pembelajaran tanpa batas www.malang-center.blogspot.com

  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin
Sit amet felis. Mauris semper,

Welcome to WordPress. This is your first post. Edit or delete it, then start blogging!Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Quisque sed felis. Aliquam sit amet felis. Mauris semper, velit semper laoreet dictum, quam diam dictum urna, nec placerat elit nisl in quam. Etiam augue pede, molestie eget, ...

Category name clash

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Quisque sed felis. Aliquam sit amet felis. Mauris semper, velit semper laoreet dictum, quam diam dictum urna, nec placerat elit nisl in quam. Etiam augue pede, molestie eget, rhoncus at, convallis ut, eros. Aliquam pharetra. Nulla in tellus eget odio sagittis blandit. ...

Test with enclosures

Here's an mp3 file that was uploaded as an attachment: Juan Manuel Fangio by Yue And here's a link to an external mp3 file: Acclimate by General Fuzz Both are CC licensed. Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Quisque sed felis. Aliquam sit amet felis. Mauris semper, velit semper laoreet dictum, ...

Block quotes

Some block quote tests: Here's a one line quote. This part isn't quoted. Here's a much longer quote: Lorem ipsum dolor sit amet, consectetuer adipiscing elit. In dapibus. In pretium pede. Donec molestie facilisis ante. Ut a turpis ut ipsum pellentesque tincidunt. Morbi blandit sapien in mauris. Nulla lectus lorem, varius aliquet, ...

Contributor post, approved

I'm just a lowly contributor. My posts must be approved by the editor.Mauris semper, velit semper laoreet dictum, quam diam dictum urna, nec placerat elit nisl in quam. Etiam augue pede, molestie eget, rhoncus at, convallis ut, eros. Aliquam pharetra. Nulla in tellus eget odio sagittis blandit. Maecenas at ...

Posted by Ezkajivo - - 0 comments



Again, the video collection of hacking techniques, which differ from the previous post has the author is a hacking technique video this time packaged in a resolution of 1024 x 768, 680 x 460, PAL (25fps), DivX. Dan yang lebih mantap adalah isi dari koleksi videonya : And a more stable is the content of the video collection:

* 128 Bit Wep Cracking With Injection!.swf 128 bit WEP Cracking With Injection!. Swf

* A Penetration Attack Reconstructed.avi A Penetration Attack Reconstructed.avi

* A Quick and Dirty Intro to Nessus using the Auditor Boot CD!.swf A Quick and Dirty Intro to Nessus using the Auditor Boot CD!. Swf
* Adding Modules to a Slax or Backtrack Live CD from Windows .swf Adding Modules to a Slax or Backtrack Live CD from Windows. Swf

* Airplay replay attack - no wireless client required.swf Airplay replay attack - no wireless client required.swf

* Anonym.OS LiveCD with build in Tor Onion routing and Privoxy.swf Anonym.OS LiveCD with build in Tor Onion routing and Privoxy.swf

* BackTrack LiveCD to HD Installation Instruction Video .swf BackTrack LiveCD to HD Installation Instruction Video. Swf

* Basic Nmap Usage!.swf Basic Nmap Usage!. Swf

* Basic Tools for Wardriving!.swf Basic Tools for Wardriving!. Swf

* Bluesnarfer attack tool demonstration.swf Bluesnarfer attack tool demonstration.swf

* Bluesnarfing a Nokia 6310i hand set.avi Bluesnarfing a Nokia 6310i hand set.avi

* Breaking WEP in 10 minutes.avi Breaking WEP in 10 minutes.avi

* Cain to ARP poison and sniff passwords!.avi Cain to ARP poison and Sniff passwords!. Avi

* Complete Hacking Video using Metasploit - Meterpreter.swf Complete Hacking Video using Metasploit - Meterpreter.swf

* Cracking a 128 bit WEP key (Auditor).swf Cracking a 128 bit WEP key (Auditor). Swf

