Jump to content

Nytro

Administrators
  • Posts

    18732
  • Joined

  • Last visited

  • Days Won

    710

Everything posted by Nytro

  1. Din pacate in spaniola, dar poate va sunt utile: BackTrack 5 sacar claves wep WIFI (HD) http://www.youtube.com/watch?v=aUqeynUsRHQ BackTrack 5 claves wep con Filtrado MAC (HD) http://www.youtube.com/watch?v=MEwLAWoE7VY BackTrack 5 claves WPA (HD) Part 1 http://www.youtube.com/watch?v=NCU65dolhI0 BackTrack 5 claves WPA (HD) Part 2 http://www.youtube.com/watch?v=yFOehkT-CNE Sursa: Videos de Cracking WEP Y WPA Backtrack 5 Español
  2. Web Services Hacking and Hardening Adam Vincent, Sr. Federal Solutions Architect The following presentation will NOTbe a vendor Pitch but will hopefully educate the audience in Web Services Hacking, Testing,and Hardening Techniques. Real life examples may be offered that relate to deployment of Layer 7 Technologies product line. Hardening of Web Services will have some focus on technologies like those Layer 7 Technologies provides. Layer 7’s product will be used as an example in this portion of the presentation. •Components and Terminology •Web Services Threats •Web Services Hacking •Web Services Hardening •Conclusion and Questions Download: https://www.owasp.org/images/d/d0/Web_Services_Hacking_and_Hardening.pdf
  3. [h=4]Dns Spoofing With Ettercap Cli[/h] Description: Download Video Good Resolution from Mediafire : http://adf/.ly/4A0QY (10.25 MB) Sursa: [Xhabie-Crew] Dns Spoofing With Ettercap Cli
  4. [h=4]Social Engineering Toolkit Megaprimer Part 1[/h] Description: In this oportunity I want to start a new series of video tutorials about the Social Engineering Toolkit, trying to cover the most important or used modules. This video will give an introduction to some concepts related to social engineering and the basic of this toolkit. Sursa: Social Engineering Toolkit Megaprimer Part 1
  5. [h=2]Kindle Touch (5.0) Jailbreak/Root and SSH[/h][h=3]December 10, 2011[/h][h=3]Yifan Lu @ 1:32 am[/h] So long story short, we can run custom code on the Kindle Touch now but because the operating system has changed so much from Kindle 3, most Kindle modifications will not run without changes. I hope developers will jump to this device now that it’s unlocked. See the bottom of the post for download links. The directions for using are in the readme. Keep reading for technical details on how this came about. Obtaining the root image Before we can look for vulnerabilities in the system that would allow us to break in, we need to break into the system and obtain the files that might contain vulnerabilities. Yes, this is a chicken-and-egg problem, but fortunately Amazon is nice enough to help us with this. On every Kindle device is a TTL serial port. I found this port on the bottom of the device when the cover is opened. Fortunately, I did not even have to mess with it, as hondamarlboro and ramirami both managed to get the dump before me. Once we have the root image, it was only a matter of painstakingly looking through all the files to see possible injection vectors. Looking for the needle At first, I was digging deep into the system, disassembling and maping out various native libraries, looking for stack overflows (I found a couple but none could be accessed efficiently). I found the bootloader was unlocked but it would be a pain and danger for users (and even developers) to flash custom kernels and such. I also found that the Java code (the Kindle’s entire GUI is written in Java) is NOT obfuscated (which means it would be easier to reverse and later modify) and Amazon has left in many places to place plugins. For example, once someone has the time to figure things out, it would be very possible to write a EPUB extension to read EPUBs from the native reader. There are some other hidden secrets in the device too. The Kindle Touch has an accelerometer and proximity sensor (and a mic, but we know that) but they aren’t used in the software (yet). The more I looked into the system, I was aware that because it was such a huge rewrite, I had misjudged when I assumed that it would be harder to break as Amazon had years to fix the holes now. In fact, I would say that the Kindle 4 is more secure until I found out that Amazon left in SSH in diagnostics mode. Anyways, as I searched up the complexity chain from the bootloader to the kernel to the libraries to the Java interface, I found something very curious. Much of the operating system is no longer written in Java, but are now in HTML5 and Javascript. In fact, many of the interfaces on the Touch are actually web pages in disguise. For example: the password entry screen, the search bar, the browser (is just an HTML page with a frame), the Wifi selection screen, and even the music player. Obviously, these can’t all run natively in HTML and JS, or the device will be even slower (and it is pretty damn slow). What Amazon did is write a couple of Javascript hooks that are implemented by native libraries and events are read by these libraries and they perform actions accordantly. In short, Javascript will run native code. This is a goldmine, there could be many possible ways of using this to our advantage. There could be buffer overflows, heap overflows, string formatting bugs, etc. However, I didn’t have to look though much before I found a curious function: nativeBridge.dbgCmd();. It seems too good to be true. This function takes any shell command, and runs it (as root). Yup. The web browser will run as root, any command given to it. Don’t go looking for remote code execution yet (although it is highly possible), as the native bridge seems to be disabled when in web browser mode (it may be able to be bypassed, but I haven’t looked into it). Calling the debug function So the normal browser (as the one you can enter URLs into) can’t make use of this native bridge. However, as I’ve mentioned, a large part of the GUI in the Kindle Touch is HTML and JavaScript. All we need to do is inject some HTML into one of these and we would be all set. We need something that takes input and displays it to the user. The first thing I thought of was the media player. The Kindle displays the song title, artist, and album name in the music player, so what if we put some HTML into the ID3 tag? Yup, it works. How about some javascript? Running. Let’s try to call the debug function. It works. Well, that was a freebie. Having some fun That was a bit too easy