Chitika

Thursday, April 21, 2011

Webroot Internet Security

  • Blocks viruses, spyware and spam, Trojans, worms, rootkits and keyloggers
  • Makes your PC invisible to hackers
  • Encrypts passwords and remembers them for you
  • Access and share your photos, music and files from anywhere

Highlights

  • Complete PC threat protection including antivirus, antispyware, and firewall security
  • Securely backs up over 5,000 photos online* (10GB)
  • Improves PC performance with system cleanup
  • More effective against malware than competing Internet security software
  • Scans for threats up to 5x faster**
  • Access and share photos, music, and files from anywhere 

Minimum System Requirements

  • Windows XP 32 bit SP2, SP3
  • Window Vista 32 bit (all Editions), Windows Vista SP1, SP2 32 and 64 bit (all Editions)
  • Windows 7 32 and 64 bit (all Editions), Windows 7 SP1 32 and 64 bit (all Editions)
  • 300 MHz processor (minimum) 1GHz (recommended on Windows Vista and Windows 7)
  • 256 MB RAM (minimum) 2GB (recommended on Windows Vista and Windows 7)
  • 300 MB Hard Disk Space
  • Internet Explorer 6.0 and higher, Firefox 3.0 and higher

Protects Your PC—and Your Identity

Webroot Internet Security Complete integrates multi-layered identity protection to make online shopping, banking and other transactions safer. In addition to blocking malicious programs that can steal sensitive information, Webroot secures and encrypts your passwords; automatically fills in online forms to prevent data thieves from logging your keystrokes; monitors credit cards for fraud; monitors your Facebook profile and alerts you if your personal information is unprotected and vulnerable to identity thieves; and blocks Web and email phishing scams that are designed to trick you into divulging personal information.

More Effective Against Viruses, Spyware and Hackers

Webroot Internet Security Complete integrates award-winning Spy Sweeper antispyware with industry-leading antivirus protection to stop all the latest online threats, including viruses, spyware, adware, Trojans, worms, rootkits and keyloggers. Two-way firewall security provides PC protection by proactively blocking hackers and intrusions while minimizing interruptions and false alerts.


D O W N L O A D


Norman Personal Firewall

The program is operating as soon as it is installed. It enables to defend your computer or laptop against the majority of intrusion techniques used by intruders. In addition to that, you can specify whether you want for well-know applications to be created automatically as they are required for the first time.

Main Features:
  • Attack detection
  • Network rules
  • Quite easy to use
  • File and registry activity
  • Event viewer
  • Used ports
  • Web Traffic Scanning
  • Simple configuration
REVIEW
Lists each application and process that has active connections
  • Automated definition of security configurations
  • Scans your system and adjusts all its settings without your supervision.
  • Search function to search the intruders, applications and filters list.
  • Is available for your free evaluation.
  • Allows product to create necessary rules automatically. Displays detailed statistics.
An online help provides information on interface, settings, and functionality. Norman Firewall is available both for 32-bit and 64-bit versions of operating systems. Note: You have to uninstall any other firewall software on your computer and reboot before using the Norman Personal Firewall.

D O W N L O A D

Panda Firewall - Global Protection 2011

Designed for home and small office settings, Panda Firewall software provides both a reliable solution to intrusion prevention and a personal firewall for individual PCs.

This complete security suite detects in real time, making the product safer and faster. Cons: expensive and poor antiphishing detection rate.

Main Features:
  • Secure remote access
  • File encryption
  • Home network management
  • Redesigned new version
  • Filtering network traffic
  • Monitors your Internet connections
  • Web Traffic Scanning
  • Simple configuration
  • Supports packet filtering
  • Firewall with Trojan protection 
REVIEW
Using a private network, Panda Firewall 2011 protect your computer of threats coming from internal users.
  • Online FAQs. Downloadable user guide
  • POP3, IMAP and SMTP traffic are scanned for viruses
  • Search function to search the intruders, applications and filters list.
  • Wizard to create rules for applications and to create filters.
  • Monitor inbound and outbound packets and be alerted to suspicious traffic
Panda Firewall - Global Protection 2011 uses minimal resources of the system where it will be installed (Windows XP or later - 275MB free hard disk space). Best of all, this application constantly adapts its behavior based on network traffic analisys in order to build the best defence for your computer and keep your system running smoothly.

D O W N L O A D




F-Secure Internet Security 2011

Today a huge amount of computers around the world are still unprotected against threats spreading through the Internet. You can keep your private data to yourself with the personal firewall that stops hackers from breaking into your computer. This advanced firewall provides a complete and easy-to-use protection against Internet threats.

