Friday, March 6, 2015

Oracle 11g Anti-Hacker's Cookbook (e-book)




Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server.
Learn to protect your sensitive data by using industry certified techniques
Implement and use ultimate techniques in Oracle Security and new security features introduced in Oracle 11g R2
Implement strong network communication security using different encryption solutions provided by Oracle Advanced Security

In Detail

For almost all organizations, data security is a matter of prestige and credibility. The Oracle Database is one of the most rich in features and probably the most used Database in a variety of industries where security is essential. To ensure security of data both in transit and on the disk, Oracle has implemented the security technologies to achieve a reliable and solid system. In Oracle 11g Anti-Hacker's Cookbook, you will learn about the most important solutions that can be used for better database security

"Oracle 11g Anti-hacker's Cookbook" covers all the important security measures and includes various tips and tricks to protect your Oracle Database.

"Oracle 11g Anti-hacker's Cookbook" uses real-world scenarios to show you how to secure the Oracle Database server from different perspectives and against different attack scenarios. Almost every chapter has a possible threads section, which describes the major dangers that can be confronted. The initial chapters cover how to defend the operating system, the network, the data and the users. The defense scenarios are linked and designed to prevent these attacks. The later chapters cover Oracle Vault, Oracle VPD, Oracle Labels, and Oracle Audit. Finally, in the Appendices, the book demonstrates how to perform a security assessment against the operating system and the database, and how to use a DAM tool for monitoring.

Network Forensics: Tracking Hackers through Cyberspace (e-book)




“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.”

– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.



“It’s like a symphony meeting an encyclopedia meeting a spy novel.”

–Michael Ford, Corero Network Security

Maximum Security - A Hacker's Guide to Protecting Your Inter (e-book)

                                  


Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their network- and work toward a solution to those problems.

Friday, February 27, 2015

Debian 7.6.0 AMD64 Gnome Desktop



Debian remains one of the most important projects in Linux. Debian 7 offers some significant improvements, and it certainly warrants an upgrade if you are using an older version of Debian.

No doubt that some folks will be disappointed by the lack of support for Secure Boot, but I don’t think that that should be a deal breaker. The support for UEFI in 64-bit PCs is a step forward that will be built on later, so I try to take the long view on this issue.

Some will take issue with my comments about the forced inclusion of the ad blocker in Iceweasel, but I think it’s something worth talking about since Debian 7 is such an important Linux project. I fully understand that some folks hate ads and will block them, that is their right. However, advertising remains the basis for free content like this review, so it’s worth noting and thinking about the ramifications of browsers having ad blockers installed by default.

Debian 6.x.x






Debian 6.0 includes the KDE Plasma Desktop and Applications, the GNOME, Xfce, and LXDE desktop environments as well as all kinds of server applications. It also features compatibility with the FHS v2.3 and software developed for version 3.2 of the LSB.


Debian runs on computers ranging from palmtops and handheld systems to supercomputers, and on nearly everything in between. A total of nine architectures are supported by Debian GNU/Linux: 32-bit PC / Intel IA-32 (i386), 64-bit PC / Intel EM64T / x86-64 (amd64), Motorola/IBM PowerPC (powerpc), Sun/Oracle SPARC (sparc), MIPS (mips (big-endian) and mipsel (little-endian)), Intel Itanium (ia64), IBM S/390 (s390), and ARM EABI (armel).


Debian 6.0 Squeeze introduces technical previews of two new ports to the kernel of the FreeBSD project using the known Debian/GNU userland: Debian GNU/kFreeBSD for the 32-bit PC (kfreebsd-i386) and the 64-bit PC (kfreebsd-amd64). These ports are the first ones ever to be included in a Debian release which are not based on the Linux kernel. The support of common server software is strong and combines the existing features of Linux-based Debian versions with the unique features known from the BSD world. However, for this release these new ports are limited; for example, some advanced desktop features are not yet supported.


Sunday, February 22, 2015

Windows 7 Sp1 Ultimate en-US (x86)



If you want to run Windows 7 on your PC, here's what it takes:
  • 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  • 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
  • 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
  • DirectX 9 graphics device with WDDM 1.0 or higher driver

Additional requirements to use certain features:
  • Internet access (fees may apply)
  • Depending on resolution, video playback may require additional memory and advanced graphics hardware
  • Some games and programs might require a graphics card compatible with DirectX 10 or higher for optimal performance
  • For some Windows Media Center functionality a TV tuner and additional hardware may be required
  • Windows Touch and Tablet PCs require specific hardware
  • HomeGroup requires a network and PCs running Windows 7
  • DVD/CD authoring requires a compatible optical drive
  • BitLocker requires Trusted Platform Module (TPM) 1.2
  • BitLocker To Go requires a USB flash drive
  • Windows XP Mode requires an additional 1 GB of RAM and an additional 15 GB of available hard disk space.
  • Music and sound require audio output

