tag:blogger.com,1999:blog-54001074690304693682024-03-19T13:38:49.712-07:00Computer resourcesHardware Networking Software resources !!Unknownnoreply@blogger.comBlogger92125tag:blogger.com,1999:blog-5400107469030469368.post-1443785759822181212012-11-09T05:01:00.001-08:002012-11-09T05:04:49.849-08:00Metasploit Framework (The best hacking tool )<div dir="ltr" style="text-align: left;" trbidi="on">
<blockquote>
<h5>
<strong><span style="color: lime;"><a href="http://lh3.ggpht.com/-2ygbNhxY35A/UJz-qaeFAwI/AAAAAAAAAG8/53SsOan424g/s1600-h/metasploit1%25255B4%25255D.jpg"><img align="left" alt="metasploit1" border="0" height="271" src="http://lh3.ggpht.com/--9iGTZlToQs/UJz-ufPRUII/AAAAAAAAAHE/Ld5QVf9kI5k/metasploit1_thumb%25255B2%25255D.jpg?imgmax=800" style="border-bottom: 0px; border-left: 0px; border-right: 0px; border-top: 0px; display: inline; margin-left: 0px; margin-right: 0px;" title="metasploit1" width="240" /></a></span></strong></h5>
<h3 style="text-align: left;">
<strong><span style="color: lime;"> What is Metasploit Framework ?</span></strong></h3>
</blockquote>
<blockquote>
</blockquote>
<blockquote>
<strong><span style="color: cyan;">Metasploit</span> software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments, providing true security risk intelligence. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports.</strong> <br />
<strong><span style="color: cyan;">Metasploit</span> editions range from a free edition to professional enterprise editions, all based on the Metasploit Framework, an open source software development kit with the world's largest, public collection of quality-assured exploits.</strong> <br />
<strong><span style="color: cyan;">Metasploit</span></strong> <strong>can help penetration test, can find vulnerability,payload,exploit etc…</strong><br />
<strong>(more tutorial will come soon about metasploit) </strong><br />
<h5>
</h5>
<h3 style="text-align: left;">
<span style="color: lime;">What is a vulnerability?<a name='more'></a></span></h3>
<span style="color: lime;"><!--more--></span>A vulnerability is a security hole in a piece of software, hardware or operating system that provides a potential angle to attack the system. A vulnerability can be as simple as weak passwords or as complex as buffer overflows or SQL injection vulnerabilities. <br />
<blockquote>
<strong>Download Link :: <a href="http://downloads.metasploit.com/data/releases/metasploit-latest-windows-installer.exe"><span style="color: yellow;">here</span></a></strong></blockquote>
<blockquote>
<strong>Official website : </strong><a href="http://www.metasploit.com/" title="http://www.metasploit.com"><strong><span style="color: yellow;">http://www.metasploit.com</span></strong></a></blockquote>
<br />
<br /></blockquote>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-55518074421693966522012-11-08T22:18:00.001-08:002012-11-08T22:18:15.676-08:00GFI LanGuard (Vulnerability scanning tool)<blockquote> <p><strong><font color="#00ffff"><img style="border-bottom: 0px; border-left: 0px; display: inline; margin-left: 0px; border-top: 0px; margin-right: 0px; border-right: 0px" border="0" align="left" src="http://www.gfi.com/content/cmsimages/ss2-23120.jpg-186x150-23120.jpg" width="219" height="174">GFI LanGuard</font> gives you a complete picture of your network setup and helps you to maintain a secure and compliant network state. It does this faster and more effectively through its automated patch management features and with minimal administrative effort</strong></p></blockquote> <blockquote> <p><strong>Over 50,000 vulnerability assessments are carried out across your network, including your virtual environments.</strong> <p><strong><font color="#00ffff">GFI LanGuard</font> checks your operating system, virtual environments and installed applications using vulnerability check databases such as OVAL and SANS Top 20. It allows you to analyze the state of your network security, what the risks are, how exposed your network is and how to take action before it is compromised.</strong></p></blockquote> <blockquote></blockquote> <blockquote></blockquote> <blockquote></blockquote> <blockquote> <p><strong> Download Link :: <a href="http://www.gfi.com/downloads/register.aspx?pid=lanss"><font color="#ffff00">here</font></a></strong></p></blockquote> <blockquote> <p> <strong>Official website : <a href="http://www.gfi.com"><font color="#ffff00">www.gfi.com</font></a></strong></p></blockquote> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-89367177470411092452012-06-01T02:41:00.001-07:002012-06-01T06:54:16.014-07:00Banner Grabbing Countermeasures : Disabling or Changing Banner<div dir="ltr" style="text-align: left;" trbidi="on">
<blockquote>
<b>IIS User can use these tools to disable or change banner information : </b> </blockquote>
<ul> <ul>
<li> <b>IIS LOCKDOWN TOOL Website : <a href="http://www.microsoft.com/" style="color: yellow;">www.microsoft.com</a><span style="color: #ffff80;"> </span></b></li>
</ul>
</ul>
<b><span style="color: #00ff40;"> </span><span style="color: white;">Download Link :: <a href="http://www.microsoft.com/en-us/download/confirmation.aspx?id=25064"><span style="color: blue;">here</span></a> </span></b><b> </b><br />
<ul> <ul>
<li><b>SERVERMASK </b></li>
</ul>
</ul>
<b> Website : </b><a href="http://www.port80software.com/products/servermask/" style="color: yellow;" title="http://www.port80software.com/products/servermask/"><b>http://www.port80software.com/products/servermask/</b></a><br />
<b><span style="color: #00ff40;"> </span><span style="color: white;">Download Link :: <a href="http://www.port80software.com/products/servermask/try.asp"><span style="color: blue;">here</span></a> </span></b><b> </b><br />
<a href="http://lh4.ggpht.com/-4bksGbchvak/T8iOJ1CUDUI/AAAAAAAAAGM/MXA4SHvvDlM/s1600-h/IIS%25255B10%25255D.jpg"><img align="left" alt="IIS" border="0" height="263" src="http://lh4.ggpht.com/-4-I8O7cNCSs/T8iOMf8GIJI/AAAAAAAAAGU/-3tCLf-R_LI/IIS_thumb%25255B8%25255D.jpg?imgmax=800" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; display: inline; margin-left: 0px; margin-right: 0px;" title="IIS" width="227" /></a><br />
