Download Free

-
-
-
-
-
-

 

HACK

HACK FOR LEARN
Top hack tool



Spytector Undetectable Keylogger
Spytector is the ultimate invisible keylogger (spy tool) used to track all activities on a PC. Spytector is tracking all the activities of PC users (visited websites, all the keystrokes, both sides of chat conversations, opened windows etc.) and delivers the logs to you via Email or/and FTP. In the delivered logs are also included the Protected Storage passwords (Outlook, MSN and others), FireFox passwords and URL history (visited websites).


Spytector keylogger is completely stealth on the user's desktop and cannot be seen in the Task Manager, being injected into system processes.


Spytector keylogger is compatible with Windows NT4, 2000, XP, 2003, VISTA, Windows 7.


Hidden Remote Spy Software
RemoteSpy is perfect for those who want to monitor their employees, children, or spouses, while away from home or work! Remote Spy offers powerful features at an affordable price! RemoteSpy can be used for remote installation, you don't need physical access on the computer you want to monitor! 


RemoteSpy can be remotely installed, no physical access is needed! Remote Spy can record all keystrokes typed, websites visited, documents accessed, applications ran and much more, all in total stealth mode! Now you can use the same keylogger professionals use to find out the information you need in total privacy. 




Professional Hidden Keylogger
Elite Keylogger is the most powerful spy software for monitoring and recording every detail of PC and Internet activity everywhere: at home or in the office. Elite Keylogger is perfect for those who want to monitor their employees, children, or spouses, while away from home or work!


Elite Keystroke Recorder includes several integrated recording modules that monitor: instant messengers, e-mails, Internet surfing history, keystrokes, programs launched, passwords (including Windows logon password), usernames and time they worked on the computer, desktop activity, clipboard and more! Vista compatible!


IAmBigBrother Parental Control Software
IAmBigBrother is a hacking spy software that allows you to secretly monitor all incoming and outgoing email, instant messages, chats, websites and more. Once the product is downloaded and installed, it is totally hidden, and only you can access it. Products of this sort are sometimes referred to as parental control software.


This full featured monitoring software will capture ALL the passwords typed; records BOTH SIDES of MSN Messenger, Yahoo Messenger, AOL Instant Messenger; Record INCOMING and OUTGOING Yahoo Mail, Hotmail, AOL and more. 




Invisible Stealth Keylogger
Invisible keylogger secretly records all keystrokes typed in complete stealth mode. During monitoring sessions Invisible Keylogger can be customized to be completely invisible and cannot be seen in the task manager, programs files menu, system tray or uninstall list. With Invisible Keylogger running all information will be captured in complete stealth mode! Record all keystrokes typed, chat conversations, email, desktop activity and more with the most powerful stealth surveillance application offered anywhere. Capture screen shots of desktop activity, send email reports secretly with the most powerful stealth key logger available anywhere! Completely Undetectable! Invisible Keylogger is the perfect surveillance solution!


Invisible Keylogger can be configured to startup for a single user, or to start up as a service for all users on the system - perfect for monitoring multiple users on your PC if you have access to install the keylogger. 


Nessus : Premier UNIX vulnerability assessment tool
Nessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free "registered feed" version in 2008. A limited “Home Feed” is still available, though it is only licensed for home network use. Some people avoid paying by violating the “Home Feed” license, or by avoiding feeds entirely and using just the plugins included with each release. But for most users, the cost has increased from free to $1200/year. Despite this, Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.


Wireshark : Sniffing the glue that holds the Internet together
Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).


Snort : Everyone's favorite open source IDS
This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts.
Open source Snort works fine for many individuals, small businesses, and departments. Parent company SourceFire offers a complimentary product line with more enterprise-level features and real-time rule updates. They offer a free (with registration) 5-day-delayed rules feed, and you can also find many great free rules at Bleeding Edge Snort.