* Cracking a 128 Bit Wep key + entering the cridentials.swf Cracking a 128 bit WEP key + entering the cridentials.swf

* Cracking Syskey and the SAM on Windows Using Samdump2 and John!.swf Cracking Syskey and the SAM on Windows Using Samdump2 and John!. Swf

* Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!.swf Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!. Swf

* Cracking WPA Networks (Auditor).swf Cracking WPA Networks (Auditor). Swf

* DoS attack against Windows FTP Server - DoS.avi DoS attack against Windows FTP Server - DoS.avi

* Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools!.swf
Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools!. Swf

* Exploiting some bugs of tools used in Windows.swf.swf Exploiting some bugs of tools used in Windows.swf.swf

* Exploiting weaknesses of PPTP VPN (Auditor).swf Exploiting weaknesses of PPTP VPN (Auditor). Swf

* Finding Rogue SMB File Shares On Your Network!.swf Finding Rogue SMB File Shares On Your Network!. Swf

* Fun with Ettercap Filters!.swf Fun with ettercap Filters!. Swf

* How to cura the local windows passwords in the SAM database .swf How to jest the local windows passwords in the SAM database. Swf

* How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor).swf How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor). Swf

* How to sniff around switches using Arpspoof and Ngrep!.avi How to Sniff around switches using Arpspoof and Ngrep!. Avi

* Install VNC Remotely!.avi Install VNC Remotely!. Avi

* Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res).avi Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res). Avi

* Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res).avi Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res). Avi

* John The Ripper 1.7 password cracker Installation Instruction Video .swf John The Ripper 1.7 password cracker Installation Instruction Video. Swf

* Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005!.swf Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005!. Swf

* MAC Bridging with Windows XP and Sniffing!.swf MAC Bridging with Windows XP and Sniffing!. Swf

* Mass De-Authentication using void11 (Auditor).swf Mass De-Authentication using void11 (Auditor). Swf

* Metasploit Flash Tutorial!.swf Metasploit Flash Tutorial!. Swf

* MITM Hijacking.wmv MITM Hijacking.wmv

* Nmap Video Tutorial 2 Port Scan Boogaloo!.swf Nmap Video Tutorial 2 Port Scan Boogaloo!. Swf

* Sniffing logins and passwords.avi Sniffing logins and passwords.avi

* Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res).avi Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res). Avi

* Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res).avi Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res). Avi

* Sniffing VoIP Using Cain!.swf Sniffing VoIP Using Cain!. Swf

* Snort Instruction video - howto install into backtrack.swf Snort Instruction video - howto install into backtrack.swf

* SSH Dynamic Port Forwarding!.swf SSH Dynamic Port Forwarding!. Swf

* Start a session and get interactive commandline access to a remote Windows box!.avi Start a session and get interactive commandline access to a remote Windows box!. Avi

* Telnet Bruteforce.avi Telnet Bruteforce.avi

* Tunneling Exploits through SSH.avi Tunneling Exploits through SSH.avi

* Use Brutus to cura a box running telnet!.avi Use Brutus to joke a box running telnet!. Avi

* Using NetworkActiv to sniff webpages on a Wi-Fi network!.swf Using NetworkActiv to Sniff
webpages on a Wi-Fi network!. Swf

* WEP Cracking using Aireplay v2.2 Beta 7 (Whax 3.0).swf Cracking WEP using Aireplay v2.2 Beta 7 (Whax 3.0). Swf

* WMF File Code Execution Vulnerability With Metasploit!.swf WMF File Code Execution Vulnerability With Metasploit!. Swf

* WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0).swf WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0). Swf

Free download here :
http://rapidshare.com/files/230824983/Huge_Collection_Of_Hacking_Videos.part1.rar
http://rapidshare.com/files/230825083/Huge_Collection_Of_Hacking_Videos.part2.rar
http://rapidshare.com/files/230825048/Huge_Collection_Of_Hacking_Videos.part3.rar
http://rapidshare.com/files/230824882/Huge_Collection_Of_Hacking_Videos.part4.rar
http://rapidshare.com/files/230824795/Huge_Collection_Of_Hacking_Videos.part5.rar
http://rapidshare.com/files/230824916/Huge_Collection_Of_Hacking_Videos.part6.rar
http://rapidshare.com/files/230824692/Huge_Collection_Of_Hacking_Videos.part7.rar
[ Read More ]