<a href="http://lh5.ggpht.com/-Vrc099ijzQo/T8iOOeIHjQI/AAAAAAAAAGs/fwkqTCXNdKk/s1600-h/51979572%25255B5%25255D.gif"><img alt="51979572" border="0" height="264" src="http://lh4.ggpht.com/-MOZHEDmqzbo/T8iOQyCQVNI/AAAAAAAAAGw/E9KVJVCDfP0/51979572_thumb%25255B3%25255D.gif?imgmax=800" style="border-bottom: 0px; border-left: 0px; border-right: 0px; border-top: 0px; display: inline;" title="51979572" width="158" /></a></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-77037253194767807422012-05-31T06:53:00.002-07:002012-05-31T06:54:29.441-07:00ID Serve : Banner Grabbing Tool<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.grc.com/image/idserveshot.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="249" src="http://www.grc.com/image/idserveshot.gif" width="320" /></a></div>
<br />
<b><span style="color: cyan;">ID Serve </span>is used to identify the make,</b><br />
<b>model, and version of any website's</b><br />
<b>server software.</b><br />
<b><br /></b><br />
<b>It is also used to Identify non-HTTP</b><br />
<b>(non web) Internet servers, such as FTP,</b><br />
<b>SMTP, POP, NEWS, etc...</b><br />
<br />
<br />
<br />
<br />
<br />
<a name='more'></a><br />
<br />
<br />
<br />
<b>For more info about ID serve : <a href="http://www.grc.com/id/idserve.htm"><span style="color: lime;">http://www.grc.com/id/idserve.htm </span></a></b><br />
<br />
<b><span style="color: lime;"><span style="color: black;">To Download Click <a href="http://www.grc.com/files/idserve.exe">here!</a> </span> </span></b></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-17805928196318278802012-02-04T05:42:00.000-08:002012-02-04T05:42:22.058-08:00Smart Whois (Loockup Tools)<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.tamos.com/upload/iblock/28eca426db7d6b6c33a6e4d1bb4640db.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="http://www.tamos.com/upload/iblock/28eca426db7d6b6c33a6e4d1bb4640db.png" width="306" /></a></div>
<br />
<span style="font-size: small;"><b><span style="color: cyan;">SmartWhois</span> is a useful network information utility that allows you to </b><b>look up all the available information about an </b><b>IP address, hostname or domain,
including country, state or province, city, name of the network
provider, administrator and technical support contact information. It
helps you find answers to these important questions:
</b></span><br />
<ul>
<li><span style="font-size: small;"><b>Who is the owner of the domain?
</b></span></li>
<li><span style="font-size: small;"><b>When was the domain registered and what is the owner's contact information?
</b></span></li>
<li><span style="font-size: small;"><b>Who is the owner of the IP address block? </b></span></li>
</ul>
<br />
<span style="font-size: small;"><b> </b></span><br />
<span style="font-size: small;"><b> </b></span><br />
<span style="font-size: small;"><b> </b></span><br />
<span style="font-size: small;"><b></b></span><br />
<a name='more'></a><span style="font-size: small;"><b> </b></span><br />
<span style="font-size: small;"><b>Home site : <span style="color: lime;">www.tamos.com</span></b></span><br />
<br />
<span style="font-size: small;"><b><span style="color: lime;"><span style="color: black;">Click to <a href="http://www.tamos.com/bitrix/redirect.php?event1=download&event2=smartwhois&event3=&goto=/files/sw5.zip">Download</a></span> </span></b></span></div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5400107469030469368.post-54302454141668226782011-12-26T04:55:00.000-08:002011-12-26T04:58:42.550-08:00Classroom Spy (Live screen)<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.classroomspy.com/img/screenshots/ss_main_window.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="231" src="http://www.classroomspy.com/img/screenshots/ss_main_window.gif" width="320" /></a></div>
<span style="font-size: small;"><b><span style="font-family: Verdana;"><span style="color: cyan;">Classroom Spy </span>lets you see what everyone's doing - without leaving your
desk. You can monitor the activity of all the PCs in your classroom
remotely. Plus, you can share your screen with your students' PCs,
making demos and presentations much easier.</span></b></span><br />
<span style="font-size: small;"><br /></span><br />
<span style="font-size: small;"><b>Top features</b> :</span><br />
<span lang="EN-US" style="font-family: Verdana; font-size: small; font-weight: 700;">What is it useful for?</span>
<br />
<ul style="text-align: left;">
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
For monitoring and recording your students activities on a
remote computers<a name='more'></a></span>
</li>
<li><span style="font-size: small;"><span style="font-family: Verdana;">For
preventing internet browsing on remote computers</span></span>
</li>
<li><span style="font-family: Verdana; font-size: small;">For
starting and stopping applications and processes </span>
<span style="font-size: small;"><span style="font-family: Verdana;">on remote
computers.</span></span>
</li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
For monitoring students in the classroom to achieve better
discipline or, just to assist them when they are in trouble (by
using the remote control feature). </span></li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
For administrating all computers just from one location – your
computer.</span>
</li>
<li><span lang="en-us" style="font-size: small;">
<span style="font-family: Verdana;">For presenting your screen to
students.</span></span>
</li>
<li><span lang="en-us" style="font-size: small;">
<span style="font-family: Verdana;">For locking students
computers while they are waiting for further instructions or
assignments.</span></span>
</li>
<li><span lang="en-us" style="font-size: small;">
<span style="font-family: Verdana;">Helping your students by
showing your desktop to them.</span></span>
</li>
<li><span lang="en-us" style="font-size: small;">
<span style="font-family: Verdana;">Turning off, restarting, ....
