Saturday, January 30, 2010

E-Books Learn How To Hack - 13 Tutorials

HHS_en01_Being_a_Hacker


HHS_en02_Windows_and_Linux

HHS_en03_Ports_and_Protocols

HHS_en04_Services_and_Connections

HHS_en05_System_Identification

HHS_en06_Malware

HHS_en07_Attack_Analysis

HHS_en08_Forensics

HHS_en09_Email_Security

HHS_en10_Web_Security_and_Privacy

HHS_en11_Passwords

HHS_en12_Legalities_and_Ethics

HHS_TOC_Glossary



Download :



http://rapidshare.com/files/160365089/HowtoHack_www.dl4all.com.rar



Password : http://www.dl4all.com/

reply fot thanks

E-Books Securing & Optimizing Linux The Hacking Solution

Securing & Optimizing Linux: The Hacking Solution






Open Network Architecture
ISBN: 0968879314
1208 pages
PDF
5 Mb



This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system administrators, managers, or Linux users who wish to protect their Linux systems from unauthorized intrusions and other external attacks. This new edition contains many tips and useful information related to security and optimization to help you get complete control of what could happen on your Linux server and network.



The book provides through its 47 chapters, a comprehensive collection of Linux security products and explains in the most simple and structured manner how to safely and easily configure and run many popular Linux-based applications and services, including Exim, Qmail, Apache 2, DHCP, Anti-Virus, Anti-Spam, Anti-Relaying, ProFTPD, and many others. The author of the book relentlessy searches and document new hacking solutions to bring you in this manual the most up-to-date security developments.



Download:



http://rapidshare.com/files/215005815/securing-optimizing-linux-the-hacking-solution_www.dl4all.com.rar
 
 
reply for thanks

E-Books Untold Hacking Secret

Untold Hacking Secret


5.37 MB

rar-rapidshare



Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)



Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it's OK. The key difference is that the ethical hacker has authorization to probe the target.



We work with IBM Consulting and its customers to design and execute thorough evaluations of their computer and network security. Depending on the evaluation they request (ranging from Web server probes to all-out attacks), we gather as much information as we can about the target from publicly available sources. As we learn more about the target, its subsidiaries and network connectivity, we begin to probe for weaknesses.



Examples of weaknesses include poor configuration of Web servers, old or unpatched software, disabled security controls, and poorly chosen or default passwords. As we find and exploit vulnerabilities, we document if and how we gained access, as well as if anyone at the organization noticed. (In nearly all the cases, the Information Syhstems department is not informed of these planned attacks.) Then we work with the customer to address the issues we've discovered.



The number of really gifted hackers in the world is very small, but there are lots of wannabes.... When we do an ethical hack, we could be holding the keys to that company once we gain access. It's too great a risk for our customers to be put in a compromising position. With access to so many systems and so much information, the temptation for a former hacker could be too great -- like a kid in an unattended candy store.



Download:



http://rapidshare.com/files/207193981/Untold_Hacking_Secret_www.dl4all.com.rar



Password: http://www.dl4all.com/


reply for thnaks

Ghosty's Hacker Software

Ghosty's Hacker Software contain many important software such as:


1. PMaker

2. Black OS

3. Regmon

4. Code Fusion

5. Hash

6. Crack

7. RSATool

8. Unpatcher

9. SoftIce

10. Etc.



Download: 30 MB



http://rapidshare.com/files/163609804/Ghos...er.Software.rar

reply for thnks

Hacking e-Book -34in1- (AIO)

Hacking e-Book -34in1- (AIO)

137.37 MB







This AIO have:



BlueTooth Hacking

Ethical Hacking

Google Hacks

Hack & Crack

Hack Attacks Revealed

Hack Attacks Testing - How To Conduct Your Own Security Audit

Hack IT Security Through Penetration Testing

Hack Proofing Your Network - Internet Tradecraft

Hack Proofing Your Network Second Edition

Hack Proofing Your Web Server

Hack The Net

Hack Xbox 360

Hackers Black Book

Hacking Firewalls And Networks How To Hack Into Remote Computers

Hacking a Coke Machine

Hacking and Network Defense

Hacking for Dummies

Hacking Intranet Websites

Hacking Techniques

Hacking The Cable Modem

Hacking The Linux

Hacking Web Applications

Hacking Windows XP

Hacking PSP

Kevin Mitnick - The Art of Deception

Kevin Mitnick - The Art of Intrusion

Network Security Hacks - Tips & Tools For Protecting Your Privacy

PayPal Hacks

PC Hacks

Simple Hacks - Addons, Macros And More

The Database Hacker Handbook Defending Database Servers

Wireless Hacking

Wireless Network Hacks & Mods for Dummies





Download Link:



http://hotfile.com/dl/23435790/70617f3/www.dl4all.com_Hacking_eBook_AIO.rar.html



reply for thanks

Tuesday, January 26, 2010

Hacking Exposed Cisco Network


Hacking Exposed Cisco Networks






Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.





Download:



http://rapidshare.com/files/217341566/McGraw.Hill.Hacking.Exposed.Cisco.Networks.Cisco.Security.Secrets_www.dl4all.com.rar


reply for thanks

Hacking The PSP


Hacking The PSP


English
PDF
13.53 MB
338 Pages



Hacking the PSP covers everything you need to know to:



Transfer video and DVDs to your PSP

Transfer audiobooks and text

Hack the games you play every day (including using the PSP as an XBox game save device)

Move your TiVo and ReplayTV shows to your PSP

Convert your DVDs to run on your PSP

Create your own quick-charge battery packs

Learn how to program the PSP

Repair your PSP

Create your own hacks and run homebrew software

Find all the online and offline resources you need

And much more!