Main Features:
  • Reputation-based detection
  • Tells you which websites are safe in real-time
  • Includes a web surfing time lock for children
  • Detects and removes rootkits
  • Prevents malicious dialer programs from using your connection
  • Enhanced Anti-Spam tool
  • Helps you stay free from spam email
REVIEW

F-Secure Internet Security 2011 provides maintenance free, easy-to-use solutions for computer security
and virus protection that you need in order to ensure safe and easy online surfing.
  • Receives high scores from independent experts
  • Enables you o stay free from spam e-mail
  • Protects your computer against viruses, worms, rootkits and zero-day attacks
  • Enhanced usability through flexible product configuration
  • Automatically distributes new spyware and virus signatures to your PC
  • Detects and removes security threats
  • Supports Windows XP, Vista (64 and 32-bit)
F-Secure DeepGuard, a new technology, constantly monitors the heart of your computer, ensuring that no malicious programs can take over your computer. It filters unwanted spam and phishing attempts from your email. The installer gives an option to choose from F-Secure Internet Security 2011 or F-Secure Anti-Virus installation.

F-Secure Internet Security is a good personal firewall protection software. It includes an antivirus and an improved anti-spyware.

D O W N L O A D 

ZoneAlarm PRO Firewall

Protect yourself with the best multi-layered firewall technology around. Simple to install (step-by-step installation wizard gets you up and running in minutes). Easy to use (comes with default security settings for "out-of-the-box" protection). Combines the firewall with identity protection and anti-spyware software.




ADVANCE FEATURES

  • File size: 47 MB
  • License can be used on up to three PCs
  • Free version upgrades
  • Two-way Firewall
  • Best alternative. Wireless PC protection
  • Multi-layered security for your PC
  • Quarantine suspicious attachments
  • Compatible with anti-virus software
  • Complete Package
D O W N L O A D

Tuesday, March 22, 2011

Hacking: The Next Generation

 With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.


With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.

  • Learn how "inside out" techniques can poke holes into protected networks
  • Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data
  • Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited
  • Prevent attacks against the mobile workforce and their devices containing valuable data
  • Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
  • Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations  

Oreilly Download
Torrent Download

Ebook: Inside Cyber Warfare


Description
You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

What people are saying about Inside Cyber Warfare

"The necessary handbook for the 21st century."

--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments

"A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war."

--Jim Stogdill, CTO, Mission Services Accenture

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.
Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.
  • Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
  • Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
  • Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
  • Find out why many attacks originate from servers in the United States, and who's responsible
  • Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

O'Relly Download
Torrent Download

Adobe Illustrator CS5 One-on-One

Description
Master the fundamentals of Adobe Illustrator and watch your designs come to life. With Deke McClelland's unique and effective learning system, you get step-by-step tutorials, hours of DVD-video demonstrations, and lots of hands-on projects to help you improve your knowledge and hone your skills.

Read the lesson. Watch the video. Do the exercises.
Master the fundamentals of Adobe Illustrator CS5 and draw pictures you've always wanted to create. With Deke McClelland's unique and effective learning system, you get step-by-step tutorials, hands-on project files, and hours of online video demonstrations -- all designed to help you improve your knowledge and hone your skills.
  • Find out everything you need to know to be productive with Illustrator right away
  • Learn at your own speed with 12 self-paced lessons packed with tutorials
  • Work on engaging, real-world projects to try out professional techniques
  • Follow every key step with video lessons, full-color photographs, and screen images
  • Test your knowledge with multiple-choice quizzes at the end of every lesson
  • Learn from an Adobe expert with more than 20 years of experience
With Adobe Illustrator CS5 One-on-One, you’ll use Illustrator faster, more creatively, and more efficiently than you thought possible.

O'Reilly Download
Torrent Download

Ebook: TCP/IP Network Administration


Description
This complete hands-on guide to setting up and running a TCP/IP network starts with the fundamentals: what protocols do and how they work, how addresses and routing are used, and how to set up your network connection. The book also covers advanced routing protocols and provides tutorials on configuring important network services. The expanded third edition includes sections on Samba, Apache web server, network security, and much more.

This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet.
Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial on configuring important network services -- including DNS, Apache, sendmail, Samba, PPP, and DHCP -- as well as expanded chapters on troubleshooting and security. TCP/IP Network Administration is also a command and syntax reference for important packages such as gated, pppd, named, dhcpd, and sendmail.
With coverage that includes Linux, Solaris, BSD, and System V TCP/IP implementations, the third edition contains:
  • Overview of TCP/IP
  • Delivering the data
  • Network services
  • Getting startedM
  • Basic configuration
  • Configuring the interface
  • Configuring routing
  • Configuring DNS
  • Configuring network servers
  • Configuring sendmail
  • Configuring Apache
  • Network security
  • Troubleshooting
  • Appendices include dip, ppd, and chat reference, a gated reference, a dhcpd reference, and a sendmail reference
This new edition includes ways of configuring Samba to provide file and print sharing on networks that integrate Unix and Windows, and a new chapter is dedicated to the important task of configuring the Apache web server. Coverage of network security now includes details on OpenSSH, stunnel, gpg, iptables, and the access control mechanism in xinetd. Plus, the book offers updated information about DNS, including details on BIND 8 and BIND 9, the role of classless IP addressing and network prefixes, and the changing role of registrars.
Without a doubt, TCP/IP Network Administration, 3rd Edition is a must-have for all network administrators and anyone who deals with a network that transmits data over the Internet.