remote computers with one click.</span></span></li>
</ul>
<h3>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
Main Features:</span></h3>
<ul>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
Displaying a live picture of a remote computer.</span>
</li>
<li><span lang="en-us" style="font-size: small;">
<span style="font-family: Verdana;">You can take </span>
</span>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
control of a remote computer by controlling its mouse and
keyboard.</span>
</li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
More remote screens can be displayed in a table.</span>
</li>
<li><span style="font-size: small;"><span style="font-family: Verdana;">Computers
can be organized in computer groups (e.g. classrooms)</span></span>
</li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
A remote screen can be zoomed to an actual size.</span>
</li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
The name of the connected user is displayed.</span>
</li>
<li><span lang="en-us" style="font-size: small;">
<span style="font-family: Verdana;">Record remote computers
screens to AVI files.</span></span>
</li>
<li><span lang="en-us" style="font-size: small;">
<span style="font-family: Verdana;">Show your desktop to students</span></span>
</li>
<li><span lang="en-us" style="font-size: small;"><span style="font-family: Verdana;">Power off,
restart, hibernate, suspend remote computers</span></span>
</li>
<li><span lang="en-us" style="font-size: small;"><span style="font-family: Verdana;">Log off
desktop users</span></span>
</li>
<li><span lang="en-us" style="font-size: small;"><span style="font-family: Verdana;">Lock
workstation</span></span>
</li>
<li><span lang="en-us" style="font-size: small;"><span style="font-family: Verdana;">Control
screensaver</span></span>
</li>
<li><span lang="en-us" style="font-size: small;"><span style="font-family: Verdana;">
<span lang="sl">Prevent web browsing</span></span></span></li>
<li><span style="font-family: Verdana; font-size: small;">Multi monitor support</span>
</li>
<li><span style="font-family: Verdana; font-size: small;">Control over running processes</span>
</li>
<li><span style="font-family: Verdana; font-size: small;">You can
lock selected remote computers</span>
</li>
<li><span style="font-family: Verdana; font-size: small;">You can
display a message on selected remote computers.</span>
</li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
When lower bandwidth is required, the refresh interval can be
enlarged. </span></li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
Automatic connection to a remote computer is optional.</span>
</li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
Settings for the agent are encrypted and password protected.</span>
</li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
Connection to a remote computer is password protected.</span>
</li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
Access to monitoring the console is password protected. If more
users use the same computer, different profiles and access
passwords can be set.</span>
</li>
<li>
<span lang="EN-US" style="font-family: Verdana; font-size: small;">
More monitoring consoles can be connected to the same remote
computer - you can monitor your students from different
locations.</span>
</li>
<li><span style="font-family: Verdana; font-size: small;">
Application can optionally use encrypted communication.</span>
</li>
<li><span style="font-size: small;"><span style="font-family: Verdana;">Agent can
be remotely installed.</span></span>
</li>
<li><span style="font-size: small;"><span style="font-family: Verdana;">Fast users
switching is supported.</span></span></li>
<li><span style="font-size: small;"><span style="font-family: Verdana;">Monitor
and control thin clients (TS, RDP).</span></span></li>
</ul>
<br />
<span style="font-size: x-small;"><span style="font-family: Verdana;"><b>Home site : <a href="http://www.classroomspy.com/" style="color: red;">http://www.classroomspy.com</a></b></span></span><br />
<span style="font-size: x-small;"><span style="font-family: Verdana;"><b>Click to <a href="http://www.classroomspy.com/dwn/classroomspypro.exe"><span style="color: lime; font-size: small;">download </span></a></b></span></span><br />
<div>
<br />
<span lang="en-us"><span style="font-size: x-small;"><span style="font-family: Verdana;"> </span></span></span>
</div>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-19453841814368225282011-11-24T04:45:00.001-08:002011-11-24T04:48:15.093-08:00Friendly Pinger 5.0 (network inventory..)<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.kilievich.com/images/preview/fpinger.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="248" src="http://www.kilievich.com/images/preview/fpinger.png" width="320" /></a></div>
<br />
<div style="font-family: Verdana,sans-serif;">
<b style="color: cyan;">Friendly Pinger</b><b> - is a powerful and user-friendly application for network administration, monitoring and inventory.
<br />
</b>
</div>
<ul style="font-family: Verdana,sans-serif;">
<li><b>Visualization of your computer network as a beautiful animated screen;</b></li>
<li><b>Monitoring network devices availability;</b></li>
<li><b>Notification when any server wakes up or goes down;</b></li>
<li><b>Ping of all devices in parallel at once;</b></li>
<li><b>Audit software and hardware components installed on the computers over the network;<a name='more'></a></b></li>
<li><b>Tracking user access and files opened on your computer via the network;</b></li>
<li><b>Assignment of external commands (like telnet, tracert, net.exe) to devices;</b></li>
<li><b>Search of HTTP, FTP, e-mail and other network services;</b></li>
<li><b>Displaying your net as desktop wallpaper or on your Web page;</b></li>
<li><b>Graphical TraceRoute;</b></li>
<li><b>Opening of computers in Explorer, in Total Commander or in FAR;</b></li>
</ul>
<b>click to <a href="http://www.kilievich.com/FPinger_5_0.exe"><span style="font-size: large;"><i style="color: lime;"><u>download</u></i></span></a></b><b> </b><br /><div>