Windows 8.1 Preactived V2 Office 2013 Pro Plus



Windows  8.1 Preactived V2 Office 2013 Pro Plus

No Windows 8.1 Settings were harmed in the making of this ISO
No Programs are added to Windows
No Registry Settings were modified
No Unattended Settings were added to the ISO


Installation Indexes:
Windows 8.1 (Core) x64 / KMS-Activated
Windows 8.1 (Core) N x64 / KMS-Activated
Windows 8.1 (Core) Single Language x64 / KMS-Activated
Windows 8.1 Pro x64 / KMS-Activated



Tools used:
imagex for /flags "ProfessionalWMC" setting and index renames
dism for set-edition for ProWMC, KB integration, install.esd export
oscdimg for ISO mastering with MS's default -u1 option
Info folder added to Windows Setup folder to annoy credit theives


Features:
Non-Activated and Pre-Activated indexes. Take your pick.*
*Uses custom AutoKMS_VL_ALL folder in Windows directory. You can
uninstall the daily task there if you wish to use a different
activator later. I've included the uninstall script
Highly Compressed install.esd recovery compression format
UEFI boot information added to ISO boot data

Windows 7 Sp1 Ultimate en-US (x64)



If you want to run Windows 7 on your PC, here's what it takes:
  • 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
  • 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
  • 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
  • DirectX 9 graphics device with WDDM 1.0 or higher driver

Additional requirements to use certain features:
  • Internet access (fees may apply)
  • Depending on resolution, video playback may require additional memory and advanced graphics hardware
  • Some games and programs might require a graphics card compatible with DirectX 10 or higher for optimal performance
  • For some Windows Media Center functionality a TV tuner and additional hardware may be required
  • Windows Touch and Tablet PCs require specific hardware
  • HomeGroup requires a network and PCs running Windows 7
  • DVD/CD authoring requires a compatible optical drive
  • BitLocker requires Trusted Platform Module (TPM) 1.2
  • BitLocker To Go requires a USB flash drive
  • Windows XP Mode requires an additional 1 GB of RAM and an additional 15 GB of available hard disk space.
  • Music and sound require audio output

Friday, February 20, 2015

Maximum Security - A Hacker's Guide to Protecting Your Internet and Network (e-book)



Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their network- and work toward a solution to those problems.



Downlaod   Maximum Security - A Hacker's Guide to Protecting Your Internet and Network  (e-book) 


                 

Machine Learning For Hackers (e-book)



If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation.

Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you’ll learn how to analyze sample datasets and write simple machine learning algorithms. Machine Learning for Hackers is ideal for programmers from any background, including business, government, and academic research.

Thursday, February 19, 2015

Back | Track 5 R3




The time has come to refresh our security tool arsenal – BackTrack 5 R3 has been released. R3 focuses on bug-fixes as well as the addition of over 60 new tools – several of which were released in BlackHat and Defcon 2012. A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.

Building, testing and releasing a new BackTrack revision is never an easy task.Keeping up-to-date with all the latest tools, while balancing their requirements of dependencies, is akin to a magic show juggling act. Thankfully, active members of our redmine community such as backtracklover and JudasIscariot make our task that much easier by actively reporting bugs and suggesting new tools on a regular basis. Hats off to the both of you.

Back Track 4 R2



“BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.“



This is the official change log for the update:

-  Kernel 2.6.35.8 – *Much* improved mac80211 stack.
-  USB 3.0 support.
-  New wireless cards supported.
-  All wireless Injection patches applied, maximum support for wireless attacks.
-  Even *faster* desktop environment.
-  Revamped Fluxbox environment for the KDE challenged.
-  Metasploit rebuilt from scratch, MySQL db_drivers working out of the box.
-  Updated old packages, added new ones, and removed obsolete ones.
-  New BackTrack Wiki with better documentation and support.
-  Our most professional, tested and streamlined release ever.This release comes with faster Desktop       responsiveness, better hardware support, broader wireless cardsupport, streamlined work                  environment. It also has the new kernel.

Kingpin - How One Hacker Took Over (e-book)


Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime.

The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.

The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots.

iOS Hacker's Handbook Honest (e-book)



Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.


Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
Also examines kernel debugging and exploitation

Hacking The Xbox 360 For Dummies (e-book)



This is the best guide i have found for hacking the 360. It tells you everything from hacking your firmware to backing up games.

