McAfee Encrypted USB Manager 3.1.1

Rabu, 21 Januari 2009
















USB drives are small, portable, and provide incredible amounts of storage space. They’re a dream for users—but a security nightmare for IT staff. McAfee Encrypted USB offers data protection in the form of powerful encryption technology combined with strong access controls, so that only authorized users can read the information stored on USB drives.


Features:

* Standard driverless secure USB flash storage
Protect sensitive information on McAfee Encrypted USB storage devices wherever it travels with built-in strong user access controls and data encryption that uses the AES-256 encryption algorithm
* Fast transfer speeds and "on-the-fly" encryption
Supports fast USB 2.0 transfer speeds. Data is encrypted "on-the-fly," with virtually no performance loss or special training required by the end user
* Driverless zero footprint technology
Gain maximum flexibility with encrypted USB storage devices that feature no client footprint; no software installation or administrator's rights are needed
* Two-factor authentication
Require employees to use a password and a second form of identification, such as a fingerprint, to access their data on encrypted USB storage devices; a maximum number of authentication retries may be set to counter brute-force attacks
* Secure token services
Keep identities secure while enabling McAfee Encrypted USB storage devices to provide corporate and personal credential validation and protection
* Centralized management
Use centralized management to centrally implement and enforce company-wide security polices that ensure data stored on devices is protected if they are lost or stolen
* Extensive auditing capabilities
Demonstrate compliance with industry and government regulations; prove that the device was encrypted at the time of a loss with extensive auditing capabilities. Gain FIPS 140-2 certification
* Install and run applications directly and securely from the USB device
(VPN, Internet browser, thin client, etc.). Allows users to conveniently and securely run applications wherever they go.

Download:
http://rapidshare.com/files/186406489/McAfee_Encrypted_USB_Manager_3.1.1.rar

Read More......

600 Cool Fonts For Web Design




Download:
http://rapidshare.com/files/186523285/600_Cool_Fonts_for_Web_Design.rar

Read More......

Haker high school plus 1200 tutorials AIO





**************************************************
Hacker HighSchool
**************************************************


General Information
13 Ebooks

229 KB------>HHS_en01_Being_a_Hacker.pdf
361 KB------>HHS_en02_Windows_and_Linux.pdf
487 KB------>HHS_en03_Ports_and_Protocols.pdf
301 KB------>HHS_en04_Services_and_Connections.pdf
237 KB------>HHS_en05_System_Identification.pdf
208 KB------>HHS_en06_Malware.pdf
318 KB------>HHS_en07_Attack_Analysis.pdf
320 KB------>HHS_en08_Forensics.pdf
531 KB------>HHS_en09_Email_Security.pdf
727 KB------>HHS_en10_Web_Security_and_Privacy.pdf
212 KB------>HHS_en11_Passwords.pdf
290 KB------>HHS_en12_Legalities_and_Ethics.pdf
244 KB------>HHS_TOC_Glossary.pdf

Dan masih banyak tutorial lainnya...




Pertama
Kedua

Read More......

1000 Hacker Tutorials 2008





































Create Bootable XP SP integrated CD

Create One-click Shutdown And Reboot Shortcuts.txt Creating a Board aka Forum on your own PC !.rtf

Creating Universal Ghost Usb Boot Disk And Cd.txt

Data Capacity of CDs [Tutorial].txt

Debug, Learn how ***** windows.txt

Delete An undeletable File.txt

Delete Files From The Recent File List In Windows.txt

Digital Camera Guide.txt

Digital Faq-learn Everything About Digital Capture, Edit and Burning and more.txt

Digital Photo Id Cards, Greate Info.txt

Direct Link To Any Page You Want To In Hotmail.txt

Directx Explained.txt

Disable Compression On Xp, NTFS partition, Disk Cleanup.txt

Disable The Send Error Report, to Microsoft.txt

Disable Windows Logo Key.txt

Discover New Music You’ll Probably Love.txt

Download Free Music legally, legally.txt

Download from a paypal site without paying a penny!.txt

Download From Ftpz, Using Ftp Search Sitez.txt

Download Mp3’s Without Using Filesharing.txt

Download Music And Video With Media Player 9, quick and easy!.txt

Download Timeframes.txt

Dual Boot After The Fact.txt

Dvd Copying-ripping Definitions.txt

DVD Regions Information.txt

Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt

Easily Disconnect-reconnect From Broadband.txt

Easily Find Serial Numbers On Google.., easy to do and works like a charm.txt

Ebay Hacktip.txt

General Keyboard Shortcuts.txt

Get In Windows 2000 As Administrator.txt

Get the Most Out of Your DVD Recorder.txt

Get The Music You Want To Hear.tx

Get unlimited bandwidth from your host for free.txt

Getting A 1gb Yahoo China Account.txt

Getting Counter-strike Source To Work.txt

getting movies, mp3,games using google.txt

Getting older programs to run on Windows XP.txt

Getting started with Linux for noobs!.txt

Go to Windows updates anonymously.txt

Google Search.txt

Google secrets.txt

Google Tips & Tricks, (utilizing search engine).txt

Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt

Guide For Getting Free Stuff.txt

Guide to IIS Exploitation.txt

Guide to Slipstreaming Service Pack 2.txt

Hard drive Gone Bad.txt

Hardware Firewall.txt

How To Add An Option To Print, the Contents of a Folder!.txt

How To Add Your Own Windows Tips.txt

How to Back Up the Registry.txt

How To Backup Ps2 Games.txt

HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt

How To Block Websties Without Software, block websites.txt

How To Boot Xp Faster (updated).txt

How to build a black box.txt

how to burn quicker in windows xp.txt

How to Bypass BIOS Passwords.txt

How To Bypass Web Filters, tutorial.txt

HOW TO CAPTURE STREAMING MEDIA.txt

How To Change A Cmos Battery.txt

How to change the serial number used in Windows XP, Valid for XP Corporate.txt

How To Change Thumbnail Size And Quality.txt

How to clear Bios info 2.txt

How to clear Bios info.txt

How To Convert File System, fat - fat32 to ntfs.txt

How To Copy A Dvd Which Will Play On A X Box.txt

How to copy songs from your iPod to your PC.txt

How To Customise Your start Button.txt

How To Delete Those Persistent Nasty Files.txt 0.53 kB

How To Directly Go To Inbox, Write Msg, w Hotmail, no need for How to find MP3’s real quickly.txt 0.35 kB