Netcat : The network Swiss army knife
This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections. The original Netcat was released by Hobbit in 1995, but it hasn't been maintained despite its immense popularity. It can sometimes even be hard to find nc110.tgz. The flexibility and usefulness of this tool have prompted people to write numerous other Netcat implementations - often with modern features not found in the original. One of the most interesting is Socat, which extends Netcat to support many other socket types, SSL encryption, SOCKS proxies, and more. It even made this list on its own merits. There is also Chris Gibson's Ncat, which offers even more features while remaining portable and compact. Other takes on Netcat include OpenBSD's nc, Cryptcat, Netcat6, PNetcat, SBD, and so-called GNU Netcat.


Tcpdump : The classic sniffer for network monitoring and data acquisition
Tcpdump is the IP sniffer we all used before Ethereal (Wireshark) came on the scene, and many of us continue to use it frequently. It may not have the bells and whistles (such as a pretty GUI or parsing logic for hundreds of application protocols) that Wireshark has, but it does the job well and with fewer security holes. It also requires fewer system resources. While it doesn't receive new features often, it is actively maintained to fix bugs and portability problems. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library, which is used by Nmap among many other tools.




John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists,




Ettercap : In case you still thought switched LANs provide much extra security
Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN. 


Nikto : A more comprehensive web scanner
Nikto is an open source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired). It uses Whisker/libwhisker for much of its underlying functionality. It is a great tool, but the value is limited by its infrequent updates. The newest and most critical vulnerabilities are often not detected.


Ping/telnet/dig/traceroute/whois/netstat : The basics
While there are many whiz-bang high-tech tools out there to assist in security auditing, don't forget about the basics! Everyone should be very familiar with these tools as they come with most operating systems (except that Windows omits whois and uses the name tracert). They can be very handy in a pinch, although for more advanced usage you may be better off with Hping2 and Netcat.


OpenSSH / PuTTY / SSH : A secure way to access remote computers
SSH (Secure Shell) is the now ubiquitous program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network, replacing the hideously insecure telnet/rlogin/rsh alternatives. Most UNIX users run the open source OpenSSH server and client. Windows users often prefer the free PuTTY client, which is also available for many mobile devices. Other Windows users prefer the nice terminal-based port of OpenSSH that comes with Cygwin. Dozens of other free and proprietary clients exist.




THC Hydra : A Fast network authentication cracker which supports many different services
When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC.


Paros proxy : A web application vulnerability assessment proxy
A Java based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQL injection and cross-site scripting.


Dsniff : A suite of powerful network auditing and penetration-testing tools
This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI. A separately maintained partial Windows port is available here. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs.




NetStumbler : Free Windows 802.11 Sniffer
Netstumbler is the best known Windows tool for finding open wireless access points ("wardriving"). They also distribute a WinCE version for PDAs and such named Ministumbler. The tool is currently free but Windows-only and no source code is provided. It uses a more active approach to finding WAPs than passive sniffers such as Kismet or KisMAC.


THC Amap : An application fingerprinting scanner
Amap is a great tool for determining what application is listening on a given port. Their database isn't as large as what Nmap uses for its version detection feature, but it is definitely worth trying for a 2nd opinion or if Nmap fails to detect a service. Amap even knows how to parse Nmap output files. This is yet another valuable tool from the great guys at THC.


GFI LANguard : A commercial network security scanner for Windows
GFI LANguard scans IP networks to detect what machines are running. Then it tries to discern the host OS and what applications are running. It also tries to collect Windows machine's service pack level, missing security patches, wireless access points, USB devices, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are saved to an HTML report, which can be customized/queried. It also includes a patch manager which detects and installs missing patches. A free trial version is available, though it only works for up to 30 days.


Aircrack : The fastest available WEP/WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).


Superscan : A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.






 

SCRIPT

What Is script Computer??


