Thursday, December 17, 2009

A Nice MP3 Player for web using XML

MP3 PLayer XML

Load mp3s files and their titles from xml file. Has auto play and automatic next song option in xml file. Comes with 2 different skins. Easily remove features by deleting their movie clips or setting their layer as a “guide”. Can also play any mp3 by calling a function listed in the help file

Demo: http://www.flashden.net/item/mp3-player-xml/15544

Download


http://rapidshare.com/files/218848853/flashden_mp3-player-xml_15544.rar

Cisco Press Routing Video Mentor DVD


Routing Video Mentor is a unique video product that provides you with more than six hours of personal, visual instruction from bestselling author and senior instructor Kevin Wallace. In the 15 videos presented on the DVD, Kevin walks you through common Cisco® router configuration and troubleshooting tasks. Designed to develop and enhance hands-on skills, each 15 to 40 minute video guides you through essential configuration tasks on Cisco routers and shows you how to verify that your network is working correctly.

Lab Layout:
Each video lab presents detailed objectives, lab diagrams, command tables, and video captures. Audio instruction throughout offers tips and shortcuts that truly make learning easy.

Network Animation:
Animated network diagrams show you lab setup, device addressing, and how traffic flows through the network.

Command-Line Interface (CLI) Video:
Video screencasts of router CLI demonstrate command entry, configuration techniques, and device response.


http://hotfile.com/dl/19679728/51e5d37/CPressMentor-.part1.rar.html
http://hotfile.com/dl/19679824/db5338a/CPressMentor-.part2.rar.html
http://hotfile.com/dl/19679885/7e19def/CPressMentor-.part3.rar.html
http://hotfile.com/dl/19679948/12d46f3/CPressMentor-.part4.rar.html
http://hotfile.com/dl/19680007/af2d909/CPressMentor-.part5.rar.html
http://hotfile.com/dl/19680080/160432d/CPressMentor-.part6.rar.html
http://hotfile.com/dl/19680191/49a8f12/CPressMentor-.part7.rar.html
http://hotfile.com/dl/19680207/bcc7d99/CPressMentor-.part8.rar.html

Wednesday, December 16, 2009

The Hacker’s Handbook: The Strategy Behind Breaking into And Defending Networks



This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. –This text refers to the Hardcover edition.

Uploading | Rapidshare

Playboy’s Complete Massage (2008)

Playboy’s Complete Massage (2008) | 900 MB

DVDRIP | English | 1h 02min | 640×480 | DivX, 1522 kbps | AC3, 2 ch, 32 kbits

Playboys Complete Massage – A how-to for erotic massage that’s almost as good to watch as to experience the actual techniques demonstrated. Includes methods from both Swedish and Asian practices to encourage shared sensual pleasure between couples.

Download

http://hotfile.com/dl/14020698/3763cc0/PC.Masge08.part01.rar.html
http://hotfile.com/dl/14020704/8716ea7/PC.Masge08.part02.rar.html
http://hotfile.com/dl/14020710/9d7741b/PC.Masge08.part03.rar.html
http://hotfile.com/dl/14020722/42f15aa/PC.Masge08.part04.rar.html
http://hotfile.com/dl/14020726/2de4289/PC.Masge08.part05.rar.html
http://hotfile.com/dl/14020733/9849dfd/PC.Masge08.part06.rar.html
http://hotfile.com/dl/14020799/76b440b/PC.Masge08.part07.rar.html
http://hotfile.com/dl/14020806/60f89c3/PC.Masge08.part08.rar.html
http://hotfile.com/dl/14020818/4fcd886/PC.Masge08.part09.rar.html
http://hotfile.com/dl/14020828/c0bdf2f/PC.Masge08.part10.rar.html
http://hotfile.com/dl/14020837/0cdeff8/PC.Masge08.part11.rar.html

23 Best Hacking Videos [High Quality Videos]

Click the image to open in full size.
Description :

This is a whole set of 23 videos showing how to hack!!!!!!!!

Thanks to the makers for their time and effort.You all are awesome.

Please use this videos only for study and research purposes.Don’t harm anyone.
==================================================
Part 1
Siffing Remote Router Traffic via GRE Tunnels (Hi-Res)
Buffer Overflows Pt. 3 by IDESpinner
Buffer Overflows Pt. 2 by IDEspinner

Part 2
Breaking WEP in 10 minutes
DoS attack against Windows FTP Server
How to sniff around switches using Arpspoof and Ngrep!

