Cari Blog Ini

Senin, 18 Maret 2013

Kode Simbol Rahasia Facebook

1. Ketikkan <3 maka akan muncul gambar
hati berwarna kemerahan..

2. Ketikkan :putnam: maka akan muncul
gambar wajah seseorang yang mendongak
ke atas. Dia bernama Chris Putnam, ahli dan
teknisi software Facebook.

3. Ketikkan <("wink maka akan muncul gambar
penguin yang

4. Ketikkan * di depan dan dibelakang kata
atau kalimat, misalnya *hai!* maka akan
muncul hai! (dengan huruf bercetak tebal).

5. Ketikkan _ (underscore) di depan dan di
belakang kata atau kalimat, misalnya: _
penting_ maka kata penting tersebut akan tergaris bawahi.

6. Ketikan :* maka akan muncul orang mencium

7. Ketikan (^^^) maka akan muncil gambar ikan hiu

8. Ketikan Gambar :|[ Maka Akan Menjadi Robot

9. nah ini yang terbaru bro ckckck :poop: apa ya?? lahacia ckckckck

Simbol-simbol Facebook dengan basic

Kunci Alt:

Simbol-simbol Facebook ini menggunakan
dasar kunci Alt untuk perintah menampilkan
simbol unicode di Facebook.Anda bisa
menampilkannya di chat box, status, pesan/
message, bahkan nama account.

Sebelumnya, ada beberapa syarat agar simbol tersebut dapat ditampilkan.

A. Di PC/Desktop Computer

Tekan dan tahan left Alt (tombol Alt di
bagian kiri keyboard) kemudian tekan
tombol angka di numpad, yaitu tombol
angka di bagian kanan keyboard, bukan
yang di atas tombol-tombol huruf.

B. Di Laptop/Notebook

Tekan left Alt dan Fn secara bersamaan,
tahan dan tekan angka. Catatan: tombol
angka ini bukan yang di bagian atas huruf
tapi yang biasanya ada pada tombol huruf
U, I, O, ....dan seterusnya.

Alternatif: Copy simbol-simbol ini dan paste
langsung ke Facebook anda
Berikut perintah dan simbolnya:

Key Symbol Key Symbol
Alt + 1 ☺ Alt + 17 ◄
Alt + 2 ☻ Alt + 18 ↕
Alt + 3 ♥ Alt + 19 ‼
Alt + 4 ♦ Alt + 20 ¶
Alt + 5 ♣ Alt + 21 §
Alt + 6 ♠ Alt + 22 ▬
Alt + 7 • Alt + 23 ↨
Alt + 8 ◘ Alt + 24 ↑
Alt + 9 ○ Alt + 25 ↓
Alt + 10 ◙ Alt + 26 →
Alt + 11 ♂ Alt + 27 ←
Alt + 12 ♀ Alt + 28 ∟
Alt + 13 ♪ Alt + 29 ↔
Alt + 14 ♫ Alt + 30 ▲
Alt + 15 ☼ Alt + 31 ▼
Alt + 16 ►



Cuma SegituSetau Gue bro nanti kalo ada yang gua tau lagi nanti insyaallah gw share
Semoga Bermanfaat

Kode Emoticon Chat Facebook Terbaru

Kode Emoticon Chat Facebook Terbaru Hai Sist Dimana Pun Ente Berada saya selaku orang yang agak gaul , mau berbagi trik yang c3t4r m3mb4h4n4 b4d41 dan ini ciyuss lohh oke kali ini saya akan berbagi kode emoticon facebook , mungkin sudah ada yang tau, dan saya share bukan untuk orang yang sudah tau melainkan untuk pemula seperti ente dan saya ciakakakakakak oke next code oya lupa disebelah kiri juga bisa lo monggo dihapalin ciakakakakakak ok nice shot eh next on kode begin (sok inggris) kwkawkawkkaw







[[291152600919956]] [[295479677155336]] [[314363058604092]]
[[262834777109378]] [[189006671194968]] [[263319493729810]]
[[251236504943440]] [[287904934588441]] [[185961414833909]]

Arunkumar Mahadevan

[[258968244165876]] [[286666501379430]] [[262520713809098]] [[159049157536013]] [[307904395916212]]
[[225447050864310]] [[209926462425564]] [[138411019605305]] [[221670374577056]] [[154671737968862]]
[[138007062977844]] [[291747794194724]] [[122952454488304]] [[337561022923016]] [[288878907831075]]
[[240630206008013]] [[264223330304357]] [[319462458078703]] [[239286912807413]] [[288721814513254]]
[[265575850170635]] [[345354905481875]] [[209004679185391]] [[259785247417432]] [[159480014157666]]
[[267428346644787]] [[239034746168540]] [[350046018344350]] [[209260572491236]] [[198316980259626]]
[[310959705610393]] [[214054278676095]] [[200638253359905]] [[334455703231303]] [[158066514298630]]