and I was disappointed that I didn’t get to talk about how I whipped out IDA Pro and did some master debugging. So, let’s make things harder. We can use a MP3 with custom ID3 tags to execute any command, but how can we make this into a cool one-click solution? First of all, we should limit ourselves to one file to copy. Why make the user keep track of MP3s and shell scripts and where to put them? I took the shell script payload (which installs a developer key into the device so custom packages can be installed) and placed it into the comments section of the ID3 tag in the MP3. Then I used “dd” to extract the script, chmod it, and execute it. Now, another problem in terms of user friendliness is how to let the user know that the process was successful? I quickly whipped up an awesome looking “splash screen” and planned on displaying it while the magic is taking place. At first I tried to encode it into a variable in the shell script payload and extract it, but it was too slow and memory intensive. Instead, I took the image, raw, and appended it into the end of the MP3 (after all, the file was a bit too small). You can see the result in the video attached. What’s next? Just because the device is jailbroken does not mean it can now magically do anything you want. What needs to happen first is that developers need to take the device and write some code for it. This first jailbreak is really for these developers. For regular users, the only use is to preemptively unlock your device now in case the method is patched in an update or something. No mods for older Kindles will work as-is on the Touch. I’ve included a VERY basic usbnetwork package that will allow you to have SSH access to the device. I think that’s as good of a starting point as anything. From there, developers should be able to rip the root filesystem, test modifications, and write useful tweaks. (And in case of a brick, read my previous post on the bootloader access). Some things I would have to see or do is GUI plugins in the device’s operating system. The Java code is easy to decompile and read as the variable names have not been stripped out (like previous models). Hopefully people can write some reader plugins (like X-Ray) or even format plugins for other ebook formats. Being a touch screen device, one could also write games or useful apps (although the speed and eink are limiting). I need to finish writing the update creation tool so developers can package their modifications. Download Download the jailbreak here Simple custom screensaver mod Demonstration Sursa: Yifan Lu | Kindle Touch (5.0) Jailbreak/Root and SSH
  6. [h=1]DIY: Create multi-boot USBs with ease[/h] By Jack Wallen December 10, 2011, 10:30 PM PST Takeaway: Get instructions on how to use XBoot or UNetbootin to have a USB stick with more than one operating system. When you want to have a single USB stick with multiple operating systems, the end result must be a reliable USB drive that contains the operating systems you need. Here’s how to do this with two tools: XBoot (using Windows 7) and UNetbootin (from within Linux). Both are simple, but the Linux version requires more manual work. [h=2]XBoot in Windows 7[/h] Requirements XBoot ISOs of the operating systems you want Instructions Download and run XBoot on your Windows 7 machine. To run XBoot, just unzip the downloaded file, change into the newly created directory, and double-click the .exe to run the software. When you run the software, you will see the main window (Figure A). Figure A [h=6]The operating systems listed will not show up on your XBoot window unless you installed them.[/h] To add ISO images, open Explorer and drag and drop the ISOs into XBoot. Some ISO images (e.g., Fedora 16) are automatically recognized. When you drag an unrecognized ISO into XBoot, a new window will appear (Figure B) where you must select the ISO (or the closest distribution) from a drop-down. For example, I selected Ubuntu for Bodhi Linux and Puppy Linux for MacPup. After you select the correct version from the drop-down, click Add This File. Figure B [h=6]XBoot window when you drag an unrecognized ISO into it.[/h] After all ISOs are added (make sure their combined size does not exceed that of the USB drive), click the Create USB button near the bottom right corner of the main window. Once this completes the process, you can reboot the machine (making sure it will boot from a USB device) and enjoy your multiboot on a stick. [h=2]UNetbootin from within Linux[/h] Requirements UNetbootin ISOs to be installed Instructions Download the UNetbootin tool for Linux. From a terminal window, give the downloaded file executable permissions with the command chmod u+x unetbootin-linux-XXX (where XXX is the architecture). Run UnNetbootin with the command ./unetbootin-linux-XXX (where XXX is the architecture). From the main window, select the distribution you want to install or use a downloaded ISO. After UNetbootin completes the install of the first OS, reboot the machine to test the OS on the USB drive. Now it gets a little tricky. You must copy everything from the USB drive to a new directory on your hard drive. Then, repeat the steps above, selecting the next OS you want on the USB drive. Now open two file manager windows: one to the USB drive and one to the newly created directory containing all the files from the first install you did on UNetbootin. You want to copy everything from the hard drive to the USB drive except the following: vesamenu.c32 ubnpathl.txt ubnkern ubninit ubnfilel.txt syslinux.cfg ldlinux.sys In the folder on your desktop, you must open the syslinux.cfg file. From that file, copy the last four lines and paste them in the syslinux.cfg file on the USB drive. Those lines will look like this: label ubnentry0 menu label DISTRIBUTION kernel /vmlinuz append initrd=/initrd.gz pmedia=cd where DISTRIBUTION is the name of the distribution you originally installed. You must copy the above four lines between the “label ubnentry1? and “label ubnentry2? entries. Make sure to relabel the “ubnenetryX” entries so they are in consecutive numerical order. After you make the necessary edits, close and save the file and reboot the system. You should now have a multi-boot USB drive that is in working order. Wth a large enough USB drive, you can carry around any number of operating systems that serve numerous purposes. Sursa: DIY: Create multi-boot USBs with ease | TechRepublic
