Username Password

Register Here || Lost Password
Navigation
Home
Articles
Forum
Web Links
Photo Gallery
Videos
MP3 Album
Free eBook
Software
FAQ
Search
Contact Us
Last Seen Users
yanri88806:59:45
Agostok11:02:03
Albrigi 2 days
OlegSat 2 days
ylanaqy 3 days
MetalCasino 3 days
EVA-00 4 days
erik8991 5 days
ujukyr 1 week
aqaduqy 1 week
Users Online
Guests Online: 1

Members Online: 0

Total Members: 21,051
Newest Member: yanri888
Popular Downloads
1000 Hacker Tutorial... 33564
Radmin 3.1 10655
SQL Injection Expose... 9885
Free eBook Cara muda... 9196
1000 Photoshop Brushes 8952
Cara Mudah Membuat W... 8643
The Art of Manipulat... 8433
Blink 182-Neighborho... 8131
Ubuntu Is My Favouri... 8113
Avenged Sevenfold-Ni... 7976
Sponsor
Hosted By Dracoola
Tracklink
Locations of visitors to this page
RSS - Feeds
RSS - News
RSS - Articles
RSS - Forum
RSS - Downloads
RSS - Photo Gallery
RSS - Weblinks
Downloads: eBook
Hacker's HandBook


This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.
License: O/S: Version:
Added: 17/03/2009 06:23 Downloads: 321 Download (4 MB)
Stealing The Network


How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The books companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.
License: O/S: Version:
Added: 17/03/2009 06:20 Downloads: 261 Download (8 MB)
Hacking GMail


Everything about GMail including :
Inside GMail, Conquering GMail, Desktop Integration, GMail Power Tips, Skinning GMail, How GMail Works, GMail & Greasemonkey, GMail Libraries, Building API, Using GMailFS, etc..........!
License: O/S: Version:
Added: 17/03/2009 06:17 Downloads: 330 Download (3 MB)
Secrets Of A Super Hacker


Here is the most amazing book ever published on computer hacking. Step-by-Step illustrated details on the techniques used by hackers to get your data including :-
Guessing Passwords, Stealing Passwords,
Password Lists, Social Engineering,
Reverse Social Engineering,
Crashing Electronic Bulletin Boards,
Dummy Screens, Fake E-mail,
Trojan Horses, Viruses, Worms,
Trap Doors, And Much more.
Anyone concerned with computer security and data privacy needs to read this book.
License: O/S: Version:
Added: 17/03/2009 06:15 Downloads: 426 Download (1 MB)
Hack Attacks Testing


A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results.
The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in.
Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.
* Paperback: 576 pages
License: O/S: Version:
Added: 17/03/2009 06:12 Downloads: 245 Download (6 MB)
Hackin9


This book will help you learn :-
* How to use Google to find sources of personal information and other confidential data.
* How to find information about vulnerable systems and Web services.
* How to locate publicly available network devices using Google.
License: O/S: Version:
Added: 17/03/2009 06:09 Downloads: 382 Download (1 MB)
Computer Viruses For Dummies


It offers real, practical solutions to help ordinary users keep viruses out of their e-mail in-boxes-and explains how to respond when one slips through-
* In 2003, there was a major virus attack almost every month, which cost businesses worldwide an estimated $55 billion and did untold damage to home computers.
* Explains what viruses are and how they work, profiles major anti-virus software packages, shows how to keep anti-virus software updated, and helps people adopt safer computer work habits.
* The book’s value price and compact size will make it irresistible to people who need to protect their home PC or network.
License: O/S: Version:
Added: 17/03/2009 06:00 Downloads: 195 Download (2 MB)
Internet Denial Of Service


Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the each and every topic relating denial-of-service attacks.
License: O/S: Version:
Added: 17/03/2009 05:53 Downloads: 289 Download (2 MB)
Hacking Exposed-5


One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.
License: O/S: Version:
Added: 17/03/2009 05:49 Downloads: 287 Download (18 MB)
Photoshop Amazing Hair Tutorial
License: O/S: Version:
Added: 16/03/2009 06:49 Downloads: 261 Download (4MB)
Shels-Wind And Clover
License: O/S: Version:
Added: 13/03/2009 22:37 Downloads: 123 Download (19MB)
1000 Photoshop Tricks
License: O/S: Version:
Added: 26/02/2009 19:02 Downloads: 599 Download (29MB)
Photoshop User How-To Magazine (March 2009)
License: O/S: Version:
Added: 26/02/2009 19:01 Downloads: 268 Download (17.5MB)
Rurouni Kenshin Artbook
License: O/S: Version:
Added: 24/02/2009 18:13 Downloads: 350 Download (21.45 MB)
Digital Creative Arts:Special Edition
License: O/S: Version:
Added: 22/02/2009 18:10 Downloads: 364 Download (29.03 MB)
Copyright © 2007-2016