Part 3
Buffer Overflows pt1
Feauture Addition pt 1
Feauture Addition pt 2
DNS Poison Routing
Install VNC Remotely!
Internet Explorer Remote Command Execution Exploit Client Side Attack (Hi-Res)
Internet Explorer Remote Command Execution Exploit Client Side Attack (lo-Res)
MITM Hijacking
Sniffing logins and Passwords

Part 4
Sniffing Remote Router Traffic via GRE Tunnels (lo-res)
A Penetration Attack Reconstructed
Telnet Bruteforce
Tunneling Exploits through SSH
Bluesnarfing a Nokia 6310i hand set
Start a session and get the interactive commandline access to a remote windows box!
Use Brutus to crack a box running telnet!
Cain to ARP Poison and sniff passwords!
Screen-Shots :
Click the image to open in full size.
Click the image to open in full size.
Click the image to open in full size.
Click the image to open in full size.

D0wn10ad
http://uploading.com/files/7VP93WYQ/23_best_Hacking_Videos_AC_DC.part13.rar.html
http://uploading.com/files/70NJKG2W/23_best_Hacking_Videos_AC_DC.part12.rar.html
http://uploading.com/files/64MR2BXL/23_best_Hacking_Videos_AC_DC.part11.rar.html
http://uploading.com/files/BTC9A4LI/23_best_Hacking_Videos_AC_DC.part10.rar.html
http://uploading.com/files/PS2HEOEF/23_best_Hacking_Videos_AC_DC.part09.rar.html
http://uploading.com/files/0ZHHGOY0/23_best_Hacking_Videos_AC_DC.part08.rar.html
http://uploading.com/files/17RXDN0L/23_best_Hacking_Videos_AC_DC.part07.rar.html
http://uploading.com/files/3QLATK61/23_best_Hacking_Videos_AC_DC.part06.rar.html
http://uploading.com/files/R2Y7INL8/23_best_Hacking_Videos_AC_DC.part05.rar.html
http://uploading.com/files/T8FI7GLK/23_best_Hacking_Videos_AC_DC.part04.rar.html
http://uploading.com/files/13A9AG1O/23_best_Hacking_Videos_AC_DC.part03.rar.html
http://uploading.com/files/3GPJFZYM/23_best_Hacking_Videos_AC_DC.part02.rar.html
http://uploading.com/files/1QSXKXK6/23_best_Hacking_Videos_AC_DC.part01.rar.html

Mirror Easy-share
http://www.easy-share.com/f/1326006058/23_best_Hacking_Videos_AC_DC

Mirror Rapidshare
http://rapidshare.com/files/241260150/23_best_Hacking_Videos_AC_DC.part13.rar
http://rapidshare.com/files/241260200/23_best_Hacking_Videos_AC_DC.part11.rar
http://rapidshare.com/files/241260209/23_best_Hacking_Videos_AC_DC.part04.rar
http://rapidshare.com/files/241260210/23_best_Hacking_Videos_AC_DC.part10.rar
http://rapidshare.com/files/241260212/23_best_Hacking_Videos_AC_DC.part08.rar
http://rapidshare.com/files/241260231/23_best_Hacking_Videos_AC_DC.part01.rar
http://rapidshare.com/files/241260244/23_best_Hacking_Videos_AC_DC.part12.rar
http://rapidshare.com/files/241260257/23_best_Hacking_Videos_AC_DC.part05.rar
http://rapidshare.com/files/241260262/23_best_Hacking_Videos_AC_DC.part06.rar
http://rapidshare.com/files/241260270/23_best_Hacking_Videos_AC_DC.part02.rar
http://rapidshare.com/files/241260316/23_best_Hacking_Videos_AC_DC.part03.rar
http://rapidshare.com/files/241260321/23_best_Hacking_Videos_AC_DC.part07.rar
http://rapidshare.com/files/241260359/23_best_Hacking_Videos_AC_DC.part09.rar