How To Find Serial Numbers On Google.txt 0.79 kB

How to fix corrupted files in XP.txt 1.48 kB

How to fix Windows Installer problem.txt 0.96 kB

How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB

HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB

How to Get someones ISP password, Get free internet.txt 2.65 kB

How To Get Top Ranking, Search Engines.txt 6.58 kB

How To Hack Windows Xp Admin Passwords.txt 2.52 kB

How to hack-change your Windows XP Boot Screen.txt 1.52 kB

how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB

How To Make An Animted Logo.txt 5.26 kB

How To Make Free Phone Calls.txt 2.29 kB

How to make key generators.txt 8.83 kB

How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB

How To Make XP Go Faster.txt 5.58 kB

How To make your own Radio Station 2.txt 3.26 kB

How To Make Your Own Radio Station.txt 1.58 kB

How to Remove DRM Protection for Video Files.txt 2.29 kB

How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB

How To Remove Signin Details Of Msn Passport.txt 1.04 kB

How To Remove The Default Admin$ Shares.txt 1.03 kB

How to remove the Links folder in IE Favorites.txt 0.59 kB

How to Remove WinXP Splash and See Operations.txt 1.19 kB

How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB

How to Rename File Extensions.txt 3.11 kB

How To Rename Multiple Files In Winxp.txt 0.56 kB

How To Restrict Login Hours Allowed.txt 0.58 kB

How to safeguard your files when computer crashes.txt 2.94 kB

How to save Windows xp updates.txt 0.63 kB

how to search google for RAPIDSHARE links.txt 0.98 kB

How To See Hidden Files, Using Dos.txt 0.08 kB

How To Set search For All Files In Winxp.txt 0.71 kB

How to set up a http server running from you computer.txt 3.06 kB

How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB

How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB

How To Set Up Direct Connect.txt 26.96 kB

HOW TO SET UP FTP SERVER.txt 1.79 kB

How To Set Up Proxies In Your Browser.txt 1.63 kB

How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB

How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB

How To Speed Up A Slow Computer.txt 1.21 kB

How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB

How To Stop Spam.txt 8.05 kB

How to swear in all languages.txt 28.32 kB

How To Unload Cached Dll Files To Free Memory.txt 0.56 kB

How to Use and How to Chain Multiple Proxies!.txt 9.70 kB

How To Use File Compression In Windows Xp.txt 4.19 kB

How To Use Google To Download Mp3’s, and applications…..txt 0.60 kB

How To Use Newsgroups.txt 0.56 kB

How To Use You Gmail With Msn Messenger.txt 0.37 kB

How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB

HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB

Important Faqs For Sp2.txt 9.47 kB

Improve Doom 3’s Performances!!, simple but efficient trick for every1.txt 4.22 kB

Improve your dialup modem preformance.txt 0.73 kB

Increase XP Folder Settings.txt 0.79 kB

Insert Your Serial For Office 2k, auto install office.txt 1.06 kB

Install A New Hard-disk.txt 5.16 kB

Install Xp From Dos.txt 0.84 kB

Installing Apache on Windows.txt 6.29 kB

Installing Gentoo Linux, Amazing step by step tutoria.txt 0.19 kB

Installing IIS On Windows Xp Pro.txt 3.04 kB

Installing Slackware Linux.txt 34.73 kB

Instructions For Removal Of Advertising In Msn Messenger.txt 2.59 kB

Ip Address Structure, Expilinatin OF IP Address {A short way}.txt 7.65 kB

Irc How To Downlaod From, How to downlaod from IRC.txt 3.95 kB

Irc Servers On nix, For people who want to start own IRC net.txt 0.48 kB

Keep Files Private.txt 1.51 kB

Keep Folders Hidden.txt 0.46 kB

Keyboard Shortcuts Result in Excel 2000 - Movement.txt 1.57 kB

Keyboard Shortcuts, Microsoft Word.txt 2.37 kB

Keyboard Shortcuts, must read.txt 3.72 kB

Kill Microsoft Instant Messenger.txt 0.28 kB

Lamination Tips, Its a Fast TUT……txt 1.98 kB

Leet Way To Get Your Ip In Windows Xp.txt 0.26 kB

Linking Your Xbox To Your Computer.txt 33.52 kB

Linux Howto’s.txt 0.08 kB

List Of Sites Not To Go To.txt 4.32 kB

Little help for anonymous mailer.txt 1.56 kB

Lots Of Windows Xp Tips, Take A Look !.txt 12.43 kB

Lyrics With Google.txt 0.08 kB

Make A Autorun File For Ur Cd.txt 0.66 kB

Make A Batch File To Clean UR PC!!, All In One!!.txt 1.37 kB

Make A Roughly 16 Hour Video Dvd.txt 1.01 kB

Make Acrobat Reader 6 load faster.txt 0.42 kB

Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt 7.41 kB

Make Mp3 Files Smaller Without Losing Quality.txt 0.73 kB

Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt 3.00 kB

Make Your Pc Faster, Guaranteed.txt 6.23 kB

MakeXPgoFaster.txt 5.74 kB

making a .cue file, in notepad.txt 0.53 kB

Making A .txt Executable Server.txt 1.60 kB

Making Bootable Floppy Disk to Boot into Windows.txt 4.82 kB

Making Cd Version Of Doom3 Into Dvd Version.txt 0.75 kB

Making Web Page Fonts Consistent and Uniform.txt 0.80 kB

Manage Saved Ie Passwords.txt 0.75 kB

Mastering The Windows XP Registry.txt 5.79 kB

Maximize Dial-up Modem Settings.txt 2.31 kB

Microsoft’s Really Hidden Files, Reveled Hidden files.txt 33.95 kB

mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt 4.37 kB

mIRCcommands.txt 10.10 kB

Misc Linux Tips & Tricks.txt 18.55 kB

Missing Administrator Account.txt 0.52 kB

Mobile Secret Codes.txt 31.09 kB

Modify .exe Files And ***** A Program.txt 3.06 kB

More Hacking/A beginners guide to Hacking UNIX.txt 5.61 kB

More Hacking/A *****ing Tutorial/C101-90.000 3.85 kB

More Hacking/A *****ing Tutorial/C101-90.001 32.32 kB

More Hacking/A *****ing Tutorial/C101-90.002 30.93 kB

More Hacking/A *****ing Tutorial/C101-90.003 14.75 kB

More Hacking/A *****ing Tutorial/C101-90.004 54.91 kB

More Hacking/A *****ing Tutorial/ED!SON.NFO 1.58 kB

More Hacking/A Guide to Internet Security- Becoming an Ueber*****er.txt 8.56 kB

More Hacking/A Guide to the Easiest Hacking there is.txt 4.58 kB

More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands.htm 23.03 kB

More Hacking/A Small Guide to Hacking HOTMAIL.txt 3.02 kB

More Hacking/A UNIX Hacking Tutorial.txt 82.20 kB

More Hacking/Almost Everything You Ever Wanted To Know About Security (but.txt 47.52 kB