Arunkumar Mahadevan: And we’re in business

[[179756028790264]] [[131478976968398]] [[314076808615174]] [[206240339463055]] [[159403400834378]]
[[200992799990165]] [[196243973803636]] [[270956806292431]] [[346811212001437]] [[328107453874590]]
[[196721100420672]] [[317586898261340]] [[298140226892101]] [[214914048591653]] [[350101681673756]]
[[123765061073750]] [[245710415498757]] [[243298355738272]] [[138812572897166]] [[149419131833071]]
[[158310927607841]] [[310752072297702]] [[316528255036793]] [[335475163146590]] [[221503331260136]]
[[241781875890038]] [[218268384920510]] [[189509191144351]] [[302618756443499]] [[182961465135557]]
[[206151719471944]] [[223223751088260]] [[158685720904140]] [[249080145157161]] [[310957895604838]]

Yople Alyen Full Nyan Cat

[[265434590178748]] [[164991926934921]] [[209695692449988]] [[250490361685507]] [[278968458819422]] [[349625665051383]] [[205760419511603]]
[[312189672135533]] [[299788346731384]] [[268532783202434]] [[266669970059695]] [[204170799672068]] [[187204144709527]] [[331078983588306]]
[[149240955184679]] [[206407216112871]] [[240669959335314]] [[180619528702085]] [[347768705240557]] [[186661331430535]] [[218646048216424]]
[[344875905539434]] [[328111047214223]] [[323186421038846]] [[157802940990663]] [[159535350818164]] [[296581710385765]] [[271261609598535]]

Sasha Andersen

[[159403400834378]] [[297487363621407]] [[1156068411]] [[135921843188987]] [[281219301903813]] [[199562043466774]]
[[295738517127851]] [[155658844536513]] [[209549519130890]] [[142176999226854]] [[246689415397308]] [[199562043466774]]
[[238766052862259]] [[307299595976209]] [[217652968315422]] [[189042331191521]] [[286721874712929]] [[344476392245488]]
[[208520335900424]] [[280378908678680]] [[289772571069549]] [[271456079578545]] [[316530365035101]] [[288356997877538]]
[[291702580880362]] [[165637363538400]] [[150244831751625]] [[241130952627573]] [[120930761357725]] [[325867137432308]]
[[154842501286195]] [[286053358112869]] [[149316288510313]] [[250243511707871]] [[291635414215481]] [[344254632266885]]
[[276412539074685]] [[131586963624296]] [[333374550025341]] [[327570193933422]] [[199699430120687]] [[136021593179546]]

meme sedih

‎[[222233554520712]] [[155093667926316]] [[159374644168797]]
[[265556180170509]] [[272006802857159]] [[144596118984229]] [[198806320212294]] [[155432547893166]]
[[239088996160999]] [[293626150673074]] [[203611766392684]] [[214124502002999]] [[268692779851733]]
[[181312795299893]] [[269771269745545]] [[189131527848966]] [[121039688013447]] [[347460675267390]]
[[116007985184523]] [[267703239958069]] [[209491689137152]] [[335109106501612]] [[286053824778978]]
[[140147629431094]] [[286265654759471]] [[208524709231940]] [[135568263223992]] [[265887476807116]]

meme gede

[[331399223556184]] [[286042634779174]] [[330023780360758]] [[329237617088409]] [[204120926342364]] [[131297490319188]] [[289987304385341]]
[[295847560451136]] [[278880668827213]] [[260560750675461]] [[264494386943951]] [[208640915887167]] [[270643856326606]] [[334868623190983]]
[[265844723474789]] [[325742447454304]] [[207587629327321]] [[294223273948603]] [[323449457679402]] [[258622847533513]] [[242014162533924]]
[[306019522772134]] [[267712979948966]] [[301751889864065]] [[213122875437139]] [[164020277032670]] [[158735217564918]] [[261124587284685]]
[[114261558693806]] [[113889888730617]] [[316407155046042]] [[316473595041291]] [[346326392049037]] [[284570571589911]] [[298670736837009]]
[[219939044752270]] [[336155773063546]] [[131032267012645]] [[155856061183812]] [[208532722565686]] [[268249169896142]] [[204863289602546]]

megusta

[[10150425979186326]] [[10150425979236326]] [[10150425979391326]] [[10150425979441326]] [[10150425979466326]] [[10150425979526326]]
[[10150425979626326]] [[10150425979671326]] [[10150425979186326]] [[10150425979186326]] [[10150425979186326]] [[10150425979986326]] [[10150425980006326]]
[[10150425980066326]] [[10150425980101326]] [[10150425980231326]] [[10150425980436326]] [[10150425980451326]] [[10150425980506326]] [[10150425980561326]]
[[10150425980646326]] [[10150425980686326]] [[10150425980756326]] [[10150425980831326]] [[10150425980896326]] [[10150425981096326]] [[10150425981191326]]
[[10150425981251326]] [[10150425981306326]] [[10150425981366326]] [[10150425981406326]] [[10150425981466326]] [[10150425981516326]] [[10150425981591326]]
[[10150425981651326]] [[10150425981796326]] [[10150425981816326]] [[10150425981876326]] [[10150425981906326]] [[10150425981966326]] [[10150425982006326]]
[[10150425982066326]] [[10150425982101326]] [[10150425982131326]] [[10150425982196326]] [[10150425982261326]]

Kaskus.