Scripting language
From Wikipedia, the free encyclopedia
  (Redirected from Script (computing)
A scripting language, script language or extension language is a programming language that allows control of one or more applications. "Scripts" are distinct from the core code of the application, as they are usually written in a different language and are often created or at least modified by the end-user. Scripts are often interpreted from source code or bytecode, whereas the application is typically first compiled to native machine code.
Early script languages were often called batch languages or job control languages. Such early scripting languages were created to shorten the traditional edit-compile-link-run process.


Early mainframe computers (in the 1950s) were non-interactive, instead using batch processing. IBM's Job Control Language (JCL) is the archetype of language used to control batch processing.
The first interactive shells were developed in the 1960s to enable remote operation of the first time-sharing systems, and these used shell scripts, which controlled running computer programs within a computer program, the shell.
Languages such as Tcl and Lua were specifically designed as general purpose scripting languages that could be embedded in any application. Other languages such as Visual Basic for Applications (VBA) provided strong integration with the automation facilities of an underlying system. Embedding of such general purpose scripting languages instead of developing a new language for each application also had obvious benefits, relieving the application developer of the need to code a language translator from scratch and allowing the user to apply skills learned elsewhere.
Some software incorporates several different scripting languages. Modern web browsers typically provide a language for writing extensions to the browser itself, and several standard embedded languages for controlling the browser, including JavaScript (a dialect of ECMAScript) or XUL


Free 


Html , java , PhP , VBS , ASP ,ASPNET ,SHell ,



 

Networking


Computer network


From Wikipedia, the free encyclopedia
"Computer networks" redirects here. For the periodical, see Computer Networks (journal).


Internet map. The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.




Distributed processing
A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that facilitate communications and allows sharing of resources and information among interconnected devices. Put more simply, a computer network is a collection of two or more computers linked together for the purposes of sharing information, resources, among other things. Computer networking or Data Communications (Datacom) is the engineering discipline concerned with computer networks. Computer networking is sometimes considered a sub-discipline of electrical engineering, telecommunications, computer science, information technology and/or computer engineering since it relies heavily upon the theoretical and practical application of these scientific and engineering disciplines.
Networks may be classified according to a wide variety of characteristics such as medium used to transport the data, communications protocol used, scale, topology, organizational scope, etc.
A communications protocol defines the formats and rules for exchanging information via a network. Well-known communications protocols are Ethernet, which is a family of protocols used in LANs, the Internet Protocol Suite, which is used not only in the eponymous Internet, but today nearly ubiquitously in any computer network.


In September 1940 George Stibitz used a teletype machine to send instructions for a problem set from his Model at Dartmouth College to his Complex Number Calculator in New York and received results back by the same means. Linking output systems like teletypes to computers was an interest at the Advanced Research Projects Agency (ARPA) when, in 1962, J.C.R. Licklider was hired and developed a working group he called the "Intergalactic Network", a precursor to the ARPANET.
Early networks of communicating computers included the military radar system Semi-Automatic Ground Environment (SAGE), started in the late 1950s
The commercial airline reservation system Semi-Automatic Business Research Environment (SABRE) which went online with two connected mainframes in 1960.[2][3]
In 1964, researchers at Dartmouth developed the Dartmouth Time Sharing System for distributed users of large computer systems. The same year, at Massachusetts Institute of Technology, a research group supported by General Electric and Bell Labs used a computer to route and manage telephone connections.
Throughout the 1960s Leonard Kleinrock, Paul Baran and Donald Davies independently conceptualized and developed network systems which used packets that could be used in a network between computer systems.
1965 Thomas Merrill and Lawrence G. Roberts created the first wide area network (WAN).
The first widely used telephone switch that used true computer control was introduced by Western Electric in 1965.
In 1969 the University of California at Los Angeles, the Stanford Research Institute, University of California at Santa Barbara, and the University of Utah were connected as the beginning of the ARPANET network using 50 kbit/s circuits.
Commercial services using X.25 were deployed in 1972, and later used as an underlying infrastructure for expanding TCP/IP networks.
 

