-
Posts
1376 -
Joined
-
Last visited
-
Days Won
17
Everything posted by ZeroCold
-
Twitter Marketing Software With Results Even Without Followers!* Drive thousands of real human traffic a day even without followers* Get results even without followers* Build thousands of followers without worrying on API limits* Send direct messages to your followers in a push of a button* Post and schedule thousands of tweets without worrying on API limits* Reply on thousands of users looking for your offers on autopilot* The very first twitter marketing software that DOES NOT USE THE API* With advance inteliggence to determine real people* Use unlimited number of accounts* NO Monthly Fees* FREE updates for life* The most complete and powerful Twitter Software Available Download: [URL="http://www.fileserve.com/file/Qbqr2X9"]Free File Hosting, Online Storage & File Upload with FileServe[/URL] // Ce postasem initial era fake, am pus o alta versiune ca sa nu la topicul gol. // Nu am descarcat, nu am testat. // Nu e link-ul meu, aveti sursa aici.
-
Super! Odata si odata trebuia sa se faca un update. Deocamdata nu am nimic de comentat Pt designeri am o rugaminte (daca tineti la ochii mei ) faceti o tema inchisa la culoare, cat mai simpla, (de ex la tema default daca ii puteti inlocui culorile de la ambient e super ok). Sau tema veche, sa o adaptati... Daca aveti nevoie de ajutorul meu, design/codding va stau la dispozitie
-
Tekpub - Hacking WebMatrix (2011) English | flv yuv420p 852x480 23.98 fps | MP3 44100Hz 128 kb/s Stereo | 1018 MB In this short production Rob Conery hacks into Microsoft's "Scripter Framework" and builds the foundations of a dynamic Web Framework using C # 4, Razor, and Microsoft Web Pages. Along the way you can see how Massive was built, along with Manatee (simple Migration framework) and Quixote (high-level testing framework). Content 1 - What Do We Have To Work With Here? In this Episode Rob Takes a Look at the core of WebMatrix Functionality - the Good stuff as well as the Bad - and discusses the Road Ahead. 2 - Cleaning Things Up, Making It Sweeter In this episode Rob cleans up the "out of the box" experience using some conventions borrowed from Rails, then drops in his "Sugar" library from SubSonic to make working with C # 4 a little more fun. 3 - Data Access with Massive In this episode Rob dives into using System.Dynamic - a new feature in C # 4 - with everyone 'favorite part of application development: Data Access. Along the way Rob spawns a new movement in. NET data access - the Micro ORM. 4 - Layouts and URLs In this Episode Rob DIVES INTO the flexxible Friendly Layouts and built-in to Microsoft Web Pages and WebMatrix. Topics include Layouts, Sections, Page Start and AppStart - and once again System.Dynamics. 5 - Migrations with Manatee In this Episode Rob Takes on Migrations - a feature That is the Cornerstone of Building out your Database in Rails. Borrowing just about every concept from that framework, Rob turns JSON and System.Dynamic into a flexible database schema builder. 6 - High Level Testing With Quixote In this Episode Rob fixes up a glaring Hole in the WebMatrix Story: Lack of the Testing. Quixote was created in this episode and is a high-level testing / acceptance framework built on Razor and, yes, System.Dynamic. It's also one page coming in at less than 500 lines of code. Download: http://www.filesonic.com/folder/15882295
-
Coding for Penetration Testers: Building Better Tools Syngress (10-2011) | PDF | 320 pages | 1597497290 | 9.9Mb Coding for Penetration Testers: Building Better Tools /by Jason Andress and Ryan Linn. Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. Coding for Penetration Testers provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the reader through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the reader is guided through real world scenarios and tool development that can be incorporated into a testers toolkit. Discusses the use of various scripting languages in penetration testing Presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages Provides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation Download: http://www.filesonic.com/file/4017767383 Mirror: http://filepost.com/files/c5cada95/1597497290Coding.pdf/
- 1 reply
-
- 1
-
Respectul nu se impune, se castiga! Daca vreti sa schimbati ceva, vedeti-va de treaba, purati-va civilizat, dati un exemplu celorlalti. Totusi, va sustin. Succes! @wildchild, relax... il doare fix in cur daca il injuri sau nu, ignora-l pur si simplu (trage un fum, bea o bere... da-l in masa)
-
E ok. Am dat vreo 28$ pe 3 ani Mersi!