More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt 40.84 kB

More Hacking/An Introduction to Denial of Service.txt 44.78 kB

More Hacking/An Introduction to the Computer Underground.txt 17.03 kB

More Hacking/Basic Networking.txt 14.04 kB

More Hacking/BBS Crashing Techniques.txt 3.72 kB

More Hacking/BRUTE- A brute force approach to hacking Unix passwords.txt 3.31 kB

More Hacking/Closing the Net.txt 30.69 kB

More Hacking/Compression and *****s for Dummies.txt 52.75 kB

More Hacking/Computer Bulliten Boards and the Law.txt 56.06 kB

More Hacking/Computer Chrime - Current Practices, Problems and Proposed So.txt 96.53 kB

More Hacking/Computer eMail and Privacy.txt 19.18 kB

More Hacking/Computer Hackers News Articles.txt 5.89 kB

More Hacking/Computer Rights vs First and Forth Amentment Right.txt 44.24 kB

More Hacking/Computer Security.txt 63.52 kB

More Hacking/Computer Security_2.txt 51.94 kB

More Hacking/Computer Viruii.txt 19.98 kB

More Hacking/Computerized Governmental Database Systems Containing Persona.txt 40.34 kB

More Hacking/COPS and Robbers-Unix System Security.txt 35.18 kB

More Hacking/Copyright Guides for Photographers.txt 17.02 kB

More Hacking/Crash Course in X Windows Security.txt 12.45 kB

More Hacking/Crime and Puzzlement.txt 62.34 kB

More Hacking/Cultural Formations in Text-Based Virtual Realties.txt 257.27 kB

More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion.txt 20.53 kB

More Hacking/Dark Angel’s Phunky Virus Writing Guide .txt 18.90 kB

More Hacking/Defamation Liability of Computerized Bulliten Board Operators.txt 101.36 kB

More Hacking/Dept of Treasury Letter.txt 11.25 kB

More Hacking/Electronic Bulliten Boards and ??Public Goods’ Explainations o.txt 45.84 kB

More Hacking/Electropolos - Communication and Comunity on IRC.txt 112.45 kB

More Hacking/Ethload User’s Guide.txt 81.28 kB

More Hacking/Formulating A Company Policy on Access to and Use and Disclos.txt 12.14 kB

More Hacking/Free Speech in Cyberspace.txt 244.25 kB

More Hacking/Gender Issues in Online Communications.txt 24.86 kB

More Hacking/Government Computer Security Techniques.txt 7.88 kB

More Hacking/HACKDICT.TXT 272.00 kB

More Hacking/Hacker Test.txt 20.84 kB

More Hacking/Hackers A-Z.TXT 256.00 kB

More Hacking/Hackers Who Break into Computer Systems.txt 57.40 kB

More Hacking/Hacking Bank Of America’s Home Banking System.txt 5.79 kB

More Hacking/Hacking Compuserve Infomation Service.txt 7.43 kB

More Hacking/Hacking Faq.txt 42.06 kB

More Hacking/Hacking GTE Telemail.txt 19.12 kB

More Hacking/Hacking IRC - The Definitive Guide.txt 13.72 kB

More Hacking/Hacking PC-Pursuit Codes.txt 8.10 kB

More Hacking/Hacking Techniques.txt 8.52 kB

More Hacking/Hacking TRW.txt 2.58 kB

More Hacking/Hacking TYMNET.txt 5.79 kB

More Hacking/Hacking Unix System V’s.txt 10.93 kB

More Hacking/Hacking Wal-Mart Computers.txt 4.09 kB

More Hacking/Hacking Webpages.txt 3.90 kB

More Hacking/How the Traditional Media Clasifications Fail to Protect in t.txt 40.50 kB

More Hacking/How to crash AOL.txt 4.75 kB

More Hacking/How to dial out of a UNIX System.txt 3.49 kB

More Hacking/How to find Security Holes.txt 15.99 kB

More Hacking/How to get a Shell in 24 hours.txt 7.98 kB

More Hacking/How to Hack UNIX System V.txt 10.93 kB

More Hacking/How to login to a C.B.I. System.txt 3.00 kB

More Hacking/How to send ICQ Bombs.txt 2.33 kB

More Hacking/Information of Hacking AngelFire Websites.txt 3.21 kB

More Hacking/Introduction to Denail of Service.txt 44.78 kB

More Hacking/IP addressing, and gaining IP’s.txt 13.70 kB

More Hacking/IP Addressing.txt 13.70 kB

More Hacking/ISSN Numbers- An Introduction.txt 5.96 kB

More Hacking/Junk Mail- How Did They All Get My Address.txt 12.70 kB

More Hacking/LENROS~1.TXT 184.58 kB

More Hacking/LENROS~2.TXT 7.41 kB

More Hacking/MEMETICS.TXT 45.79 kB

More Hacking/MINDVOX.TXT 64.57 kB

More Hacking/MORRIS~1.TXT 31.18 kB

More Hacking/NEIDOR~1.TXT 41.02 kB

More Hacking/NFS Tracing.txt 34.20 kB

More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt 20.86 kB

More Hacking/NY_2'S Guide to Obtaining An IP Address. .doc 10.50 kB

More Hacking/Organizational Analysis in Computer Science.txt 65.00 kB

More Hacking/PGP Startup Guide.htm 26.00 kB

More Hacking/Presumed Guilty.txt 153.76 kB

More Hacking/Raising Hell with Unix.txt 12.91 kB

More Hacking/Remarks of the President and Vice President to Silicon Valley.txt 37.70 kB