[[243344945733611]] = Repost
[[mahochat]] = Maho
[[203443053077888]] = I Love Kaskus
[[205827876172490]] = Bingung
[[261018420628968]] = Thumbs
[[328740787138287]] = Nope
[[296027833771776]] = Capede
[[311851138846391]] = Alay
[[guengakak]] = Ngakak

Lain-Lain

Troll face: [[171108522930776]]
Me Gusta: [[211782832186415]]
ARE YOU FUCKING KIDDING ME: [[143220739082110]]
Feel like a sir: [[1680408465586189]]
Not bad Obama: [[169919399735055]]
Mother of God: [[142670085793927]]
Cereal Guy: [[170815706323196]]
LOL Face: [[168456309878025]]
NO Guy: [[167359756658519]]
Yao Ming: [[14933336846417]]
Derp: [[224812970902314]]
Derpina: [[192644604154319]]
Forever Alone: [[177903015598419]]
It’s Okay!: [[148578318584679]]
ALL the y: [[219611504753863]]
Impossibruh: [[305710872791586]]
Rage Face: [[145768898802324]]
Watch out, badass: [[309795212383816]]
Poker face: [[129627277060203]]
Justin Bieber: [[67253243887]]
Lady GaGa: [[ladygaga]] or [[10376464573]]
Eminem: [[eminem]]
Mark Zuckerberg: [[zuck]]
FUCK YEAH: [[105387672833401]]
CHUCK NORRIS: [[161751797197606]]
POKER FACE: [[129627277060203]]
CHALLENGE ACCEPTED: [[100002727365206]]
Dislike Icon – [[139407806171115]]
Like Icon – [[333181686710881]]
Inverted Like Icon – [[180601488705317]]
[[249199828481201]] – Konata Izumi
[[250128751720149]] – Domo Kun
[[223328504409723]] – Gintoki Sakata
[[236147243124900]] – Pokeball
[[326134990738733]] – Pikachu
[[155393057897143]] – Doraemon
[[224502284290679]]? – Nobita
[[144685078974802]] – Mojacko
[[334954663181745]] – Spongebob
[[196431117116365]] – Shin chan
[[148935948523684]] – Pedo Bear
[[269153023141273]] – Poring

icon smile Code Emoticon facebook versi besar:

[[334230636605501]] [[335080033169115]] [[314686231886107]]
[[179637912133385]] [[345951442087087]] [[208631755887293]]
[[297872013591588]] [[317089564978607]] [[341555305870236]]

Christmas:

[[271907092867476]] [[283723885007037]] [[327860897243844]] [[327860897243844]] [[271624196228707]] [[154936547887417]]
[[318243861533088]] [[240416619363543]] [[327860897243844]] [[238634442876406]] [[313359385353119]] [[159993800773468]] [[271907092867476]] [[285167624869191]] [[313359385353119]]

Huruf:

[[107015582669715]] = A
[[116067591741123]] = B
[[115602405121532]] = C
[[112542438763744]] = D
[[115430438474268]] = E
[[109225112442557]] = F
[[111532845537326]] = G
[[111356865552629]] = H
[[109294689102123]] = I
[[115636698451811]] = J
[[116651741681944]] = K
[[115807951764667]] = L
[[106596672714242]] = M
[[108634132504932]] = N
[[116564658357124]] = O
[[111669128857397]] = P
[[107061805996548]] = Q
[[106699962703083]] = R
[[115927268419031]] = S
[[112669162092780]] = T
[[108983579135532]] = U
[[107023745999320]] = V
[[106678406038354]] = W
[[116740548336581]] = X
[[112416755444217]] = Y
Kalau Gak salah sih ada code yang error cuma saya lupa narok nya diman cobain aja sendiri :D Semoga Bermanfaat dan salam sctv

Cara Mempercepat Koneksi Internet



Bang Zendy -  Cara Mempercepat Koneksi Internet Penggunaan internet saat ini memang sudah dapat dinikmati oleh banyak orang namun pada daerah-daerah tertentu akses internet seringkali dirasakan sangat lambat apalagi untuk daerah yang belum menggunakan akses internet broadband yang berbasis teknologi Asymetric Digital Subscriber Line (ADSL), yang dapat memberikan paket layanan dari modem sampai BRAS (Broadband Remote Access Server)yang banyak disediakan oleh provider internet.