-
Oricat de bine organizat ai fi si cat de bun esti, odata si odata tot cazi. (vorbesc la general) off: uitati-va la filmul Takers (2010) sa vedeti ce inseamna organizare Cel mai important lucru e sa stii sa te opresti la timp. ___ e 2011, hacker = persoana care foloseste pc-ul la altceva in afara de jocuri, mess, site-urile de socializare si cele porno.
-
SECURITATEA SISTEMELOR INFORMATICE note de curs si aplicatii pentru studentii Facultatii de Inginerie POPA SORIN EUGE PDF: http://ti.stupizii.ro/an3/sem2_securitatea-sistemelor-informatice/Curs_SSI_fara-parola.pdf
-
Credits: T0X1CV1RU5 @HF NOTES: 1) This is my 1st Tutorial so please don't flame.. :non: 2) I'm not that good in English but I will do my best to make this tutorial understandable 3) In this method, you need to add your slave as a friend or else you will not be able to Post on his wall, Comment and Message him. 4) By doing this method, Facebook can block you from posting comments and wallposts, so I suggest use a dummy account or use this with care and limitation. THINGS WE NEED: 1) A Facebook Account and a slave (of course) 2) Auto-Clicker (In this tutorial we will use Auto Clicker v2.2 by Shocker) Download: You can download it at the Official Site Virus Scan Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org File Info Report date: 2010-12-21 15:48:31 (GMT 1) File name: autoclicker-exe File size: 376320 bytes MD5 Hash: 046b89cf26dd4e1629a72f04825fde3a SHA1 Hash: b7051c0a92e5ec53e61f7c0cca262dfb5ea5a118 Detection rate: 8 on 16 (50%) Status: INFECTED Detections a-squared - Trojan-Dropper.Win32.Mudrop!IK Avast - AVG - Avira AntiVir - BitDefender - ClamAV - Comodo - UnclassifiedMalware Dr.Web - Trojan.MulDrop1.46671 F-PROT6 - W32/MalwareS.ABKA Ikarus T3 - Trojan-Dropper.Win32.Mudrop Kaspersky - NOD32 - Win32/TrojanDropper.MultiDropper.CAKFPQU Panda - TrendMicro - VBA32 - Trojan-Dropper.Win32.Mudrop.fsk VirusBuster - Trojan.DR.Mudrop!HI1EdFfyIkQ Scan report generated by NoVirusThanks.orgNOTE: Detections are false positives. If you don't trust me you can run it sandboxed. 3) The most important is BRAIN and COMMON SENSE :whistle::victoire: INSTRUCTIONS: 1) Login to your Facebook account. Then after logging in, open another tab/window then go to "m.facebook.com" (without quotes) 2) Go to friends, then type your slave's name then click Search. Now go to your slave's profile. 3) Now for the third step, I will cut this into 3 parts, Wallpost Flood, Comment Flood and Messaging Flood. -Wallpost Flood- 1) Open Auto Clicker. Change the "Number of Clicks" to "9999". NOTE: Leave all the settings as it is exept the "Number of Clicks". 2) Put your comment on the textbox. Then press F2. NOTE: Don't put your cursor on the "Post" button yet. Just place it in a blank space. Now after pressing F2, you will see the countdown of the Auto-Clicker at your taskbar.*see picture. Autoclicker Countdown 3) Now after you saw the progress of click at the taskbar (see picture) place your cursor on the "Post" button. 4) Now leave your cursor on the "Post" button while the Auto-Clicker runs. Leave it for atleast a minute. 5) Finished. You've just flooded his Wall. -Comment Flood- NOTE: In this tutorial we will Comment Flood a profile picture. But you can also use Comment Flooding in Wallposts and other posts/pics/vids that can be commented on. Just use your common sense on how to do it. 1) Open Auto Clicker. Change the "Number of Clicks" to "9999". NOTE: Leave all the settings as it is exept the "Number of Clicks". 