{HTTP_HOST} ^www\.domain\.com [NC]
  2. RewriteRule ^(.*)$ http://domain.com/$1 [L,R=301]


Redirect old page to new page:



  1. RewriteRule ^old-url\.htm$ http://www.domain.com/new-url.htm [NC,R=301,L]


Useful Links





Summary



Hopefully if you've made it this far you now have a clear understanding of what URL rewriting is and how to add it to your site. It is worth taking the time to become familiar with - it can benefit your SEO efforts immediately, and increase the usability of your site.




Prevent Crosssite Request Forgery CSRF

Ever surprised of an action you have performed without your notice? Receiving a payment confirmation of 400$ from ebay since you have viewed a post for pen drive sale on ebay once. A Cross Site Request Forgery(CSRF) Attack can make you embarrassed. CSRF is an attack that forces user to perform an action which he is authorised to do, without his intention.

In the above case, attacker has injected malicious URI into the pen drive post, so that when a user viewed the post, he is forced to place the bid. He can inject into image tag or a iframe tag. In this case, GET request in the malicious URI caused the problem. Even if web application do not allow such operations with GET request, Attacker can still exploit by causing a POST request submission by Javascript injection. This attack was successful due to improper sanitisation of attackers post on the website. It is easily observed that most of the vulnerabilities are due to improper sanitisation of user input.

Even this attack can occur when the user visits a malicious site constructed by attacker that will load and executes malicious URI embedded in it submitting user’s credentials to a users trusted site. Such attempts can be prevented by referrer checking, where trusted site will check if the origin of the request is same as that site (same origin policy). Although Referrer headers can be spoofed using XMLHTTP object, it adds some layer of protection.

CSRF attacks are successful against web applications that use implicit authentication. To protect from such attacks, web applications should implement POST only (although it does not completely resolve), Request Verification (such as CAPCHA), Request tokens. At the server side, web application firewall (such as modsecurity) has to be implemented to counter these CSRF attacks. Proper sanitation of user input has to be implemented on web application. On client side, browser addons such as CSRF Protector on Mozilla would help stay protected from these attacks.

Sunday, November 29, 2009

CSS Menu Tutorial

CSS Tutorial

Saturday, November 28, 2009

Important 14 sites everyone needs

Post taken from www.anewmorning.com

Presenting a list of 14 Free and useful web based applications that can always come in handy. Most of these apps are better alternatives to a paid software/application that you are already using. I use most of these services on almost daily basis and thought it would be a good share.



Warranty Elephant


WElephant


Warranty Elephant is a useful online service, free of-course, which lets you track warranties. It’s a unique website designed to organize your warranty information on all purchased goods. Your warranty information will be stored for free on their secure server and will be listed by date of warranty expiration. An easy click on the item will allow you to obtain all valid warranty information on that product, including handy telephone numbers and your product’s serial number. You also get reminder emails at 3 months, 1 month and 1 week before your warranty expires.


Site-Perf


Site-Perf


With Site-Perf, you get an accurate, realistic, and helpful estimation of your site’s loading speed. The script fully emulates natural browser behaviour downloading your page with all the images, CSS, JS and other files – just like a regular user. Spot bottlenecks, reach perfect performance and balance your site load with Site-Perf.com, a smart and flexible testing tool. Focus on important things while it delivers the speed facts straight to your screen.


Whisper Bot


Send A Note


Are you at a public spot where you don’t want to use your private email (gmail, yahoo, hotmail etc..) but need to send a message to someone. Check out whisper bot, it’s a great service that lets you send a note to anyone you want to, online. No sign-up required, just click Send a note, add the recipients email address, answer a simple question (to avoid spam) and click Send. Your message will be delivered instantly.



Evernote


Evernote


Evernote is a popular web service that most of us know about. It lets you save your ideas, things you see, and things you like. Then find them all on any computer or device you use. For free. It gives you the ability to capture everything, websites, text, pictures, screenshots etc. You can also organize them, find whatever you want to in no time and more.


ShowDocument


ShowDocument


Show Document is a quick and simple way to share a document with other people at the same time. It is a web collaboration platform that lets individuals have a free online meeting. It is an alternative to various commercial desktop sharing applications. One can easily upload any file and during the session mark it up with a pen or a highlighter tool in addition to a text box tool and eraser. There is also a chat box to discuss ideas and changes. Everyone’s cursor is tracked with their name as it moves around the screen.


No Sign up required and you can start on the spot by clicking quick start. Click invite more participants to invite more people in for collaborative work.