Mirror Hotfile
http://hotfile.com/dl/5234940/9abcf18/23_best_Hacking_Videos_AC_DC.part01.rar.html
http://hotfile.com/dl/5234987/256700b/23_best_Hacking_Videos_AC_DC.part02.rar.html
http://hotfile.com/dl/5235039/155fa29/23_best_Hacking_Videos_AC_DC.part03.rar.html
http://hotfile.com/dl/5235079/63916a9/23_best_Hacking_Videos_AC_DC.part04.rar.html
http://hotfile.com/dl/5235120/a485b25/23_best_Hacking_Videos_AC_DC.part05.rar.html
http://hotfile.com/dl/5235184/3be9419/23_best_Hacking_Videos_AC_DC.part06.rar.html
http://hotfile.com/dl/5235282/3a7be67/23_best_Hacking_Videos_AC_DC.part07.rar.html
http://hotfile.com/dl/5235339/1bd7ec7/23_best_Hacking_Videos_AC_DC.part08.rar.html
http://hotfile.com/dl/5235401/ddc5657/23_best_Hacking_Videos_AC_DC.part09.rar.html
http://hotfile.com/dl/5235467/d815d5b/23_best_Hacking_Videos_AC_DC.part10.rar.html
http://hotfile.com/dl/5235540/c4e15c5/23_best_Hacking_Videos_AC_DC.part11.rar.html
http://hotfile.com/dl/5235616/4abd629/23_best_Hacking_Videos_AC_DC.part12.rar.html
http://hotfile.com/dl/5235657/16b05c3/23_best_Hacking_Videos_AC_DC.part13.rar.html

HSC Hackers Kit


Kit Includes following Sections
Hackers Center has selected for you hundreds among the newest papers and tools to let anyone,
in the middle of his internet security education, learn faster and from a black hat
perspective. We do believe into ethical hacking as the only way to be successful at
understanding and defending your network or your company from remote attacks.
Note: An ethical hacker is like a penetration tester. The ethical hacker is an individual
who is employed or contracted to undertake an attempted penetration test. These individuals
use the same methods employed by hackers. You must acquire written permission to avoid
braking the law. If you brake into a system you have committed a felony, any one that uses
these new acquired teachings will be held responsible for there own actions

Sec 1: Footprinting & Scanning

- Understanding Ethical Hacking
- Intro to reconnaissance phase
- Understanding footprinting
- Scanning & Footprinting Tools
- Scanning & Footprinting Books
- Understanding port scanning
- Discovering the OS system
- Discovering services running
- Understanding enumerations

Sec 2: Web Security

- Understanding Web Security
- Password Hacking & Security
- IIS web Server Security
- Web Security Tools
- Web Security Books
- Apache Web Server Security
- SQl injection & Security
- Cross-Site Scripting (XSS)
- Web Application Security
- Authentication & Sessions
- Prevention & Countermeasures

Sec 3: Win Hacking & Networking

- Windows System Security
- Cracking Passwords
- Password Recovery
- Hardware Security
- Registry Security
- Win & Networking Tools
- Win & Networking Books
- Cisco Security & Hacks
- Intrusion detection
- Firewalls & Honeypots
- Ip Changing & Security
- Spyware & Anti-Virus Sec

Sec 4: Sniffing & Hijacking

- Understanding sniffers
- Packet capturing
- MAC flooding & ARP poisoning
- How session hijacking works
- Sniffing & Hijacking Tools
- Sniffing & Hijacking Books
- Spoofing attacks & Security
- Many Sniffing countermeasures

Sec 5: Denial of Service

- Denial Of Service Attacks
- Distributed Denial Of Service
- Types of denial of attacks
- Tools for running DOS attacks
- Tools for running DDOS attacks
- Denial Of Service Books
- Denial of Service Countermeasures

6: Social Engineering

- What is Social Engineering
- Policies and Procedures
- Online Social Engineering
- Social Engineering Books
- Who is Kevin Mitnick
- The Common Types of Attack
- Best collection of Ezines
- Social Engineering Countermeasures

Sec 7: Wireless Security

- Understanding Wireless Security
- Introduction to 802.11
- 802.11 Wireless Networks
- Introduction to WEP
- How to Find WLANs
- Cracking WEP Keys
- Wireless DoS attacks
- Wireless Security Books
- Wireless Security Tools
- Wireless Hacking Tools
- WEP Key Encryption
- Securing Wireless Networks

Sec 8: Coding & Buffer Overflow

- Coding Skills Required
- Windows Programming
- What is API Coding
- Linux Programming
- Open Source Coding
- ASM, CGI & Perl
- C/C++, Java & PHP
- What is Secure Coding
- HSC Coding Library
- Reverse Engineering
- What is a Buffer Overflow
- Writing your own exploits
- Understanding Stacks
- Defense from Buffer Overflows
- Understanding shellcodes
- Writing Exploits
- Coders Professional Books