Download:



http://hotfile.com/dl/13975376/758ac01/hacking.the.psp_DL4ALL.com.rar.html


reply for thanks

Norton 360 AIO 11Years License


Norton 360 AIO 11Years License

190Mb



Info:


"Provides comprehensive, automated protection for everything pc users care about."

EditByBSEditor: Norton 360 is designed to deliver all-in-one security for everything the computer users in your family care about. Easy to use, it helps provide automatic and transparent Protection from viruses and spyware, fraudulent Web sites, phishing scams, hackers, identity theft, and more. With a renewable subscription, up to three PCs in your Household can be provided with Norton 360 protection, safeguarding your family when they play games, send and receive email, download files, chat, or surf the Web. And transaction security features allow you to shop and bank online with confidence.

Norton 360 also helps keep your PCs tuned for Peak Performance, and safeguards the data on them by making it easy to back up photos, music, financial documents, and other files—and to restore them at any time. Flexible options allow you to back up your files to CD, DVD, and USB devices. For even more convenience, you can also set up automatic backups to an attached hard drive or a secure online storage service to safeguard your important files in the event something happens to your PC. And for enhanced performance, a smart background scheduler automatically schedules key Norton 360 functions such as scans, backups, and tune-ups so that they don’t interfere with your PC activities.



Why Choose Norton 360™?Protects your PC, online activities and your identity 24/7 – Delivers award-winning protection against viruses, spyware, worms, phishing, hackers, and more in one complete, fully automated solution.

NEW! Provides industry-leading security without slowing you down — Runs fast and uses less memory than competing programs, so you won’t sacrifice performance for security.† Take the Performance Challenge and see for yourself.

NEW! Blocks botnets — Automatically detects botnets to Prevent hackers from taking control of your PC and accessing your private information.





Download:



Code: Select All

http://hotfile.com/list/267684/891a451Mirror:



Code: Select All

http://sharingmatrix.com/folder/21527
 
reply for thanks

Office Password Recovery Magic v6.1.1.129


Windows Sofware

Office Password Recovery Magic v6.1.1.129
6 MB



Office Password Recovery Magic is password recovery software designed to help users recover the lost or forgotten password. Any office files' read-only passwords can be recovered here. We still can recover *.xls, *.ppt, *.mdb, *.doc and Office 2007 formats files. The easy-to-use interface help users do exact search. Users can set parameters to exact the range of searching password, such as the length of the password and the shape of the password. Users still can using dictionary file, which is a string document to find password more quickly.You can enjoy full function of recovering password. If you have questions or suggestions about our software, please contact us, we hope to grow up with you together.



Here are some key features of "Office Password Recovery Magic":

· Recover the lost or forgotten password quickly.

· Recover read-only passwords for Microsoft Office Word.

· Recover read-only passwords for Microsoft Office Excel.

· Recover read-only passwords for Microsoft Office PowerPoint.

· Recover read-only passwords for Microsoft Office Access.

· User-friendly interface.



Download



Code:

http://hotfile.com/dl/24548834/fb2530f/Office.Password.Recovery.Magic.v6.1.1.129-BEAN.rar.html


reply for thanks

Monday, January 25, 2010

The Ultimate Password Recovery 70 in 1



All In One (AIO) ? The Ultimate Password Recovery 70 in 1

The Ultimate Password Recovery 70 in 1
405.7 MB



Thie ultimate password recovery software collection compirses of 70 in one password recovery tools, with this software you can retreive all forgotton passwords from everything from IM clients to OS'S. The ultimate password recovery software contains:




* Accent Office Password Recovery v 2.50

* Accent WORD Password Recovery v 2.40

* ActMon Password Recovery XP v 4.03

* Advance RAR Password Recovery v 1.53

* Advanced ACT Password Recovery

* Advanced Archive Password Recovery v 4.0

* Advanced FTP Password Recovery v 1.0

* Advanced Office Password Recovery v 3.12

* Advanced Office Password Recovery v 4.00

* Advanced zip Password Recovery V.4.0

* Asterix Logger v 1.04

* Atomic Zip Password Recovery

* Bios PW Unlock

* ChromePass v 1.05

* Content Adviser Password Remover v 1.0

* Delete XP and Vista Logon Passwords Bootable ISO

* Dell Bios Boot PW Reset ISO

* Dialupass v 3.02

* Distributed Password Recovery v 1.6

* Distributed Password Recovery 2.0

* Easy Password Recovery v 2.01

* Email Password Restore v 1.4

* FAR Manager Password Recovery

* FileZilla Password Recovery v1.0

* Flash FXP Password Recovery v1.0

* FTP Password Recovery Master v 1.1

* Gmail Password Recovery v 1.10

* Google Password Recovery v 1.10

* Google Talk Password Recovery v 1.10

* Hacking windows password

* Instant Messengers Password Recovery Master v 1.0

* Internet Explorer PassView v 1.16

KRyLack Password Recovery v 2.11

KRyLack Password Recovery V 2.73.02

* LostPassword Passware Kit v 8.0

* Mail PassView v 1.52

* MessenPass v 1.26

* Miranda Password Recovery v 1.0

* MS Access Password Recovery v 1.01

* MSN and Google Talk Password Recovery v 1.5

* Multi.Password.Recovery v 1.0.9

* Network Password Recovery v 1.11

* network Password Recovery v 1.21

* Office Password Recovery Magic

* Office Password Recovery Magic v 6.1.0

* Outlook PST Password Recovery v 1.12

* Paltalk Password Recovery v 1.09

* Passware Kit Forensic v 9.0

* Passware Password Recovery Kit Enterprise v 9.3

* Passware Password Recovery Kit v 9.3

* Password Recovery Studio 6

* PasswordFox v 1.11

* PasswordsPro v 2.5

* PDF Password Remover v 2.5

* Rar Password Cracker v 4.12

* RAR Password Recovery Magic

* RAR Password Recovery Magic v 6.1

* Rar Password Unlocker v 3.0

* Remote Desktop PassView v 1.01

* SniffPass v 1.07

* SpotAuditor V 3.8

* Total Commander Password Recovery v 1.0

* Trillian Password Recovery v 1.0

* Visual Zip Password Recovery v 2.40

* VNC PassView v 1.02

* Windows Live Password Recovery v 1.01

* Wireless Key VIew v 1.27

* Word Password Unlocker v 3.0

* ZIP Password Recovery Magic

* ZIP Password Recovery Magic v 6.1.0

* Zip Password Recovery Master v 6.2

* Zip Password Tool v 1.6

download here!!!





Code:

http://hotfile.com/dl/22231661/9336e35/Now4ever.Vn__UltimatePWRecoverySoftware.part1.rar
 
reply for thanks

Saturday, January 23, 2010

Hacking The Xbox 360 For Dummies


PDF

96 Pages
6.43 MB





Download:



http://rapidshare.com/files/75427004/1388HXD.rar



Mirror:



http://www.megaupload.com/?d=MDVJVEIU



Pass: http://www.dl4all.com/


reply for thanks

make esey money


Make Easy Money








What Does This Do?

This is not really a hack, but just a way of showing you how I make

extra money for buying stuff online and paying for this sites hosting costs.



What Programs Do You Need?

Any Internet Browser



Steps

1. First you will need a Paypal.com or Alertpay.com account, these are where you

will receive the money you make.

2. Then you need a Neobux.com account, this is the site where

you make the money

3. Now login to your Neobux account and click the View Advertisements link

at the top right. You will see about 4 ads.

4. Click the blue text of one ad, then click the red button that shows up and

a new window should appear with a loading bar on top. Wait until

the loading bar at the top is full and it says "Advertisement Validated".

5. You just made $0.01! That is not a lot of money, so this is where getting

referrals comes into play.

6. You can refer people to do the same thing you are doing, but since you

referred them, that means you get money for their clicks. With

many referrals you can start making $10 or more a day.

7. How do you get referrals? Give them your referral link which you get from

logging in and going HERE, or renting referrals, which you do by paying

25 cents per referral and you will keep them for 30 days. If you refer them

yourself you keep them forever, so try for that instead of renting.

8. Also, the only way you get credit for your referral clicks is to click ALL of your own ads EVERYDAY, so be sure to do that.



Done! You are now ready to start making some easy money!


reply for thanks

Hacking tutorials 2009 8.10 MB


Hacking tutorials 2009

8.10 MB





Download:



http://www.ziddu.com/download/2202801/Hackingtutorials2009.rar.html



Pass: http://www.dl4all.com/


reply for thanks

Thursday, January 21, 2010

HACKING WINDOW XP


HACKING WINDOW XP


379 PAGES

12.1 MB

PDF



A complete guide on Hacking Windows XP-More than

200 Hacks,Tweaks,Mods and Customizations BYSteve Sinchak



XP Your Way:Boost up Boot Speed,Max. Security,Total Makeover,Accelerate Surfing and Downloads.



Download: 12.1 Mb



http://sharembit.com/870/HackingWindowsXP_www.dl4all.com.rar.html


reply for thanks

Software Anti-Hacking PRO Unleashed



Anti-Hacking PRO Unleashed

3.8Mb



Close and lock the door, then don't give out keys to strangers... Anytime you are connected to the Internet you are assigned an IP address. This is your door, if it is open anyone can come in without you knowing it. the simplest protection is a utility that blocks intruders and alerts you. Most of these can be downloaded free on the internet and offer minimal security. Personal firewall software can be effective, but at times confusing to set up and a separate copy is required for each machine. The most effective firewall is a hardware device. It can be a separate computer with two network cards installed and proxy software. The important thing is having two network cards or MAC addresses, forcing network traffic through the proxy software. Another solution is a stand alone firewall device between your computer, or network and the Internet.



Download:



http://www.teradepot.com/qcn3e1dc0udm/Sophos.SafeGuard.PrivateCrypto.v2.40.0.10_www.dl4all.com.rar.html
 
 
reply for thanks

Software Live CD for Wireless hacking (Updated New Tools)


Ultimate Black Hat weapon (Rapidshare link)


- Live CD with all the tools you need to hack a WLAN / wireless Access point & more-

Live-CD - OS runs from CD - 635 mb - .iso

- also used by the FBI ...



WEP Hacking - The Next Generation

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.



Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong"encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.



Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets?a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.



Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!"



Basic Directions:

1)Boot from cd

2)get the wep key

3)write it down

4)reboot into windows

5)connect using wep key.





http://rapidshare.com/files/309449857/Live_CD_-_Wireless_hacking_dl4all.com.part1.rar

http://rapidshare.com/files/309449693/Live_CD_-_Wireless_hacking_dl4all.com.part2.rar

http://rapidshare.com/files/309451438/Live_CD_-_Wireless_hacking_dl4all.com.part3.rar

http://rapidshare.com/files/309438142/Live_CD_-_Wireless_hacking_dl4all.com.part4.rar

http://rapidshare.com/files/309437701/Live_CD_-_Wireless_hacking_dl4all.com.part5.rar

http://rapidshare.com/files/309447160/Live_CD_-_Wireless_hacking_dl4all.com.part6.rar


reply for thanks

Software Top 10 Vital Hacking Software and Tools



Top 10 Vital Hacking Software and Tools

23.6 MB



The collection contains the most necessary programs and utilities for the hacker. All is presented in a convenient environment with background music.