  7. Foarte probabil fake.
  8. E de preferat, se poate si brute-force simplu, vezi: cracking_wpawpa2 [hashcat wiki]
  9. [h=4]Hijack From Android Phone[/h] Description: I installed DroidSheep for V14, it is an open source software. Please visit this website and download the APK package. (http://droidsheep.de/) enjoy~ Sursa: Hijack From Android Phone Exemplu de capturare a unei sesiuni HTTP folosind DroidSheep pe un telefon cu Android.
  10. Merge ca uns daca prinzi handshake-ul. Daca nu, nu ai facut nimic...
  11. [h=4]Capturing A Wpa2 4-Way Handshake, Cracking It, And Then Using Armitage To Exploit A Local Machine[/h] Description: Please watch in 1080p!!! Using Oclhashcat-plus (oclHashcat-plus - advanced password recovery/) to speed up the WPA2 cracking process. For more information on how to use oclhc+ to crack WPA/WPA2 handshakes visit this link (cracking_wpawpa2 [hashcat wiki]) Sursa: Capturing A Wpa2 4-Way Handshake, Cracking It, And Then Using Armitage To Exploit A Local Machine Pe scurt: - se captureaza handshake-ul de la conexiunea WPA2 cu aircrack-ng - se sparge cu oclHash - se scaneaza reteaua locala - se foloseste un exploit pentru obtinerea accesului - smb-netapi - fun
  12. [h=4]Cross-Platform Java Exploit (Cve-2011-3544) Demonstration[/h] Description: This video uses Armitage and Metasploit to demonstrate a new cross-platform Java exploit. This exploit uses a loophole in the Java API to execute a payload outside of Java's security sandbox without requiring a user to approve some action. This works in Firefox, Internet Explorer, and Safari on Windows, MacOS X, and presumably Linux. Java 1.6.0u27, Java 1.7.0, and older versions are vulnerable. Sursa: Cross-Platform Java Exploit (Cve-2011-3544) Demonstration Exemplu de folosire al exploitului Java Rhino cu Armitage. Simplu si extrem de eficient.
  13. [h=2]Shell Scripting: Expert Recipes for Linux, Bash and more[/h] [h=3]Book Description[/h] A compendium of shell scripting recipes that can immediately be used, adjusted, and applied The shell is the primary way of communicating with the Unix and Linux systems, providing a direct way to program by automating simple-to-intermediate tasks. With this book, Linux expert Steve Parker shares a collection of shell scripting recipes that can be used as is or easily modified for a variety of environments or situations. The book covers shell programming, with a focus on Linux and the Bash shell; it provides credible, real-world relevance, as well as providing the flexible tools to get started immediately. Shares a collection of helpful shell scripting recipes that can immediately be used for various of real-world challenges Features recipes for system tools, shell features, and systems administration Provides a host of plug and play recipes for to immediately apply and easily modify so the wheel doesn’t have to be reinvented with each challenge faced Come out of your shell and dive into this collection of tried and tested shell scripting recipes that you can start using right away! From the Back Cover Tried-and-true recipes that can be immediately applied or easily adjusted to meet your needs The shell is the primary way of communicating with Unix and Linux systems, providing a direct way to program by automating simple to intermediate tasks. In this invaluable resource, Unix, Linux, and shell scripting expert Steve Parker shares a collection of shell scripting recipes that can be used as provided or easily modified for a variety of environments and situations. The book begins with coverage of theory and principles, replete with insightful examples of each element discussed. You then move on to an in-depth discussion of shell programming, covering all Unix flavors but with a focus on Linux and the Bash shell. All the while, you explore credible, real-world recipes and the tools necessary to get started immediately. Shell Scripting: Shares a compendium of helpful shell scripting recipes that can be used to address a variety of real-world challenges Includes recipes using file and text control as well as general systems administration tasks Provides a host of plug-and-play recipes ready for you to immediately apply and easily modify Examines variables, if/then conditionals, loops, functions, pipes, redirects, and more [h=3]Book Details[/h] Paperback: 600 pages Publisher: Wrox (August 2011) Language: English ISBN-10: 1118024486 ISBN-13: 978-1118024485 File Size: 33.2 MiB [h=3]E-Book[/h] [FilePost] Wrox.Shell.Scripting.Aug.2011.rar [FileJungle] Wrox.Shell.Scripting.Aug.2011.rar [h=3]Paper Book[/h] [Amazon] Shell Scripting: Expert Recipes for Linux, Bash and more Sursa: Shell Scripting: Expert Recipes for Linux, Bash and more | Wow! eBook - Blog