Bagi anda yang sering mengalami gangguan akses anda dapat mengunakan cara mempercepat koneksi Internet dengan tips trik sederhana berikut ini :

A. Mengubah setting bandwith pada windows

Secara default OS windows membatasi bandwidth untuk koneksi internet sebanyak 20% dari total bandwidth, anda dapat memaksimalkan jatah bandwith untuk PC atau laptop yang anda gunakan agar akses internet anda dapat maksimal dengan tips sederhana ini :

1. Klik Tombol Start pada windows

2. Klik Run dan Ketik gpedit.msc dan klik OK

3. Pilih Administrative Templates dan Klik Network

4. Setelah terbuka klik QoS Packet scheduler

5. Pilih Limit Reservable Bandwidth dan ubah setting menjadi Enable

6. Ubah Bandwidth Limitnya menjadi 0 Klik Apply > OK

7. keluar dan Restart komputer


B. Setting DNS menggunakan OpenDNS.

1. Buka Control Panel

2. Pilih icon Network Connection

3. Klik Kanan Local Area Connection pilih Properties atau Wireless Network Connection jika anda menggunakan
wireless untuk koneksi

4. Pilih Internet Protocol (TCP/IP) kemudian Klik Properties

5. Klik Use Following DNS Server

6. Isi Preferred DNS Server dengan angka : 208.67.222.222

7. Isi Alternate DNS Server dengan angka : 208.67.220.220

8. Kemudian Klik OK



C. Mengatur Buffer pada windows :

1. Klik tombol Start dan pilih Menu “Run”

2. Ketik “system.ini”

3. Setelah Terbuka tambahkan dibawah baris terakhir
Page buffer=100000kbps load=100000kbps download=100000kbps save=100000kbps back=100000kbps

5. Hasilnya akan tampak seperti berikut ini.

; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON
page buffer=100000kbps load=100000kbps download=100000kbps save=100000kbps back=100000kbps

6. Save dan exit lalu restart komputer anda.


Semoga Bermanfaat

Jumat, 08 Maret 2013

Download Machine Learning for Hackers Mediafire

Machine Learning for Hackers By Drew Conway, John Myles White
Publisher: O'R||eil||ly Me||dia 2012 | 322 Pages | ISBN: 1449303714 | PDF | 16 MB



If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation.
Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you’ll learn how to analyze sample datasets and write simple machine learning algorithms. Machine Learning for Hackers is ideal for programmers from any background, including business, government, and academic research.
Develop a naïve Bayesian classifier to determine if an email is spam, based only on its text
Use linear regression to predict the number of page views for the top 1,000 websites
Learn optimization techniques by attempting to break a simple letter cipher
Compare and contrast U.S. Senators statistically, based on their voting records
Build a “whom to follow” recommendation system from Twitter data

Download : 

10 Tren Ancaman Keamanan Cyber Tahun 2013

10 Tren Ancaman Keamanan Cyber Tahun 2013
Liputan6.com, Menyambut tahun baru 2013, banyak perusahaan yang membuat prediksi tren teknologi dan ancaman keamanan cyber di masa mendatang.

Berikut prediksi ancaman cyber di tahun 2013 menurut perusahaan penyedia layanan keamanan komputer dan jaringan Trend Micro.
1. Aplikasi berbahaya yang menyasar pengguna Android akan mencapai 1 juta.
Sistem operasi berbasis Android masih populer di hampir seluruh dunia. Hal itu menjadi daya tarik bagi penjahat cyber untuk menyerang sistem operasi buatan Google itu.
2. Windows 8 menawarkan tingkat keamanan yang lebih baik.
Sistem operasi buatan Microsoft menawarkan kemampuan lintas perangkat. Tingkat keamanan yang terbilang baik juga disebutkan bakal jadi kekuatan OS ini. Sayangnya, keamanan yang baik diprediksi masih sebatas hanya bagi sektor konsumer.
3. Layanan cloud mulai jadi target serangan
Layanan penyimpanan komputasi awan (cloud) populer seperti Google Docs, Dropbox, Facebook, dan lainnya akan menjadi sasaran kejahatan yang dilakukan oleh peretas. Jadi siap-siap amankan data yang Anda simpan pada layanan tersebut.
4. Serangan muncul di tempat tak terduga.
Teknologi digital akan semakin dekat dengan siapa saja dan dimana saja, sehingga kejahatan cyber akan muncul di tempat-tempat dengan teknik serangan yang tidak kita duga sebelumnya. Misalnya bisa saja serangan akan dimulai dari layanan TV yang berjalan di Windows, iOS, atau Android.
5. Pengamanan data makin sulit karena multiplatform.
Konsumen dan perusahaan menggunakan banyak platform, mulai dari piranti di kantor hingga komunikasi mobile Anda. Hal ini akan membuat pengguna lebih sulit dan kompleks dalam mengamankan data.
6. Motif politik picu cyberwar.
Serangan bermotif politik atau "ditunggangi" kepentingan politik diprediksi akan menjadi salah kegiatan cyberwar di tahun depan. Misalnya dengan adanya pengrusakan fasilitas-fasilitas penting negara saat para hacker disponsori oleh salah satu negara tertentu.
7. Pelanggaran data.
Penyimpanan data di cloud ataupun tidak, pelanggaran terhadap data akan tetap menjadi tren di 2013.
8. Penegakan hukum cyber.
Upaya untuk mengatasi kejahatan cyber secara global membutuhkan waktu dua tahun atau lebih untuk mencapai implementasi penuh. Paling tidak pada 2015 nanti banyak negara akan menegakkan hukum cyber sehingga tidak ada lagi ruang gerak bagi peretas untuk menjalankan aksinya dari negara yang "longgar" hukum cyber-nya.
9. Malware akan lebih canggih.
Ancaman malware konvensional akan secara bertahap berkembang, serangan akan menjadi lebih canggih dalam hal penyerangan. Kerjasama antar kelompok peretas underground alias "bawah tanah" pun akan memperkuat mereka dalam hal teknik penyerangan.
10. Kejahatan cyber akan banyak dilakukan dari benua Afrika.
Afrika, benua ini akan menjadi pelabuhan yang aman bagi para penjahat cyber dalam menjalankan aksinya yang lebih canggih dan terencana. Hal ini tentunya berkaitan langsung dengan masih lemahnya penegakan hukum cyber di negara tersebut. (DEN/DEW)