More Hacking/RIGGSB~1.TXT 54.03 kB

More Hacking/RIGGS_~1.TXT 54.03 kB

More Hacking/RIGHTS~1.TXT 7.99 kB

More Hacking/RIVERA.TXT 26.43 kB

More Hacking/Security holes.txt 11.77 kB

More Hacking/Seisure Warrent Documents for Ripco BBS.txt 72.01 kB

More Hacking/Site Security Handbook.txt 247.43 kB

More Hacking/SJ-DEC~1.TXT 45.03 kB

More Hacking/SJ-RESP.TXT 69.59 kB

More Hacking/SMTP-Simple Mail Transfer Protocol.txt 117.61 kB

More Hacking/Summary of FBI Computer Systems.txt 5.07 kB

More Hacking/SUNDEVIL.TXT 100.17 kB

More Hacking/SUPREM~1.TXT 56.70 kB

More Hacking/TCP packet fragment attacks against firewalls and filters.txt 4.39 kB

More Hacking/Telenet-The Secret Exposed.txt 9.91 kB

More Hacking/The Basics of Hacking- Introduction.txt 24.82 kB

More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt 85.17 kB

More Hacking/The Constitution in Cyberspace.txt 46.60 kB

More Hacking/The *****ing Manual.txt 86.38 kB

More Hacking/The Electronic Communication Privacy Act of 1986 - A Laymans .txt 10.04 kB

More Hacking/The Greatest Hacker of all time.ASC 25.02 kB

More Hacking/The Hacker’s League.txt 12.37 kB

More Hacking/The Inner Circle Book’s Hacking Techniques.txt 1.96 kB

More Hacking/The Lamahs-Guide to Pirating Software on the Internet.txt 12.21 kB

More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB

More Hacking/The National Information Infrastructure-Agenda for Action.txt 96.49 kB

More Hacking/The Newbies Handbook- ?? How to beging in the World of Hacking.txt 43.83 kB

More Hacking/The Newbies-User’s Guide to Hacking.txt 47.35 kB

More Hacking/The Pre-History of Cyberspace.txt 60.25 kB

More Hacking/The Price of Copyright Violation.txt 73.11 kB

More Hacking/The REAL way to hack RemoteAccess.txt 12.12 kB

More Hacking/The Secret Service, UUCP,and The Legion of Doom.txt 19.63 kB

More Hacking/the UNIX operating system (Berkley 4.2).txt 13.55 kB

More Hacking/Theft of Computer Software-A National Security Threat.txt 12.22 kB

More Hacking/Thoughts on the National Research and Education Network.txt 19.72 kB

More Hacking/Tips on Starting Your Own BBS.1 8.04 kB

More Hacking/undocumented DOS commands.txt 23.17 kB

More Hacking/UNIX Computer Security Checklist.0 49.34 kB

More Hacking/UNIX Use and Security - By the Prophet.txt 153.74 kB

More Hacking/UNIX Use and Security From The Ground Up.htm 135.60 kB

More Hacking/UNIX- A Hacking Tutorial.SIR 82.26 kB

More Hacking/Viruii FAQ.txt 4.07 kB

More Hacking/Virus-Trojan FAQ.txt 1.95 kB

More Hacking/What Files are Legal for Distribution on a BBS.txt 20.83 kB

More Hacking/What To Look For In A Code Hacking Program.htm 5.56 kB

More Hacking/What To Look For In A Code Hacking Program.txt 5.46 kB

More Hacking/What You Should Know About Computer Viruses.DNA 16.91 kB

More Xp Tips and tricks make your computer more faster.txt 46.14 kB

Moving and Removing the Start Button.txt 0.66 kB

Msn Messenger & Gmail.txt 3.69 kB

My Flash Bookmarks, long list of tutorials.txt 2.98 kB

Myth about WPA ( How it is done ), Windows Product Activation Technique.txt 45.54 kB

Nero How To Verify The Validity Of The Sn U Use.txt 0.88 kB

New Hacking Ebooks/A Basic UNIX Overview.rtf 22.46 kB

New Hacking Ebooks/A BEGINNERS GUIDE TO Hacking Unix.txt 6.05 kB

New Hacking Ebooks/A Novice’s Guide to Hacking 2004.txt 40.75 kB

New Hacking Ebooks/A Novice’s Guide To Hacking.txt 8.58 kB

New Hacking Ebooks/A Short HACKER SPEAK Glossary.txt 9.78 kB

New Hacking Ebooks/A simple TCP spoofing attack.txt 14.60 kB

New Hacking Ebooks/Accessing the bindery files directly.txt 3.97 kB

New Hacking Ebooks/An Architectural Overview of UNIX Network Security.htm 53.27 kB

New Hacking Ebooks/Anonymity complete GUIDE.rtf 28.90 kB

New Hacking Ebooks/ANONYMOUS emails.txt 3.15 kB

New Hacking Ebooks/Anonymous FTP FAQ.htm 28.14 kB

New Hacking Ebooks/ANSIBombs II Tips And Techniques.txt 10.05 kB

New Hacking Ebooks/attacks on networks how to stop.htm 67.77 kB

New Hacking Ebooks/Backdoor.txt 18.71 kB

New Hacking Ebooks/Backdoors.txt 19.15 kB

New Hacking Ebooks/BBS CRASHING TECHNIQUES.txt 3.72 kB

New Hacking Ebooks/Bust Avoidance For ~censored~.txt 5.82 kB

New Hacking Ebooks/Firewall Protection how to.rtf 33.12 kB

New Hacking Ebooks/Guide to Hacking with sub7.doc 106.00 kB

New Hacking Ebooks/hacking and phreaking.doc 168.00 kB

New Hacking Ebooks/Hacking for Dummies Volume 2.doc 147.00 kB

New Hacking Ebooks/Hacking For Newbies.doc 54.00 kB

New Hacking Ebooks/hacking in telnet ftp.rtf 57.47 kB

New Hacking Ebooks/hacking on Telnet explained.doc 16.25 kB

New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 1.doc 4.58 kB

New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 2.doc 8.25 kB

New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 3.doc 4.51 kB

New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 4.doc 0.00 kB

New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 5.doc 0.00 kB

New Hacking Ebooks/hacking password protected site.doc 26.50 kB

New Hacking Ebooks/Hacking Password Protected Website’s.doc 3.06 kB

New Hacking Ebooks/hacking passwords.doc 26.50 kB

New Hacking Ebooks/How to learn to hack in easy steps.doc 100.00 kB

New Hacking Ebooks/How to use the Web to look up information on hacking.doc 16.28 kB