<b> </b></div>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-24315477455006632142011-11-24T04:32:00.001-08:002011-11-24T04:40:07.873-08:00Portable Storage Explorer (Display remote network...)<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.networksecurityhome.com/network_tools/removable_storage_monitoring/images/portablestorageexplorer.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="http://www.networksecurityhome.com/network_tools/removable_storage_monitoring/images/portablestorageexplorer.jpg" width="195" /></a></div>
<br />
<div style="font-family: Times,"Times New Roman",serif;">
<br />
<div style="font-family: Verdana,sans-serif;">
<span style="font-size: small;"><b><span style="color: cyan;">Portable Storage Explorer</span>
displays remote network computer USB devices, removable storage, CD-Rom
and DVD drive information and state, drive type, serial number,
revision, device name, last cleaned time, device vendor and product
name, operational state, created and modified time, device library and
more... You must have administrative privileges on the remote network
computer. All the mentioned features are provided with a user friendly
graphical interface.</b></span></div>
</div>
<div style="font-family: Verdana,sans-serif;">
<span style="font-size: small;"><b></b></span></div>
<a name='more'></a><br />
<div style="font-family: Times,"Times New Roman",serif;">
<br /></div>
<div style="font-family: Times,"Times New Roman",serif;">
<span style="font-size: small;"><b><span style="font-family: Verdana,sans-serif;">Click to </span><a href="http://www.networksecurityhome.com/downloads/PortableStorageExplorer.exe"><i style="color: lime; font-family: Verdana,sans-serif;"><u>download</u></i><span style="color: lime;"> </span></a></b></span></div>
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-70624918365124856012011-11-17T02:57:00.001-08:002011-11-17T03:09:08.541-08:00Dropbox (Backup your files on the net)<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.dropbox.com/static/images/install_graphic.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="253" src="http://www.dropbox.com/static/images/install_graphic.gif" width="320" /></a></div>
<div style="font-family: Times,"Times New Roman",serif;">
<span style="font-size: small;"><b></b></span></div>
<h3 style="font-family: inherit; font-weight: normal;">
<span style="font-size: small;"><b>Any file you save to <span style="color: cyan;">Dropbox </span>also instantly saves to your computers, phones, and the <span style="color: cyan;">Dropbox</span> website.</b></span></h3>
<div style="font-family: inherit;">
<span style="font-size: small;"><b>
</b></span></div>
<ul class="blue-bullets" style="font-family: Times,"Times New Roman",serif; text-align: left;">
<li style="font-family: inherit;"><span style="font-size: small;"><b>2GB of Dropbox for free, with subscriptions up to 100GB available.</b></span></li>
<li style="font-family: inherit;"><span style="font-size: small;"><b>Your files are always available from the secure Dropbox website.</b></span></li>
<li style="font-family: inherit;"><span style="font-size: small;"><b>Dropbox works with Windows, Mac, Linux, iPad, iPhone, Android and BlackBerry.</b></span></li>
<li style="font-family: inherit;"><span style="font-size: small;"><b>Works even when offline. You always have your files, whether or not you have a connection.</b></span></li>
<span style="font-family: inherit;">
</span>
<li><span style="font-size: small;"><b><span style="font-family: inherit;">Dropbox transfers just the parts of a file that change (not the whole thing).</span><a name='more'></a></b></span></li>
<li><span style="font-size: small;"><b>Manually set bandwidth limits -- Dropbox won't hog your connection. </b></span><br /><h3>
<span style="font-size: small;"> </span></h3>
<h3>
<span style="font-size: small;">Apps for iPhone, iPad, Android, and BlackBerry keep your Dropbox at hand, even on the go.</span></h3>
</li>
<li><span style="font-size: small;">Bring your files with you when you're on the go.</span></li>
<li><span style="font-size: small;">Edit files in your Dropbox from your phone.</span></li>
<li><span style="font-size: small;">Easily upload your photos and videos to Dropbox.</span></li>
<li><span style="font-size: small;">Share freely with family and friends.</span></li>
</ul>
<span style="font-size: small;"><b style="color: lime;">Click to <a href="https://www.dropbox.com/downloading?os=win"><u><span style="color: cyan;">download</span></u></a>.</b></span><br />
<span style="font-size: small;"><b style="color: lime;">Dropbox site : www.dropbox.com </b> </span></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-71737783604067944872011-11-15T23:48:00.001-08:002011-11-16T00:02:15.149-08:00Types of password Attacks (hacking)<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXpIWzw3lCIlg74j7zPavObxccrvd3kop4J0SRkTy5ZftfuBgtYOfAa60fX3sMSHM47wJxI4mcML9NlPvufnIM3c7iUEy_FJ3TGOsrxx3AZoXQlRdY8T2IzaUzsif8PdTu1WZVRnUhFOg/s1600/pic1.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="207" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXpIWzw3lCIlg74j7zPavObxccrvd3kop4J0SRkTy5ZftfuBgtYOfAa60fX3sMSHM47wJxI4mcML9NlPvufnIM3c7iUEy_FJ3TGOsrxx3AZoXQlRdY8T2IzaUzsif8PdTu1WZVRnUhFOg/s320/pic1.png" width="320" /></a></div>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<a name='more'></a><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR_BDOEosbADrWTxbSNG9XHtdn94VpZV0kSGtM6KyYKpNs1ImQ4MFP-yzbdbvrkemfRl8KDUdTylSddDAUbuA2eqHqerT9tnhYunmsp4nH1pVkdK9eLj3FLupMVNqoqqi7yGo-z_LxdLs/s1600/pic2.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="206" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR_BDOEosbADrWTxbSNG9XHtdn94VpZV0kSGtM6KyYKpNs1ImQ4MFP-yzbdbvrkemfRl8KDUdTylSddDAUbuA2eqHqerT9tnhYunmsp4nH1pVkdK9eLj3FLupMVNqoqqi7yGo-z_LxdLs/s320/pic2.png" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmyLrGcqVM3deT4IXFGHlRz7jbuvqhCcJY98FDTHl9TCwsbMwCw1hAUYUQ94S42JugIvFnXdwjJA73sRwWYD1LnTARMXc-xPxclwN5t7QLBc90vQGhalO7W33NUjhTxCV7Elv8O1yFO7s/s1600/pic5.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4JLBVKQjNzRfaDw5sD5Z9FZUuffgYyo0ff4qzjr83MzXEJs1A6XuGeVi_eCq4jIChZh7B-NG5Hxm0klvHckjITFlqhjdEKn2tN4wA8lOP3lVsPgb7hznRC5xu6vuSmNj2k-96aJJGwGs/s1600/pic3.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="206" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4JLBVKQjNzRfaDw5sD5Z9FZUuffgYyo0ff4qzjr83MzXEJs1A6XuGeVi_eCq4jIChZh7B-NG5Hxm0klvHckjITFlqhjdEKn2tN4wA8lOP3lVsPgb7hznRC5xu6vuSmNj2k-96aJJGwGs/s320/pic3.png" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmyLrGcqVM3deT4IXFGHlRz7jbuvqhCcJY98FDTHl9TCwsbMwCw1hAUYUQ94S42JugIvFnXdwjJA73sRwWYD1LnTARMXc-xPxclwN5t7QLBc90vQGhalO7W33NUjhTxCV7Elv8O1yFO7s/s1600/pic5.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="206" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmyLrGcqVM3deT4IXFGHlRz7jbuvqhCcJY98FDTHl9TCwsbMwCw1hAUYUQ94S42JugIvFnXdwjJA73sRwWYD1LnTARMXc-xPxclwN5t7QLBc90vQGhalO7W33NUjhTxCV7Elv8O1yFO7s/s320/pic5.png" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhInzPr5-suF_W_xG7nxbmsY8yhQzzci0qfunNX-wTmRwfkIsVxUMZf2sjlY4gzlAQ5yvXuPIWVWPSLFU3Ajhujt6ghjPnkEOLffQN7m98LNGL-me3t6gNdo6Ux2k91FsbA7dWnGFZ7ibU/s1600/pic4.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhInzPr5-suF_W_xG7nxbmsY8yhQzzci0qfunNX-wTmRwfkIsVxUMZf2sjlY4gzlAQ5yvXuPIWVWPSLFU3Ajhujt6ghjPnkEOLffQN7m98LNGL-me3t6gNdo6Ux2k91FsbA7dWnGFZ7ibU/s320/pic4.png" width="320" /></a></div>