  14. [h=2]Objective-C Fundamentals[/h] [h=3]Book Description[/h] Objective-C Fundamentals guides you gradually from your first line of Objective-C code through the process of building native apps for the iPhone. Starting with chapter one, you’ll dive into iPhone development by building a simple game that you can run immediately. You’ll use tools like Xcode 4 and the debugger that will help you become a more efficient programmer. By working through numerous easy-to-follow examples, you’ll learn practical techniques and patterns you can use to create solid and stable apps. And you’ll find out how to avoid the most common pitfalls. No iOS or mobile experience is required to benefit from this book but familiarity with programming in general is helpful. What’s Inside Objective-C from the ground up Developing with Xcode 4 Examples that work unmodified on iPhone Table of Contents PART 1 GETTING STARTED WITH OBJECTIVE-C Building your first iOS application Data types, variables, and constants An introduction to objects Storing data in collections PART 2 BUILDING YOUR OWN OBJECTS Creating classes Extending classes Protocols Dynamic typing and runtime type information Memory management PART 3 MAKING MAXIMUM USE OF FRAMEWORK FUNCTIONALITY Error and exception handling Key-Value Coding and NSPredicate Reading and writing application data Blocks and Grand Central Dispatch Debugging techniques [h=3]Book Details[/h] Paperback: 368 pages Publisher: Manning Publications (September 2011) Language: English ISBN-10: 1935182536 ISBN-13: 978-1935182535 File Size: 14.5 MiB [h=3]E-Book[/h] [FilePost] Manning.Objective-C.Fundamentals.Sep.2011.rar [FileJungle] Manning.Objective-C.Fundamentals.Sep.2011.rar [h=3]Paper Book[/h] [Amazon] Objective-C Fundamentals Sursa: Objective-C Fundamentals | Wow! eBook - Blog
  15. [h=2]Professional NoSQL[/h] [h=3]Book Description[/h] A hands-on guide to leveraging NoSQL databases NoSQL databases are an efficient and powerful tool for storing and manipulating vast quantities of data. Most NoSQL databases scale well as data grows. In addition, they are often malleable and flexible enough to accommodate semi-structured and sparse data sets. This comprehensive hands-on guide presents fundamental concepts and practical solutions for getting you ready to use NoSQL databases. Expert author Shashank Tiwari begins with a helpful introduction on the subject of NoSQL, explains its characteristics and typical uses, and looks at where it fits in the application stack. Unique insights help you choose which NoSQL solutions are best for solving your specific data storage needs. Professional NoSQL: Demystifies the concepts that relate to NoSQL databases, including column-family oriented stores, key/value databases, and document databases. Delves into installing and configuring a number of NoSQL products and the Hadoop family of products. Explains ways of storing, accessing, and querying data in NoSQL databases through examples that use MongoDB, HBase, Cassandra, Redis, CouchDB, Google App Engine Datastore and more. Looks at architecture and internals. Provides guidelines for optimal usage, performance tuning, and scalable configurations. Presents a number of tools and utilities relating to NoSQL, distributed platforms, and scalable processing, including Hive, Pig, RRDtool, Nagios, and more. [h=3]Book Details[/h] Paperback: 384 pages Publisher: Wrox (August 2011) Language: English ISBN-10: 047094224X ISBN-13: 978-0470942246 File Size: 32.3 MiB [h=3]E-Book[/h] [FilePost] Wrox.Professional.NoSQL.Aug.2011.rar [FileJungle] Wrox.Professional.NoSQL.Aug.2011.rar [h=3]Paper Book[/h] [Amazon] Professional NoSQL Sursa: Professional NoSQL | Wow! eBook - Blog
  16. [h=2]Microsoft Visual C# 2010: An Introduction to Object-Oriented Programming, 4th Edition[/h] [h=3]Book Description[/h] Using engaging examples and a clear, straightforward approach, MICROSOFT VISUAL C# 2010: AN INTRODUCTION TO OBJECT-ORIENTED PROGRAMMING, FOURTH EDITION guides beginning programmers through developing programs in the C# language. The book provides readers with a strong background knowledge of structured programming, method calling, and parameter passing, all of which are important concepts easily transferable to other programming languages. The Fourth Edition has been written and tested using the latest version of C#, Visual C# 2010, and now offers supplementary video lessons, expanded coverage of methods, and the option to study GUI applications earlier in the text. Table of Contents Preface CHAPTER 1 A First Program Using C# CHAPTER 2 Using Data CHAPTER 3 Using GUI Objects and the Visual Studio IDE CHAPTER 4 Making Decisions CHAPTER 5 Looping CHAPTER 6 Using Arrays CHAPTER 7 Using Methods CHAPTER 8 Advanced Method Concepts CHAPTER 9 Using Classes and Objects CHAPTER 10 Introduction to Inheritance CHAPTER 11 Exception Handling CHAPTER 12 Using Controls CHAPTER 13 Handling Events CHAPTER 14 Files and Streams CHAPTER 15 Using LINQ to Access Data in C# Programs APPENDIX A Operator Precedence And Associativity APPENDIX B Understanding Numbering Systems and Computer Codes APPENDIX C Using The IDE Editor Glossary Index [h=3]Book Details[/h] Paperback: 848 pages Publisher: Course Technology; 4th Edition (August 2010) Language: English ISBN-10: 0538479515 ISBN-13: 978-0538479516 File Size: 11.3 MiB [h=3]E-Book[/h] [FilePost] Course.Microsoft.Visual.CSharp.2010.Aug.2010.rar [FileJungle] Course.Microsoft.Visual.CSharp.2010.Aug.2010.rar [h=3]Paper Book[/h] [Amazon] Microsoft Visual C# 2010: An Introduction to Object-Oriented Programming, 4th Edition Sursa: Microsoft Visual C# 2010: An Introduction to Object-Oriented Programming, 4th Edition | Wow! eBook - Blog