O'Reilly Download
Torrent Download

Apache: The Definitive Guide, Second Edition


Description
 
Written and reviewed by key members of the Apache group, this book is the only complete guide on the market that describes how to obtain, set up, and secure the Apache software on both Unix and Windows systems. The second edition fully describes Windows support and all the other Apache 1.3 features. Includes CD-ROM with Apache sources and demo sites discussed in the book.

The freeware Apache web server runs on about half of the world's existing web sites, and it is rapidly increasing in popularity. Apache: The Definitive Guide, written and reviewed by key members of the Apache Group, is the only complete guide on the market today that describes how to obtain, set up, and secure the Apache software.
Apache was originally based on code and ideas found in the most popular HTTP server of the time: NCSA httpd 1.3 (early 1995). It has since evolved into a far superior system that can rival (and probably surpass) almost any other Unix-based HTTP server in terms of functionality, efficiency, and speed. The new version now includes support for Win32 systems. This new second edition of Apache: The Definitive Guide fully describes Windows support and all the other Apache 1.3 features. Contents include:
  • The history of the Apache Group
  • Obtaining and compiling the server
  • Configuring and running Apache on Unix and Windows, including such topics as directory structures, virtual hosts, and CGI programming
  • The Apache 1.3 Module API
  • Apache security
  • A complete list of configuration directives
With Apache: The Definitive Guide, web administrators new to Apache can get up to speed more quickly than ever before by working through the tutorial demo. Experienced administrators and CGI programmers, and web administrators moving from Unix to Windows, will find the reference sections indispensable. Apache: The Definitive Guide is the definitive documentation for the world's most popular web server. Includes CD-ROM with Apache manuals and demo sites discussed in the book.

O'Reilly Download
Torrent Download

Ebook: Linux Server Hacks

Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.


A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. There's basic documentation online but there's a lot beyond the basics you have to know, and this only comes from people with hands-on, real-world experience. This kind of "know how" is what we sought to capture in Linux Server Hacks.
Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.
O'Reilly's new Hacks Series proudly reclaims the term "hacking" for the good guys. Hackers use their ingenuity to solve interesting problems. Rob Flickenger is an experienced system administrator, having managed the systems for O'Reilly Network for several years. (He's also into community wireless networking and he's written a book on that subject for O'Reilly.) Rob has also collected the best ideas and tools from a number of other highly skilled contributors.
Written for users who already understand the basics, Linux Server Hacks is built upon the expertise of people who really know what they're doing.

Monday, March 21, 2011

Hacking Tools: TCPDUMP for Windows

The main features of the TCPDUMP for Windows®

MicroOLAP TCPDUMP for Windows® accurately reproduces all features of the original tcpdump by LBNL's Network Research Group, developed for the UNIX systems.
Since MicroOLAP TCPDUMP for Windows® is compiled with the Packet Sniffer SDK, it has the following advantages:

1 It is portable

MicroOLAP TCPDUMP for Windows® may be run from any removable device without installation on the user's PC: it is compiled with Packet Sniffer SDK, so no any pre-installed third-party packet capture drivers are required. Just run tcpdump.exe, and use tcpdump command-line interface you're already familiar with.

2

   Performance

 Thanks to the traffic capture technology utilized in TCPDUMP for Windows®, this product has very        high performance too.

3   

Small footprint

MicroOLAP TCPDUMP for Windows® comes as single 400Kb .EXE file, that allows to upload it to a remote Windows PC box to be analyzed, and then run it under Windows Terminal, Radmin, or other remote administration tool.

TCPDUMP for Windows supports the following operation systems

Windows NT 4.0; Windows 2000; Windows XP; Windows 2003; Windows Vista; Windows Longhorn; Windows 98; Windows ME, WinXP x64, Win2003 x64, Vista x64.



D O W N L O A D

Hacking Tools: Windump

WinDump is the Windows version of tcpdump, the command line network analyzer for UNIX. WinDump is fully compatible with tcpdump and can be used to watch, diagnose and save to disk network traffic according to various complex rules. It can run under Windows 95, 98, ME, NT, 2000, XP, 2003 and Vista.


WinDump captures using theWinPcap library and drivers, which are freely downloadable from the WinPcap.org website. WinDump supports 802.11b/g wireless capture and troubleshooting through the CACE Technologies AirPcap adapter.
WinDump is free and is released under a BSD-style license.