Contains a following software:

- Cain and Abel (sniffer)

- John the Ripper (powerful brootforce)

- NetStumbler (allows to define radius of action of network WiFi - in real time for the diagram it is possible to see size of a useful signal)

- Nmap (one of the best network scanner)

- Putty (a quite good telnet the client)

- SuperScan (powerful scanner TCP of ports, pinger and hostname resolver)

- Hping (allows to generate special ICMP/UDP/TCP packages and to look through answers ping a host in style of the usual utility ping)

- Lcp (audit and restoration of passwords Windows NT / 2000 / XP / 2003)

- Nikto (perl the scanner broken Web a server, with support SSL)

- Kismet (sniffer a wireless network 802.11 and the decoder of packages)



Note: This Tools May be DETECTED as VIRUS.. Plz IGNORE.. Its A Hacking Stuff.. So any ANTI-VIRUS Will Detect this as a VIRUS.. Don't Worry Its HARMLESS.



Enjoi!!!!!!



Peace!!!!!!



NO MIRROR PLZ



Download:



http://www.megaupload.com/?d=56XNITHI



Mirror:



http://www.easy-share.com/1907144440/Top.10.Vital.Hacking.Software.and.Tools_www.dl4all.com.rar
 
reply for thanks

Tuesday, January 19, 2010

Invisible Secrets 4


Invisible Secrets 4


Keep those prying eyes out of your communications and prevent unwanted people from reading your private files!



Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for sensitive information. Using our file encryption software nobody, not even your wife, boss, or a hacker would realize that your important papers or letters are stored in your last holiday pictures, or that you use your personal web page to exchange messages or secret documents. With Invisible Secrets 4 - File encryption software you may encrypt and hide files directly from Windows Explorer, and then automatically transfer them by e-mail or via the Internet.



It features strong file encryption algorithms (including AES - Rijndael), a password management solution that stores all your passwords securely and helps you create secure passwords, a shredder that helps you destroy beyond recovery files, folders and internet traces, a locker that allows you to password protect certain applications, the ability to create self-decrypting packages and mail them to your friends or business partners, a tool that allows you to transfer a password securely over the internet, and a cryptboard to help you use the program from Windows Explorer. Invisible Secrets 4 - File encryption software is shell integrated and offers a wizard that guides you through all the necessary steps needed to protect your data.





Cryptography



File and folder encryption using 8 strong encryption algorithms (AES - Rijndael, Twofish, RC 4, Cast128, GOST, Diamond 2, Sapphire II, Blowfish).



Steganography



Hides your sensitive data into innocent files, so nobody can find them. Features five innocent carriers for hiding: JPEG, PNG, BMP, HTML and WAV.



Email Encryption



Possibility to create a package with encrypted content and to send it by e-mail.



Password manager - Random password generator



With Invisible Secrets 4 you can store passwords in encrypted password lists and you can also generate real-random passwords.



File Shredder



An integrated Shredder (DoD 5220.22-M compliant) to destroy files and folders beyond recovery.



Application Locker



An Application Locker to password protect any application installed on your computer.



IP-to-IP Password Transfer



Allows the secure transfer of passwords between two computers using an encrypted internet line.



Virtual Keyboard



The virtual keyboard was created in order to prevent any key logger software from stealing your passwords.



Cryptboard



A Shell Integrated Cryptboard - use it like a basket for storing file names and make various operations on them in a single step



Real-time News System



It will allow you to be kept up-to-date with new versions, new products, new features, and special offers, without having to browse our website

searching for new information. You will instantly get the news from us.



crack include



Link

http://rapidshare.com/files/86508098/secrets.rar

reply for thanks

Misc Premium Passwords, Kaspersky genuine key maker, Google hacking, Hiding IP, Firefox tweaks etc.. a must for all



Premium Passwords, Kaspersky genuine key maker, Google hacking, Hiding IP, Firefox tweaks

5 MB





Download:



http://rapidshare.com/files/145972536/Premium_Accounts.zip



Password: http://www.dl4all.com/
 
reply for thanks

Misc Useful hacking tips for your PC



Get to know some amazing tips and tricks for Your PC!!


Some of the HACKS are-

Hacking a webcam

Speeding up your internet

Orkut flooder

Speeding up Mozilla Firefox

Creating ringtones

Making a trial version of a Software FULL forever

and many more





Download:



http://rapidshare.com/files/281818913/hacking_www.dl4all.com_by_ultimategames.rar



PASSWORD:www.dl4all.com
 
rely for thanks

Software FOR HACKERS OR BEGINERS ANY WIRELESS HACKING TOOL BY POWER TOOLS


FOR HACKERS OR BEGINERS : ANY WIRELESS HACKING TOOL BY POWER TOOLS


HACK ANY WIRELESS CONNECTION USING DIS TOOL,

IT HELPS YOU IN HACKING ANY WIRELESS...