  17. [h=2]Start Here! Fundamentals of Microsoft .NET Programming[/h] [h=3]Book Description[/h] Grasp the basic concepts that drive all Microsoft® .NET-based languages—and prepare yourself to learn .NET programming. If you have absolutely no previous experience, no problem—simply start here! This ebook provides the foundation for all other .NET programming language books in the Start Here! series. You’ll explore programming concepts and techniques with clear explanations, easy-to-follow examples, and exercises. It’s the perfect reference for understanding how computer programs work. Delve into object-oriented concepts such as properties, methods, and events Discover what multiprocessing is—and how it’s changing computing Examine how programs store data in files, object stores, and databases Explore controls, such as labels, text boxes, menus, and scroll bars Learn how programming environments help you design and run programs Get an extensive glossary of key programming terms Table of Contents Chapter 1 Computer Hardware Chapter 2 Multiprocessing Chapter 3 Programming Environments Chapter 4 Windows Program Components Chapter 5 Controls Chapter 6 Variables Chapter 7 Control Statements Chapter 8 Operators Chapter 9 Routines Chapter 10 Object-Oriented Programming Chapter 11 Development Techniques Chapter 12 Globalization Chapter 13 Data Storage Chapter 14 .NET Libraries [h=3]Book Details[/h] Paperback: 264 pages Publisher: Microsoft Press (October 2011) Language: English ISBN-10: 0735661685 ISBN-13: 978-0735661684 File Size: 9.6 MiB [h=3]E-Book[/h] [FilePost] Microsoft.Press.Start.Here.Fundamentals.of.Microsoft.NET.Programming.Oct.2011.rar [FileJungle] Microsoft.Press.Start.Here.Fundamentals.of.Microsoft.NET.Programming.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] Start Here! Fundamentals of Microsoft .NET Programming Sursa: Start Here! Fundamentals of Microsoft .NET Programming | Wow! eBook - Blog
  18. [h=2]Start Here! Learn Microsoft Visual C# 2010[/h] [h=3]Book Description[/h] Ready to learn programming? Start Here!™ Learn the fundamentals of modern programming with Visual C# 2010—and begin building your first apps for the desktop and web. If you have absolutely no previous experience, no problem—simply start here! This book introduces must-know concepts and techniques through easy-to-follow explanations, examples, and exercises. Here’s where you start learning Visual C# Learn how an application performs tasks by tracing its code Query and manipulate application data with LINQ Access web services with REST and SOAP Build simple apps with Windows® Presentation Foundation Explore rich Internet apps with Microsoft Silverlight® Find and fix errors by debugging your applications Put it all together by creating your first programs Table of Contents Chapter 1 Getting to Know C# Chapter 2 Developing a Web Project Chapter 3 Basic Data Manipulation Techniques Chapter 4 Using Collections to Store Data Chapter 5 Working with XML Chapter 6 Accessing a Web Service Chapter 7 Using the Windows Presentation Foundation Chapter 8 Working with Libraries Chapter 9 Creating Utility Applications Chapter 10 Using LINQ in Web Applications Chapter 11 Working with Silverlight Applications Chapter 12 Debugging Applications [h=3]Book Details[/h] Paperback: 394 pages Publisher: Microsoft Press (October 2011) Language: English ISBN-10: 0735657726 ISBN-13: 978-0735657724 File Size: 19.2 MiB [h=3]E-Book[/h] [FilePost] Microsoft.Press.Start.Here.Learn.Microsoft.Visual.CSharp.2010.Oct.2011.rar [FileJungle] Microsoft.Press.Start.Here.Learn.Microsoft.Visual.CSharp.2010.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] Start Here! Learn Microsoft Visual C# 2010 Sursa: Start Here! Learn Microsoft Visual C# 2010 | Wow! eBook - Blog
  19. [h=2]JavaScript & jQuery: The Missing Manual, 2nd Edition[/h] [h=3]Book Description[/h] JavaScript lets you supercharge your HTML with animation, interactivity, and visual effects—but many web designers find the language hard to learn. This jargon-free guide covers JavaScript basics and shows you how to save time and effort with the jQuery library of prewritten JavaScript code. You’ll soon be building web pages that feel and act like desktop programs, without having to do much programming. The important stuff you need to know: Make your pages interactive. Create JavaScript events that react to visitor actions. Use animations and effects. Build drop-down navigation menus, pop-ups, automated slideshows, and more. Improve your user interface. Learn how the pros make websites fun and easy to use. Collect data with web forms. Create easy-to-use forms that ensure more accurate visitor responses. Add a dash of Ajax. Enable your web pages to communicate with a web server without a page reload. Practice with living examples. Get step-by-step tutorials for web projects you can build yourself. Table of Contents Chapter 1 Writing Your First JavaScript Program Chapter 2 The Grammar of JavaScript Chapter 3 Adding Logic and Control to Your Programs Chapter 4 Introducing jQuery Chapter 5 Action/Reaction: Making Pages Come Alive with Events Chapter 6 Animations and Effects Chapter 7 Improving Your Images Chapter 8 Improving Navigation Chapter 9 Enhancing Web Forms Chapter 10 Expanding Your Interface Chapter 11 Introducing Ajax Chapter 12 Flickr and Google Maps Chapter 13 Getting the Most from jQuery Chapter 14 Going Further with JavaScript Chapter 15 Troubleshooting and Debugging [h=3]Book Details[/h] Paperback: 536 pages Publisher: O’Reilly Media / Pogue Press; 2nd Edition (October 2011) Language: English ISBN-10: 1449399029 ISBN-13: 978-1449399023 File Size: 21.5 MiB [h=3]E-Book[/h] [FilePost] Oreilly.JavaScript.and.jQuery.The.Missing.Manual.2nd.Edition.Oct.2011.rar [FileJungle] Oreilly.JavaScript.and.jQuery.The.Missing.Manual.2nd.Edition.Oct.2011.rar [h=3]Paper Book[/h] [Amazon] JavaScript & jQuery: The Missing Manual, 2nd Edition Sursa: JavaScript & jQuery: The Missing Manual, 2nd Edition | Wow! eBook - Blog