<br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-12902931315880363302011-11-15T08:52:00.001-08:002011-11-15T09:08:25.140-08:00Look@Lan (Fing) "Tools"<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://img.brothersoft.com/screenshots/softimage/l/look-lan_network_monitor-110117-1.jpeg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="http://img.brothersoft.com/screenshots/softimage/l/look-lan_network_monitor-110117-1.jpeg" width="320" /></a></div>
<b>Born from the ashes of </b><b><u style="color: lime;">Look@LAN</u>, </b><b>Fing is the
ultimate command line tool for network and service discovery. Taking
advantage of a brand new cross-platform network engine, it reaches an
impressive discovery sharpness and speed.</b><br />
<b>Whether you're a
Look@LAN user or not, do not miss the chance to take a ride on Fing;
it's definitely worth it! You're going to discover your whole network in
few seconds and generate customized real-time reports.</b><br />
<a name='more'></a><br />
<br />
<ul>
<li><b>Network discovery with 100% hit in any ethernet-based network</b></li>
<li><b>Supported operating systems: Linux, Mac OS (Snow Leopard included), Windows (Vista and Windows 7 included)</b></li>
<li><b>MAC address gathering</b></li>
<li><b>Faster and smarter than Look@LAN</b></li>
</ul>
<b>Click to <a href="http://www.over-look.com/site/index.php/fing-download-windows/114-overlook-fing-1-4">download</a> </b> </div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-13227474295116186682011-08-15T06:36:00.000-07:002011-08-15T06:36:55.014-07:00Dogpile (Meta Search Engine)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://bpephistory.com/Graphics/dogpile.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="256" src="http://bpephistory.com/Graphics/dogpile.jpg" width="320" /></a></div><b><span style="color: blue;">Dogpile </span>is a meta search engine; it gets results </b><br />
<b>from multiple search engines and directories and then </b><br />
<b>combines them and presents to the user.</b><br />
<br />
<b style="color: cyan;">Dogpile </b><b>page provides code to add search tool to your website.</b><br />
<br />
<b>It chases down the best results from Internet's top </b><br />
<b>search engines, including Google, Yahoo! Search, MSN,</b><br />
<b>Ask Jeeves, About, MIVA, LookSmart and others. </b></div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5400107469030469368.post-4787483475701366332011-07-20T07:13:00.000-07:002011-07-20T07:13:48.979-07:00Daemon tools (virtual cd) free download<div class="separator" style="clear: both; text-align: center;"><a href="http://img.disc-soft.com/screenshots/dtLite-7-small.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://img.disc-soft.com/screenshots/dtLite-7-small.jpg" /></a></div> An advanced application for Microsoft Windows which provides one of the best optical media emulation in the industry. DAEMON Tools enables you to convert your physical CD/DVD discs into "virtual discs" so called "images". It also emulated up to 4 virtual CD/DVD drives, so you can mount (insert) and unmount (eject) images.<br />
<br />
<br />
<a name='more'></a><br />
<b>Click to <a href="http://disc-tools.com/request?p=b26016d07e63aa3468998ff150f4fdb8/DTLite4402-0131.exe"><span style="color: blue; font-size: large;"><i><u>download</u></i></span></a></b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-52282211008661674692011-06-01T06:38:00.000-07:002011-06-01T06:38:09.536-07:00WinPatrol 2011 (System monitor)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://www.winpatrol.com/mediakit/wpstartup480.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="199" src="http://www.winpatrol.com/mediakit/wpstartup480.jpg" width="320" /></a></div><br />
<div align="justify"> You don't have to be doing anything wrong on the Internet to become a casualty of malware. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge. WinPatrol was the pioneer in using a heuristic behavioral approach to detecting Zero-Day attacks and violations of your computing environment. WinPatrol continues to be <strong> the most powerful system monitor </strong>for its small memory footprint.</div><div align="justify"> WinPatrol's easy tabbed interface allows you to explore deep inside your computer without having to </div><a name='more'></a>be a computer expert. A one-time investment in WinPatrol PLUS provides a unique experience you won't find in any other software.<br />
<div align="justify"><br />
</div><div align="justify"><b>Click to <a href="http://www.winpatrol.com/wpsetup.exe"><span style="color: blue; font-size: large;"><i><u>download</u></i></span></a></b> </div><div align="justify"><br />
</div></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-63591784262762265372011-05-29T09:46:00.000-07:002011-05-29T09:46:01.313-07:00Bidiblah Automated Scanner (hack tools)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://www.sensepost.com/blogstatic/2009/04/1.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="238" src="http://www.sensepost.com/blogstatic/2009/04/1.png" width="320" /></a></div><br />
<h3 style="color: lime;">what is BiDiBLAH ?</h3>Working with large international companies and organizations finding every single Internet Access Point and exposed Internet Services became a big part of our assessment. Our customers realized that it was not only the complex vulnerability on a single host that bit them, but more often the single unsecured host somewhere on their vast perimeter that allowed attackers to breach the network. Thus, footprinting became such a big component of our services that we were often asked to perform projects that only entailed performing a footprint. Our methodology was <br />