D O W N L O A D


Thursday, March 17, 2011

Hacking Tools: Super Bluetooth hack 2009

This is a new version of Super Bluetooth Hack for conventional and mobile-based simbian. If you do not know what a Super Bluetooth Hack, this program through you can manage other people’s mobile phone at a distance (10-15 meters, it’s blyutuz)
What can …
1) Read SMS
2) disable telenfon
3) Vklyucht music
4) Choose modes (normal, without sound …)
5) Block Phone
And much much more
Extras. information.
Installation:
1) Download to PC.
2) Pour on the mobile
3) Run the Installer (what you download, incidentally need JAVA)
4) He finds it and you will be able to run progammu
5) Select the language and polazit configured
6) Click Connection
7) Click search devices

8)
     Choose the “victim”
9) AND MANAGE!
Nokia’s Symbian S60 3rd and S60 5th edition based mobile phones: 3250, 5300, 5320 XM, 5700, 5700 XM, 5800 XM (Tube), 6110, 6120c, 6121c, 6124c, 6210, 6220c, 6290, 6650, E50, E51, E60, E61, E61i, E62, E63, E66, E70, E71, E90, ,N70, N71, N73, N75, N76, N77, N78, N79, N81, N81 8GB, N82, N85, N90, N91, N92, N93, N93i, N95, N95, N95 8GB, N96, N97.

D O W N L O A D

Hacking Tools: Gmail Password Hacking

Gmail Password Hacking - Gmail Password Retriever PRO (GPRP)

Gmail Password Retriever PRO is a convenient tool that gives it's user the ability to retrieve any Gmail account password without the user's authorization. Gmail Password Retriever PRO allows you to monitor your child's or spouse's behavior when you are not at home - a convenient tool for worried parents and spouses. This easy-to-use tool can meet all youGmail password retrieval needs. Gmail Password Retriever PRO is now available for download free of charge for a limited period of time, grab your copy while you can!


This application has been created with the intent to help users looking to hack their way into Gmail accounts. You have most likely already searched on the internet countless times on "how to hack Gmail" or Gmail password hacking" to no avail. Gmail hacker pro offers its user the ability to crack Gmail accounts in less than 30 seconds per account. Gmail hacking has never been as easy and fast as it is now. All that's required on your end to get started and to do your first Gmail password crack is to download our free Gmail hacking software and install it on your system now!. We are offering this software free of charge in attempt to help the thousands of people who do to not know how to hack Gmail account passwords and are in dire need for such a service due to spousal infidelity and its rising prevalence.


Keywords
Gmail hacking, Gmail account password hacking, how to hack
Gmail accounts, how to hack Gmail passwords, Gmail account
hacking, Gmail hacks, Gmail password finder, Gmail cracking

D O W N L O A D


Recovery Data Software


Tubulator Publisher's Description
Tubulator is a YouTube browser and video/music download tool

Tubulator is a YouTube browser and video download tool. In addition to offer downloads of YouTube video and audio/music, Tubulator lets you browse YouTube in a way similar to the YouTube website. Search for keywords, and Tubulator gives you the search results. Browse related videos and user channel uploads/favorites - all available via a user interface not much different from your normal web browser. Search, browse,bookmark and download away!

YouTube contains a vast amount of video audio content. Comedy shows, movie trailers, funny commercials, old music and movies not found anywhere else, spoken word shows - the list goes on. Slow internet? Add the video to the download queue in Tubulator, and watch it offline on your computer or smartphone later. Want to avoid a video gets removed from YouTube? Download it instead.

Tubulator converts the downloaded YouTube video or music to MP4 or MP3 formats, ready to be played in your favorite movie player, MP3 player, iPod/iPhone or smartphone. It it is of course also possible to keep the original FLV file for no quality loss at all.

Tubulator lets you download video and music from YouTube for free while it's in Beta stage.


D O W N L O A D



Wednesday, March 2, 2011

EmailTrackerPro



EmailTrackerPro can trace any email back to its true geographical locaction* by using the email header. The header of an email provides the key details about where an email came from and if it is likely to be spam.

EmailTrackerPro can detect abnormalties in the email header and warn you that the email may be spam. 

Despite the growing number of networks that ignore reports of abuse there are still many that take notice of abuse reports. EmailTrackerPro makes it simple to generate and send abuse reports to the network responsible for spam and phishing email.

D O W N L O A D

Porn Filter Software - Block Porn Now

Porn Filter Software - Block Porn Now

Millions of Users are enjoying the Internet With No Pornography

Easily block adult websites and porn. Children should not view porn - even by accident. Blocking pornography prevents exposure to hardcore sexual imagery that can lead to serious problems in developing healthy sexual attitudes.