Wireless Crack: You can easly (4mins) crack the WEP/WPA



DOWNLOAD: 6.5MB



http://rapidshare.com/files/337267299/WirelessCraking_dl4all.com.rar


reply for thanks

Software Hacking del.icio.usUltimate Guide to Hacking and Tweaking


Hacking del.icio.us:Ultimate Guide to Hacking and Tweaking

18.67Mb



This is the ultimate guide to hacking, tweaking, and modifying del.icio.us - one of the hottest topics on the web today. Tons of hacks including:

* Geotagging del.icio.us bookmarks

* Mapping del.icio.us tags with Google Maps

* Building and watching tag clouds over time

* del.icio.us tagging using browser keywords

* del.icio.us Firefox hacks

* Integrating Bloglines and del.icio.us

* Linking to posts w/ greasemonkey

* del.icio.us Safari hacks

* del.icio.us desktop hacks for Windows, Mac, and Linux

* Combining del.icio.us and blogs - Movable Type, WordPress, blosxom: and others

* Programming with the del.icio.us API



Download:



http://bitroad.net/download/918434bb5b888458f741a2795e5ddb5b8/Hacking_del.icio.us_www.dl4all.com.pdf.html


reply for thanks

Software Hacking Wep Tutorials


I find out how hack wep , and now i write it in notepad and post it for you .


I download all tools for you , so you will have all what you need.

Some antivirus "aircrack-ng-1.0-win" see like virus , but its cracking tool.

I hope i help you guys .

It have only 12 steps and 2 tools what you need , for tutorials you will see "Wep Hack tutorials"

you can't miss it . Good luck and have fun



Home/Info URL

Jskako



Download : (size :4408 KB)



http://rapidshare.com/files/288320268/_www.dl4all.com.rar



Password: http://www.dl4all.com/

reply for thanks

ULTRA ISO 9.3.3.2685 + KEYGEN



ULTRA ISO 9.3.3.2685 + KEYGEN






Download



http://rapidshare.com/files/254803010/Ultra-ISO-9.3.3.2685----dl4all.com----AlviNz.rar.html



PASSWORD dl4all.com



reply for thanks

Ultra Rapidshare Downloader 2.0



Ultra Rapidshare Downloader 2.0



I can't tell anymore.



Download:



http://rapidshare.com/files/146752859/Ultra_Rapidshare_Downloader_2.0.rar



Pass: http://www.dl4all.com/


reply for thanks

Video Hacking Collecction


Video Hacking Collecction


Hacking Megaupload, Hacking DNS, .....





Hacking MegaUpload

Hacking Windows XP Administrator

Hacking Windows XP

Hacking DNS

Hacking PHP Mail

Hacking Hotmail Password[/b][/size][/center]



Download: 33.27



http://rapidshare.com/files/270572450/video_hack_www.dl4all.com.rar


reply for thanks

Video Tutorials Hacking Wireless Tutorial



Download: 7.22




http://rapidshare.com/files/272100846/WirelessHack_www.dl4all.com.rar



Password: http://www.dl4all.com/
 
 
reply for thanks

Xbox 360 Hack Pack RC1 2.1


Xbox 360 Hack Pack RC1 2.1

186 Mb



This AIO is for modding/hacking your xbox 360.

It comes with these tools.

Includes the latest:

Firmware

Firmware Tools

Burning Tools

Harddrive Tools

Media Converters

Media Streamers

Developer Tools

Device Drivers

Gamedump Tools

Xbox Live Management Tools

Security Sector Tools

Written Tutorials

Online Video Tutorials

All inside one easy to manage/use (sexy) GUI

...:[ FEATURES ]:...

*Copy To Temp: Copy to temp gives you the option to copy (almost) any file/application included in the Hack Pack to a temporary folder (of your choice or default) so the user may view/run any file/application externally.

*Xbox 360 Hack Pack includes a Firmware Version Checker , it connects to the selected server and displays the newest firmware release to public so you never fall behind



Download:



http://hotfile.com/dl/16987492/212ed64/Xbox_360_Hack_Pack_RC1_2.0.1.0_x86-x64_Installer_www.dl4all.com.part1.rar.html

http://hotfile.com/dl/16987511/f6032f8/Xbox_360_Hack_Pack_RC1_2.0.1.0_x86-x64_Installer_www.dl4all.com.part2.rar.html

http://hotfile.com/dl/16989170/0c085ac/Xbox_360_Hack_Pack_RC1_2.0.1.0_x86-x64_Installer_www.dl4all.com.part3.rar.html


reply for thanks

Hacking Exposed 5


Hacking Exposed 5




One of the international best-selling. The book walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols. Hacking Exposed wastes no time in explaining how to implement the countermeasures--where they exist--that will render known attacks ineffective.



Download:



http://rapidshare.com/files/221119113/hacking_exposed_5_www.dl4all.com.rar

Hacking Secrets Revealed


Hacking Secrets Revealed




Hacking Secrets Revealed



Magnificent a documentary one to you emitted by Discovery Channel, that reviews great landmarks of the history of hacking.



In this way, you will be able to see Steve Wozniak or the John Draper and, by all means, to Kevin Mitnick, interviewed people in exclusive right for the program. It is worth the trouble to put themselves comfortable and to know first hand the opinion of these pioneers on an as dark subculture as attractive.



Download:



http://hotfile.com/dl/8636524/28651c8/DC_HisH.part1.rar.html

http://hotfile.com/dl/8636520/9ed937e/DC_HisH.part2.rar.html

Full Hack Pack 2009 [Exclusive]



New Hacking Tool-s 2009 for Georgia Hacking Community




Download



http://hotfile.com/dl/7266531/9a1059f/All-In-One_Ultra_Hacker_(2009)_dl4all.com.rar.html

Mobile Hacking Ultimate Tools Pack



Mobile Hacking Ultimate Tools Pack

6Mb



With this program you can hack mobile phones via bluetooth .You can read the sms ,turn off the mobile phone,make it play videos or music and do many other things.