  20. [h=2]Professional C++, 2nd Edition[/h] [h=3]Book Description[/h] Essential reading for experienced developers who are determined to master the latest release of C++ Although C++ is often the language of choice from game programming to major commercial software applications, it is also one of the most difficult to master. With this no-nonsense book, you will learn to conquer the latest release of C++. The author deciphers little-known features of C++, shares detailed code examples that you can then plug into your own code, and reveals the significant changes to C++ that accompany the latest release. You’ll discover how to design and build applications that solve real-world problems and then implement the solution using the full capabilities of the language. Appeals to experienced developers who are looking for a higher level of learning Drills down the extensive changes to the latest C++ standard, C++11, including enhancements made to run-time performance, standard library, language usability, and core language Zeroes in on explaining the more poorly understood elements of the C++ feature set and addresses common pitfalls to avoid Includes case studies that feature extensive, working code that has been tested on Windows and Linux platforms Intertwines text with useful tips, tricks, and workarounds Packed with best practices for programming, testing, and debugging applications, this book is vital for taking your C++ skills to the next level. From the Back Cover Master the latest release of the C++ language: C++11 C++ is often the language of choice for writing fast, powerful, and enterprise-class object-oriented programs, be it games or major commercial software applications. However, there’s no two ways around it: C++ can be difficult to master. With this no-nonsense book, you will learn to conquer the latest version of the C++ language: C++11. The authors share real-world examples, decipher little-known features of C++, and reveal the significant changes to C++ that accompany the latest release. Ultimately, you’ll discover programming methodologies, reusable design patterns, and good programming style that will increase the quality of your code and improve your programming efficiency. Professional C++, 2nd Edition: Offers detailed code examples that you can plug into your own code Takes you on a technical tour of C++ and the STL, and explores the unusual and quirky aspects of this language Exposes best practices for using the more advanced features of C++, including operator overloading, managing memory, writing templates, and writing multithreaded code Discusses techniques for writing cross-language and cross-platform code Teaches you the importance of code reuse as well as the nuances of writing readable C++ code [h=3]Book Details[/h] Paperback: 1104 pages Publisher: Wrox; 2nd Edition (October 2011) Language: English ISBN-10: 0470932449 ISBN-13: 978-0470932445 File Size: 5.8 MiB [h=3]E-Book[/h] [FilePost] Wrox.Professional.CPP.2nd.Edition.Oct.2011.epub [FileJungle] Wrox.Professional.CPP.2nd.Edition.Oct.2011.epub [h=3]Paper Book[/h] [Amazon] Professional C++, 2nd Edition Sursa: Professional C++, 2nd Edition | Wow! eBook - Blog
  21. [h=2]Optimizing Windows 7 Pocket Consultant[/h] [h=3]Book Description[/h] Portable and precise, this pocket-sized guide delivers ready answers for optimizing the performance of your Windows 7-based PC. Zero in on core tuning, customization, and troubleshooting tasks using quick-reference tables, instructions, and lists. Topics include system boot and startup, software and hardware, search and indexing, system health, and personalizing the interface. You’ll get the focused information you need to solve problems and get the job done. Table of Contents Chapter 1 Customizing the Windows 7 Interface Chapter 2 Personalizing the Appearance of Windows 7 Chapter 3 Customizing Boot, Startup, and Power Options Chapter 4 Organizing, Searching, and Indexing Chapter 5 Optimizing Your Computer’s Software Chapter 6 Tracking System Performance and Health Chapter 7 Analyzing and Logging Performance Chapter 8 Optimizing Performance Tips and Techniques Appendix Firmware Interface Options About the Author William R. Stanek has more than 20 years’ experience in systems management and advanced programming. He is an award-winning author who’s written more than 100 books, including the popular Windows Server® 2008 Inside Out. He is Series Editor for the Pocket Consultant line of books from Microsoft Press®. [h=3]Book Details[/h] Paperback: 208 pages Publisher: Microsoft Press (September 2011) Language: English ISBN-10: 0735661650 ISBN-13: 978-0735661653 File Size: 11.5 MiB [h=3]E-Book[/h] [FilePost] Microsoft.Press.Optimizing.Windows.7.Pocket.Consultant.Sep.2011.rar [FileJungle] Microsoft.Press.Optimizing.Windows.7.Pocket.Consultant.Sep.2011.rar [h=3]Paper Book[/h] [Amazon] Optimizing Windows 7 Pocket Consultant Sursa: Optimizing Windows 7 Pocket Consultant | Wow! eBook - Blog