5 Steps to Filter Porn on Your Computer

  • 1Download the porn filter software for FREE
  • 2Install Optenet PC porn filter on your computer
  • 3Follow the on-screen instructions and go to Filter Configuration.
  • 4Set the software for your family's exact Internet needs. Each user can be different.
  • 5Go to the Porn Filter configuration and choose which type of content to filter, schedule time permitted online, control what each user can download, etc.
D O W N L O A D

Wednesday, February 16, 2011

Platinum Hide IP 3.0.6.6

Platinum Hide IP, a professional provider of online security software, is built on technology and focused on quality and service. We have been devoted ourselves to the development of privacy products, aiming to guard people against Internet threats such as hackers, identity thefts, spying eyes, etc., and have made great achievements in this field.

The Platinum Hide IP programs, designed with a strong focus on the consumer, with the simple but powerful design and great practicability and usability, are very popular in this field and have won great recognition of a great number of consumers.

Platinum Hide IP, striving for excellence in state-of-the-art global technology services, will do our utmost to continue to provide good solutions to meet consumers' need and bring customers more excellent software and service.

D O W N L O A D

Tuesday, February 8, 2011

Hacking Tools: NETFILTER AND IPTABLES

Netfilter is a set of hooks inside the Linux kernel that allows kernel modules to register callback functions with the network stack. A registered callback function is then called back for every packet that traverses the respective hook within the network stack.
iptables is a generic table structure for the definition of rulesets. Each rule within an IP table consists of a number of classifiers (iptables matches) and one connected action (iptables target).
netfilter, ip_tables, connection tracking (ip_conntrack, nf_conntrack) and the NAT subsystem together build the major parts of the framework.

Main Features

  • stateless packet filtering (IPv4 and IPv6)
  • stateful packet filtering (IPv4 and IPv6)
  • all kinds of network address and port translation, e.g. NAT/NAPT (IPv4 only)
  • flexible and extensible infrastructure
  • multiple layers of API's for 3rd party extensions
  • large number of plugins/modules kept in 'patch-o-matic' repository
 D O W N L O A D

Hacking Tools: KISMET

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and (with appropriate hardware) can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet also supports plugins which allow sniffing other media such as DECT.

Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic.

D O W N L O A D

Hacking Tools: Nikto2 web server scanner

Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1000 servers, and version specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.

Nikto is not designed as an overly stealthy tool. It will test a web server in the quickest time possible, and is fairly obvious in log files. However, there is support for LibWhisker's anti-IDS methods in case you want to give it a try (or test your IDS system).

Not every check is a security problem, though most are. There are some items that are "info only" type checks that look for things that may not have a security flaw, but the webmaster or security engineer may not know are present on the server. These items are usually marked appropriately in the information printed. There are also some checks for unknown items which have been seen scanned for in log files.

Download: Version 2.1.3 bz2 or gz

Monday, February 7, 2011

Hacking Tools: Nmap Network Scanning official guide

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire.
Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.

Download

Download or Read online

(online html) 

Hacking Tools: Nmap Network Scanning

Nmap is a free, open-source port scanner available for both UNIX and Windows. It has an optional graphical front-end, NmapFE, and supports a wide variety of scan types, each one with different benefits and drawbacks.
This article describes some of these scan types, explaining their relative benefits and just how they actually work. It also offers tips about which types of scan would be best against which types of host.
The article assumes you have Nmap installed (or that you know how to install it. Instructions are available on the Nmap website, http://www.insecure.org/nmap/install/inst-source.html ), and that you have the required privileges to run the scans detailed (many scans require root or Administrator privileges).
A frequently asked questions section has been added since the first version of this article, and this is included as the last section in this version. This is a fully revised and updated version of this tutorial, re-typed and converted to a TeX format, allowing more output formats to be utilised. At the time of writing, the latest Nmap version was 4.11.

Download

Hacking Tools: AxCrypt - File Encryption for Windows

AxCrypt is the leading open source file encryption software for Windows. It integrates seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual files.
We have received 2,103,141 registrations, so it is tried and proven!

AxCrypt2Go and AxDecrypt are portable but limited in functionality. The full installer is recommended.
Check your OS type: Click 'Start', right-click 'Computer', click 'Properties'.

Features

Right-click integration with Windows Explorer makes AxCrypt the easiest way to encrypt individual files in Windows.
Double-click integration makes it as easy to open, edit and save encrypted files as it is to work with unencrypted files.

Download

OReilly Learning Python 4th Edition


Google and YouTube use Python because it's highly adaptable, easy to maintain, and allows for rapid development. If you want to write high-quality, efficient code that's easily integrated with other languages and tools, this hands-on book will help you be productive with Python quickly -- whether you're new to programming or just new to Python. It's an easy-to-follow self-paced tutorial, based on author and Python expert Mark Lutz's popular training course.