Sec 9: Worms & Virus

- Understanding Viruses
- Viruses different forms
- Viruses & Worms Books
- How Anti-Viruses Work
- How worms spread & infect
- Viruses Codes and Tools
- History of viruses & worms
- Protection against viruses

Sec 10: Linux Security

- Introduction to Linux
- Linux file structure
- Linux Networking
- Basic Linux commands
- How Linux is hacked
- Rootkits for Linux
- Compiling Programs on Linux
- IP Chains and IP Tables
- Linux Security Tools
- Linux Security Books
- Types of Platforms
- Linux Security Methods

Sec 11: Encryption

- Introduction to Encryption
- Encryption Cracking Techniques
- Types of Encryptions
- Understanding hashing
- Know how MD5 works
- Basic cryptographic attacks
- Art of steganography
- SSH, RSA, PGP, SSL & SHA
- Algorithm coding
- Rainbow Tables & Cracking
- Cryptographic Defence
- Cryptographic Tools
- Cryptographic Books
- Online anonymity
- Anonymous surfing Tools
- Understanding *****

Sec 12: Trojans & Rats

- Understanding Trojan horses
- Understanding Backdoors
- Understanding Rats
- Trojan infection mechanisms
- Intro to keyloggers
- Overview of Trojan tools
- Security Tools
- Trojan & Rats Books
- How to write your Trojan
- How to remove a Trojan
- What are logic Bombs
- Windows Rootkits
- Trojan & Rat Encryptions
- Types of Attack Methods
- Trojans & Rats Countermeasures

Sec 13: Miscellaneous

- Hackers Dictionary
- Hacking Questions
- Acrobat Reader
- mIRC (chat)
- Archivers
- FireFox 2 (Secure)
- Best Security & Hacking Links
- E.H Policy

Module.1.Ethical.Hacking.and.Penetration.Testing

http://rapidshare.com/files/208614372/UDK_01.zip.001
http://rapidshare.com/files/208618515/UDK_01.zip.002
http://rapidshare.com/files/208632595/UDK_01.zip.003
http://rapidshare.com/files/208632679/UDK_01.zip.004
http://rapidshare.com/files/208632697/UDK_01.zip.005
http://rapidshare.com/files/208632709/UDK_01.zip.006
http://rapidshare.com/files/208640410/UDK_01.zip.007
http://rapidshare.com/files/208640441/UDK_01.zip.008
http://rapidshare.com/files/208955075/UDK_01.zip.009
http://rapidshare.com/files/208960632/UDK_01.zip.010
http://rapidshare.com/files/208962690/UDK_01.zip.011

CODE

Module.2.Footprinting.and.Reconnaissance

http://rapidshare.com/files/208971586/UDK_02.zip.001
http://rapidshare.com/files/208984762/UDK_02.zip.002
http://rapidshare.com/files/208984947/UDK_02.zip.003
http://rapidshare.com/files/208984957/UDK_02.zip.004
http://rapidshare.com/files/208984968/UDK_02.zip.005
http://rapidshare.com/files/208988106/UDK_02.zip.006
http://rapidshare.com/files/208990283/UDK_02.zip.010
http://rapidshare.com/files/208996738/UDK_02.zip.007
http://rapidshare.com/files/208997229/UDK_02.zip.009
http://rapidshare.com/files/208997230/UDK_02.zip.008

CODE

Module.3.TCP.IP.Basics.and.Scanning

http://rapidshare.com/files/209000206/UDK_03.rar.001
http://rapidshare.com/files/209003277/UDK_03.rar.002
http://rapidshare.com/files/209006998/UDK_03.rar.003
http://rapidshare.com/files/209010544/UDK_03.rar.004
http://rapidshare.com/files/209014295/UDK_03.rar.005
http://rapidshare.com/files/209017281/UDK_03.rar.006
CODE
Module.4.Enumeration.and.Verification
http://rapidshare.com/files/209021253/UDK_04.zip.001
http://rapidshare.com/files/209027776/UDK_04.zip.002
http://rapidshare.com/files/209336788/UDK_04.zip.003
http://rapidshare.com/files/209343640/UDK_04.zip.004
http://rapidshare.com/files/209349261/UDK_04.zip.005
http://rapidshare.com/files/209355241/UDK_04.zip.006
http://rapidshare.com/files/209361779/UDK_04.zip.007

http://rapidshare.com/files/209365478/UDK_04.zip.008
http://rapidshare.com/files/209366884/UDK_04.zip.009

