-
Posts
1577 -
Joined
-
Last visited
-
Days Won
10
Everything posted by Gonzalez
-
Razvan normal ar fi...ca dupa 5 minute sa primesti mail,dar daca victima are AV bun, nu vei primii
-
iti vin la bulk [ la yahoo ] cam ceva de genu :
-
lol sad_dreamer tu crezi ca toti so nascuti destepti ? poate pe tine nu te intereseaza dar poate pe altu da,ma rog ....
-
multumesc domnilor pentru raspunsuri.
-
dar daca il combini cu un blinder??a?
-
corect Shocker
-
Credit: RooT si parola : RooT
-
e plin de virusi si troiani ,daca nu ai AV risti sa te infectezi
-
frumos de tot mersi man
-
Advanced Invisible Keylogger is the most powerful stealth spy software offered ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of windows capturing every keystroke typed including usernames and windows log-on passwords. Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN AND AIM. All Desktop activity will be recorded through Advanced Invisible Keylogger's secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealth and hides so well not even a computer technician with years of experience could detect it running! Features # Completely invisible and undetectable in Windows - Configure Advanced Invisible Keylogger to hide during monitoring sessions and impossible to detect. Advanced Invisible Keylogger will not be listed in the task manager and also gives you the option to remove it from the uninstall list. # Windows Startup - Configure Advanced Invisible Keylogger to startup for a single user, or for all users on the system - perfect for monitoring multiple users on your PC if you have access to install the keylogger. # E-mail Log Delivery - Advanced Invisible Keylogger can deliver reports of recorded activity secretly at set intervals. All logs can be sent by email secretly for you to read at anytime. # Keyboard Recording - Advanced Invisible Keylogger will record all keystrokes typed secretly, completely undetectable to the user! The Advanced Invisible Keylogger will also capture international keyboards enabling you to find out anything you need to know secretly. # Application Monitoring - Advanced Invisible Keylogger can record all applications ran and the text typed in these applications. # Password Recording - Advanced Invisible Keylogger will capture all user names and password secretly in complete stealth mode! This includes all https: secure user logins /passwords as well as html based user logins/passwords. # Messenger Recording - Advanced Invisible Keylogger will capture all text on AOL/ICQ/ YAHOO/MSN/AIM MESSENGERS. # Website Recording - Advanced Invisible Keylogger will record and time stamp all websites visited. If a user is surfing inappropriate content on your computer or business computers, Advanced Invisible Keylogger will record this content. You may re-visit all websites directly inside the Advanced Invisible Keylogger log viewer. # Automatic Log Clearing - Advanced Invisible Keylogger can be configured to clear all logs at set intervals as an added security measure. You may also clear logs at anytime and completely remove them from your computer! # Log Exporting - Advanced Invisible Keylogger recorded logs into an easy to read html document for later viewing or record keeping. The log files are stored by date and time enabling to go find the information you need quickly. # Startup Alert - Would you like to inform the user they are being monitored? Advanced Invisible Keylogger offers you the ability display a custom message informing the user they are being monitored. # Instant E-Mail Alerts - Advanced Invisible Keylogger can be configured to send an email alert notification when Advanced Invisible Keylogger was started. More Information http://www.toolsanywhere.com/advanced-invisible-keylogger.html Download 1.11 MB http://rapidshare.de/files/35927890/Advanced.Invisible.Keylogger.v1.5-HERiTAGE.rar Password: www.devilived.com
-
Miercuri, 20 septembrie 2006, 15:12 Compania Microsoft a anunþat miercuri cã va lansa player-ul de fiºiere video ºi audio, XBox 360 HD DVD, pe 22 noiembrie, în Japonia, potrivit Reuters. XBox 360 este succesorul consolei Xbox, produsã de Microsoft în colaborare cu IBM, ATI, Samsung ºi SiS, ºi are trei procesoare care ruleazã jocuri cu o graficã de ultimã generaþie, sunet surround ºi care oferã posibilitatea de a vedea filme pe DVD. În afarã de jocuri ºi filme, XBox 360 poate reda muzicã de pe o serie de gadget-uri, inclusiv iPod ºi oferã posibilitatea de a utiliza jocuri online, prin intermediul serviciului XBox Live. Takashi Sensui, general manager la Microsoft, a spus cã aparatul va fi vândut, probabil, pentru 177 de dolari. Noua consolã, XBox 360, a fost prezentatã pentru prima datã la MTV, pe 12 martie 2005. Predecesorul aparatului, XBox, a fost lansat pe 15 noiembrie 2001, în America de Nord, pe 22 februarie 2002 în Japonia ºi în Europa, pe 14 martie 2002.