Senin, 04 Maret 2013

Download Ninja Hacking: Unconventional Penetration Testing Tactics


Book Description
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today?s ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company?s assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don?t you want to be a ninja for a day just because they?re cool? Let this book be your excuse!

* Discusses techniques used by malicious attackers in real-world situations
* Details unorthodox penetration testing techniques by getting inside the mind of a ninja
* Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks




Book Details

* Paperback: 376 pages
* Publisher: Syngress (October, 2010)
* Language: English
* ISBN-10: 9781597495882
* ISBN-13: 978-1597495882 

Download : 

Download 52 Video Tutorials Network Hacking Mediafire


52 Video Tutorials - Network Hacking - Mediafire

English | XVID | 640x480 | SWF, AVI, WMV | 15 fps 459 kbps | 750.64 MB

Genre: Elearning


Description:
These tutorials should not be treated as a threat - moreover they should be used into securing your own network so it would be more than safe

A Penetration Attack Reconstructed
A Quick and Dirty Intro to Nessus using the Auditor Boot CD!
Adding Modules to a Slax or Backtrack Live CD from Windows
Airplay replay attack – no wireless client required
Anonym.OS LiveCD with build in Tor Onion routing and Privoxy
BackTrack LiveCD to HD Installation Instruction Video
Basic Nmap Usage!
Basic Tools for Wardriving!
Bluesnarfer attack tool demonstration
Bluesnarfing a Nokia 6310i hand set
Breaking WEP in 10 minutes
Cain to ARP poison and sniff passwords!
Complete Hacking Video using Metasploit – Meterpreter
Cracking a 128 bit WEP key (Auditor)
Cracking a 128 Bit Wep key + entering the cridentials
Cracking Syskey and the SAM on Windows Using Samdump2 and John!
Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!
Cracking WPA Networks (Auditor)
DoS attack against Windows FTP Server – DoS
Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools!
Exploiting some bugs of tools used in Windows
Exploiting weaknesses of PPTP VPN (Auditor)
Finding Rogue SMB File Shares On Your Network!
Fun with Ettercap Filters!
How to crack the local windows passwords in the SAM database
How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor)
How to sniff around switches using Arpspoof and Ngrep!
Install VNC Remotely!
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res)
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res)
John The Ripper 1.7 password cracker Installation Instruction Video
Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005!
MAC Bridging with Windows XP and Sniffing!
Mass De-Authentication using void11 (Auditor)
Metasploit Flash Tutorial!
MITM Hijacking
Nmap Video Tutorial 2 Port Scan Boogaloo!
Sniffing logins and passwords
Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res)
Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res)
Sniffing VoIP Using Cain!
Snort Instruction video – howto install into backtrack
SSH Dynamic Port Forwarding!
Start a session and get interactive commandline access to a remote Windows box!
Telnet Bruteforce
Tunneling Exploits through SSH
Use Brutus to crack a box running telnet!
Using NetworkActiv to sniff webpages on a Wi-Fi network!
WEP Cracking using Aireplay v2.2 Beta 7 (Whax 3.0)
WMF File Code Execution Vulnerability With Metasploit!
WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0)

 Download Links:


Mediafire re-uploaded ...

Or

Uploaded.to Links:

http://ul.to/file/f9fuwp3n/52.Video.Tutorials-Network.Hacking.part1.rar
http://ul.to/file/uslr5kkk/52.Video.Tutorials-Network.Hacking.part2.rar
http://ul.to/file/idkcdf89/52.Video.Tutorials-Network.Hacking.part3.rar
http://ul.to/file/3dyj8a79/52.Video.Tutorials-Network.Hacking.part4.rar
http://ul.to/file/7c2c312n/52.Video.Tutorials-Network.Hacking.part5.rar
http://ul.to/file/77zvvjw9/52.Video.Tutorials-Network.Hacking.part6.rar
http://ul.to/file/yo4wfia1/52.Video.Tutorials-Network.Hacking.part7.rar
http://ul.to/file/yheqqzaw/52.Video.Tutorials-Network.Hacking.part8.rar

Metasploit : The Penetration Tester’s Guide Ebook





The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.