CODE
Module.5.Hacking.Defending.Wireless.Modems

http://rapidshare.com/files/207576697/UDK_05.zip

CODE
Module.6.Hacking.Defending.Web.Servers
http://rapidshare.com/files/209370683/UDK_06.zip.001
http://rapidshare.com/files/209374435/UDK_06.zip.002
http://rapidshare.com/files/209384348/UDK_06.zip.003
http://rapidshare.com/files/209384553/UDK_06.zip.004
http://rapidshare.com/files/209386036/UDK_06.zip.006
http://rapidshare.com/files/209386043/UDK_06.zip.005
http://rapidshare.com/files/209404586/UDK_06.zip.007

CODE
Module.7.Hacking.Defending.Web.Applications

UDK_07.zip

http://rapidshare.com/files/207581166/UDK_07.zip

CODE
Module.8.Sniffers.and.Session.Hijacking
UDK_08.zip

http://rapidshare.com/files/207577941/UDK_08.zip

CODE
Module.9.Hacking.Defending.Windows.Systems

UDK_09.zip

http://rapidshare.com/files/207583004/UDK_09.zip

CODE
Module.10.Hacking.Defending.Unix.Systems

UDK_10.zip

http://rapidshare.com/files/207579692/UDK_10.zip

CODE
Module.11.Rootkits.Backdoors.Trojans.Tunnels

UDK_11.zip

http://rapidshare.com/files/207581978/UDK_11.zip

CODE
Module.12.Denial.of.Service.and.Botnets

UDK_12.zip

http://rapidshare.com/files/207580560/UDK_12.zip

CODE
Module.13.Automated.Pen.Testing.Tools

UDK_13.zip

http://rapidshare.com/files/207577291/UDK_13.zip

CODE
Module.14.Intrusion.Detection.Systems

UDK_14.zip

http://rapidshare.com/files/207578538/UDK_14.zip

CODE
Module.15.Firewalls

http://rapidshare.com/files/209404825/UDK_15.zip.001
http://rapidshare.com/files/209404901/UDK_15.zip.002
http://rapidshare.com/files/209404905/UDK_15.zip.003
http://rapidshare.com/files/209412714/UDK_15.zip.007
http://rapidshare.com/files/209416979/UDK_15.zip.004
http://rapidshare.com/files/209417020/UDK_15.zip.005
http://rapidshare.com/files/209417044/UDK_15.zip.006

CODE
Module.16.Honeypots.and.Honeynets

UDK_16.zip

http://rapidshare.com/files/207578337/UDK_16.zip

CODE
Module.17.Ethics.and.Legal.Issues

UDK_17.zip

http://rapidshare.com/files/207577599/UDK_17.zip

pass: KELCYRA4EVER@UDK

Password default : shytex.com

Holiday Workout in 4 Minutes for Complete Fat Burn

XoaX C++ Videos

XoaX Learn C++ 2008 Videos Full | 420 MB

C++ is a statically typed, free-form, multi-paradigm, compiled, general-purpose programming language. It is regarded as a middle-level language, as it comprises a combination of both high-level and low-level language features. It was developed by Bjarne Stroustrup starting in 1979 at Bell Labs as an enhancement to the C programming language and originally named “C with Classes”. It was renamed to C++ in 1983.

C++ Video Tutorials
Watch our free C++ tutorials below. Our C++ tutorials cover the C++ language from the very first steps, including how to download a free compiler to begin programming. We are always adding more video tutorials, so check back frequently. Please refer questions to our Forum.

For C++ Beginners
Following our C++ Console series of video tutorials is the best way to begin learning C++. These tutorials start at the very beginning by showing you step-by-step how to install a free compiler. Then the videos build up programming concepts gradually.

1. Console C++ Video Tutorials
Watch our free Console C++ video tutorials. Check back frequently for more. Please refer your questions to our Forum. See our C++ Computer Terminology page for information on specific computer terms.

How These C++ Tutorials Are Structured

This series is intended to be a starting point for beginners to C++ as well as a refresher for experienced programmers. The videos give a sequential presentation of standard C++ starting from the very basics of the language. Most of the video tutorials present a single C++ concept and require a single main.cpp file, with each code sample fitting entirely on the screen. There is no download for these lessons as the whole program is extremely short. Every few lessons, like 9, 13, 20, etc., the material from the previous lessons is brought together to make a longer program to illustrate general usage. These lessons have a single substantial program and include downloadable code.