Description
Finally updated the firmware tutorial with all the new stuff! Only included the .pdf this time, but navigation is very much improved. There is now bookmarks to the left that will make finding your place much easier - use the bookmarks!



Enjoy!




Downlaod Hacking The Xbox 360 For Dummies (e-book) .pdf


                                       

Nik Software - Silver Efex Pro 2 Review



Create Stunning Black and White Digital Photos

(You can now get 75% off of the original price of the ENTIRE NIK Collection from Google when you use Coupon code KENK)

While there are countless ways to create black and white digital photographs today, Nik software’sSilver Efex Pro 2 stands out as my preferred method of creating Rich and beautiful black and white images in the digital darkroom.

I spent many years in real darkrooms back at the beginning of my career in photography. I think that having that background allows me to have a deeper appreciation of what is possible to do with digital images today on a computer. We are living in a golden age of photography where the possibilities for creating incredible images is near limitless.

While programs like Lightroom, Aperture, and Photoshop are quite capable of creating excellent black-and-white images, Silver Efex Pro 2 offers incredible diversity along with simplicity for the user. Anyone who is serious about black and white photography needs to try this excellent plug-in.

Luckily, there is a 15 day free trial of the software that allows you to test the full version with no limitations.


Sunday, February 15, 2015

Hackers and Painters - Big Ideas from the Computer Age (e-book)



This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.


Downlaod Hackers and Painters - Big Ideas from the Computer Age   (e-book)

                                 

Hacker, Hoaxer, Whistleblower, Spy The Many Faces of Anonymous (e-book)




Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says “knows all of Anonymous’ deepest, darkest secrets.”

Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.

The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”



Downlaod   Hacker, Hoaxer, Whistleblower, Spy The Many Faces of Anonymous




Saturday, February 14, 2015

Hackers and Painters - Big Ideas from the Computer Age (e-book)



"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham


We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?


Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.




Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West."


The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.




Downlaod  Hackers and Painters - Big Ideas from the Computer Age (e-book)


Hacker Techniques, Tools, and Incident Handling (e-book)




Hacker Techniques, Tools, and Incident Handling, Second Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling, Second Edition provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.

New to the Second Edition:

-  Includes a completely new Chapter 13 on social engineering and what it means in the context of          cybersecurity, including a typical attack, identity theft, and best security practices
-  Provides new information on cryptography and encryption in network protocols
-  Updated references to Windows 8, Server 2008, Server 2012
-  Added information on Active Directory and Symantec Security Suite 10
-  Includes new material on using social networks, Wardriving and Warflying, detecting rogue access    points and WiFi Pineapple
-  New section material on cloud computing and cloud security issues.

-  Instructor Materials for Hacker Techniques, Tools, and Incident Handling include:
-  PowerPoint Lecture Slides
-  Exam Questions
-  Case Scenarios/Handouts



]k
Download Hacker Techniques, Tools, and Incident Handling (e-book)

Friday, February 13, 2015

Gray Hat Hacking, Third Edition (e-book)




Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.


- Develop and launch exploits using BackTrack and Metasploit
- Employ physical, social engineering, and insider attack techniques
- Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
- Understand and prevent malicious content in Adobe, Office, and multimedia files
- Detect and block client-side, Web server, VoIP, and SCADA attacks
- Reverse engineer, fuzz, and decompile Windows and Linux software
- Develop SQL injection, cross-site scripting, and forgery exploits
- Trap malware and rootkits using honeypots and SandBoxes


Download  Gray Hat Hacking, Third Edition (e-book)  .pdf



                             

Thursday, February 5, 2015

Anti-Hacker Tool Kit, Fourth Edition (e-book)






Format: PDF
Genre: anti hacking/tutorial
Published: 2014


Book Description: Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.

Demonstrates how to configure and use these and other essential tools:

Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options
Vulnerability scanners: OpenVAS, Metasploit
File system monitors: AIDE, Samhain, Tripwire
Windows auditing tools: Nbtstat, Cain, MBSA, PsTools
Command-line networking tools: Netcat, Cryptcat, Ncat, Socat
Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay
Port scanners: Nmap, THC-Amap
Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort
Network defenses: firewalls, packet filters, and intrusion detection systems
War dialers: ToneLoc, THC-Scan, WarVOX
Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap
Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra
Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion
Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR



Downlaod       Anti-Hacker Tool Kit, Fourth Edition

                                  

Gray Hat Hacking, Second Edition (e-book)






THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.