Posted by Ezkajivo - - 0 comments

There are times when someone who has enthusiasm in learning about network security experience fatigue in reading what he learned, because basically reading requires a fixed focus of attention, with furrowed brow, perhaps.

This time I will try to bring to your natural relaxation, the deeper, more rilex.
Yes, of course, the explanation of a hacking or cracking techniques using video is much easier to understand than to read it, and also of course there are many weaknesses.
A person who saw the video of course, hacking techniques used to understand the concept of hacking techniques that previously. Besides showing hacking techniques, for those of you who want to learn how a software hack to get cd key, license, or the serial number is presented as a complete video learning. Please download it for free:

http://rapidshare.com/files/174700524/Cr4k.h4ck.Tut.part1.rar
http://rapidshare.com/files/174700648/Cr4k.h4ck.Tut.part2.rar
http://rapidshare.com/files/174700526/Cr4k.h4ck.Tut.part3.rar
http://rapidshare.com/files/174700610/Cr4k.h4ck.Tut.part4.rar
http://rapidshare.com/files/174700440/Cr4k.h4ck.Tut.part5.rar
http://rapidshare.com/files/174700301/Cr4k.h4ck.Tut.part6.rar

[ Read More ]

Posted by Ezkajivo - - 0 comments

For the lamerz maniac hacking tools will often hear the keylogger. :D. : D.
What is keylogger?

Keylogger is a tool that basically has a function to monitor all akitivitas done by the user on a PC.
Starting from record passwords typed, chat on instant messaging, what programs run by the user, the user what the program, and everything typed on the keyboard to the mouse movement, even some who have long keylogger outstanding facilities mengincludekan screen pengcapture every 5 minutes, and the output is HTML. There are some fairly interesting keylogger, some of which can send the results of the monitoring activity to the investor email keylogger is. So that the owner keylogger can see all the activities done by the user on a pc via email.

Clearly, this keylogger is controversial as the blade 2, positive, negative, build and destroy. Not enough time to discuss all these things.
To add to your collection of hacking tools,: D
please download the latest keylogger 63 reliable enough ...