2) Click your slave's profile picture. 3) Pick a photo you want to comment on. (You can use Next and Previous Button to Navigate to his other Profile Pics.) 4) Put your comment on the textbox. Then press F2. NOTE: Don't put your cursor on the "Comment" button yet. Just place it in a blank space. Now after pressing F2, you will see the countdown of the Auto-Clicker at your taskbar.*see picture. Autoclicker Countdown 5) Now after you saw the progress of click at the taskbar (see picture) place your cursor on the "Comment" button. 6) Now leave your cursor on the "Comment" button while the Auto-Clicker runs. Leave it for atleast a minute. 7) Finished. You've just comment flooded a profile picture of your slave -Message Flood- 1) Open Auto Clicker. Change the "Number of Clicks" to "9999". NOTE: Leave all the settings as it is exept the "Number of Clicks". 2) Click "Messages" beside his profile picture. 3) Put anything in the "Subject" and "Body Message". 4) Then press F2. NOTE: Don't put your cursor on the "Send" button yet. Just place it in a blank space. Now after pressing F2, you will see the countdown of the Auto-Clicker at your taskbar.*see picture. Autoclicker Countdown 5) Now after you saw the progress of click at the taskbar (see picture) place your cursor on the "Send" button. 6) Now leave your cursor on the "Send" button while the Auto-Clicker runs. Leave it for atleast a minute. 7) Finished! You've just flooded an Inbox of your slave. FINISHED If you noticed, they are all the same concept on how to flood. I've just cut it into 3 parts to make your life easier If you're planning to use a specific flood. Hope you liked my tutorial. Thank you for reading! Credits: T0X1CV1RU5 @HF
- 1 reply
-
- 2
-
Fake name generator Link: Generate a Random Name - Fake Name Generator
-
Moudi Crypter Latest release v1.3 beta1 Oct 15th 1 on 9 detec. rate
ZeroCold replied to spider's topic in Programe hacking
Daca l-ai luat dintr-un loc public, care il gasesti usor pe google, de ce il mai dai prin pm? (daca era fud, privat, sau munca ta, da... dar in cazul asta nu vad rostul) Macar pune-i alt titlu... #Sursa: http://www.hackforums.net/archive/index.php/thread-1793050-1.html (intrati cu alt ip daca nu va merge cel de ro) #Download: Download Moudi_Crypter_1.3___beta_1.exe for free on Filesonic.com -
Il vreau si eu. Mersi!
-
ZennoPoster program was developed for webmasters and people involved in vigorous activity on the Internet. Our program is able to repeat your actions on multiple Internet resources (filling in forms, clicks on links) in several dozen of streams (Professional Version), and also provides anonymity through a proxy, which are processed by our powerful proxychecker. Sales page: http://zennolab.com/en/buy-it-now/version-comparison/ Download link: http://www.sendspace.com/file/z94gop Nu l-am testat, rulati in vmware.
-
Programarea orientata pe obiecte: C++ si Visual C++ PDF online: http://ti.stupizii.ro/an2/sem2-programarea-orientata-pe-obiecte/Programare%20Orientata%20pe%20Obiecte.pdf
-
cand pune mana pe oglinda sa-l futa-n cur cu clanta. Faci ceva de genu: Ce am desenat eu cu negru e prea mare, ceva mai finut, sa nu strice aspetul... Atasezi chestia aia metalica ca si cum ar tine oglinda sa nu pice, nus daca intelegi, sa arata ca un fel de izolare/sprijin/.... nus cum sa ii zic. Sau iti pui un abtibild care sa arate ca si cum oglinda ar fi sparta ) Nimanui nu ii trebuie ceva stricat... Nu cunosc, mi-am dat si eu cu parerea.