New Hacking Ebooks/IP how to.rtf 5.15 kB

New Hacking Ebooks/NetBios explained.doc 26.68 kB

New Hacking Ebooks/Proxy how to.rtf 3.13 kB

New Hacking Ebooks/Routing Basics.pdf 30.25 kB

New Hacking Ebooks/telnet trick port 25.doc 1.76 kB

New Hacking Ebooks/Yahoo Chat Commands how to.rtf 0.93 kB

New Pc Or New Motherboard.txt 3.77 kB

New Way To Relive Some Zinio File.txt 1.95 kB

news groups the how to do.txt 11.40 kB

Nice list of windows shortcuts.txt 7.50 kB

No Text Icons.txt 0.29 kB

Ntfs Cluster Size, better harddrive performance.txt 1.34 kB

Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org.txt 0.91 kB

Open Windows Explorer To A Different Default Direc.txt 0.74 kB

Optimize Broadband & Dsl Connections.txt 1.91 kB

Optimize Emule Connection.txt 1.20 kB

Outpost Rules, Outpost rules for system & app.txt 7.32 kB

Outsmarting System File Protection.txt 5.37 kB

Overclocking_Tutorial.txt 7.67 kB

Packet Attacks - Version 1.1, { Packet_Attack_Exlained}.txt 25.94 kB

Part 0 Dc++.txt 4.11 kB

Part 1 Bittorrents.txt 4.19 kB

Part 2 Irc (mirc).txt 4.91 kB

Part 3 Ftp.txt 2.71 kB

Partitioning Your Harddisk With Fdisk.txt 2.13 kB

Pc File Extention Listing.txt 26.48 kB

Pc Maintenance Guide.txt 10.20 kB

Peer2mail Tutorial.txt 9.37 kB

Performance Increase Through My Computer.txt 0.53 kB

Phreaking/2600 Hertz Single Tone Generator Schematic.txt 1.95 kB

Phreaking/A List of every TeleNet code that there is.txt 1.96 kB

Phreaking/A List Of Government BBS Numbers.txt 13.07 kB

Phreaking/An Extensive Guide to Bell System Man Holes.txt 10.10 kB

Phreaking/An Introduction into TeleScan.txt 3.98 kB

Phreaking/An Introductory Guide To TeleNet Commands.txt 2.20 kB

Phreaking/Area Codes and Time Zones.txt 4.90 kB

Phreaking/Becoming A Phreaker - The Quick n’ Easy Way.txt 17.09 kB

Phreaking/Bell Hell Volume #1.txt 10.29 kB

Phreaking/Bell Hell Volume #2.txt 15.92 kB

Phreaking/Breaker B0X.txt 1.96 kB

Phreaking/busybox.txt 1.61 kB

Phreaking/Cellular Listening with a TV .txt 1.96 kB

Phreaking/Cellular Telephone Phreaking Phile Series VOL 1.txt 10.00 kB

Phreaking/Drake’s Phreaking Tutorial.txt 3.34 kB

Phreaking/Hacking VoiceMail Systems.txt 25.89 kB

Phreaking/How BT phone cards works.txt 4.18 kB

Phreaking/How Phone Phreaks are Caught.txt 12.00 kB

Phreaking/How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt 11.38 kB

Phreaking/How to make a Free Phone Call.txt 2.16 kB

Phreaking/How to Put an End to Unwanted or Harassing Phone Calls.HAR 12.10 kB

Phreaking/Phone Systems Tutorial by The Jolly Roger.txt 8.68 kB

Phreaking/Phreakers Handbook.txt 9.83 kB

Phreaking/Quick Phone Modifications.txt 4.12 kB

Phreaking/The ABC’s of Payphones part 1.txt 2.58 kB

Phreaking/The ABC’s of Payphones part 2.txt 2.12 kB

Phreaking/The ABC’s of Payphones part 3.txt 2.21 kB

Phreaking/The ABC’s of Payphones part 4.txt 2.64 kB

Phreaking/ThE Beige BoX .txt 6.23 kB

Phreaking/The History of British Phreaking.htm 8.29 kB

Phreaking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB

Phreaking/The Moterola Bible.txt 116.99 kB

Phreaking/The Myth of the 2600Hz Detector .txt 6.55 kB

Phreaking/The Official Phreaker’s Manual.txt 499.25 kB

Phreaking/The Phreakers Handbook-1.txt 62.87 kB

Phreaking/The Telephone Works.txt 9.25 kB

Phreaking/The Ultimate Phreaking Guide .txt 1.96 kB

Phreaking/Understanding the Telephone System.txt 16.34 kB

Phreaking/Zen and the Art of Fone Phreaking `97 .txt 66.74 kB

Play Games On PS2 Without ModChip.txt 5.37 kB

Play On A Bnet Emulator, and f off cd key check =).txt 1.81 kB

Port Numbers.txt 40.19 kB

Problem With Internet Navigation, Clean Host File.txt 0.47 kB

Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt 1.77 kB

Quick Msc.txt 0.50 kB

Quick Shutdown for XP, How to create a shutdown shortcut..txt 0.54 kB

Quickly Start The Shared Folder Wizard.txt 0.40 kB

Rapidshare hack!!!!! Free premium acount for all.txt 3.08 kB

Rapidshare Hacked, unlimited upload, no countdown.txt 1.72 kB

Rapidshare Timelimit.txt 0.98 kB

Read This! Av Compare!.txt 7.56 kB

Recover A Corrupted System File.txt 1.10 kB

Recover a Quick erased CD RW.txt 3.89 kB

Reformat&Reinstall.txt 2.58 kB

Regedit.exe & Regedt32.exe, Whats the difference.txt 2.87 kB

Registry Disassembled a basic tutorial.txt 7.10 kB

Reinstall Internet Explorer 6.txt 1.13 kB

Release Codes, Read, and Learn….txt 2.29 kB

Remote Desktop Through Company Firewall.txt 2.59 kB

Remote Shutdown.txt 1.22 kB

Remove Linux From Your Pc Safely, …and restoring your MBR.txt 1.66 kB

Remove Msn Messenger From Xp, several ways…txt 4.99 kB

Removing Banners From Free Webhosts.txt 2.69 kB

Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt 0.97 kB

Rename ??recycle Bin’ To Whatever You Want.txt 0.66 kB

Reregister All .dll Files Within Registry.txt 1.54 kB

Reset your lost Bios Password.txt 4.24 kB

Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt 1.28 kB

REVERSE CODING.txt 15.11 kB

Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt 0.44 kB

Running A Board forum From Your Own Pc.txt 2.32 kB

Running Vanishing Console Programs With A Click!, Ever had a console program that vanis….txt 1.13 kB