  22. [h=2]Routing TCP/IP, Volume II[/h] [h=3]Book Description[/h] A detailed examination of exterior routing protocols and advanced IP routing issues Routing TCP/IP, Volume II, enables you to: Master the operational components, configuration, and troubleshooting of BGP-4-the de facto interdomain routing protocol Understand the operation, configuration, and troubleshooting of NAT Learn how to deploy, configure, and troubleshoot IP multicast routing through an array of case studies and exercises Familiarize yourself with the design goals and current state of IPv6, the new generation of the IP protocol Implement router management through a diverse range of expert-tested methods Test and validate your knowledge with practical, comprehensive review questions, configuration exercises, and troubleshooting exercises Further your CCIE preparation while mastering advanced TCP/IP concepts The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. Routing TCP/IP, Volume II, provides you with the expertise necessary to understand and implement Border Gateway Protocol Version 4 (BGP-4), multicast routing, Network Address Translation (NAT), IPv6, and effective router management techniques. Jeff Doyle’s practical approach, easy-to-read format, and comprehensive topic coverage make this book an instant classic and a must-have addition to any network professional’s library. Routing TCP/IP, Volume II, expands upon the central theme of Volume I: scalability and management of network growth. Volume II moves beyond the interior gateway protocols covered in Volume I to examine both inter-autonomous system routing and more exotic routing issues such as multicasting and IPv6. This second volume follows the same informational structure used effectively in Volume I: discussing the topic fundamentals, following up with a series of configuration examples designed to show the concept in a real-world environment, and relying on tested troubleshooting measures to resolve any problems that might arise. This book helps you accomplish more than earning the highly valued CCIE number after your name; it also helps you develop the knowledge and skills that are essential to perform your job at an expert level. Whether you are pursuing CCIE certification, need to review for your CCIE recertification exam, or are just looking for expert-level advice on advanced routing issues, Routing TCP/IP, Volume II, helps you understand foundation concepts and apply best practice techniques for effective network growth and management. [h=3]Book Details[/h] Hardcover: 976 pages Publisher: Cisco Press (April 2001) Language: English ISBN-10: 1578700892 ISBN-13: 978-1578700899 File Size: 16.0 MiB [h=3]E-Book[/h] [FilePost] Cisco.Press.Routing.TCP.IP.Vol.II.Apr.2001.rar [FileJungle] Cisco.Press.Routing.TCP.IP.Vol.II.Apr.2001.rar [h=3]Paper Book[/h] [Amazon] Routing TCP/IP, Volume II Sursa: Routing TCP/IP, Volume II | Wow! eBook - Blog
  23. [h=2]Network Security Technologies and Solutions[/h] [h=3]Book Description[/h] Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure. With an easy-to-follow approach, this book serves as a central repository of security knowledge to help you implement end-to-end security solutions and provides a single source of knowledge covering the entire range of the Cisco network security portfolio. The book is divided into five parts mapping to Cisco security technologies and solutions: perimeter security, identity security and access management, data privacy, security monitoring, and security management. Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. With this definitive reference, you can gain a greater understanding of the solutions available and learn how to build integrated, secure networks in today’s modern, heterogeneous networking environment. This book is an excellent resource for those seeking a comprehensive reference on mature and emerging security tactics and is also a great study guide for the CCIE Security exam. “Yusuf’s extensive experience as a mentor and advisor in the security technology field has honed his ability to translate highly technical information into a straight-forward, easy-to-understand format. If you’re looking for a truly comprehensive guide to network security, this is the one! ” –Steve Gordon, Vice President, Technical Services, Cisco Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco. Filter traffic with access lists and implement security features on switches Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques Secure management access with AAA Secure access control using multifactor authentication technology Implement identity-based network access control Apply the latest wireless LAN security solutions Enforce security policy compliance with Cisco NAC Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instruction on network design, deployment, and support methodologies to help networking professionals manage complex networks and prepare for CCIE exams. [h=3]Book Details[/h] Hardcover: 840 pages Publisher: Cisco Press (March 2008) Language: English ISBN-10: 1587052466 ISBN-13: 978-1587052460 File Size: 19.1 MiB [h=3]E-Book[/h] [FilePost] Cisco.Press.Network.Security.Technologies.and.Solutions.Mar.2008.rar [FileJungle] Cisco.Press.Network.Security.Technologies.and.Solutions.Mar.2008.rar [h=3]Paper Book[/h] [Amazon] Network Security Technologies and Solutions Sursa: Network Security Technologies and Solutions | Wow! eBook - Blog