It works on Sony erricson, Nokia and Samsung.



Download:



http://www.teradepot.com/dmr2vdj5dl68/Mobile.Hack.Tool_2.1_www.dl4all.com.rar.html

Big Ultra Hackers Pack (155 in 1)


Big Ultra Hackers Pack (155 in 1)

56.52 Mb



Your attention a collection of Big Ultra Hackers Pack. It is a package of tools for hacking. This collection includes over 155 unique instruments.



Platform: Windows All

Language: English

License: Freeware

Size: 56.52 Mb



Download:



http://letitbit.net/download/2111.2aeb74aef2835c2a1d339afbf/Big_Ultra_HPack_155_in_1_www.dl4all.com.rar.html

KingCripts Hacking Pack


AIO

KingCripts Hacking Pack(Legionares™)
37Mb
RS&HF



Download :



http://rapidshare.com/files/285595015/www.dl4all_LegionaresSuite.exe



Mirror :



http://hotfile.com/dl/13615917/def3b04/www.dl4all_LegionaresSuite.exe.html



hacker tool 100 in 1


Download my this latest hacking softwares collection and some hacking tips and enjoy!!!!!!!!




link

http://hotfile.com/dl/23888235/bdd607d/Best_Hacking_Tools_-_100_in_1_2010.rar.html

AIO Software Power Pack v1.4.0.2




AIO pack includes


12 Adobe Portables Collection

AIO Disk Image 2008

AIO Uniblue Products 2009

ImTOO Software All In One 2009

Best Hacking Tools - 85 in 1

Best Portable Soft 2009 40 in 1

ZC Software DVD Authoring Software 2009

AIO StarDock Applications September 2008

Bit Defender - All Product 2009

Auslogics AIO Pack 2009

Media Plugins & Players

DFX Audio Enhancer 9.102

Real Player v.11.0.9.372 Gold Premium

MediaMonkey Goid 3.1.0.1228

GOM Player 2.1.17.4710

FabFilter Pro-C VST RTAS 1.12

Winamp PRO 5.551 Build 2419

BSPlayer Pro v2.37.992B

CyberLink PowerCinema 6 v6.0.0.1309 Multilingual

CyberLink PowerDVD Ultra v9.0.1501 Multilingual

VLC Media Player v0.9.9







http://bitroad.net/download/744e7b06e9ebf318a413cdcea872de413/PowerPack142_www.dl4all.com.exe.html

The Ankit Fadia Hacking Books Collection




CONTENTS


1.The Unofficial Guide to Ethical Hacking

2.Network Security: A Hacker’s Perspective

3. The Ethical Hacking Guide to Corporate Security

4.Hacking Mobile Phones

5.Email Hacking

6.Windows Hacking

7.Google Hacking

8.Intrusion Alert

9. Encryption

10.Tips and Tricks on Linux Computer Forensics (COMING SOON)

11.OS Hacking (COMING SOON) + Many Many More

Sunday, January 17, 2010

THE JAMES BOND TRICK




If you short-circuit theleft middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying.

Saturday, January 16, 2010

HOW TO BLOCK SITE IN YOUR PC TRICK

Block Site On Your Computer Easily




Here is a guide to Block the websites that you want to Block to prevent your Brother/Sister for teasing.

Please Note that this will not work If you use proxy from your browser.This tutorial has been tested on Vista/XP/Windows 2003/Windows 2000.

Ok here it is starting

First step is to prepare your self [ Prepare Site list ]

- Now go to Start and go to Run

- Type Following address/path c:\WINDOWS\system32\drivers\etc\HOSTS [please make sure your current/working window installation is on which drive Replace c: with ur windows installtion drive]

- Now open this file in Notepad/Wordpad/Any othe text editor you want

- Note that this is Host file of windows where you can specify the IP address of a Domain

- So now main work come [ I'm taking example to blocking the orkut ]

type following in the last lines of that file

127.0.0.1 orkut.com

127.0.0.1 www.orkut.com

the above will specify orkut.com or www.orkut.com with an IP address of 127.0.0.1 i.e the domain name of orkut will be resolved as 127.0.0.1

- Now the most Important thing is to save that file :-D

- now open command prompt [ Start -> Run -> CMD ]

- Type following command

ipconfig /flushdns

the above command will flush the DNS cache on ur machine

- Now do following command on command prompt

ping orkut.com

It will show the following

pinging orkut.com [127.0.0.1] with 32 bytes of data

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

if it is shown its IP address else then 127.0.0.1 then ur setting might be wrong [ In that case you can contact me by leaving a comment here ]

- Now we are in final stage of our tutorial

open you web browser and u will be unable to open the website you blocked

——————–

Note for user who want to use the block site again

Open the host file as explained above and delete entries and give ipconfig /flushdns command

REMOVE WIDOWS GINUSE ADVANTEG SPAM

Open a command prompt window by going to Start > Run. Type "cmd." Click "Enter" to open the command prompt window.




Step 2Type "CD C:\Windows\System32" and click "Enter" to access the System32 directory.



Step 3Open a blank Notepad document by going to Start > All Programs > Accessories > Notepad.



Step 4Type the next three lines into the blank document. Press "Enter" after each line.

"taskkill -IM wgatray.exe"

"del wgatray.exe"

"del wgalogon.dll"



Step 5Press "Ctrl" + "a" to select all three lines. Press "Ctrl" + "C" to copy the lines. Open your command prompt windows and press "Ctrl" + "V" to paste and run the lines.

