July 8, 2010

Trojan Ports

TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250
TCP 28 Amanda.200
TCP 31 MastersParadise.920
TCP 68 Subseven.100
TCP 142 NetTaxi.180
TCP 146 Infector.141, Intruder.100, Intruder.100
TCP 171 ATrojan.200
TCP 285 WCTrojan.100
TCP 286 WCTrojan.100
TCP 334 Backage.310
TCP 370 NeuroticKat.120, NeuroticKat.130
TCP 413 Coma.109
TCP 420 Breach.450
TCP 555 Id2001.100, PhaseZero.100, StealthSpy.100
TCP 623 Rtb666.160
TCP 660 Zaratustra.100
TCP 661 Noknok.800, Noknok.820
TCP 666 BackConstruction.210, BackConstruction.250, Bla.100, Bla.200, Bla.400, Bla.503, Cain.150, Dimbus.100, Noknok.820, Ripper.100, SatansBackdoor.100, SatansBackdoor.101, SatansBackdoor.102, Unicorn.100, Unicorn.101, Unicorn.110
TCP 667 SniperNet.210, Snipernet.220
TCP 668 Unicorn.101, Unicorn.110
TCP 680 Rtb666.160
TCP 777 Tiny.100, Undetected.230, Undetected.300, Undetected.310, Undetected.320, Undetected.330, Undetected.331, Undetected.332
TCP 785 NetworkTerrorist.100
TCP 800 NeuroticKitten.010
TCP 831 NeuroticKat.100, NeuroticKat.120, NeuroticKat.130
TCP 901 NetDevil.130, NetDevil.140
TCP 1000 DerSpaeher.200
TCP 1001 Silencer.100
TCP 1008 AutoSpy.100
TCP 1010 DerSpaeher.200
TCP 1015 Doly.150
TCP 1111 TPort.100
TCP 1130 Noknok.800, Noknok.820
TCP 1207 SoftWAR.100
TCP 1243 Subseven.100, SubSeven.110, SubSeven.180, SubSeven.190, Subseven.200
TCP 1245 VoodooDoll.006
TCP 1269 Matrix.130
TCP 1480 RemoteHack.130
TCP 1568 RemoteHack.100, RemoteHack.110
TCP 1600 DirectConnection.100
TCP 1601 DirectConnection.100
TCP 1602 DirectConnection.100
TCP 1634 NetCrack.100
TCP 1784 Snid.120, Snid.212
TCP 1999 TransmissionScout.100, TransmissionScout.110
TCP 2000 ATrojan.200, InsaneNetwork.400
TCP 2001 DIRT.220, TrojanCow.100
TCP 2003 TransmissionScout.100, TransmissionScout.110
TCP 2023 RipperPro.100
TCP 2040 InfernoUploader.100
TCP 2115 Bugs.100
TCP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
TCP 2332 SilentSpy.202
TCP 2589 Dagger.140
TCP 2600 DigitalRootbeer.100
TCP 2989 Rat.200
TCP 3128 MastersParadise.970
TCP 3129 MastersParadise.920, MastersParadise.970
TCP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
TCP 3215 BlackStar.100, Ghost.230
TCP 3333 Daodan.123
TCP 3410 OptixPro.100, OptixPro.110
TCP 3456 Force.155, TerrorTrojan.100
TCP 3505 AutoSpy.130, AutoSpy.140
TCP 3586 Snid.120, Snid.212
TCP 3700 PortalOfDoom.100
TCP 3723 Mantis.100
TCP 3800 Eclypse.100
TCP 3996 RemoteAnything.364
TCP 4000 SkyDance.220, SkyDance.229
TCP 4201 Wartrojan.160, Wartrojan.200
TCP 4225 SilentSpy.202
TCP 4321 Bobo.100
TCP 4444 AlexTrojan.200, Crackdown.100
TCP 4488 EventHorizon.100
TCP 4523 Celine.100
TCP 4545 InternalRevise.100, RemoteRevise.150
TCP 4567 FileNail.100
TCP 4666 Mneah.100
TCP 4950 ICQTrojan.100
TCP 5005 Aladino.060
TCP 5025 Keylogger.WMRemote.100
TCP 5031 NetMetro.104
TCP 5032 NetMetro.104
TCP 5033 NetMetro.104