Learn How To :


  • Find and exploit unmaintained, misconfigured, and unpatched systems
  • Perform reconnaissance and find valuable information about your target
  • Bypass anti-virus technologies and circumvent security controls
  • Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
  • Use the Meterpreter shell to launch further attacks from inside the network
  • Harness standalone Metasploit utilities, third-party tools, and plug-ins
  • Learn how to write your own Meterpreter post exploitation modules and scripts

Product Details

  • Paperback: 328 pages
  • Publisher: No Starch Press; 1 edition (July 22, 2011)
  • Language: English
  • ISBN-10: 159327288X
  • ISBN-13: 978-1593272883
  • Product Dimensions: 9.2 x 6.9 x 1 inches 

Download :

Hacking: The Art of Exploitation, 2nd Edition Mediafire

Jon Erickson, "Hacking: The Art of Exploitation, 2nd Edition"
Publisher: No Starch Press | 2008 | Pages : 480 | PDF/EPUB | ISBN-10: 1593271441 | 4.9 mb
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.

The included LiveCD provides a complete Linux programming and debugging environmentall without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits.

This book will teach you how to:
* Program computers using C, assembly language, and shell scripts
* Corrupt system memory to run arbitrary code using buffer overflows and format strings
* Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
* Outsmart common security measures like nonexecutable stacks and intrusion detection systems
* Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
* Redirect network traffic, conceal open ports, and hijack TCP connections
* Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.


Download :

Download Hacking the Kinect Mediafire

Hacking the Kinect By Jeff Kramer, Nicolas Burrus, Daniel Herrera Do., Florian Echtler, Matt Parker

2012 | 268 Pages | ISBN: 1430238674 | PDF | 19 MB

Hacking the Kinect is the technogeek’s information to creating software package and making projects involving the groundbreaking volumetric sensor identified as the Microsoft Kinect. Microsoft’s launch of the Kinect in the drop of 2010 startled the technological innovation entire world by delivering a reduced-expense sensor that can detect and observe physique motion in three-dimensional area. The Kinect set new data for the speediest-promoting gadget of all time. It has been adopted worldwide by hobbyists, robotics fans, artists, and even some entrepreneurs hoping to develop enterprise around the technological innovation.
Hacking the Kinect introduces you to programming for the Kinect. You will understand to established up a computer software atmosphere, stream knowledge from the Kinect, and compose code to interpret that information. The progression of arms-on projects in the e-book sales opportunities you even deeper into an knowing of how the device capabilities and how you can implement it to generate fun and instructional assignments. Who is aware? You may even appear up with a business idea.
  • Provides an superb resource of enjoyable and educational jobs for a tech-savvy father or mother to go after with a son or daughter
  • Leads you progressively from generating your quite initial connection to the Kinect through mastery of its entire function set
  • Exhibits how to interpret the Kinect info stream in order to push your individual software package and components applications, including robotics apps

What you will discover
  • How to produce a software package setting and connect to the Kinect from your Pc
  • How to produce three-dimensional images from the Kinect knowledge stream
  • How to recognize and operate all around components constraints
  • How to build laptop or computer interfaces in the design of “Minority Report”
  • How to interact directly with objects in the digital planet
  • The ins and outs of level clouds, voxel occupancy maps, depth images, and other fundamentals of volumetric sensor technology

Who this ebook is for

Hacking the Kinect is aimed at makers of all varieties. Tech-savvy artists can use the Kinect to push 3-dimensional, interactive artwork. Robotics hobbyists can produce robots able of “seeing” and responding to human movement and gesture. Programmers can develop programs in which customers manipulate information by way of physical motion and gestures. The creative choices are limitless, and entertaining!
Hacking the Kinect does need some programming qualifications. Familiarity with programming in C++ or comparable languages is assumed. Viewers should also be reasonably comfy operating with electronics—for illustration, with Arduino or similar equipment.

Download :

The Master collection of C++,C#,vb.net,Java And many more



Hello At all This is master collection of:
C++
C#
Vb.net
net.framework
Java
Windows
Linux 


The Name OF books are:
- AMACOM Fundamentals of Project Management 3rd Ed 2007
- A Practical Guide to Linux Commands Editors and Shell Programming
- Admin linux-guid
- Apress Visual Basic 2008 Recipes A Problem Solution Approach Apr 2008
- Bash Beginners-Guide
- Bjarne Stroustrup - The C++ Programming Language - 3rd edition
- C++ (Complete Reference C++)
- C++ for Dummies 5th Edition
- Computer Vulnerability
- Cracking Passwords Guide
- Effective C++;More Effective C++
- Effective STL
- Erickson, Jon - Hacking - The Art Of Exploitation
- Grey Hat Hacking - Ethical Hackers Handbook
- Hack Attacks Revealed 
- Hack IT Security Through Penetration Testing
- Hackers Beware
- Hacking Exposed - Linux
- Hacking Exposed 6th Edition - Network Security Secrets And Solutions 2009
- Java Complete Reference ed 5 - Herbert Schildt 
- Kevin Mitnick - The Art of Deception (Plus Banned First Chapter) 
- MS - Visual Basic 2008 - Step by Step
- No Starch Press Hacking The Art of Exploitation 2nd Edition Feb 2008
- offensive-security
- professional penetration tester
- RemoteExploits2
- Scott Meyers - Effective C++ Third Edition 55 Specific Ways to Improve Your Programs and Designs
- Stealing the Network - How to Own the Box
- The Art of Intrusion
- The C++ Programming Language Special 3rd Edition
- The Art of War
- The Giant Black Book of Computer Viruses
- Windows Sockets C++

Download : 

Download Hacking VoIP: Protocols, Attacks, and Countermeasures



Hacking VoIP: Protocols, Attacks, and Countermeasures


Product Description :


Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it’s notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.
Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you’re serious about security, and you either use or administer VoIP, you should know where VoIP’s biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.
Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You’ll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:
Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing
Audit VoIP network security
Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage
Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX
Identify the many vulnerabilities in any VoIP network
Whether you’re setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.