Safely Editing the Registry….txt 1.86 kB

Save Your Desktop Icon Settings.txt 2.18 kB

Saving and loading Photoshop actions.txt 1.79 kB

Scheduled Tasks - Defrag, how to set up scheduled defrags.txt 1.92 kB

ScreenLock Professional v2.0.41.txt 0.04 kB

SEARCH eBOOK in FTP SEARCH ENGINE.txt 0.43 kB

Search For Ebook Server With Google.com.txt 0.35 kB

Search like a real warez d00dz, for warez of course!.txt 0.57 kB

Searching For Something To Download, This may help.txt 0.34 kB

Secret Backdoor To Many Websites.txt 2.09 kB

Secrets Of Lock Picking.txt 53.74 kB

Securing WinXP Pro (with what win-xp has to offer.txt 9.60 kB

Securing your WINDOWS XP computer.txt 1.19 kB

Set Google as your Default Search in IE.txt 0.55 kB

Set Win Explorer to open the folder you want!, Little trick.txt 0.23 kB

sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt 3.21 kB

sidebar fix.txt 0.57 kB

Simple Tweaks For Peak Pc Graphics Performance.txt 10.16 kB

Single Click Shutdown.txt 2.82 kB

Single-click To Open An Item…, IF the Folder Options is grayed out.txt 1.19 kB

Slow Loggon Time, one fix for problem.txt 0.96 kB

Slow Opening Of File Dialogs.txt 1.10 kB

Some Cool Site For Tutorials.txt 0.41 kB

Some Google Tricks, again.txt 1.74 kB

Some More Tips To Improve Your Winxp.txt 24.09 kB

Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt 10.71 kB

Sp2 Tweaks.txt 3.44 kB

Speed Up Internet.txt 4.46 kB

Speed up menu display.txt 0.54 kB

Speed up Mozilla FireFox.txt 0.45 kB

Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt 1.02 kB

Speeding up menus in XP.txt 0.27 kB

Speeding up your internet connection under Linux and Windows.html 11.75 kB

Spoofing emails, via telenet.txt 0.41 kB

Standard ASCII Character Set.txt 1.79 kB

Steps to Clean Install XP.txt 8.23 kB

Stop A Restart Process In 3steps.txt 0.29 kB

Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt 1.23 kB

System Changes To Foil Hackers And Browser Hijacke.txt 7.65 kB

System File Checker For Windows Xp.txt 2.26 kB

Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt 50.96 kB

Testing Wattage Consumption Of Your Computer, Measuring your computer’s wattage.txt 9.33 kB

The Antivirus Defense-in-Depth Guide.txt 2.77 kB

The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt 3.69 kB

The Modern Phreakers Guide To Beige Boxing.txt 4.32 kB

The Modern Phreakers Guide To Payphones.txt 6.98 kB

The Port Guide, Port number and info.txt 24.64 kB

The Ultimate Guide To Installing Windows Xp Sp2.txt 3.14 kB

Three Ways Of Bypass Starforce Cd Protection.txt 2.48 kB

Tip for shutdown windows - virus.txt 0.39 kB

Tips And Tricks, Windows XP.txt 41.24 kB

Tired Of Reinstalling Windows.txt 2.31 kB

To Get And Show The Ip Via Javascript.txt 0.62 kB

Top 5 Myths About Safe Surfing, PC Magazine.txt 3.36 kB

Transferring Data.txt 6.45 kB

Translating Binary To Text.txt 6.22 kB

Translating Binary to Text2.txt 5.72 kB

Trojan Ports.txt 1



Download:
http://rapidshare.com/files/174186159/leechersplace.wordpress.com_1000_20hacking_20tutorials_20-_20The_20Best_20of_202008.rar

Read More......

Konsep Dasar Hacking

Jumat, 09 Januari 2009

Dalam suatu kesempatan, saya pernah melihat seorang auditor keamanan jaringan melalukan penetration test (pen-test) terhadap suatu sistem IT. Karena penasaran saya melihat sedikit2 cara penetration test yang dilakukan. Waktu itu saya belum banyak tahu tools apa aja yang digunakan, yang saya tau dia menggunakan tcpdump untuk menganalisis paket apa aja yang lewat, trus untuk men-scan beberapa host menggunakan Nessus. Ada salah satu aplikasi yang digunakan berbasis web yang terdapat kumpulan beberapa exploit. Waktu itu saya belum tahu aplikasi apa itu, yang saya ingat aplikasi itu menggunakan alamat http://127.0.0.1:55555, nah berbekal port 55555 saya mencari di google, dan ternyata itu adalah Metasploit Framework!.

Peristiwa itu menginspirasikan saya untuk mengenang masa-masa lalu ketika masih seneng2nya ngoprek dan belum ‘tercemar’ oleh DotA. Akhirnya sekarang saya ingin belajar ngoprek lagi, tp lebih fokus ke exploitnya saja. Tulisannya ini akan saya buat menjadi tiga bagian. Bagian pertama mengenai bagaimana salah satu cara umum yang dilakukan untuk menge-hack suatu system. Disini saya lebih menitikberatkan untuk hacking OS Windows XP, karena OS ini paling banyak dipakai orang. Bagian kedua lebih banyak ke teori mengenai exploit. Tapi karena mungkin akan sangat sulit dipahami (saya sendiri msh blm bisa membuat exploit sendiri), saya hanya menuliskan hasil terjemahan yang membahas apa itu dan cara kerja exploit. Sedangkan bagian terakhir merupakan praktek bagaimana mengelakukan penetration test menggunakan metasploit di Windows XP.

Bagian 1

*ini merupakan artikel lama mengenai salah satu cara umum yang dilakukan untuk hacking. (artikel ini jg di mirror oleh Negative a.k.a Jim Geovedi di sini). Langkah dibawah ini merupakan cara ’standar’, hacking sebenarnya tidak harus selalu sesuai dengan ’standar’ ini.