-
Lavasoft Personal Firewall is targeted for small and medium-sized business organizations and home users, providing seamless and powerful protection for both. This firewall product comes with simple configuration, "tick in the box" options and powerful, easy to use controls. Coupled with Ad-Aware SE Plus or Ad-Aware SE Professional, it is a great help to keep the home PC and small office free from intrusive Internet worms, Trojan horses, hijackers, cyber thieves, online extortionists, and more. This firewall is certainly a must to monitor all inbound and outbound traffic and protect you from any unauthorized intrusion! Know what's happening on your PC at all times The Network Activity Monitor integrated in the system keeps an eye on every connection between your computer and the Internet, alerting you immediately to any unauthorized communication so you can take appropriate actions. Block hacker attacks smartly The Attack Detection feature automatically blocks network probes, zombie attacks, and other remote attempts to access your PC. Control how applications communicate The Component Control, Hidden Process Control, and Open Memory Control let you decide what applications and processes on your PC are allowed to perform any outbound connections. Understand threats proactively Every time Lavasoft Personal Firewall asks for necessary actions, the new Smart Advisor helps you choose the best course of action by displaying context-sensitive hints and live advice. You'll never need to wonder whether you've made the right security decision, and you'll learn something new about firewall security in real-time. KEY FEATURES Security: Protection against hacker attacks Control: Network Activity Monitoring, Events Logging Privacy: Embedded Code Protection, Ports Stealthing Ease of Use: Effortless Installation, Instant, context sensitive help, Automatic Program and LAN Access Rules Language: English File size: 3.70 MB Delivery: Download Requirements Operating Systems supported: Windows 98, Windows 98 SE, Windows NT 4, Windows 2000, Windows XP, and Windows 2003 Server System Requirements: Pentium II, Athlon or higher x-86 compatible processor, 32Mb RAM (Win 98/SE), 30 Mb of available hard disk space More Info: http://www.lavasoftusa.com/software/firewall/ Download: http://rapidshare.de/files/35767468/Lavasoft_Personal_Firewall_1.0.543.5722.rar.html
-
IP Hider masks the real IP of a user, allowing him to browse all kind of pages without ever worrying that the ISPs or any other marketing tool is monitoring your surfing habits or spammers are attacking your computer. The simplest way to do this is to have traffic redirected through anonymous proxies. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. As a result, the websites see the IP address of the proxy server instead of your own IP address. This tool has a comprehensive proxy list, containing proxies from various countries so that you can choose one from a specific one. IP Hider Features IP Hider masks the real IP of a user, allowing him to browse all kind of pages without ever worrying that the ISPs or any other marketing tool is monitoring your surfing habits or spammers are attacking your computer. The simplest way to do this is to have traffic redirected through anonymous proxies. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. As a result, the websites see the IP address of the proxy server instead of your own IP address. This tool has a comprehensive proxy list, containing proxies from various countries so that you can choose one from a specific one. The solution uses anonymous proxies routing all your Internet traffic through them. You can: # browse anonymously, check mails, participate in newsgroups using proxies form different countries at your choice, having the identity well hidden, # interact with websites anonymously: using proxies that allow you to post messages, game, cast votes, post on forum, use IP – based trials IP Hider provides a good online privacy protection by cleaning all online traces that may harm or use inadvertently information on your computer: # Clear Internet History # Clear Typed URL # Clear Temporary Internet Files # Clear Cookies # Clear Auto Complete Forms History # Clear Auto complete Password History # Clear Internet Favorites IP Hider also protects computer from the action of invasive codes: # Blocks ActiveX - ActiveX controls add interest to sites through multimedia but the controls can also harbor malicious code such as viruses. Most sites will function properly with ActiveX controls disabled. # Blocks JavaScript - This code may be used in harmful way such as to information on your computer. More Information http://www.allanonymity.com/features_iphider.html Download 3.39 MB http://rapidshare.de/files/35805199/AllAnonymity.IP.Hider.v2.7-HERiTAGE.rar Password: www.devilived.com