Download :

Hacking: The Next Generation Mediafire


Hacking: The Next Generation
Neitesh Dhanjani, Billy Rios, Brett Hardin
Publisher: O'Reilly Media, Inc. | Number Of Pages: 296 | PDF
Publication Date: 2009-09-21
ISBN-10 / ASIN: 0596154577



With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.

Learn how "inside out" techniques can poke holes into protected networks

Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data

Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited

Prevent attacks against the mobile workforce and their devices containing valuable data

Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants

Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations.


Download :

Download PaRaNo1Ds Tutorial Collection Mediafire


Learn all the tricks and hacks that you need to know !
Contents of the book :


Download :


Or

Download iOS Hacker's Handbook Mediafire


iOS Hacker's Handbook By Charlie Miller, Dion Blazakis, Dino DaiZovi and more
2012 | 408 Pages | ISBN: 1118204123 | EPUB + PDF | 7 MB



Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.

  • Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
  • Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
  • Also examines kernel debugging and exploitation 

Companion website includes source code and tools to facilitate your efforts
iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.

Download :


Or

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab Mediafire


Professional Penetration Testing: Creating and Operating a Formal Hacking Lab (Ebook + DVD)
Publisher: Syngress | 2009 | ISBN: 1597494259 | PDF | 528 pages | 8.85MB
DVD: English | .ISO | 3.65GB


Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!
Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios.

Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will be useful to beginners all the way through to advanced practitioners.

Find out how to turn hacking and pen testing skills into a professional career

Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers

Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business

Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester

Learn through video - the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment

 

Download :


Download The Mac Hacker's Handbook Mediafire

Charles Miller, Dino Dai Zovi "The Mac Hacker's Handbook"
Wiley | English | 2009-03-03 | ISBN: 0470395362 | 384 pages | PDF | 6,5 MB
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.


Download :

Download Wifi Hack Ultimate All In One ISO Mediafire


Wifi Hack Ultimate All In One (2010) ISO | Mediafire | Final
Size : 163 MB
This time we bring you the best software to hack the WiFi networks 2009-2010. The compilationincludes powerful encryption software in network detection and ideal forhacking WiFi networks.Download Programs to hack Free Full WiFinetworks.

Download :

Download The IDA Pro Book Mediafire



The IDA Pro Book | 640 Pages | 1593271786 | O'Reilly Media | PDF | 33Mb

The Unofficial Guide to the World's Most Popular Disassembler

The IDA Pro Book provides a top-down overview of IDA Pro and its potential uses in the software reverse engineering field. After a thorough introduction to the origins and basic operation of IDA Pro, the book goes into depth on how to use IDA Pro. Author Chris Eagle, a recognized expert in the field, covers a variety of real-world reverse engineering challenges and offers strategies to deal with them, such as disassembly manipulation, graphing, and effective use of cross references.


This is the definitive reference for IDA Pro. If you have any of the others, just chuck them out now. This book does a great job of explaining a fairly heavy technical topic in language understandable by the novice, but still useful to the advanced user. Highly recommended for anyone interested in learning about disassembly, reversing, and IDA in general.




Download :

Download The Art of Human Hacking Mediafire




The Art of Human Hacking
English | Publisher: Wiley; 1 edition (December 21, 2010) | PDF | 408 Pages | 6.11 Mb


From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. 


Download :

Download iOS Forensic Analysis Mediafire



iOS Forensic Analysis: for iPhone, iPad, and iPod touch By Sean Morrissey
2010 | 372 Pages | ISBN: 1430233427 | PDF | 24 MB


iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and procedures outlined in the book can be taken into any courtroom. With never-before-published iOS information and data sets that are new and evolving, this book gives the examiner and investigator the knowledge to complete a full device examination that will be credible and accepted in the forensic community.

What you’ll learn
How to respond to security incidents involving iOS devices
How to acquire and analyze data on iOS devices such as iPhone and iPad
How to analyze media exploitation on iOS devices

Who this book is for :
Computer forensic professionals, law enforcement, attorneys, security professionals, those who are curious about such things, and educators.

This book can also be employed by law enforcement training academies and universities, as well as computer forensics, information security, and e-discovery communities.