Hacking buat pemula

- by aCh

Artikel ini ditujukan bagi pemula, dan disusun oleh pemula. Ditulis untuk pengetahuan semata. Untuk temen2 yg udah ahli, sok aja dilewat, tapi dibaca juga gpp….

Apa sebenarnya hacking itu? klo menurut pengertian gue, hacking adalah ngoprek. Yup, hacking adalah ngoprek, mempelajari sesuatu dengan keingintahuan (curiosity) yg tinggi, ngutak atik sesuatu, ‘ngudek-ngudek’ sampai ke ‘jeroannya’. Sesuatunya apa dong? ya terserah… bisa komputer, mobil, motor, mesin. Tapi masalahnya ada ngga ya hacker mobil, hacker motor, atau hacker pesawat terbang?? hehe… Walaupun saat ini hacking identik dengan ‘bobol-membobol’, tapi gue kurang setuju klo cuman bobol server orang doang!. Ada yang bilang ‘Hacking is Art’, trus dimana letak seninya dong? Mau tau pengertian hacking sebenarnya, coba baca artikel sebelumnya (How to Become A Hacker). Di situ dijelasin bahwa hacker berkaitan dengan kemahiran teknis serta kegemaran menyelesaikan masalah dan mengatasi keterbatasan. Contoh hacker pada saat ini yang sering-sering disebut adalah Linus Torvald (tau ngga? itu lho yang menciptakan Linux). Apa dia tukang bobol? belum tentu kan….

Pada artikel ini, gue pengen membagi pengalaman mengenai Hacking, walaupun sampai saat ini gue belum pernah nge-Hack ke server orang. Salah satu cara untuk mencoba simulasi Hack yaitu H3cky0uRs3lf! Buat komputer kita sebagai server (sekaligus belajar konfigurasi server) trus install program yg dibutuhkan. Misalnya klo mo Web Hacking, coba install Apache atau IIS. Atau kita sesuaikan dengan exploit yang udah kita dapet. Tapi lebih baik install Linux atau FreeBSD dulu di komputer pribadi, trus konfigurasi sebagai server, lalu simulasi Hack, setelah itu baru Hack Betulan… Apalagi klo di kost ada jaringan.

Pro dan Kontra Hacking


Pro

Kontra

Etika Hacking

Semua informasi adalah free

Jika semua informasi adalah free, maka tidak ada ladi privacy

Aspek Security

Intrusion adalah ilustrasi kelemahan sistem

Tidak perlu menjadi pencuri untuk menunjukkan pintu yang tidak terkunci

Idle Machines

Hacking hanya pada idle machines

idle machines milik siapa ?

science education

hanya membobol tapi tidak merusak

“hacker wannabe” berpotensi sangat besar untuk merusak

Okeh, sekarang waktunya melakukan aksi…

1. Fase Persiapan

~ Mengumpulkan informasi sebanyak-banyaknya

- Secara Aktif : - portscanning

- network mapping

- OS Detection

- application fingerprinting

Semua itu bisa dilakukan menggunakan toolz tambahan seperti nmap atau netcat

- Secara Pasif : - mailing-list (jasakom, newbie_hacker, hackelink, dsb)

- via internet registries (informasi domain, IP Addres)

- Website yang menjadi terget

2. Fase Eksekusi
~ Setelah mendapatkan informasi, biasanya akan didapatkan informasi mengenai OS yg digunakan, serta port yang terbuka dengan daemon yg sedang berjalan. Selanjutnya mencari informasi mengenai vulnerability holes (celah kelemahan suatu program) dan dimanfaatkan menggunakan exploit (packetstromsecurity.org, milw0rm, milis bugtraq, atau mencari lewat #IRC).
~ Mengekspolitasi Vulnerability Holes
- compile eksploit -> local host ->

$gcc -o exploit exploit.c

$./exploit

# hostname (# tanda mendapatkan akses root)

Mengukur Kecepatan Baca/Tulis Flash Disk

Rabu, 07 Januari 2009

Beberapa bulan yang lalu saya membutuhkan UFD baru, mengingat UFD transcend yang kecil saya itu selalu sulit dicari karena ’saking’ kecilnya. Hal ini cukup menyebalkan juga, jadi saya membutuhkan UFD yang ukurannya normal, desainnya sederhana, memiliki kecepatan baca/tulis cepat dan tentunya berwarna hitam :)

UFD Kenz 2008
Kredit Photo : O2 Flame

Saya bingung memilih transcend atau kingston, keduanya merupakan merk UFD yang menurut saya bisa diandalkan. Transcend, unggul dalam hal model desain dan juga garansi (seumur hidup, langsung ditukar baru jika masih ada stok barangnya). Sedangkan kingston, terkenal sebagai produsen memori besar yang memiliki keahlian dalam membuat berbagai tipe memori PC (Personal Computer).

Akhirnya saya memilih Kingston DT-100 4GB. Saya termakan dengan promosi penjual yang mengatakan UFD ini memiliki kecepatan baca yang tinggi dibandingkan UFD yang lainnya. Pertanyaannya adalah bagaimana membuktikan apa yang dikatakan oleh penjual UFD tersebut.

Setelah mencari-cari di internet, saya mendapatkan sebuah shareware yang bisa digunakan untuk mengukur kecepatan baca dan tulis UFD (USB Flash Disk). Shareware itu adalah Flash Memory Toolkit yang bisa didownload disini :
http://www.flashmemorytoolkit.com/

Flash Memory Toolkit terdiri atas berbagai fasilitas yang sangat berguna untuk flash memory, yaitu mengetahui informasi ttg flash memory, backup data, mengembalikan file yang hilang, dan mengukur kinerja flash memory. Fasilitas terakhir yaitu File Benchmark adalah fasilitas yang akan kita gunakan untuk mengukur kinerja flash memory kali ini.