Soshiku


Soshiku


Soshiku is a simple but powerful tool that manages your high school or college assignments. Soshiku keeps track of when your assignments are due and can even notify you via email or SMS. And it’s totally free.


Vi-sualize.us


visualize


vi.sualize.us is a social bookmarking website for visual contents — vi.sualize.us (read visualize us) allows you to remember your favorite images around the web, and share them with everyone. Sometimes, you are looking through pictures and one of them catches your eye. You know you want to remember it and been able to look at it again in the future, but it’s not that easy: downloading to your hard disk is as useless as bookmarking the website in the usual way.


This is where vi.sualize.us changes the rules. Within two clicks, you can quote the image reference in your account, and easily look at it whenever you want to, just as your new favorite picture deserves. All without thinking about what computer you stored it in: always online, always available.


Feedity


feedity


Feedity is a revolutionary service that generates RSS web feeds for web pages without a web syndication format. With Feedity you can create an RSS feed for any webpage. Feedity allows feed subscribers, webmasters, organizations, and developers to seamlessly interact with web content. Feedity will take virtually any web page, and convert it into a fully formed RSS document.


Primo PDF


PrimoPdf


PrimoPDF’s free Web-based PDF converter, PrimoOnline, is the simple and fast way to create PDF files, online, without installing a thing. Just upload your file or enter a URL, provide your email address, and our server-based PDF creator will quickly convert it, and deliver the PDF straight to your inbox.


Color Jive


Color Jive


ColorJive is a free online service that lets you upload pictures of your room and then provides you with very easy tools to see how the room would look with a different paint color! You can keep on trying your color combinations till you find one which suits your tastes. You can safely pick that color with all your fears removed.


That fact that ColorJive is free makes it even better. And as if that was not enough to impress users, ColorJive requires no registration whatsoever! (However, if you would like ColorJive to save the pictures you modify, then you will need to register for a free account.)


Load2All


Load2All



Load2All is a great service that lets you upload files on multiple hosting services. The best thing about this service is that if you have a file which has a larger file size apposed to  limit imposed by file hosting sites, it will automatically split it and give you a single download link.


Ye-s



Shortening long URLs is something that often comes handy. Shorter links are easier to remember and take up lesser place if you plan on posting them on a site or a forum. Ye-s.com is a free service that lets you shorten any long URL with just a click of a button. You can either shorten URLs from Ye-s’s homepage or simply drag their bookmarklet into your browsers bar. This bookmarklet will shorten the link of your current page and show it to you instantly.


Compare My Docs



If you have multiple versions of a text document and you want to see exactly what’s different about the text in each version, you might have to play around in your Word processing software a little before you can get the changes to be displayed. But with CompareMyDocs, you can simply upload your files and have the changes present themselves to you.


Zoho Writer


Zoho


I started using Zoho Writer when my MS Office license expired. After that I never thought of renewing it (since it came with the OS). Zoho writer takes care of all my needs when it comes to writing. An excellent online alternative to Microsoft Office.

Friday, November 27, 2009

Working Megavideo Hack to bypass 72 min restriction

Hi,

Here is the best way to watch movie without restriction using megavideo

http://www.megavideo.com/ep_gr.swf?v=XXXXXXX

Replace XXXXXXX with the video code... Enjoy...

Try These

MegaStreaming
Mega Video Pop
MegaPremium
Vid23

Saturday, November 21, 2009

Java Video Tutorials

TeachPro JAVA Programming For Beginners And Professionals|60hours Training

2 CDs

1) JAVA, Programming for Beginners - 30 hours, and
2) Java, Programming for Advanced - 30 hours.

Thursday, November 19, 2009

Shutting Down XSS with Content Security Policy

For several years, Cross-Site Scripting (XSS) attacks have plagued many of the web’s most popular sites and victimized their users. At Mozilla, we’ve been working for the last year on a new technology called Content Security Policy, designed to shut these attacks down. We wanted to give a bit of background on this project as well as provide an update on our progress so far.


Learn More..