- Develop and launch exploits using BackTrack and Metasploit
- Employ physical, social engineering, and insider attack techniques
- Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
- Understand and prevent malicious content in Adobe, Office, and multimedia files
- Detect and block client-side, Web server, VoIP, and SCADA attacks
- Reverse engineer, fuzz, and decompile Windows and Linux software
- Develop SQL injection, cross-site scripting, and forgery exploits
- Trap malware and rootkits using honeypots and SandBoxes


Downlaod  Gray Hat Hacking, Second Edition



EC-Council Certified Security Analyst 4.0 instructor slides





Course Description


ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.

EC-Council’s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.


Who Showld Atend

Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.




Duration :
5 days (9:00 - 5:00) Certification


Certification Exam
The ECSA certification exam will be conducted on the last day of training. Students need to pass the online Prometric exam 412-79 to receive the ECSA certification. The Student also will be prepared for the LPT certification


Downlaod        EC-Council Certified Security Analyst 4.0 instructor slides.iso



Defense against the Black Arts - Honest (e-book)



Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It

File type: PDF

Size: 11,5 MB

Number of Pages: 396

===



Description:

===


This guide to common computer hacking techniques and defenses against them provides a detailed exploration of how computers are compromised and explains multi-level resources for protecting information and infrastructures. The volume covers hacking the Microsoft Windows operating system, hacking and manipulating websites, monitoring and capturing network traffic, wireless hacking and software and tools. A small section on hacking Apple Mac operating systems is also included. Chapters include numerous illustrations, screenshots and step-by-step instructions. The authors are computer security professionals working in both governmental and private institution

===

How to use:

* Open with any PDF reader

Downlaod     Defense against the Black Arts - Honest   (e-book)





Computeractive Issue (e-book)


Description

Computeractive Issue 432 - 2014 UK

76 Pages | True PDF | English | 16 MB

The objective of Computeractive is to provide 'Simple Clear Advice In Plain English' on all matters of technology. Computeractive writes about technology issues facing general readers in their day to day life. From buying advice on computers, mobile phones, cameras etc. to increasing productivity on Microsoft Windows to troubleshooting computers and laptops.




Downlaod     Computeractive Issue 432 - 2014 UK.pdf


Android Magazine (UK) (e-book)





Description

Android Magazine Issue 45 - 2014 UK

100 Pages | True PDF | English | 22 MB

Whether you’re a beginner wanting to get up to speed or an advanced user looking for tips, tricks and hacks Android Magazine is the ultimate guide to cutting-edge mobile and tablet technology.





Android Magazine (UK) .pdf      20 M


                             

Hacking Secrets Revealed (e-book)



Hacking Secrets Revealed (e-book)

Step by Step Guide to Learn Hacking in 10 days!

  Table of Contents




























Hacking Secrets Revealed (e-book) .pdf

                                      


Tuesday, February 3, 2015

GTA 3 Android

                         



The sprawling crime epic that changed open-world games forever.

Welcome to Liberty City. Where it all began.

Rockstar Games celebrates the 10th anniversary of one of the most influential games of all time. The critically acclaimed blockbuster Grand Theft Auto III comes to mobile devices, bringing to life the dark and seedy underworld of Liberty City. With a massive and diverse open world, a wild cast of characters from every walk of life and the freedom to explore at will, Grand Theft Auto III puts the dark, intriguing and ruthless world of crime at your fingertips.

With stellar voice acting, a darkly comic storyline, a stunning soundtrack and revolutionary open-world gameplay, Grand Theft Auto III is the game that defined the open world genre for a generation.

Features:
• Visually stunning updated graphics, character and vehicle models
• HD quality resolution
• Gameplay optimized for touch screen devices
• Custom controls for the mobile platform
• Countless hours of gameplay
• Gamepad Support for select USB controllers
• Integrated with Immersion Haptic Vibration Feedback
• Tailor your visual experience with new video display settings

Languages Supported: English, French, Italian, German, Spanish & Japanese.

Grand Theft Auto III 10 Year Anniversary Edition is now available on:
• Android Phones: Galaxy Nexus, HTC Rezound, LG Optimus 2x, Motorola Atrix 4G, Motorola Droid X2, Motorola Droid Bionic, Motorola Photon 4G, Samsung Galaxy R, Samsung Galaxy S2, Sony Ericsson Xperia Play, T-Mobile G2x
• Android Tablets: Acer Iconia, Asus Eee Pad Transformer, Asus Eee Pad Transformer Prime, Dell Streak 7, LG Optimus Pad, Medion Lifetab, Motorola Xoom, Samsung Galaxy Tab 8.9 and 10.1, Sony Tablet S, Toshiba Thrive

For optimal performance, we recommend re-booting your device after downloading and closing other applications when playing Grand Theft Auto III: 10 Year Anniversary Edition.