Download :

Download Crackingislife Video guides to Hacking Mediafire


                                          Crackingislife - Video guides to Hacking | IO | 807 MB

Genre: e-Learning
This is a Whole set of 58 videos Showing How to hack! Thanks to the makers for Their effort.You time and all are awesome. Please use this videos Only for Study Purposes and researc

The course content :


Download :


Download Hex-Rays SA Ida Pro Advanced Edition v6.1


                          Hex-Rays SA Ida Pro Advanced Edition v6.1 build 0110409 | 256 Mb

IDA Pro Advanced Edition v6.1 the multi processor, multi operating system, interactive disassembler is used by security professionals to build a safer internet; by governmental agencies to validate commercial software; by open-source activists to support undocumented architectures; by device driver developers to tackle complex compatibility issues; and by embedded developers to build a better future.
IDA Pro is an interactive disassembler - it converts a binary executable program into an assembler text, allowing you to examine internals of the executable, to reverse engineer it and obtain a source text of the input file. Its most outstanding feature that makes it unique among other disassemblers is interactivity (as the name implies). With IDA Pro you may examine the input file and make modifications on the fly, with zero wait time, all your modifi-cations are instantly displayed on the screen.



Another unparalleled aspect of IDA is FLIRT - Fast Library Identification and Recognition Technology. The disassembler looks at the input file and tries to find common procedures and properly names and attaches comments to them, working as an intelligent assistant for you. FLIRT technology saves your valuable time, taking the routine part of work. It is pretty funny to open a window with the list of functions and to look how FLIRT gives meaningful names to the functions and attaches comments to them. lso, IDA Pro 6.1.0 - is the only disassembler that knows about high level language data structures like arrays, enumerations and structs. You may use them to make your disassembly clearer and more understandable. The upcoming version of IDA under- stands even local variables of procedures.



IDA: What's new in 6.1  :

http://www.hex-rays.com/products/ida/6.1/index.shtml

Download :

Download Take Control of iPad Networking & Security


Take Control of iPad Networking & Security (Covers iOS 4.3, original iPad and iPad 2, and GSM and CDMA) By Glenn Fleishman
English | 2011 | 106 Pages | ISBN: 1615420541 | PDF | 2 MB
Once you move beyond connecting to a simple home Wi-Fi network or using 3G data, you’ll want to read networking expert Glenn Fleishman’s discussion of how to integrate your iPad into more-complex networks and keep its data safe from prying eyes. Along with offering advice about Wi-Fi and 3G connections, Glenn explains how to protect your data in transit, and how to set up Bluetooth for various types of connections, including an iPhone personal hotspot, a wireless keyboard, and peer-to-peer pairing.

Covers iOS 4.3, original iPad and iPad 2, and GSM and CDMA.

“I am so very, very delighted with your coverage of the iPad. Previously I was always looking for answers in other manuals. None were complete like yours are. You answer the questions! Your manuals are so fantastic.”—Dennis M.

Inside, you’ll find advice and steps for how to:
•Set up an iPhone personal hotspot so that you can put any iPad on the Internet.
•Connect to a Wi-Fi network at work, home, or when at a public hotspot.
•Tweak a Wi-Fi network to give your iPad a faster connection.
•Connect to Wi-Fi using secure connections—learn about the security pros and cons of MAC address filtering, WEP, WPA, WPA2, and VPNs.
•Connect with 3G: This topic is most detailed in its discussions of plans from AT&T and Verizon Wireless in the United States, but it also takes a global perspective, with brief details about some data plans outside the United States and what to consider when traveling to a different country with your iPad.
•Monitor and limit 3G data usage to save on your data plan.
•Connect to Bluetooth peripherals such as keyboards and headsets, and do tethering and peer-to-peer pairing.
•Understand what’s at risk and protect the private passwords, documents, and data stored on your iPad.
•Take preventative action: Get ideas for installing third-party remote-tracking software and turn on Apple’s Find My iPhone.
•Find out how to use Find My iPhone if your iPad is lost or stolen.

Download :


Download Hacker Techniques, Tools, and Incident Handling

Hacker Techniques, Tools, and Incident Handling by Sean-Philip Oriyano, Michael Gregg
Jones & Bartlett Learning | 2010 | PDF | ISBN : 0763791830 | English | 59MB


Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.

Download :


Download Advanced Penetration Testing for Highly-Secured Environments

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Packt Publishing | 2012 | ISBN : 1849517746 | 414 pages | PDF | English | 15MB

Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environments that have been secured using IDS/IPS, firewalls, network segmentation, hardened system configurations and more. The stages of a penetration test are clearly defined and addressed using step-by-step instructions that you can follow on your own virtual lab.

The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and footprinting. You'll learn how to clean up and compile proof of concept, exploit code from the web, advanced web application testing techniques, client side attacks, post exploitation strategies, detection avoidance methods, generation of well defined reports and metrics, and setting up a penetration testing virtual lab that mimics a secured environment. The book closes by issuing a challenge to your skills and ability to perform a full penetration test against a fictional corporation; followed by a detailed walk through of the solution.
Advanced Penetration Testing for Highly-Secured Environments is packed with detailed examples that reinforce enumeration, exploitation, post-exploitation, reporting skills and more.

Download :