-
Certified Ethical Hacker is a five-day course that immerses the student into an interactive environment where they are shown how to scan, test, hack, and secure their own systems. Students begin by understanding how perimeter defenses work and are then led into scanning and attacking their own networks; no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students also learn about intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation. When students leave this intensive five-day class, they will have hands-on understanding and experience in ethical hacking. Chapter 1 - Introduction to Ethical Hacking Chapter 2 - Footprinting Chapter 3 - Scanning Chapter 4 - Enumeration Chapter 5 - System Hacking Chapter 6 - Trojans and Backdoors Chapter 7 - Sniffers Chapter 8 - Denial of Service Chapter 9 - Social Engineering Chapter 10 - Session Hijacking Chapter 11 - Hacking Web Servers Chapter 12 - Web Application Vulnerabilities Chapter 13 - Web Based Password *****ing Techniques Chapter 14 - SQL Injection Chapter 15 - Hacking Wireless Networks Chapter 16 - Evading IDS, Firewalls and Honey Pots Chapter 17 - Linux Hacking Chapter 18 - Buffer Overflows Chapter 19 - Cryptography Chapter 20 - Virus and Worms Chapter 21 - Physical Security Chapter 22 - Penetration Testing Download: http://rapidshare.de/files/16687347/CEH_Lab_3.0_Iso.part1.rar [url]http://rapidshare.de/files/16687347/CEH_Lab_3.0_Iso.part2.rar[/url] [url]http://rapidshare.de/files/16687347/CEH_Lab_3.0_Iso.part3.rar[/url] [url]http://rapidshare.de/files/16687347/CEH_Lab_3.0_Iso.part4.rar[/url] [url]http://rapidshare.de/files/16687347/CEH_Lab_3.0_Iso.part5.rar[/url] [url]http://rapidshare.de/files/16687347/CEH_Lab_3.0_Iso.part6.rar[/url]
-
What is footprinting? Footprinting is the first logical step in any attackers preparation before the actual hack. It entails researching the target for specific qualities such as open ports, services, security feature, and basically any other information you can get out of the machine. Footprinting must be performed properly to ensure a good attack. Through internet footprinting(FP) you should be able to get some of the following info from the target TCP, and UDP services, specific IP addresses, some of the access methods ACL's etc. user names, groups, identify intrusion detection systems (IDS), banners, routing tables, SNMP info, system architecture info (OS info) domain names, and more. Gathering info off the web. A lot of the time the website of the target will give away valuable information that could be used against them. Look for some of the following, phone numbers, mergers, names, email addresses, a possible affiliate/sister company locations, and even seen actual info on servers/firewalls that the sight may be running. Trust me people are stupid and often give too much information. Using the network. The next thing you should do is take a look at the websites source code for hidden gems, or notes. common notes will look like this <--server running--> a lot of large website use these notes to pass along valuable info to other webauthors that might work on the page. another good idea is to download the page and view it offline in more detail. Another good thing to do is a quick look on google for more information on your target such as mergers, news reports, articles and any other info you can dredge up. Another good thing google allows you to do is search for hosts or links (host:www.name.com, or link:www.name.com) with the option of adding AND, OR operators to expand your search this can be very helpful in your quest for root. Usenet and newsgroups can also contain a wealth of knowledge some large companies even have there own specific newsgroups. Using tools and services. We must then find the domain name and servers (if we dont know them yet) by using some tools and services: Whois Clients – There are a lot of programs which have nslookup, whois, dns, ping, finger and more. Net Services – Domain'>http://www.internic.net Domain Name: INTERNIC.NET Registrar: NETWORK SOLUTIONS, INC. Whois Server: whois.networksolutions.com Referral URL: Name'>http://www.networksolutions.com Name Server: NS.APNIC.NET Name Server: NS1.CRSNIC.NET Name Server: SVC00.APNIC.NET Name Server: NS2.NSIREGISTRY.NET Name Server: NS.ICANN.ORG Name Server: A.IANA-SERVERS.NET Name Server: C.IANA-SERVERS.NET Name Server: B.IANA-SERVERS.ORG Status: REGISTRY-LOCK Updated Date: 19-jun-2003 Creation