* Lesson 0: Installing Visual C++ 2008 Express
* Lesson 1: Creating a Console Application
* Lesson 2: Basic Input and Output
* Lesson 3: Variables and Constants
* Lesson 4: Basic Data Types
* Lesson 5: Logical Operators
* Lesson 6: Relational Operators
* Lesson 7: If, Else If, Else
* Lesson 8: While and Do While Loops
* Lesson 9: Tic Tac Toe
* Lesson 10: One-Dimensional Arrays
* Lesson 11: Global and Local Scope
* Lesson 12: Basic Functions
* Lesson 13: Perceptron Training
* Lesson 14: Increment and Decrement
* Lesson 15: Namespace Essentials
* Lesson 16: For Loops
* Lesson 17: References and Pointers
* Lesson 18: Arguments and Return Values
* Lesson 19: Function Templates
* Lesson 20: Sorting with Bubblesort
* Lesson 21: Arithmetical Operators
* Lesson 22: Using the rand() Function
* Lesson 23: Blackjack
* Lesson 24: Fundamental Data Types
* Lesson 25: Type Conversion Operators
* Lesson 26: Enumerations
* Lesson 27: Switch Statements
* Lesson 28: Multi-Dimensional Arrays
* Lesson 29: Fifteen Puzzle
* Lesson 30: Simple Classes
* Lesson 31: Member Functions
* Lesson 32: Constructors and Destructors
* Lesson 33: Built-in Class Behavior
* Lesson 34: Public and Private Members
* Lesson 35: A Simple Role-Playing Game
* Lesson 36: Dynamic Memory Allocation
* Lesson 37: Preprocessor Directives
* Lesson 38: Simple Inheritance
* Lesson 39: Function Pointers

2. C++ OpenGL Video Tutorials
Watch our free C++ OpenGL programming video tutorials. Check back frequently for more. Please refer your questions to our Forum. Please see our C++ Computer Terminology page for information on specific computer terms.

* Lesson 1: A Simple OpenGL Project
* Lesson 2: Drawing Geometric Primitives
* Lesson 3: Using Geometric Primitives
* Lesson 4: Basic Lighting
* Lesson 5: Shading Models

3. C++ MFC Video Tutorials
Watch our free C++ MFC programming video tutorials. Check back frequently for more. Please refer your questions to our Forum. Please see our C++ Computer Terminology page for information on specific computer terms.

* Lesson 1: Creating a Simple SDI Application
* Lesson 2: The Document/View Architecture
* Lesson 3: Application & FrameWnd Classes
* Lesson 4: Drawing with MFC

4. C++ Win32 Video Tutorials
Watch our free C++ Win32 programming video tutorials. Check back frequently for more. Please refer your questions to our Forum. Please see our C++ Computer Terminology page for information on specific computer terms.

* Lesson 1: Creating a Simple Win32 Application
* Lesson 2: The Message Loop
* Lesson 3: Messages
* Lesson 4: Drawing Lines and Ellipses with GDI
* Lesson 5: Adding Menu Items
* Lesson 6: Message Boxes
* Lesson 7: Responding to Mouse Clicks
* Lesson 8: Tic Tac Toe
* Lesson 9: Loading and Displaying Bitmaps

5. Visual C++ Video Tutorials
Watch our free Visual C++ 2008 video tutorials. Check back frequently for more. Please refer your questions to our Forum. See our C++ Computer Terminology page for information on specific computer terms.

For more information on what is available in each edition of Visual Studio, see Visual Studio 2008 Product Comparison.

* Installing Visual Studio 2008 (Standard edition)
* Adding a New Header (.h) File to a Project
* Adding a New Source (.cpp) File to a Project
* Creating an Executable (.exe) File
* Enabling Line Numbering

6. C++ Miscellaneous Video Tutorials
Watch our free C++ Miscellaneous video tutorials. Check back frequently for more. Please refer your questions to our Forum. See our C++ Computer Terminology page for information on specific computer terms.