<a name='more'></a>well established and so we started putting many of the concepts into code.<br />
The result of all this is BiDiBLAH, and today we use BiDiBLAH in some way on almost all our assessments. As we've refined our methodologies and techniques, so we update BiDiBLAH, adding new features and functionality on a continuous basis.<br />
<br />
<h3 style="color: lime;">BiDiBLAH - System Requirements</h3><ol><li>You need to install the .NET framework 2 for BiDiBLAH.</li>
<li>If you want to use Nessus functionality you will need a Nessus server or a login to one.</li>
<li>If you want to use the sub domain discovery module, you will need SPUD.</li>
<li>Minumum 256MB of RAM is preferred.</li>
<li>The raw packet driver only works on Windows XP.</li>
<li>If you dont want to use HTML reporting you'll need Office 2003.</li>
</ol> <b>Click to <a href="http://www.sensepost.com/cms/resources/labs/tools/pentest/bidiblah/BiDiBLAH-v2.0-Eval.zip"><span style="color: blue; font-size: large;"><i><u>download</u></i></span></a></b><br />
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-57483042789195328332011-05-25T00:51:00.000-07:002011-05-25T00:51:10.641-07:00Httprint (hack - fingerprinting tool)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://net-square.com/httprint/images/httprint301.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="215" src="http://net-square.com/httprint/images/httprint301.png" width="320" /></a></div><b> <span style="color: lime;">Introduction</span></b> <br />
httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature <br />
<a name='more'></a>database. <br />
More details on how httprint works can be found in the Introduction to HTTP fingerprinting paper. It is printer-friendly. <br />
<br />
<a href="" name="features"></a> <b>Features</b> <br />
<br />
<ul><li>Identification of web servers despite the banner string and any other obfuscation. httprint can successfully identify the underlying web servers when their headers are mangled by either patching the binary, by modules such as mod_security.c or by commercial products such as ServerMask. </li>
<li>Inventorying of web enabled devices such as printers, routers, switches, wireless access points, etc. </li>
<li>Customisable web server signature database. To add new signatures, simply cut and paste the httprint output against unknown servers into the signatures text file. </li>
<li>Confidence Ratings. httprint now picks the best matches based on confidence ratings, derived using a fuzzy logic technique, instead of going by the highest weight. </li>
<li><b>[new]</b> Multi-threaded engine. httprint v301 is a complete re-write, featuring a multi-threaded scanner, to process multiple hosts in parallel. This greatly saves scanning time. *multi-threading is not yet supported in the FreeBSD version. </li>
<li><b>[new]</b> SSL information gathering. httprint now gathers SSL certificate information, which helps you identify expired SSL certificates, ciphers used, certificate issuer, and other such SSL related details. </li>
<li><b>[new]</b> Automatic SSL detection. httprint can detect if a port is SSL enabled or not, and can automatically switch to SSL connections when needed. </li>
<li>Automatic traversal of HTTP 301 and 302 redirects. Many servers who have transferred their content to other servers send a default redirect response towards all HTTP requests. httprint now follows the redirection and fingerprints the new server pointed to. This feature is enabled by default and can be turned off, if needed. </li>
<li>Ability to import web servers from nmap network scans. httprint can import nmap's xml output files. </li>
<li>Reports in HTML, CSV and XML formats. </li>
<li>Available on Linux, Mac OS X, FreeBSD (command line only) and Win32 (command line and GUI). </li>
</ul><br />
<br />
<b>click to <a href="http://net-square.com/httprint/httprint_win32_301.zip"><span style="color: blue; font-size: large;"><i><u>download</u></i></span></a></b> </div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-5400107469030469368.post-61838880021939235842011-05-17T09:43:00.000-07:002011-05-17T09:48:59.929-07:00War Dialer Technique (hacking)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrzc4fOgqundr5bcrlW89lAm-2Y6vJoIuoO35mOJf9CBP6Kj4NNDlNO7FmQY86RFZx4BvKEkfWVAH4ekgvbdrnPx7bQTbHhIAl0wv2lfjXhLZhh3QiN82GX7EeRg8sRKFJs9xXSZQLnXE/s1600/ceh25.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrzc4fOgqundr5bcrlW89lAm-2Y6vJoIuoO35mOJf9CBP6Kj4NNDlNO7FmQY86RFZx4BvKEkfWVAH4ekgvbdrnPx7bQTbHhIAl0wv2lfjXhLZhh3QiN82GX7EeRg8sRKFJs9xXSZQLnXE/s320/ceh25.jpg" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><br />
</div><a name='more'></a> <br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwdOYIJaVz_PKVZIpaAWd5ZxXHcimdiiKclmetIj3yH0krqG4AVnbdDVCiPEA6Rc41_xQYNW836ISxZfp5B0-ugwnhm5ni2JhEYFAbKPcfAyqc87zEn39h3V01EYtAQw1HffcEigNqDMI/s1600/ceh26.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="244" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwdOYIJaVz_PKVZIpaAWd5ZxXHcimdiiKclmetIj3yH0krqG4AVnbdDVCiPEA6Rc41_xQYNW836ISxZfp5B0-ugwnhm5ni2JhEYFAbKPcfAyqc87zEn39h3V01EYtAQw1HffcEigNqDMI/s320/ceh26.jpg" width="320" /></a></div><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNn_aA3K7sHDwyA3Qi6HL1YIszEdYhvl1vFbeDbTE0nPEM0LGOQpOxs7GTkKcOsWCCIx6sA1i4FukoqVTBSHz8oR3691qZA_b9K0-JS0mPG1k2DaOUsUQ-la1Dna8kDhykMZuLKSxB0Qg/s1600/ceh+26.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="243" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNn_aA3K7sHDwyA3Qi6HL1YIszEdYhvl1vFbeDbTE0nPEM0LGOQpOxs7GTkKcOsWCCIx6sA1i4FukoqVTBSHz8oR3691qZA_b9K0-JS0mPG1k2DaOUsUQ-la1Dna8kDhykMZuLKSxB0Qg/s320/ceh+26.jpg" width="320" /></a></div><br />