Following list:
1. 007 Keylogger Spy Software 3.873 007 Keylogger Spy Software 3873
2. Active Key Logger 2.4 Active Key Logger 2.4
3. Activity Keylogger 1.80.21 Activity Keylogger 1.80.21
4. Activity Logger 3.7.2132 Activity Logger 3.7.2132
5. ActMon Computer Monitoring 5.20 ActMon Computer Monitoring 5:20
6. Actual Spy 2.8 Actual Spy 2.8
7. Advanced Invisible Keylogger v1.9 Advanced Invisible Keylogger v1.9
8. Advanced Keylogger 1.8 Advanced Keylogger 1.8
9. Ardamax Keylogger 2.9 Ardamax Keylogger 2.9
10. BlazingTools Perfect Keylogger 1.68 BlazingTools Perfect Keylogger 1.68
11. Blazingtools Remote Logger v2.3 Blazingtools Remote Logger v2.3
12. Data Doctor KeyLogger Advance v3.0.1.5 Data Doctor KeyLogger Advance v3.0.1.5
13. Local Keylogger Pro 3.1 Local Keylogger Pro 3.1
14. ExploreAnywhere Keylogger Pro 1.7.8 ExploreAnywhere Keylogger Pro 1.7.8
15. Family Cyber Alert 4.06 Family Cyber Alert 4:06
16. Family Keylogger 2.80 Family Keylogger 2.80
17. Firewall bypass Keylogger 1.5 Firewall bypass Keylogger 1.5
18. Free Keylogger 2.53 Free Keylogger 2:53
19. Ghost Keylogger 3.80 Ghost Keylogger 3.80
20. Golden Eye 4.5 Golden Eye 4.5
21. Golden KeyLogger 1.32 Golden KeyLogger 1:32
22. Handy Keylogger 3.24 build 032 3:24 Keylogger Handy build 032
23. Home Keylogger 1.77 Home Keylogger 1.77
24. Inside Keylogger 4.1 Inside Keylogger 4.1
25. iOpus Starr PC and Internet Monitor 3.23 iOpus Starr PC and Internet Monitor 3:23
26. iSpyNow v2.0 iSpyNow v2.0
27. KeyScrambler 1.3.2 KeyScrambler 1.3.2
28. Keystroke Spy 1.10 Keystroke Spy 1:10
29. KGB Keylogger 4.2 KGB Keylogger 4.2
30. KGB Spy 3.84 KGB Spy 3.84
31. LastBit Absolute Key Logger 2.5.283 LastBit Absolute Key Logger 2.5.283
32. Metakodix Stealth Keylogger 1.1.0 Metakodix Stealth Keylogger 1.1.0
33. Network Event Viewer v6.0.0.42 Network Event Viewer v6.0.0.42
34. OverSpy v2.5 OverSpy v2.5
35. PC Activity Monitor Professional 7.6.3 PC Activity Monitor Professional 7.6.3
36. PC Spy Keylogger 2.3 build 0313 PC Spy Keylogger 2.3 build 0313
37. PC Weasel 2.5 PC Weasel 2.5
38. Personal PC Spy v1.9.5 Personal PC Spy v1.9.5
39. Power Spy 6.10 Power Spy 6:10
40. Powered Keylogger v2.2.1.1920 Powered Keylogger v2.2.1.1920
41. Quick Keylogger 2.1 Quick Keylogger 2.1
42. Radar 1.0 Radar 1.0
43. Real Spy Monitor 2.80 Real Spy Monitor 2.80
44. Real Spy Monitor 2.80 Real Spy Monitor 2.80
45. Remote Desktop Spy 4.04 Remote Desktop Spy 4:04
46. Remote KeyLogger 1.0.1 Remote KeyLogger 1.0.1
47. Revealer Keylogger Free 1.33 Revealer Keylogger Free 1:33
48. SC Keylogger Pro 3.2 SC Keylogger Pro 3.2
49. Smart Keystroke Recorder Pro Smart keystroke Recorder Pro
50. Spector Pro 6.0.1201 Spector Pro 6.0.1201
51. SpyAnytime PC Spy 2.42 SpyAnytime PC Spy 2:42
52. SpyBuddy 3.7.5 SpyBuddy 3.7.5
53. Spytech SpyAgent 6.02.07 Spytech SpyAgent 6:02:07
54. Spytector 1.3.5 Spytector 1.3.5
55 Stealth Key Logger 4.5 55 Stealth Key Logger 4.5
56. System keylogger 2.0.0 System keylogger 2.0.0
57. Tim's Keylogger 1.0 Tim's Keylogger 1.0
58. Tiny Keylogger 2.0 Tiny Keylogger 2.0
59. Total Spy 2.7 Total Spy 2.7
60. Windows Keylogger 5.04 Windows Keylogger 5:04
61. Win-Spy Pro 8.9.109 Win-Spy Pro 8.9.109
62. XP Advanced Keylogger 2.5 XP Advanced Keylogger 2.5
63. 63. XPCSpy Pro version 3.01 XPCSpy Pro version 3:01

Silahkan download di sini ... /Please download it here ...
http://rapidshare.com/files/191921436/Aio_Keyloggers_Pack.part1.rar
http://rapidshare.com/files/191921441/Aio_Keyloggers_Pack.part2.rar


[ Read More ]

Posted by Ezkajivo - - 0 comments

















[ Read More ]