* Simple Sounds
* A High-Resolution Timer
* Creating a Thread

Install Instructions :
1.Unrar.
2.Mount with Poweriso or other emulator wich support .daa extension.
3.Enjoy
D0wn1oad
http://hotfile.com/dl/20774463/1d05b17/XoaX_Learn_C_2008.part01.rar.html
http://hotfile.com/dl/20774464/4f91a54/XoaX_Learn_C_2008.part02.rar.html
http://hotfile.com/dl/20774518/f00e883/XoaX_Learn_C_2008.part03.rar.html
http://hotfile.com/dl/20774520/4a06770/XoaX_Learn_C_2008.part04.rar.html
http://hotfile.com/dl/20774573/387fae8/XoaX_Learn_C_2008.part05.rar.html
http://hotfile.com/dl/20774604/b6ab95a/XoaX_Learn_C_2008.part06.rar.html
http://hotfile.com/dl/20774634/2d5bd86/XoaX_Learn_C_2008.part07.rar.html
http://hotfile.com/dl/20774672/eb07654/XoaX_Learn_C_2008.part08.rar.html
http://hotfile.com/dl/20774685/bed0ad1/XoaX_Learn_C_2008.part09.rar.html

Ethical Hacking Video Training DVD (CEH)


The latest version of the Certified Ethical Hacker (CEH) Courseware is due to be released and presented for the first time at Hacker Halted USA 2008 in June. Many small details of CEH Version 6 have been peppered on the Internet, as well as snippets of teaser copy on EC-Council’s own web site.

“With a total of 28 new and never seen before modules, covering the latest concepts, featuring more real life cases, and showcasing the latest hacking and security tools, the Certified Ethical Hacker (Version 6) will be the most advanced course ever.”

So I requested an interview with EC-Council to see if we could get confirmation as well as clarification. The questions are compiled from my own list as well as some others that were suggested by readers of The Ethical Hacker Network (EH-Net). EC-Council replied in a very timely manner with answers from both Haja Mohideen, co-founder of EC-Council, and Chuck Swanson, the instructor scheduled to teach the very first v6 offering of the course.

http://www.rapidspread.com/file.jsp?id=0pblp65jdl
http://www.rapidspread.com/file.jsp?id=foiyd0oued
http://www.rapidspread.com/file.jsp?id=5hxrbrciam
http://www.rapidspread.com/file.jsp?id=34oetnjnh1
http://www.rapidspread.com/file.jsp?id=1pdyt5r22a
http://www.rapidspread.com/file.jsp?id=nkhbqwkbu4
http://www.rapidspread.com/file.jsp?id=w0ap5afxm1
http://www.rapidspread.com/file.jsp?id=ljy5zp13ty
http://www.rapidspread.com/file.jsp?id=uqcozb1ynv
http://www.rapidspread.com/file.jsp?id=k9fo2s3lrr
http://www.rapidspread.com/file.jsp?id=xabubhrf1t
http://www.rapidspread.com/file.jsp?id=gzfvqpvgd5
http://www.rapidspread.com/file.jsp?id=v8kq6eco4s
http://www.rapidspread.com/file.jsp?id=icy6uu3pio
http://www.rapidspread.com/file.jsp?id=evp5gtm9vy
http://www.rapidspread.com/file.jsp?id=yjwcqzdugz

Password: www.softprovn.net


Source: [DL] Ethical Hacking Video Training DVD (CEH)

Thursday, December 3, 2009

VTC TCP-IP Packet Analysis

Both network administrators and IT security professionals must have the fundamental knowledge of TCP/IP to do their jobs. With that comes a necessity to be able to analyze TCP/IP traffic in order to troubleshoot network problems, analyze attacks, and better understand and secure their systems. Veteran VTC author, Bobby Rogers, will provide in-depth explanations for beginners and seasoned network professionals alike to enable them to understand the complex techniques of TCP/IP traffic analysis. To begin learning, simply click on the TCP/IP Packet Analysis movie links.


Megaupload:
http://www.megaupload.com/?d=D05JV7ZP
http://www.megaupload.com/?d=IEV1DG8J
http://www.megaupload.com/?d=YIE204ON

Rapidshare:
http://rapidshare.com/files/151574925/VTC.TCP.pm.part1.rar
http://rapidshare.com/files/151575014/VTC.TCP.pm.part2.rar
http://rapidshare.com/files/151575125/VTC.TCP.pm.part3.rar

filefactory
http://www.filefactory.com/file/c3308a/n/VTC_TCP_pm_txt
265 MB
Password default : shytex.com