The Essential Guide to Disaster Recovery

This white paper provides a basic understanding of the building blocks of IT and business continuity - from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution. Readers will be able to quickly match their specific optimum uptime objectives with the easiest and most cost-effective IT.
View

Best Video Tut for computer guyz

Shytex Best source for all e-video tut

Enjoy this wonderful collection...
Thanks to that guy..great work

SANS Security 560 Network penetration testing & Ethical hacking




SANS Security 560 is one of the most technically rigorous courses offered by the SANS Institute. Attendees are expected to have a working knowledge of TCP/IP, cryptographic routines such as DES, AES, and MD5, and the Windows and Linux command lines before they step into class. Although SANS Security 401 (Security Essentials) and then next SANS Security 504 (Hacker Techniques, Exploits, and Incident Handling) are not pre-requisites for 560, these courses cover the groundwork that all 560 attendees are expected to know. While 560 is technically in-depth, it is important to note that programming knowledge is NOT required for the course


http://rapidshare.com/files/242603634/SS560.NetworkPenetration_tdk.part05.rar
http://rapidshare.com/files/242603502/SS560.NetworkPenetration_tdk.part08.rar
http://rapidshare.com/files/242603495/SS560.NetworkPenetration_tdk.part07.rar
http://rapidshare.com/files/242603438/SS560.NetworkPenetration_tdk.part01.rar
http://rapidshare.com/files/242602844/SS560.NetworkPenetration_tdk.part02.rar
http://rapidshare.com/files/242602835/SS560.NetworkPenetration_tdk.part03.rar
http://rapidshare.com/files/242602833/SS560.NetworkPenetration_tdk.part04.rar
http://rapidshare.com/files/242602815/SS560.NetworkPenetration_tdk.part06.rar
http://rapidshare.com/files/242602700/SS560.NetworkPenetration_tdk.part09.rar

pass:KELCYRA4EVER

Wednesday, November 18, 2009

Online TV




Telugu Channels



Monday, November 16, 2009

Planks for complete body

Do each plant for 30 sec continuesly.......

Do this

Exploiting HTTPS using SSL Flaw
By Uma Mahesh

Today security is most critical factor in business applications. Security is implemented at transport layer using SSL Protocol known as Transport Layer Security (TLS). Any secure transactions are carried over internet using https which is implemented using SSL and Digital Certificates. A flaw is discovered in the protocol due to Transport Layer Security Renegotiation. An attacker can leverage this loop hole by Man in the Middle Attack. Internet Engineering Task Force (IETF) is working to provide the fix this protocol level flaw.

A normal HTTPS session involves negotiation for algorithm support (handshake), key exchange and authentication followed by encrypted data transmission. This would happen when a client requests HTTPS Server for a resource/request that needs client certificate authentication. TLS Renegotiation is triggered by sending ClientHello packet (Initial handshake packet). The process is as usual but is encrypted in current session.

Now the attacker waits for client trying to connect to Server, hijacks the connection. Then Attacker establishes a secure connection with server and then request for resource that cause renegotiation and also issues a transaction with ignore prefix (Injection Attack).
“GET acc/transferAmt.php?to=XXX&from=YYY\r\n”
“X-Ignore” #(\r\n missing so that next packet data is appended to this request packet)
Now attacker just acts as proxy between client and server. After client certificate authentication, client and server establish a new connection which attacker cannot see, but the transaction issued previously is positive. As “X-Ignore” ignores the header (original client request) and still use clients credentials (Cookies) sent along with client request.
A successful injection attack can cause even bigger problems as it can steal critical data by injecting a POST command. It was successfully implemented with twitter to steal password and twitter has updated immediately. The immediate fix released has disabled renegotiation, but it is not complete as it would disrupt existing applications


Rescorla Draft on TLS Renegotiate

Wednesday, November 11, 2009

Complete Excercise for ABs

This short video shows what are the exercises you have to do and how many times you have to do in a very short time..

Do It...

Lay on the floor now do this

Alternating toe touch
raise legs, touch right toe with left palm. comeback and now touch left toe with right palm..
Do it for 45 sec or 15 reps each.

Ankle wiggles
fold your legs. touch your right leg ankle with right palm.
repeat for left side. Do it for 15 reps.

Hip thrust
raise your legs and place your arms on ground, now push your hip up (just fuck upwards)
Do it for 15 reps

Stiffed leg reversed crunch
Place your hands below ur back for support, now raise your both legs up forming 90 deg and down the legs till about 1ft from ground.

Single V-Sit

fold left leg. stretch your arms along floor. raise arms and right leg at a time to touch the toe. Do this for 15 reps.
Do the same for right left for 15 reps.

Take 15 sec break b/w each one.
After 1 complete Set, Do 5 minutes Drill(pump up heart beat)
Perform each one for 2 sets continuesly then go to next exercise.



How much to do...