Each chapter contains a stand-alone lesson on a key component of the language, and includes a unique Test Your Knowledge section with practical exercises and quizzes, so you can practice new skills and test your understanding as you go. You'll find lots of annotated examples and illustrations to help you get started with Python 3.0.

  • Learn about Python's major built-in object types, such as numbers, lists, and dictionaries
  • Create and process objects using Python statements, and learn Python's general syntax model
  • Structure and reuse code using functions, Python's basic procedural tool
  • Learn about Python modules: packages of statements, functions, and other tools, organized into larger components
  • Discover Python's object-oriented programming tool for structuring code
  • Learn about the exception-handling model, and development tools for writing larger programs
  • Explore advanced Python tools including decorators, descriptors, metaclasses, and Unicode processing
Torrent Download

Python

Python is a dynamic object-oriented programming language that can be used for many kinds of software development. It offers strong support for integration with other languages and tools, comes with extensive standard libraries, and can be learned in a few days. Many Python programmers report substantial productivity gains and feel the language encourages the development of higher quality, more maintainable code.
 
Python runs on Windows, Linux/Unix, Mac OS X, OS/2, Amiga, Palm Handhelds, and Nokia mobile phones. Python has also been ported to the Java and .NET virtual machines.

Python is distributed under an OSI-approved open source license that makes it free to use, even for commercial products.

Download

Sunday, February 6, 2011

JBoss application server

 
JBoss Application Server (or JBoss AS) is a free software/open-source Java EE-based application server. An important distinction for this class of software is that it not only implements a server that runs on Java, but it actually implements the Java EE part of Java. Because it is Java-based, the JBoss application server operates cross-platform: usable on any operating system that supports Java. JBoss AS was developed by JBoss, now a division of Red Hat.

JBoss Application Server download
JBoss Application Server Documentation

Saturday, February 5, 2011

phpMyAdmin 3.3.9

phpMyAdmin is a free software tool written in PHP intended to handle the administration of MySQL over the World Wide Web. phpMyAdmin supports a wide range of operations with MySQL.
  • Support for most MySQL features
  • Browse and drop databases, tables, views, fields and indexes.
  • Create, copy, drop, rename and alter databases, tables, fields and indexes.
  • Maintenance server, databases and tables, with proposals on server configuration.
  • Execute, edit and bookmark any SQL-statement, even batch-queries.
  • Manage MySQL users and privileges.
  • Manage stored procedures and triggers.
  • Import data from CSV and SQL.
  • Export data to various formats: CSV, SQL, XML, PDF, ISO/IEC 26300 - OpenDocument Text and Spreadsheet, Word, Excel, LATEX and others.
 Download

MySQL 5.1.54

                          The world's most popular open source database
 
MySQL Community Edition is a freely downloadable version of the world's most popular open source database that is supported by an active community of open source developers and enthusiasts.
MySQL delivers enterprise features, including:
  • Partitioning to improve performance and management of very large database environments
  • Row-based/Hybrid Replication for improved replication security
  • Event Scheduler to create and schedule jobs that perform various database tasks
  • XPath Support
  • Dynamic General/Slow Query Log
  • Performance/Load Testing Utility (mysqlslap)
  • Improved! Full Text Search (faster, new dev templates)
  • Improved! Archive engine (better compression, more features)
  • Improved! User session and problem SQL identification
  • Improved! MySQL embedded library (libmysqld)
  • Additional INFORMATION_SCHEMA objects
  • Faster data import operations (parallel file load)
  • ACID Transactions to build reliable and secure business critical applications
  • Stored Procedures to improve developer productivity
  • Triggers to enforce complex business rules at the database level
  • Views to ensure sensitive information is not compromised
  • Information Schema to provide easy access to metadata
  • Pluggable Storage Engine Architecture for maximum flexibility
  • Archive Storage Engine for historical and audit data
Download

Sandboxie

Tired of dealing with rogue software, spyware and malware?
Spent too many hours removing unsolicited software?
Worried about clicking unfamiliar Web links?
Introducing Sandboxie: Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.
Benefits of the Isolated Sandbox
  • Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.
  • Enhanced Privacy: Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don't leak into Windows.
  • Secure E-mail: Viruses and other malicious software that might be hiding in your email can't break out of the sandbox and can't infect your real system.
  • Windows Stays Lean: Prevent wear-and-tear in Windows by installing software into an isolated sandbox.
Download

NetBeans IDE 6.9.1

A free, open-source Integrated Development Environment for software developers. You get all the tools you need to create professional desktop, enterprise, web, and mobile applications with the Java language, C/C++, and even dynamic languages such as PHP, JavaScript, Groovy, and Ruby. NetBeans IDE is easy to install and use straight out of the box and runs on many platforms including Windows, Linux, Mac OS X and Solaris.