</div>Unknownnoreply@blogger.com3tag:blogger.com,1999:blog-5400107469030469368.post-57962505083870721862011-05-11T04:00:00.000-07:002011-05-11T04:00:23.889-07:00Port Detective (hack tools)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://downloadsource.net/img/310f79ff59a7222bc6373a11746266b0.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="202" src="http://downloadsource.net/img/310f79ff59a7222bc6373a11746266b0.gif" width="320" /></a></div><h1 align="left" style="font-weight: normal;"><span style="font-size: small;"><span style="font-family: Tahoma;"></span></span></h1><h1 align="left" style="font-weight: normal;"><span style="font-size: small;"><span style="font-family: Tahoma;">The <span style="color: lime;"> Port Detective</span> performs a remote port scan on your IP address. This scan helps you determine if you are properly secured, or if you have the proper ports available and open for hosting a server on your Cable or DSL modem. If you have a Cable Modem or xDSL modem, Port Detective will give you the details on what TCP/IP ports are open, in use or blocked. Why not run your own web server from your home? Port Detective will <a name='more'></a>tell you if you can run a web server, FTP Server, Mail Server and just about any other type of Internet server!</span></span></h1><h1 align="left"><span style="font-size: small;"><span style="font-family: Tahoma;"> click to <a href="ftp://ftp.portdetective.com/pdsetup.exe"><span style="font-size: large;"><i><u>download</u></i></span></a></span></span></h1><h1 align="left"><small><small><small><small><small><small><span style="font-family: Tahoma;"> </span></small></small></small></small></small></small></h1></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-46890159533501637652011-05-10T23:16:00.000-07:002011-05-10T23:18:45.469-07:00Meebo (All IM in to one site)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://www.meebo.com/ppstatic/img/meebo-desktop.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://www.meebo.com/ppstatic/img/meebo-desktop.png" /></a></div><div style="margin-top: 1em;"><b> <span style="color: lime;">Meebo </span>gives you the easiest, most open and most “right there where you want it” way to share on the web.</b> </div>Integrating all social networks and communications channels into a single, simple-to-use solution, Meebo enables users to easily share content and communicate in real time with the people who matter to them. <br />
<br />
<div class="main-column column">With Meebo, you can keep up with the people who matter most to you when you're online or on the go.<br />
<a name='more'></a><br />
<br />
<ul><li style="padding-bottom: 10px;">Chat with friends across your favorite IM and social networks from one place.</li>
<li style="padding-bottom: 10px;">Spread the word about your latest web "finds" with Meebo's easy-to-use sharing tools for photos, articles, and more. You can discover new sites from other people's check-ins on their Meebo <a href="http://www.meebo.com/support/article/151/">public profile</a>. </li>
<li style="padding-bottom: 10px;">Check in to sites to share your interests. Check in every day to become a VIP.</li>
</ul></div> <b>click to meebo <a href="http://www.meebo.com/"><span style="font-size: large;"><i><u>site</u></i></span></a></b></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-12652549337387979842011-05-06T00:19:00.000-07:002011-05-06T00:19:31.951-07:00Resource Hacker (hack tools)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://screenshots.en.softonic.com/en/scrn/50000/50033/3_reshack3.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="237" src="http://screenshots.en.softonic.com/en/scrn/50000/50033/3_reshack3.jpg" width="320" /></a></div><br />
<b style="color: lime;">Resource Hacker</b> is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (RES). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.<br />
Viewing Resources: Cursor, Icon, Bitmap, GIF, AVI, and JPG resource images can be viewed. WAV and MIDI audio resources can be played. Menus, Dialogs, MessageTables, StringTables, Accelerators, Delphi Forms, and VersionInfo resources can be <br />
<a name='more'></a>viewed as decompiled resource scripts. Menus and Dialogs can also be viewed as they would appear in a running application.<br />
<br />
<b>click to <span style="font-size: large;"><i style="color: blue;"><u>download</u></i></span></b> </div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-968810404202541212011-05-04T03:09:00.000-07:002011-05-04T03:09:25.016-07:00How to Disable the Ability to Right Click on the Desktop ?<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAZZWGTpfIFmxVpwudOk-zAbOBP6c4YZIWh9h5MzA7d9tfEJlgzpBlT37auDktJ4atZAreq1VpPetgAAiW-kMPmVR15WGxyIXWp4n5UheH93CJH_DXpUxn4aSvE_RruEyckpxMsqvLHBQ/s1600/registry.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="82" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAZZWGTpfIFmxVpwudOk-zAbOBP6c4YZIWh9h5MzA7d9tfEJlgzpBlT37auDktJ4atZAreq1VpPetgAAiW-kMPmVR15WGxyIXWp4n5UheH93CJH_DXpUxn4aSvE_RruEyckpxMsqvLHBQ/s400/registry.JPG" width="400" /></a></div><div class="separator" style="clear: both; text-align: center;"></div><span style="font-family: verdana,arial; font-size: 9pt;">This tweak removes the context menu that would normally appear when the user right clicks on the desktop or in the Explorer right results pane.</span> <br />
<span style="font-family: verdana,arial; font-size: 9pt;">Open your registry and find the key below. </span><br />
<span style="font-family: verdana,arial; font-size: 9pt;">Create a new DWORD value, or modify the existing value called 'NoViewContextMenu' using the settings below. </span><br />
<span style="font-family: verdana,arial; font-size: 9pt;">Exit your registry, you may need to restart or log out of Windows for the change to take effect. </span><br />
<br />
<a name='more'></a><br />
<br />
<table border="0" cellpadding="0" cellspacing="0"><tbody>
<tr> <td bgcolor="#dddddd"><span style="font-family: verdana,arial; font-size: x-small;">Settings:</span></td> </tr>
<tr> <td bgcolor="#eeeeee"><span style="font-family: verdana,arial; font-size: 9pt;"><b>User Key:</b> [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\<br />
Explorer]</span><br />
<span style="font-family: verdana,arial; font-size: 9pt;"><b>System Key:</b> [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\<br />
Explorer]</span><br />
<span style="font-family: verdana,arial; font-size: 9pt;"><b>Name:</b> NoViewContextMenu</span><br />
<span style="font-family: verdana,arial; font-size: 9pt;"><b>Type:</b> REG_DWORD (DWORD Value)</span><br />