This will stop the Windows XP Genuine Advantage Notification task and delete associated files to prevent the notification from appearing again.



Step 6Restart your computer by going to Start > Turn Off Computer > Restart to ensure the notification is gone.

Friday, January 15, 2010

HOW TO RECHARGE YOUR MOBILE FOR FREE

Recharge ur phone every month freely by following this process


Please follow the instruction & you can recharge your SIM card

absolutely free.

Yes it is possible, see how technology can be used to make technicians

fool.

I just got a mail from a friend of mine, whose friend is B.Tech.(ETC)

from IIT Powai, teaching me how to reload my hand set every month for free.

Engineered by a group of rebel programmers. I am going to share this to all of you.

Please follow the instructions as stated below before you start it:

Applicable for ORANGE (HUTCH), AIRTEL, SPICE & BSNL users only ,sorry

for idea, BPL and Reliance users and it is done illegally of course. But there

are many things that are illegal in this world. But then who cares. Don’t worry nobody can trap you. No legal action can be taken on you for this. So go ahead without worrying.

You can only do this every 24th & 25th of the month as the network system is

under upgrade.

1.) ** Dial ” 1415007 ” using your h/phone and wait for 5 second

2.) ** after 5 second, you will hear some funny noise (like sound from TV when the station is finished)

3.) ** Once the noise stop, immediately dial 9151 follow by your phone number

4.) ** A recorded message “please insert your pin number” will follow

5.) ** punch in the pin number ” 011785 45227 00734? and wait for the operator finish repeating the above pin number.

6.) ** After the pin number has been repeat, dial ” 0405-for AIRTEL, 404 -for ORANGE (HUTCH)” . 403 -for BSNL”

7.) ** you will hear a message “for air time top-up press 1723? you just have to follow the instructions.

8.) ** After you follow the instruction, the noisy sound will re-appear for about 5 second.

9.) ** once the noise stop, dial ” 4455147 ” follow by ” 146 “.

10.) ** after about 5 second, dial ” 1918 ” after 3 second dial ” 4451?.

11.) ** after you done that, punch in the serial number “01174452271145527 ” you will hear dial tone.

12.) ** once the dialing tone stop, dial ” 55524785933 ” you will hear “please

key in your password”

13.) ** the password is ” **** 2+253+7891*+546322 ” wait for the message “your

password accepted”.

14.) ** you will hear ” please insert your emei number ” now you have to be fast

to dial your own h/phone number.

15.) ** you will hear a dialing tone, when the call is answered, dial “1566 ” and you will hear “re-confirm emery number”.

16.) ** once you hear that message, dial ” 6011556 2245334 follow by your h/phone number”.

17.) ** after a while, you will hear a message “your pin number is accepted” you

have to dial ” 1007 “.

18.) ** after you done that you will hear “your emery number is accepted”.

19.) ** continue dial ” 4566 ” you will hear “your password is accepted”.

20.) ** once the second message finish, immediately dial your own h/phone number.

21.) ** Now you will receive a message saying

rohit


bank hacking guide

Heres a bank hacking guide:




Quote:

ORIGINAL: The Ultimate Uplink Guide



6.1 - Bank Hacking



Despite the risks involved, hacking a Bank is relatively easy. As long as you are fast, by following this guide you should have no problems. Before you start, you will need to know an Account Number at the bank you want to hack, your Uplink Bank Account number, and the IP of Uplink International Bank.



1. Connect to the bank, with InterNIC as your first bounce, and bypass the monitor and proxy with Level 5 Bypassers.

2. Break into the account you want to steal from, using the account number as the user name, and the password breaker to get the password. You should not have a trace on you because of the monitor bypass.

3. Enter the transfer screen and transfer money to your Uplink bank account

4. Delete the Statement logs from the account you stole from saying you just transferred money.

5. Connect to Uplink bank, log into your account, bypass monitor and proxy then delete the log saying you received money

6. Connect to InterNIC and delete the bounce logs.

7. Start Spending. You don't have to wait before you can spend the money you just stole.



Note that once you have a password of an account, you don't need the monitor bypass to access it, the bank doesn't trace normal account entries.

Send SMS for free from ur email account 2 any mobile

Send SMS for free from ur email account 2 any mobile., It's very fast this is what u r lookin for:
1. Andhra Pradesh Airtel
Code:
9849012345@airtelap.com
2. Andhra Pradesh Idea Cellular
Code:
9848012345@ideacellular.net
3. Andhra Pradesh Hutch
Code:
9885012345@south.hutch.co.in
4. Chennai Sky cell / Airtel
Code:
9840012345@airtelchennai.com
5. Chennai RPG Cellular
Code:
9841012345@rpgmail.net
6. Delhi Hutch
Code:
9811012345@delhi.hutch.co.in
7. Gujarat Idea
Code:
9824012345@ideacellular.net
8. Gujarat Celforce / Fascel
Code:
9825012345@celforce.com
9. Karnataka Hutch
Code:
9886012345@south.hutch.co.in
10. Karnataka Airtel
Code:
phonenumber@airtelkk.com
11. Tamil Nadu Airtel
Code:
919894012345@airteltn.com
12. Tamil Nadu BPL Mobile
Code:
9843012345@bplmobile.com
13. Tamil Nadu Aircel
Code:
9842012345@airsms.com
Free SMS to BSNL Mobile Phones ( 94 series ) - BSNL users who activated Unified Messaging service will be provided with an email address for their cell phone. Based on location the email varies i.e.,
Code:
North - cellnumber@bsnlumn.com South - cellnumber@bsnlums.com East - cellnumber@bsnlume.com West - cellnumber@bsnlumw.com
Just send an email from your gmail account to the Mobile Email of your friend and it will SMSed to your friend mobile phone.
Example: If your Friend Mobile No is 9843028370, then you’re Friend Mobile No. Series is 9843 and so you have to send an email to your friend as Code:
9843028370@bplmobile.comand it will be SMSed to his mobile