Download

Eclipse Classic

Eclipse Classic is the most recent release from the Eclipse top-level project. It contains what you need to build applications based on Eclipse technology, including integrated development environments IDE, and rich client applications using the Eclipse Rich Client Platform RCP. The Eclipse Classic provides superior Java editing with incremental compilation, the Plug-in Development Environment PDE, complete source code for the Eclipse Platform, and much more.

Download

Windows Live Messenger 2011


Windows Live Messenger makes it easier than ever to stay connected to the people you care about.
  • Favorites and groups - Put the people you chat with most at the top of your contacts, so you easily see when they're online. Want to chat with several people in one window? Just set up a group.
  • Share photos - Look at photos together, right in the conversation window. And Messenger tells you when people you know post new photos on Windows Live.
  • Customize - Show off your personal style with custom scenes, animated display pictures, and signature sounds.
  • Mobile and web - Using a public computer without Messenger? No problem! You can chat on the web from Windows Live Hotmail. Or, use Messenger on your mobile phone.
Get Messenger and stay in touch.


Download

Thunderbird 3.1.7

Thunderbird is a great email client from the same people who brought you the Firefox browser.
Thunderbird gives you IMAP/POP support, a built-in RSS reader, support for HTML mail, powerful quick search, saved search folders, advanced message filtering, message grouping, labels, return receipts, smart address book LDAP address completion, import tools, and the ability to manage multiple e-mail and newsgroup accounts.
  • Tabbed email
  • An Archive feature similar to the one in GMail
  • Lightning fast search
  • Smart folders
Download

Skype 5.1.0.112

Skype is software for calling other people on their computers or phones. Download Skype and start calling for free all over the world.
The calls have excellent sound quality and are highly secure with end-to-end encryption. You don't even need to configure your firewall or router or any other networking gear.
Additionally it doesn't just work on Windows. Skype is also for Mac OS X, Linux and PDAs using Pocket PC, with a native look and feel for each platform. Talking, sending instant messages or even file transfers work between different platforms like a charm.
  • Skype calling - Skype has all the features of an ordinary phone so it's even easier to manage your calls.
  • Video calling - see who you are talking to at the same time as speaking to them.
  • Add Skype and SkypeOut contacts - Add contacts who use Skype and those who use ordinary phones so you can call more people.
  • Organising groups - group contacts under certain names and share them with your contacts so they can talk to them too.
  • Basic chat and emoticons - when it's not convenient to call, chat or Instant Message (IM) your contacts.
  • Group chat - for when it's easier to chat or Instant Message (IM) all your friends at once.
  • Profile settings - change how you appear to the world and let people know a bit about you.
  • Conference calling - talk to more than one friend at a time.
  • Import contacts - search your address book to find friends and family that already have a Skype name and start calling them for free.
  • View Outlook contacts - view and call your Microsoft Outlook® contacts quickly and directly from your Skype contact list.
  • Quickfilter and Speed-Dial - find Skype contacts, recent chats and SkypeOut contacts quickly and easily, then enter their Skype name to call them back quickly.

Download

Google Talk 1.0.0.104 Beta

The Google Talk downloadable application for Windows offers many features for communicating with your friends and family.

Instant messaging :- Chat with all of your Google Talk and Gmail contacts in real time.
Free PC-to-PC voice chat :- You can talk to anyone else for free who's online and has the Google Talk client.
Send and receive voicemails :- If the person you're calling isn't available, you can leave a voicemail.
Unlimited file transfers :- Send files to your contacts. There are no file size or bandwidth restrictions.
Gmail notifications on your desktop :- When you're signed into Google Talk, you'll be notified of new messages in your Gmail inbox.

Download

XBMC Media Center 10.0

XBMC is an award winning media center application for Linux, Mac OS X, Windows and XBox. The ultimate hub for all your media, XBMC is easy to use, looks slick, and has a large helpful community. Try it now!

Media Management
XBMC supports viewing and playing a vast library of audio, video and image formats. XBMC has a sophisticated library management system that allows you to organize all your media to give you quick and immediate access.

Fluid Interface
XBMC provides a user friendly interface that's intuitive, very flexible, and easy to use. The interface is completely customizable through user-created or downloadable skins.

Plug-ins and Extensibility
XBMC has a built-in Python interpreter that allows users and developers to write their own scripts and plugins that run inside XBMC using it's own widgets and controls. It also has a built-in web server that allows it to be controlled remotely.

Visualisations
XBMC's audio player supports many visualisations including ProjectM and Goom. In addition, it allows easy development of visualisations using a simple API.