TCP 5050 RoxRat.100
TCP 5151 OptixLite.020, OptixLite.030, OptixLite.040
TCP 5190 MBomber.100
TCP 5277 WinShell.400
TCP 5343 WCRat.100
TCP 5400 BackConstruction.120, BackConstruction.150, BladeRunner.080, DeepThroat.300
TCP 5401 BackConstruction.120, BackConstruction.150, BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5402 BackConstruction.210, BackConstruction.250, BladeRunner.080, DeepThroat.300, Mneah.100
TCP 5534 TheFlu.100
TCP 5550 XTCP.200, XTCP.201
TCP 5555 Noxcape.100, Noxcape.200
TCP 5695 Assassin.100
TCP 5714 WinCrash.100
TCP 5741 WinCrash.100
TCP 5742 WinCrash.103
TCP 5802 Y3KRat.160
TCP 5810 Y3KRat.160
TCP 5838 Y3KRat.170
TCP 5858 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5880 Y3KRat.140
TCP 5881 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5883 Y3KRat.110, Y3KRat.140
TCP 5884 Y3KRat.140, Y3KRat.150
TCP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5886 Y3KRat.120, Y3KRat.140
TCP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
TCP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5889 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
TCP 5890 Y3KRat.140
TCP 6400 Thething.100, Thething.150
TCP 6556 AutoSpy.120, AutoSpy.122
TCP 6655 Aqua.020
TCP 6660 LameSpy.095
TCP 6666 LameRemote.100, ProjectMayhem.100
TCP 6669 Vampire.100
TCP 6670 DeepThroat.200, DeepThroat.210
TCP 6671 DeepThroat.310
TCP 6699 HostControl.101
TCP 6711 DeepThroat.300, Noknok.820, SubSeven.180, SubSeven.190
TCP 6712 Subseven.100
TCP 6713 Subseven.100
TCP 6767 NTRC.120
TCP 6776 SubSeven.180, SubSeven.190, Subseven.200
TCP 6789 Doly.200
TCP 6796 SubSeven.214
TCP 6912 ShitHeep.100
TCP 6939 Indoctrination.100
TCP 6953 Lithium.100
TCP 6969 2000Cracks.100, Bigorna.100, Danton.110, Danton.210, Danton.220, Danton.310, Danton.320, Danton.330, GateCrasher.110, NetController.108, Sparta.110, VagrNocker.120
TCP 6970 Danton.330
TCP 7001 Freak88.100
TCP 7119 Massaker.100
TCP 7200 Massaker.110
TCP 7300 Coced.221
TCP 7301 Coced.221
TCP 7306 NetSpy.200, NetSpy.200
TCP 7410 Phoenix.190, Phoenix.200
TCP 7511 Genue.100
TCP 7609 Snid.120, Snid.212
TCP 7614 Wollf.130
TCP 7648 BlackStar.100, Ghost.230
TCP 7788 Last.2000, Matrix.200
TCP 7826 MiniOblivion.010, Oblivion.010
TCP 7887 SmallFun.110
TCP 7891 Revenger.100
TCP 7979 VagrNocker.200
TCP 7997 VagrNocker.200
TCP 8000 XConsole.100
TCP 8011 Way.240
TCP 8012 Ptakks.215, Ptakks.217
TCP 8110 LoseLove.100
TCP 8111 LoseLove.100
TCP 8301 LoseLove.100
TCP 8302 LoseLove.100
TCP 8372 NetBoy.100
TCP 8720 Connection.130
TCP 8734 AutoSpy.110
TCP 8811 Force.155
TCP 8899 Last.2000
TCP 9000 Aristotles.100
TCP 9301 LoseLove.100
TCP 9400 InCommand.100, InCommand.110, InCommand.120, InCommand.130, InCommand.140, InCommand.150, InCommand.153, InCommand.160, InCommand.167, InCommand.170
TCP 9401 InCommand.100, InCommand.110, InCommand.170