<span style="font-family: verdana,arial; font-size: 9pt;"><b>Value:</b> (0 = disabled, 1 = enabled)</span></td></tr>
</tbody></table></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-17810239216311976372011-05-03T06:36:00.000-07:002011-05-03T06:36:17.544-07:00KGB Archiver (10GB to 1MB) compression tools.<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://sourceforge.net/dbimage.php?id=139206" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="240" src="http://sourceforge.net/dbimage.php?id=139206" width="320" /></a></div> <b style="color: lime;">KGB Archiver</b> is the compression tool with unbelievable high compression rate. It surpasses even such efficient compression tool like 7zip and UHARC in terms of the abilities. KGB Archiver uses AES-256 encryption to encrypt archives.<br />
<br />
<b style="color: lime;"> KGB Archiver</b> is free and open source software released under the terms of the GNU General Public License. Version 2 beta 2 is available for Microsoft Windows<sup class="reference" id="cite_ref-Review_1-0"><a href="http://en.wikipedia.org/wiki/KGB_Archiver#cite_note-Review-1"><span></span><span></span></a></sup><sup class="reference" id="cite_ref-Beta_2-0"><a href="http://en.wikipedia.org/wiki/KGB_Archiver#cite_note-Beta-2"><span></span><span></span></a></sup> and a command line version of KGB Archiver 1.0 is available for Unix-like operating systems. KGB Archiver is one of the few applications that works with t<br />
<a name='more'></a>he PAQ algorithm for making its KGB files.<sup class="reference" id="cite_ref-Beta_2-1"><span></span><span></span></sup> It has ten levels of compression, from very weak to maximum, a greater variety than that found in most other compression software. However, at higher compression levels, the time required to compress a file increases significantly.<sup class="reference" id="cite_ref-Review_1-1"><a href="http://en.wikipedia.org/wiki/KGB_Archiver#cite_note-Review-1"><span></span><span></span></a></sup><br />
<br />
<b>Click to <a href="http://sourceforge.net/settings/mirror_choices?projectname=kgbarchiver&filename=KGB%20Archiver%202/2.0%20beta%202/KGB_Archiver_2beta2.msi"><span style="font-size: large;"><i><u>download</u></i></span></a></b> </div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-51483553232906046992011-05-02T06:53:00.000-07:002011-05-02T06:53:12.840-07:00Colasoft MAC Scanner (hack tools)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://blog.colasoft.com/wp-content/uploads/2009/05/colasoft-mac-scanner-screenshot.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="253" src="http://blog.colasoft.com/wp-content/uploads/2009/05/colasoft-mac-scanner-screenshot.jpg" width="320" /></a></div><b style="color: lime;"> Colasoft MAC</b> Scanner allows to scan the network and get a list of<br />
MAC addresses along with IP address, machine name, and<br />
manufacturer's information.<br />
<br />
It can automatically detect all subnets according to the IP addresses<br />
configured on multiple NICs of a machine.<br />
<br />
It supports multi-threaded scanning. <br />
<br />
<a name='more'></a><br />
<br />
<b>Click to <a href="http://www.colasoft.com/download/cmac_pro.exe"><span style="color: blue; font-size: large;"><i><u>download</u></i></span></a></b></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-68225169944342109612011-05-01T09:37:00.000-07:002011-05-01T09:37:27.008-07:00OstroSoft Internet Tools (hack tools)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://www.ostrosoft.com/images/ostronet.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="231" src="http://www.ostrosoft.com/images/ostronet.jpg" width="320" /></a></div><br />
<span style="color: blue;">OstroSoft Internet Tools</span> is integrated set of network information utilities. It is intended for use by network, domain and systems administrators, network security professionals, Internet users and everyone who wants to know more about network and Internet.<br />
It gives you such vital information as: <br />
<ul><li>which computers on domain are running specified service - for example: how many newsservers are available on domain (Domain Scanner) </li>
<li>what network services are running on specified computer (remote or local) - for example: Web <a name='more'></a>server, telnet, mailserver, FTP, finger, etc. (Port Scanner) </li>
<li>let you test if remote host is running, accessible from your system, and how long it takes to reach it (Ping) </li>
<li>shows you the path TCP packet takes from your system to remote host (Traceroute) </li>
<li>shows you the information about active connections on you computer (Netstat) </li>
<li>resolves host names to IP addresses and vice versa (Host Resolver - dns) </li>
<li>returns contact information (address, phone, fax, administrator name, DNS servers) for specified network (Network Info) </li>
<li>shows network-related information (IP address, host name, version of Winsock, etc.) about your computer (Local Host Info) </li>
</ul> <b>click to <a href="http://www.ostrosoft.com/download/full/ostronet.exe"><span style="font-size: large;"><i><u>download</u></i></span></a></b></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-5400107469030469368.post-21309285104928986232011-04-29T09:55:00.000-07:002011-04-29T09:55:43.281-07:00Advanced IP scanner (hack tools)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://www.radmin.com/images/screenshots/ips/ipscan20_main_sm.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://www.radmin.com/images/screenshots/ips/ipscan20_main_sm.gif" /></a></div><br />
<b style="color: lime;">Advanced IP</b> Scanner is a free, fast and easy-to-use network scanner for Windows. In a matter of seconds, this utility finds all the computers on your network and provides easy access to their various resources, whether HTTP, HTTPS, FTP or shared folders. With Advanced IP Scanner, you can wake up and shut down remote groups of Windows machines. If you use Radmin remote access software, you will also enjoy the improved Radmin Server detection and integration capabilities, which allow you to connect to any scanned machine with Radmin Server.<br />
<a name='more'></a><br />
<b>Click to <a href="http://www.radmin.com/download/ipscan20.exe"><span style="color: blue; font-size: large;"><i><u>download</u></i></span></a></b> </div>Unknownnoreply@blogger.com1