  24. [h=2]Security Administrator Street Smarts, 3rd Edition[/h] [h=3]Book Description[/h] A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator’s job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition or the CompTIA Security+ Deluxe Study Guide, 2nd Edition, the latest offerings from Sybex for CompTIA’s Security+ SY0-301 exam. Targets security administrators who confront a wide assortment of challenging tasks and those seeking a career in security administration who are hampered by a lack of actual experience Walks you through a variety of common tasks, demonstrating step by step how to perform them and how to circumvent roadblocks you may encounter Features tasks that are arranged according to four phases of the security administrator’s role: designing a secure network, creating and implementing standard security policies, identifying insecure systems in an existing environment, and training both onsite and remote users Ideal hands-on for those preparing for CompTIA’s Security+ exam (SY0-301) This comprehensive workbook provides the next best thing to intensive on-the-job training for security professionals. From the Back Cover Develop the skills you need in the real world Hit the ground running with the street-smart training you’ll find in this practical guide to security administration. Using a “year in the life” approach, it gives you an inside look at the common responsibilities of security administrators, with key information organized around the actual day-to-day tasks, scenarios, and challenges you’ll face in the field. Updated for CompTIA Security+ Exam SY0-301, this valuable training tool is loaded with hands-on, step-by-step exercises covering all phases of a security administrator’s job, including: Designing a secure network environment Creating and implementing standard security policies and practices Identifying insecure systems in physical and digital environments Providing training to onsite and remote users An invaluable study tool This no-nonsense book also covers common tasks that CompTIA expects all of its Security+ candidates to know how to perform. So whether you’re preparing for certification or seeking practical skills to break into the field, you’ll find the instruction you need, including: Performing an initial risk assessment Hardening all systems—services, ports, OS,and more Encrypting files and securing data storage Creating and managing user accounts Deploying IPSec and securing remote systems Securing Internet activity, networks, and wireless Testing, pen testing, tracking, profiling, and troubleshooting The Street Smarts series is designed to help current or aspiring IT professionals put their certification to work for them. Full of practical, real world scenarios, each book features actual tasks from the field and then offers step-by-step exercises that teach the skills necessary to complete those tasks. And because the exercises are based upon exam objectives from leading technology certifications, each Street Smarts book can be used as a lab manual for certification prep. Step-by-step exercises teach you hands-on skills Real world scenarios put those skills in perspective REVISED FOR THE UPDATED SECURITY+ EXAM (SY0-301) [h=3]Book Details[/h] Paperback: 624 pages Publisher: Sybex; 3rd Edition (June 2011) Language: English ISBN-10: 1118061160 ISBN-13: 978-1118061169 File Size: 56.0 MiB [h=3]E-Book[/h] [FilePost] Sybex.Security.Administrator.Street.Smarts.Jun.2011.epub [FileJungle] Sybex.Security.Administrator.Street.Smarts.Jun.2011.epub [h=3]Paper Book[/h] [Amazon] Security Administrator Street Smarts, 3rd Edition Sursa: Security Administrator Street Smarts, 3rd Edition | Wow! eBook - Blog
  25. [h=2]Engineering Information Security[/h] [h=3]Book Description[/h] Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal, technical, competitive, criminal and consumer forces and influences that are rapidly changing our information dependent society. From the Back Cover From design to deployment to decommissioning: a systems engineering approach to information security With this book as a guide, readers learn to apply a tested and proven methodology to address the information security concerns of any organization, ensuring that specific classes of information are only accessible to designated users. The methodology is based on systems engineering, a set of concepts that enable the systematic documentation of objectives and set forth the functional and performance capabilities needed to achieve those objectives. Because the book considers the complete life cycle of security systems, it also guides readers through deployment, operations, and eventual decommissioning. Moreover, the book goes well beyond technical requirements, enabling the full account of all aspects of an organization’s needs, including: Day-to-day operations Services and products provided and consumer markets served Overall competitive environment and key competitors Legal and regulatory requirements Vulnerability to criminal activity The book includes a CD which contains more than 200 color figures and diagrams to help illustrate and simplify complex systems and processes. Numerous examples throughout the book show step by step how to put security concepts and mechanisms into practice. The CD also includes a number of useful appendices, including a listing of individual state privacy laws, a sample enterprise security policy document, and a sample request for proposal.By presenting a systems engineering approach to information security, this book enables security practitioners and students of information security to cope with rapid changes in technology in order to consistently provide the level of information security needed to fully protect the interests of an organization, its personnel, and its customers. [h=3]Book Details[/h] Hardcover: 728 pages Publisher: Wiley-IEEE Press (July 2011) Language: English ISBN-10: 0470565128 ISBN-13: 978-0470565124 File Size: 9.2 MiB [h=3]E-Book[/h] [FilePost] Wiley-IEEE.Engineering.Information.Security.Jul.2011.rar [FileJungle] Wiley-IEEE.Engineering.Information.Security.Jul.2011.rar [h=3]Paper Book[/h] [Amazon] Engineering Information Security Sursa: Engineering Information Security | Wow! eBook - Blog
×
×
  • Create New...