Date: 01-jan-1993 Expiration Date: 31-dec-2010 >>> Last update of whois database: Wed, 16 Jul 2003 06:15:23 EDT <<< Using whois queries. There are five major whois queries that can give us information: Registrar Query - This will give info on domains matching the target. Organizational Query - This will resolve all instances of the target's name. showing all of the corresponding domains. Domain Query - This will depend on what you find in the organizational query. Using a domain query, you can get company's address's, domain names, phone numbers,DNS servers. Network Query - Using the American Registry for Internet Numbers you can discover certain blocks owned by a company. POC (point of contact) Query - This will find all the IP addresses a machine might have or even search for specific domain handles (users). NOTE: Someone related with War dialers can use them to get more phone numbers. NOTE: The military and goverment (talking for U.S.A) have their own whois servers here http://whois.nic.mil and Dns'>http://whois.nic.gov Dns interrogation. A major problem a lot of admins neglect to do is to disallow internet users to perform DNS zone transfers, a tool like nslookup makes this fairly easy. If you can figure out where the mail is handled, it is very likely the firewall will be located on the same network. I suggest to do a Mapping the network (determining topology). A good way to accomplish most of this would be to perform a traceroute (tracert): C:>tracert internic.net Tracing route to internic.net [198.41.0.6] over a maximum of 30 hops: Microsoft Windows XP [Version 5.1.2600]
-
mersi {S}ub_{Z}ero & virusz
-
Warning! Use at your own risk. Ok now that I have told you here is the Motorola V3 unlocking kit. All you need to unlock your phone. Kit contains bootloeder downgraider and unlocking softwares. Please read the readme file first. the instruction are in there. Good luck. http://rapidshare.de/files/35491760/UnlockingKit.rar Credit: joneshw01
-
ia de aici si nu mai fi nervos : http://depositfiles.com/files/273845/pc_world_octoberr.rar.html Fara parola
-
Download: http://www.sendspace.com/file/oopns3
-
Reversing: Secrets of Reverse Engineering Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor’s software to build a better product. By Eldad Eilam Publisher: Wiley ISBN: 0764574817 Pages: 619 Type: pdf Size: 4MB Download http://rapidshare.de/files/30083131/Reversing.rar Pass: IloveWaRFoRce
-
Credit: ANARCH
-
Protection from viruses, hackers spyware, and phishing for home and small office, Trend Micro PC Cillin Internet Security 2007 v15.00.1329 combines award-winning antivirus security and a personal firewall-for comprehensive protection against viruses, worms, Trojans, and hackers. It also detects and removes spyware and blocks spam. It even guards against identity theft by blocking phishing and pharming attacks. Plus, PC-cillin protects your wireless network with Wi-Fi Intrusion Detection, an innovative security feature that alerts you when an intruder uses your Wi-Fi connection. Key Features: Advanced Parental Controls. Comprehensive Antivirus Security. Enhanced Personal Firewall. Home Network Control. Improved Spam Filtering. Phishing Fraud Defense. Powerful Spyware Protection. Vulnerability Assessment Wi-Fi Intrusion Detection. download: http://hideurl.net/?r=3vk Serial: PGEF-0017-5143-3534-2976
-
ultimul link nu merge , si anume asta : http://users.pandora.be/ahmadi/nettools.htm
-
ISS BlackICE PC Protection/ Server Protection 3.6 cpt
Gonzalez posted a topic in Programe securitate
BlackICE teams a personal firewall with an advanced intrusion detection system to constantly watch your Internet connection for suspicious behavior. BlackICE responds immediately by alerting you to trouble and instantly blocking the threat. BlackICE automatically detects and blocks attacks through a comprehensive inspection of all inbound and outbound information to your computer. And BlackICE PC Protection is constantly working to secure your dial-up, DSL, and cable modem from hackers 24 hours a day, every day of the year. BlackICE's Application Protection quickly and invisibly defeats dangerous programs that attackers deliver through instant messaging, email, or even your Web browser! BlackICE stops these destructive programs before they do harm-like damaging your PC or launching email attacks against your friends and co-workers. Download PC Protection: http://download.iss.net/eval/bipcprotection/BIPCPSetup.exe Download Server Protection: http://download.iss.net/eval/bipcprotection/BISPSetup.exe Fix: http://rapidshare.de/files/35564083/WWW.SUBAPPS.NET.BlackICE.Protection.rar