Hasil pengukuran menunjukkan bahwa apa yang dikatakan si penjual Kingston DT-100 itu memang benar, UFD ini memiliki kecepatan baca yang cukup tinggi yaitu berkisar antara 19MB/s - 21MB/s. Sedangkan kecepatan tulisnya adalah 3MB/s - 7MB/s.

flashtoolkit_kingstondatatraveler-20-300x233 Mengukur Kecepatan Baca/Tulis Flash Disk

Sebagai perbandingan, Kingston U3 saya yang dulu saja hanya memiliki kecepatan baca sekitar 11MB/s dan kecepatan tulis sekitar 4MB/s.

flashtoolkit_kingstondatatraveler-u3-300x233 Mengukur Kecepatan Baca/Tulis Flash Disk

Imation Nano yang saya punya juga hanya memiliki kecepatan baca sekitar 12MB/s dan kecepatan tulis sekitar 3MB/s saja.

flashtoolkit_imation-nano-300x233 Mengukur Kecepatan Baca/Tulis Flash Disk

Terakhir saya cek kecepatan Trancend JetFlash T3 mungil saya, dan hasilnya masih dibawah Kingston DT-100 yaitu hanya memiliki kecepatan baca sekitar 2MB/s dan kecepatan tulis sekitar 12MB/s.

flashtoolkit_jetflashts1gjft3-300x233 Mengukur Kecepatan Baca/Tulis Flash Disk

Bagaimana dengan UFD kamu? Ayo sharingkan hasil tesnya supaya ketahuan mana UFD yang paling cepat kinerjanya dalam membaca dan menulis file.

kingston driver

Device: USB
Manufacturer: Kingston™
Operating System(s): Windows
Model: kingston usb flash memory
File name: driver5806.zip
File size: 41781 bytes
Date added: 08-Feb-2004 22:35
Number of downloads: 9708
Recommended: Download DriverScanner to get the most current drivers for your computer.


Having Trouble? Don't know which driver is the problem? Try Driver Scanner a FREE tool offered by our Friends Uniblue.

Driver Scanner scans, identifies the bad drivers and displays the results. Simple, easy and FREE! Try Driver Scanner today.

Net Tools 5.0












Net Tools 5.0 (build 70) contains a whole variety of network tools. Here is a list of the most important tools:

1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator
124) Secure File Splitting
125) My File Protection (Password Protect Files, File Injections)
126) Dynamic Switch Port Mapper
127) Internet Logger (Log URL)
128) Get Whois Servers
129) File Split&Merge
130) Hide Drive
131) Extract E-mails from Documents
132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN)
133) Hook Spy
134) Software Uninstaller
135) Tweak & Clean XP
136) Steganographic Random Byte Encryption
137) NetTools Notepad (encrypt your sensitive data)
138) File Encrypter/Decrypter
139) Quick Proxy Server
140) Connection Redirector (HTTP, IRC, ... All protocols supported)
141) Local E-mail Extractor
142) Recursive E-mail Extractor
143) Outlook Express E-mail Extractor
144) Telnet Client
145) Fast Ip Catcher
146) Monitor Host IP
147) FreeMAC (MAC Address Editor)
148) QuickFTP Server (+user accounts support)
149) NetTools Macro Recorder/Player (Keybord and Mouse Hook)
150) Network Protocol Analyzer
151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods)
152) WebMirror (Website Ripper)
153) GeoLocate IP
154) Google PageRank Calculator
155) Google Link Crawler (Web Result Grabber)
156) Network Adapter Binder
157) Remote LAN PC Lister
158) Fast Sinusoidal Encryption
159) Software Scanner
160) Fast FTP Client
161) Network Traffic Analysis
162) Network Traffic Visualiser
163) Internet Protocol Scanner
164) Net Meter (Bandwidth Traffic Meter)
165) Net Configuration Switcher
166) Advanced System Hardware Info
167) Live System Information
168) Network Profiler
169) Network Browser
170) Quick Website Maker and Web Gallery Creator
171) Remote PC Shutdown
172) Serial Port Terminal
173) Standard Encryptor
174) Tray Minimizer
175) Extra Tools (nmap console & win32 version)

Many extra features and utilities are included in this package!

Download

Best Hacking Tools (85 jadi 1) Portabel

- HOTMAIL HACKING
- YAHOO HACKING
- MSN FUN TOOLS
- FAKE SCREENS/PAGES
- OTHER HACKING TOOLS
- FUN TOOLS



Page 1:

MSN Chat Monitor And Sniffer
MSN Password Retriever
MSN Hacker DUC
Head ~censored~ HotMail HAck
HotMail Hacker XE Edition
HotMail HAck
HotMAil Hacker
MSN Passwords
MSN Flooder
MSN Sniffer
MSN SPY Lite
HotMail Hacker Gold
HotMail HAcker Final
Give me Ur Pass
HotMail Brute Forcer
MSN PAssword Finder
MSN Password Grabber
Hack MSN Password
Hack HotMAil Evolution
MAgic Password Sender
MSN Locker
HotMail Killer
Hot Freeze
MessenPass
HotMAil Hack !
Ice Cold Reload
HotMail Killer 2
Nuke MSN



Page 2:

Yahoo Messenger Login Screen
MSN Messenger 7 Login Screen
MSN Messenger 5 Login Screen
MSN Messenger 4.6 Login Screen
HotMail Login Screen
Fake Web Pages 2
Fake Eeb Pages 1
AOL Killer
Fake Login HotMail
B-S Spy
Saria Fake Logins



Page 3:

Yahoo Password Retrieval
Yacam
Yahoo Cracker
Yahoo Booster
Yahoo Hack!
Yahoo Password Stealer
S-H Yahoo Password Sender



Page 4:

NetWork Password Recovery
Net BIOS Name Scanner
FTP Password Hacker
Cable Modem Sniffer
Port Listening XP
Blue Port Scanner
www 2 IP
XP Killer
Sniff Password
Port Scanner
Fast Resolver
Domain Scan
Whois Domain
NetRes View
PHPbb Defacer
Angry IP Scanner
FTP Brute Forcer



Page 5:

Hook Tool Box
Smart HAck UpLoader
Remote Anything
Post Sage
PHPbb Attacker



Page 6:

Skinner
MSN Bomber Man
Ultimate Nick PopUpz
MSN 7 Universal Patcher
Emoticons Creator
MSN Picture Crawler
Anti Status Bomb
MSN Detector
Multi MSN Loader
Kitle
Protect Lithium
Tray It!
MSN Block Checker
MSN Auto Responder
MSN Virus Cleaner
MSN Dondurucu





http://rapidshare.com/files/112804728/Best_Hacking_Tools_-85_Appz_In_1-.rar





theviperfiles.com