Download

KMPlayer 3.0.0.1439

The KMPlayer is a versatile media player which can cover various types of container format such as VCD, DVD, AVI, MKV, Ogg Theora, OGM, 3GP, MPEG-1/2/4, WMV, RealMedia, and QuickTime among others. It handles a wide range of subtitles and allows you to capture audio, video, and screenshots in many ways.
The player provides both internal and external filters with a fully controlled environment in terms of connections to other splitters, decoders, audio/video transform filters and renderers without grappling with the DirectShow merit system. Internal filters are not registered to user's system to keep it from being messed up with system filters.
In December 2008 KMPlayer was bought by Pandora.tv, and continues to be made available as freeware.

DOWNLOAD

foobar2000

foobar2000 is an advanced freeware audio player for the Windows platform. Some of the basic features include full unicode support, ReplayGain support and native support for several popular audio formats.

Main features:
  • Supported audio formats: MP3, MP4, AAC, CD Audio, WMA, Vorbis, FLAC, WavPack, WAV, AIFF, Musepack, Speex, AU, SND... and more with additional components.
  • Gapless playback.
  • Full unicode support.
  • Easily customizable user interface layout.
  • Advanced tagging capabilities.
  • Support for ripping Audio CDs as well as transcoding all supported audio formats using the Converter component.
  • Full ReplayGain support.
  • Customizable keyboard shortcuts.
  • Open component architecture allowing third-party developers to extend functionality of the player.

Thursday, February 3, 2011

Hacking Tools: network search engine

network search engine – 10-Strike Network File Search Benefits & Features

  • Search network computers for documents, multimedia files, and other information on local network.
  • Search hidden and admin resources.
  • Search files on FTP servers.
  • Preview, open, download found files.
  • Delete files on network computers.
  • Save your time with fast multithreading network scanning engine.
  • Scan IP address range (save time and find more computers if you are an advanced user).
  • Set up domain, computer, and resource filters (where not to search) and save your time even more.
  • Export search results to TXT and HTML formats (for printing etc, view sample report).
  • Windows 95/98/ME/NT/2000/XP/Vista supported.
  • Register and get free upgrades and priority e-mail support.
Order via secure server
After paying the registration fee, you will receive a license key by e-mail.
Important Notes
  1. Microsoft Windows XP Service Pack 2 slows down IP address scanning by connecting to TCP ports for all running programs. You can not scan more than 10 addresses per 10 seconds and take full advantage of multithreading search engine with this OS.
  2. For getting all scanning features working, please enable NetBios, ICMP (ping), and TCP ports #21 and #139 for the program in your firewall.
  3. You can decrease the time of searching by configuring resource, computer name, and domain filters (where not to search).

    Download 

Top Software Download: Security Tool Nessus

GMail Backup 0.107 Latest Version

Description

This program is aimed to backup and restore of your GMail mailbox. You will need to activate the IMAP access to your mailbox, to do so, please open your GMail settings and under POP/IMAP tab activate this option.
The messages are stored in the local directory in files which names follow the format YYYYMMDD-hhmmss-nn.eml where YYYY is the year, MM the month number, DD is the day number, hh are hours, mm are minutes and ss are seconds when the e-mail was SENT. For the case there is more emails with the same timestamp there is the number nn which starts with value 1. Label assignment is stored in the file labels.txt which is the plain text file and it pairs the emails stored in the file described above with the assigned labels.

Examples:

To perform full backup of your GMail account into directory dir, use:
gmail-backup.exe backup dir user@gmail.com password
To specify time interval, you can add additional date specification in the format YYYYMMDD. The second date can be ommited in which case the backup is from the first date to now:
gmail-backup.exe backup dir user@gmail.com password 20070621 20080101
You can do multiple backups into the same directory. The labels.txt is updated according the new e-mails not in the previous backup.
To restore your backup use the restore command. To restore your GMail account from the previous backup in the directory dir, use for example:
gmail-backup.exe restore dir user@gmail.com password
You can also use the extra feature of GMail backup. It allows the user to completely clear his mailbox (for example if the user wants to end using the GMail). All messages are permanently deleted (of course the email can be stored somewhere deep in the Google company). To do so, execute the command:
gmail-backup.exe clear user@gmail.com password
The program will ask you to repeat the username, so you have the chance to cancel your mistake.

Note

If your internet provider does not allow you access the IMAP ports in the internet, than you will not be able to download the emails from GMail.

Linux note: Under Linux you will need the wxPython (http://wxpython.org) packages installed. It also requires the ctypes module, it should be included in the Python 2.5 distribution. For earlier versions of Python you can find the package in the repositories of your distribution.
Thank your for testing and bug reporting
Your GMail Backup Team
 http://www.gmail-backup.com/

Wednesday, February 2, 2011

Hacking Tools: L0phtcrack

L0phtcrack :  Windows password auditing and recovery application.
L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, then re-acquired by the original L0pht guys and reborn as LC6 in 2009. For free alternatives, consider Ophcrack, Cain and Abel, or John the Ripper. 

JABONG

Zip Cloud