Please ensure you have at least 1GB of free space before installing Grand Theft Auto III: 10 Year Anniversary Edition.













Download APK >>          Grand Theft Auto III v1.4.apk 10 Mb


                                                       







Download SD Data  >>    SD DATA.rar 587 Mb Extracted 'com.rockstar.gta3' 1.2 G


                                                     






Grand Theft Auto III v1.4




Instructions :

Install APK

extract rar

Copy 'com.rockstar.gta3' folder to 'sdcard/Android/obb'

Launch the Game


ENJOY









Saturday, January 31, 2015

Accessing Databases with Object-Oriented PHP Tutorial



- 01. Introduction


 01_01-Welcome 

 01_02-What you should know before watching this course


01_03-Using the exercise files


01_04-Setting SQLite permissions


01_05-A quick primer on using PHP objects



 Downlaod >> 01. Introduction :  Password For 7zip is AlbDll.com


-----------------------------------------------------------


- 02. Why Use Object-Oriented PHP to Access a Database 

02_01-Overview of PHP database APIs


02_02-Using prepared statements



02_03-Using transactions


 Downlaod >> 02. Why Use Object-Oriented PHP to Access a Database  :  Password For 7zip is AlbDll.com

-----------------------------------------------------------

- 03. PHP Data Object (PDO) Basics

03_01-Creating a database source name


03_02-Connecting to a database with PDO


03_03-Looping directly over a SELECT query


03_04-Fetching a result set


03_05-Finding the number of results from a SELECT query


03_06-Checking if a SELECT query contains results


03_07-Executing simple non-SELECT queries


03_08-Getting error messages


03_09-Using the quote() method to sanitize user input


 Downlaod >> 03. PHP Data Object (PDO) Basics :  Password For 7zip is AlbDll.com

-----------------------------------------------------------

- 04. PDO-Prepared Statements and Transactions
04_01-Binding input and output values


04_02-Using named parameters


04_03-Using question marks as anonymous placeholders


04_04-Passing an array of values to the execute() method


04_05-Binding results to variables


04_06-Executing a transaction



04_07-Closing the cursor before running another query


 Downlaod >> 04. PDO-Prepared Statements and Transactions Password For 7zip is AlbDll.com


-----------------------------------------------------------

- 05. Advanced PDO Fetch Methods

05_01-Generating an array from a pair of columns


05_02-Setting an existing object`s properties with a database result


05_03-Creating an instance of a specific class with a database result


05_04-Reusing a result set




 Downlaod >> 05. Advanced PDO Fetch Methods Password For 7zip is AlbDll.com

-----------------------------------------------------------

- 06. MySQL Improved Basics

06_01-Connecting to a database with MySQLi


06_02-Setting the character set


06_03-Submitting a SELECT query and getting the number of results


06_04-Fetching the result


06_05-Rewinding the result for reuse


06_06-Handling non-SELECT queries


06_07-Getting error messages



06_08-Sanitizing user input with real_escape_string()




 Downlaod >> 06. MySQL Improved Basics Password For 7zip is AlbDll.com

-----------------------------------------------------------


- 07. MySQLi Prepared Statements and Transactions


07_01-Initializing and preparing a statement


07_02-Binding parameters and executing a prepared statement


07_03-Binding output variables


07_04-Executing a MySQLi transaction



07_05-Dealing with commands out of sync in prepared statements



 Downlaod >>07. MySQLi Prepared Statements and Transactions Password For 7zip is AlbDll.com

-----------------------------------------------------------


- 08. Diving Deeper into MySQLi

08_01-Buffered and unbuffered queries 



08_02-Using real_query() 




08_03-Freeing resources that are no longer needed



08_04-Submitting multiple queries 



08_05-Creating an instance of a class from a result set 


 Downlaod >>08. Diving Deeper into MySQLi Password For 7zip is AlbDll.com

-----------------------------------------------------------

- 09. Conclusion


09_01-PDO and MySQLi compared

 Downlaod >>09. Conclusion Password For 7zip is AlbDll.com


-----------------------------------------------------------


 -  Exercise Files
 Downlaod >> -  Exercise Files Password For 7zip is AlbDll.com



-----------------------------------------------------------



 Downlaod All Pacpage >> Accessing Databases with Object-Oriented PHP Tutorial Password For 7zip is AlbDll.com     (If you have error to extract with wirar ,extract with 7zip is Good)