SOFTWARE

Free Blogger Template zip file    downloads
Free Netcut ( networking informator ip and mac address ) free Downloads
Free Winamp ( Mp3,mp4,windowsmedia etc)  free downloads
Plugin and template joomla free click here

-
-
-
-
-
-
-
-

 

HARDWARE

Review Harware Motherboard

Biostar A780L Desktop Motherboard - AMD Chipset Micro ATX - Socket AM2+ PGA-940 - 8...

Memory Type: DDR2, SDRAM - Graphics Card Interface: PCI, PCI Express
Package Contents: A780L Desktop Motherboard 2 x SATA Cable 1 x I/O Shield 1 x CD Driver 1 x Quick Guide . 
ALL BIOSTRAR Mainboard  here






ASUS HD 6870 Direct CU Video Card Review
By B. Ramirez | 07-06-2011 | Categories: Hardware Video Cards


We have the new Asus HD 6870 Direct CU video card that we will be looking at today. This is a mid-range card that fits into the higher end spectrum for cards in this bracket. It retails for about 200 hundred dollars in most places. This review will be taking a look at the card itself, the features that are built into this card and how well it performs against the competition. readmore >>

link hard ware review

http://www.hardwarereview.net/


 

3D and Animation Tutorial

3D Software


Lightwave 3D
Lightwave 3D is NewTek's high-end 3D animation and rendering program. Available for both Mac and PC, Lightwave has long been a leader in it's field and is actually two products bundled into one. One part, 'Modeller', is responsible for building the elements of the job and the second, 'Layout', is where the animation project takes place. This is not as complex as it may sound for the beginner and in many ways is a very logical approach. Additionally, integration between the two programs is very smooth.


On the negative side, Lightwave has often been criticised for it's user interface - Mac users in particular might cringe it unix-like menu structure. Additionally, users have to be extremely careful about file locations - project directories have to be explicitly defined, or the program gets confused. Lightwave's strong-points include the richness of it's rendering. Although, it's animation may not be up to Maya's standards.


Maxon Cinema 4D
Cinema 4D by Maxon comes as a main program with a number of add-on modules. First developed for the Amiga platform, Cinema 4D now comes for both Mac and PC. Its strong-point is certainly its interface, with customised and pre-set layouts, as well as quick switching between modeling, animation and painting layouts.


Cinema 4D has excellent modeling tools, but some users have complained that its rendering can look shiny and 'artificial'. However, it is famous for having exceptionally fast rendering - even at a high quality - a feature that many users are happy to pay for. Cinema 4D comes in several bundled version, ranging from fairly cheap to very expensive. It's worth researching these well.


3D Studio Max
3D Studio Max is an acknowledged heavyweight in the 3D design world. It has a large user-base in architectural modeling and virtual walkthroughs, but is also the dominant player in 3D games development. 3D Studio Max is also the only major 3D product that has not bothered developing a Mac version. Probably thinking, not without reason, that the Mac market is already saturated.


3DS Max comes fully featured out of the box, but has gained a huge user base largely due to the enormous amount of third party plug-ins available for it. For example, it was one of the first packages to be able to export directly to Flash, as the result of plug-in development.


MAYA
Autodesk® Maya® 3D animation software delivers an end-to-end creative workflow with comprehensive tools for animation, modeling, simulation, visual effects, rendering, matchmoving, and compositing on a highly extensible production platform. Whether you work in film, games, television, advertising, publishing, or graphic design, Maya offers state-of-the-art toolsets, combined into a single affordable offering designed to help meet today’s demanding production requirements. Autodesk® Maya® 2012 delivers new toolsets for previsualization and game prototyping, extended simulation capabilities, and improved pipeline integration.


Tutorial for Maya
http://www.creativecrash.com/maya/tutorials/

 

IT Zone Tutorial

-
-
-
-
-
-
-
-

 

FACEBOOK MARIO TEGUH

This facebook is very interactive real comment in every post
readbud - get paid to read and rate articles baca artikel bisa di bayar dollar lho??


readbud - get paid to read and rate articles baca artikel bisa di bayar dollar lho