· 45 seconds per exercise

· 15 second break in between

· Total number of circuits: 2-3

Watch this and have ripped Abs

11 Killer Pushups

By Arnel Ricafranca

Watch and Do

You will FINALLY DISCOVER how to:
  • Develop RIPPING Pecs That Will Make Women Swoon....:)
  • Get Those Broad, Muscular, Greek God-Like Look To Make Heads Turn, Stop Crowds and Drive Your Guy Friends MAD With Jealousy!
  • 11 IN THE TRENCHES, Underground, NEVER BEFORE REVEALED Exercises For You To Trigger MASSIVE Growth In Your Upper, Middle and Lower Chest...
You can see it right now by going here and
pressing "the play" button:

Friday, November 6, 2009

Major SSL Flaw Find Prompts Protocol Update

Vendors, IETF, have been working on a fix since last month for a newly discovered vulnerability in the SSL protocol that spans browsers, servers, smart cards, and other products

By Kelly Jackson Higgins | DarkReading



The Internet Engineering Task Force (IETF) is about to issue a proposed extension to Secure Sockets Layer (SSL) that addresses a major vulnerability in the protocol that was inadvertently disclosed publicly late yesterday -- a flaw that affects browsers, servers, smart cards, VPN products, as well as many lower-profile products that contain the protocol embedded in their firmware.


Marsh Ray, who first discovered the bug in August, has been working with the IETF, vendors including Google and Mozilla, and members of the Industry Consortium for the Advancement of Security on the Internet (ICASI) on a fix since last month. He says he expects the IETF to issue a proposed extension to its specification for SSL, known as Transport Layer Security (TLS) in IETF parlance, as early as today. Software vendors that use SSL can then create patches for the vulnerability.


"The bug results in a set of related attacks that allow a man-in-the-middle to do bad things to your SSL/TLS connection. The [attacker] in the middle is able to inject his own chosen text into what your application believes is an encrypted, secure communications channel," says Ray, a senior software development engineer for PhoneFactor. "This has implications for all protocols that run on top of SSL/TLS, such as HTTPS."
Dan Kaminsky, director of penetration testing for IOActive, says he doesn't think the flaw is limited to just injecting traffic. "HTTPS content will leak because of this bug," Kaminsky says. "Never underestimate the usefulness of a subtle cryptographic vulnerability. Nobody would say, 'Well, it's just an iceberg, and we're heading right for it, but it's not like it's cut a huge gash in the ship yet.'"


SSL has been under siege during the past year, with the groundbreaking
man-in-the-middle hack by researcher Moxie Marlinspike, which dupes a user into thinking he's in an HTTPS session when in reality he has been taken elsewhere by the attacker, as well as Kaminsky's research exposing critical flaws in X.509 certificate technology used in SSL.


But this latest threat resides within the SSL protocol itself and will require fixes to browsers, Web servers, database servers, mail servers, SQL servers, smart cards, and other SSL-based software. "All the [SSL] attacks I've seen [recently] have been around the client or server software, or the way it handles a certificate," Ray says. "What's different with this [bug] is that both the client and server need to be patched to restore the full security guarantees that are expected with TLS."

Marlinspike maintains that the newly found SSL flaw is not earth-shattering. "The sky is not falling," he says. "This was some clever work, and it is interesting for those of us who are into secure protocols, but I have yet to see an example of how this could significantly impact the way that SSL/TLS is commonly deployed in ways that differ from simple CSRF [cross-site request forgery]."

PhoneFactor had kept the bug under wraps for several months as vendors worked on ways to fix it. But when another researcher stumbled across some of the same issues and posted them to a public mailing list yesterday, word got out fast, so Ray decided to reveal the details of his work.

The IETF will issue a new extension for the SSL/TLS protocol that fixes the bug, which is basically a gap in the authentication process that lets an attacker execute a man-in-the-middle attack. The gap occurs in the renegotiation process of the session -- a time when some applications require the encryption process be "refreshed" after a certain point.

The proposed SSL/TLS extension allows renegotiation but restores security during that process, Ray says. "It defines an extension header that lets a client and server indicate what they believe was going on over the communications channel before the renegotiation. It restores the continuity of authentication," he says.
More worrisome, meanwhile, is finding and fixing smaller products with embedded devices that use SSL. "There's a very long tail of smaller [SSL] implementations in embedded devices," Ray says. "We'll probably be tracking them down for years to come."

Ray says end users shouldn't worry too much about the attack for now, but should be ready to patch for the SSL bug. "It's important that everybody fix their software as soon as patches become available," he says