45 HACKING TOOLS

FREE 45 HACKING TOOLS
ITS ABSOLUTE FREE & EASY TO DOWNLOAD .Features:IMC Grahams TrojanIMC Ice DragonMyspace Password CrackerIMC Myspace PhisherUltra SurfRapid Share Account GenMSN Nudge MadnessIce Reloaded MSN FreezerIMC HandbookBrutusAE2Lord PSHoax ToolboxIMC Word ListBlues Port ScannerBandook RAT v1.35Project Satan 2.0EES binder v1.0File Injector v3Remote Desktop Spy v4.0Passive Terror v1.3 Final EditionDyn-DL (Dynamic downloader)Silent Assassin v2.0Net Scan Tools v4.2Rocket v1.0NStealth HTTP Security Scanner v5.8Attack Toolkit v4.1 & source code includedLegion NetBios Scanner v2.1Battle PongTeraBIT Virus Maker v2.8p0kes WormGen 2.0JPS Virus MakerIRC Ban ProtectionIRC Mega FlooderFTP Brute HackerRAR Password CrackerVbulletin 3.6.5 Sql Injection ExploitIPB 2-2.1.5 Sql Injection ExploitIPB 2-2.1.7 ExploitCain & Abel v4.9.3NetStumbler 0.4.0Cryptor 1.2VNC CrackMutilate File Wiper 2.92Hamachi 0.9.9.9pbnj-1.0U NEED WINRAR SOFTWARE FOR DOWNLOADING TOOLSDownload:http://rapidshare.com/files/34338957/Wi ... _Setup.rarpassword:www.rapidlinks.co.ukAFTER THAT U R READY FOR DOWNLOADING THESE TOOLSTHE URL LINK IS
http://rapidshare.com/files/34738681/IMC_Tool_Set.zipANOTHER LINK IS;-http://rapidshare.com/files/57355491/IMC_Tool_Set.zipCAUTION ;- PLS LOGG OFF U R AUTOMATIC UPDATE PROTECTION OF U R ANTI VIRUS SOFTWARE WHEN U INSTALIZATION OTHERWISE U R NOT ABLE TO DOWNLOAD SPECIALLY U HAD KASPERSKY.ENJOY

DOS IS ILLEGAL

DoS and distributed hacking tools finally criminalisedComputer Misuse Act updated
A law criminalising denial of service attacks and the supply of hacking tools has been brought into force in England and Wales after a number of delays. The law was already in force in Scotland.
Denial of service (DoS) attacks involve the simultaneous sending of millions of messages or page requests to an organisation's servers. The sudden, massive deluge of information can render website and email servers inoperable.
The UK's main cybercrime law is the Computer Misuse Act, passed 18 years ago. Its application to denial of service attacks had been the subject of some confusion.
In 2005, charges were brought under that Act against teenager David Lennon who sent his former employer five million emails at once. The massive volume of email disabled the office server. A Magistrates' Court said that Lennon had no case to answer because the employer's system was designed to receive email. But the High Court later said that the original judge had erred in that ruling. Lennon eventually pleaded guilty and, in 2006, he was sentenced to two months' curfew with an electronic tag.
The first attempt to amend the Computer Misuse Act, to put the illegality of DoS attacks beyond doubt, dates back six years. A Private Member's Bill to amend the Act was introduced by the Earl of Northesk in 2002, but like most Private Members' Bills, it failed to become law.
Changes were made to the Computer Misuse Act in 2006 but they were not made live at the time. In October 2007 they were adopted in Scotland, but not in England and Wales.
The Home Office said that the changes would be brought into force in April 2008, but they were not. The Statutory Instrument to bring them into force was finally passed on 24th September and the changes came into effect for England and Wales on 1st October 2008.
The changes make it a criminal offence to conduct DoS attacks. The original legislation included offences of unauthorised access to computer material and of unauthorised modification of computer material. There is now a new offence of doing anything without authorisation with intent to impair, or with recklessness as to impairing, the operation of a computer.
The new offence carries a maximum penalty of 10 years' imprisonment and a fine. It replaces the more limited offence of unauthorised modification, which carried a five-year maximum sentence.
The changes also increase the maximum penalty for unauthorised access to computer material from six months' imprisonment and a fine to two years' imprisonment and a fine.
The Computer Misuse Act has also been changed to make it an offence to make, adapt, supply or offer to supply any article which is "likely to be used to commit, or to assist in the commission of, [a hacking or unauthorised modification or DoS] offence". It is also an offence to supply an article "believing that it is likely" to be used to commit such an offence.
The meaning of "article" includes any program or data. The provisions would cover the supply of DoS or virus toolkits. Anyone convicted of breaking this section of the Act could be jailed for up to two years.
This part of the law has been controversial because security researchers have said that it could impede their work.
"The difficulty in the Act is that it says 'any item' and people are worried that that might include information about a piece of software's security vulnerability," Cambridge University security researcher Dr Richard Clayton previously told OUT-LAW.COM. "If you distribute information about a security vulnerability and the bad guys use it to attack it then the information about that vulnerability might qualify."
The Statutory Instrument which came into force this October amends the Police and Justice Act of 2006. The Instrument makes live provisions in that Act which in turn amend the Computer Misuse Act.

indian boy