-
Screenshot: Download: http://www.megaupload.com/?d=4I44ESTX http://www.mediafire.com/?inbmljyrmnh http://fil.hosten.se/?download=Wordpress+Bot.zip Others Things to Know: Well this tool don't bypass akismet (Anti-Spam Of Wordpress) then there is some rules to follow for get more posted comments 1- No short Comments as "Nice Article","Amazine Blog","Thanks For Share" they are all detected from Akismet 2- No standard URL's in the Comment like "http://www.domain.com/" Best way is use URL's like : "hxxp://domain[com]" 3- Rotate your comments, just a word changled can goes well like "Realy good forum that helped me alot is : hxxp://domain[com]" "Fantastic forum that helped me alot is : hxxp://domain[com]" "Fantastic forum who helped me alot is : hxxp://domain[com]" "Incredible forum that helped me very much is : hxxp://domain[com]" 4- If you use Pubblic Proxies (such as those from the program) the best is use only the Elite One or don't even use proxies. with out use proxies akismet will ban you IP after 30/40 posts 5- I suggest to don't use others internet's things, Akismet detect it too 6- Don't use My texts Examples like Names, Emails i post over 1000 post with they're probably banned Follow this simple rules and you will get alot of more success posts. Virus Scan: http://www.virustotal.com/en/analisis/94a9d48c21c47a3763b54217e2508780f51d20b37514cc15e3dfd4f00ffe0350-1275465604File Tua_Mamma.exe received on 2010.06.02 08:00:04 (UTC) Current status: finished Result: 0/41 (0.00%)
-
Felicitari baieti! Sunt sigur ca o sa va descurcati bine
-
HTML: Comprehensive Concepts and Techniques, 5 edition HTML: Comprehensive Concepts and Techniques, 5 edition by Gary B. Shelly HTML: Comprehensive Concepts and Techniques, 5 edition by Gary B. Shelly, Denise M. Woods, William J. Dorin 2008 | ISBN: 1423927222 | 608 pages | PDF | 55 MB Download: http://www.filefactory.com/file/c223212/n/102711.BO.1423927222_(1).rar Mirror: http://www.filesonic.com/file/2854766385/102711.BO.1423927222_(1).rar
-
- 1
-
Files: Cisco Networking Academy Program – CCNA Semester 1 Networking Basics v3.1.1.iso 152 MB Cisco Networking Academy Program – CCNA Semester 2 Routers And Routing Basics v3.1.1.iso 170 MB Cisco Networking Academy Program – CCNA Semester 3 Switching Basic And Intermediate Routing v3.1.1.iso 135 MB Cisco Networking Academy Program – CCNA Semester 4 Wan Technologies V3.1.1.iso 116 MB cisco Networking Academy Program – CCNP Remote Acces = [BCRAN] 642-821 Version 3.1.iso 155 MB Cisco Networking Academy Program – CCNP Advanced Routing = [BSCI] 642-801 Version 3.1.iso 143 MB CIsco Networking Academy Program – CCNP Multilayer Switching = [BCMSN] 642-811 Version 4.0.iso 115 MB Cisco Networking Academy Program – CCNP Network Troubleshooting = [CIT] 642-831 Version 4.0.iso 110 MB Download 1: https://rs959tl3.rapidshare.com/#!download|959l3|363601026|heo8x_CiscoNetworking_AcademyProgram_CCNACCNP_SPVN.part1.rar|208666|R~C540AE63463214C92C0155512C41222A|0|0 Download 2: https://rs859l34.rapidshare.com/#!download|859tl|363600601|heo8x_CiscoNetworking_AcademyProgram_CCNACCNP_SPVN.part2.rar|23674|R~C656B0C44D71960ACF3AFAE097711F55|0|0 Sursa: Cisco Networking Academy Program CCNA CCNP | ScriptLeech [dot] com $.cei care vor sa ajute, postati mirrors ca sa ramana cat mai mult.
-
Filme cu hackeri, despre hackeri: Welcome to SecurityTube! Si in felul asta poate mai si inveti ceva, nu doar sa bati in tastatura, sa bei cola si sa mananci pizza. Salut!
-
Reverse Honey Trap Striking Deep inside Online Web Antivirus Engines and Analyzer PDF: http://www.infosecwriters.com/text_resources/pdf/ASood_Reverse_Honey_Trap.pdf
-
A Forensic Analysis : HTTP Protocol Link: A Forensic Analysis : HTTP Protocol
-
- 1