TCP 9402 InCommand.100, InCommand.110
TCP 9561 CRatPro.110
TCP 9563 CRatPro.110
TCP 9580 TheefLE.100
TCP 9696 Danton.210, Ghost.230
TCP 9697 Danton.320, Danton.330, Ghost.230
TCP 9870 R3C.100
TCP 9872 PortalOfDoom.100
TCP 9873 PortalOfDoom.100
TCP 9874 PortalOfDoom.100
TCP 9875 PortalOfDoom.100
TCP 9876 Rux.100, SheepGoat.100
TCP 9877 SmallBigBrother.020
TCP 9878 SmallBigBrother.020, TransmissionScout.100, TransmissionScout.110, TransmissionScout.120
TCP 9879 SmallBigBrother.020
TCP 9999 ForcedEntry.100, Infra.100, Prayer.120, Prayer.130, TakeOver.200, TakeOver.300
TCP 10001 DTr.130, DTr.140
TCP 10013 Amanda.200
TCP 10067 PortalOfDoom.100
TCP 10100 Gift.240
TCP 10101 NewSilencer.100
TCP 10167 PortalOfDoom.100
TCP 10528 HostControl.100, HostControl.260
TCP 10607 Coma.109
TCP 10666 Ambush.100
TCP 11011 Amanda.200
TCP 11050 HostControl.101
TCP 11051 HostControl.100, HostControl.260
TCP 11223 AntiNuke.100, Progenic.100, Progenic.110
TCP 11225 Cyn.100, Cyn.103, Cyn.120
TCP 11306 Noknok.800, Noknok.820
TCP 11831 Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 11991 PitfallSurprise.100
TCP 12043 Frenzy.2000
TCP 12345 Fade.100, Netbus.160, Netbus.170, VagrNocker.400
TCP 12346 Netbus.160, Netbus.170
TCP 12348 Bionet.210, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.316, Bionet.317
TCP 12349 Bionet.084, Bionet.261, Bionet.280, Bionet.302, Bionet.305, Bionet.311, Bionet.313, Bionet.314, Bionet.316, Bionet.317, Bionet.401, Bionet.402
TCP 12389 KheSanh.210
TCP 12478 Bionet.210
TCP 12623 Buttman.090, Buttman.100
TCP 12624 Buttman.090, Buttman.100
TCP 12625 Buttman.100
TCP 12904 Akropolis.100, Rocks.100
TCP 13473 Chupacabra.100
TCP 13753 AFTP.010
TCP 14100 Eurosol.100
TCP 14194 CyberSpy.840
TCP 14286 HellDriver.100
TCP 14500 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14501 PCInvader.060, PCInvader.070
TCP 14502 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14503 PCInvader.050, PCInvader.060, PCInvader.070
TCP 14504 PCInvader.050, PCInvader.060
TCP 15092 HostControl.100, HostControl.260
TCP 15382 SubZero.100
TCP 15432 Cyn.210
TCP 15555 ICMIBC.100
TCP 16322 LastDoor.100
TCP 16484 MoSucker.110
TCP 16661 Dfch.010
TCP 16969 Progenic.100
TCP 16982 AcidShiver.100
TCP 17300 Kuang.200
TCP 17499 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17500 CrazzyNet.370, CrazzyNet.375, CrazzyNet.521
TCP 17569 Infector.141, Infector.160, Infector.170, Infector.180, Infector.190, Infector.200, Intruder.100, Intruder.100
TCP 17593 AudioDoor.120
TCP 19191 BlueFire.035, BlueFire.041
TCP 19604 Metal.270
TCP 19605 Metal.270
TCP 19991 Dfch.010
TCP 20000 Millenium.100
TCP 20001 Millenium.100, PshychoFiles.180
TCP 20002 AcidKor.100, PshychoFiles.180
TCP 20005 MoSucker.200, MoSucker.210, MoSucker.220
TCP 21212 Schwindler.182
TCP 21554 Exploiter.100, Exploiter.110, Girlfriend.130, GirlFriend.135
TCP 21579 Breach.2001
TCP 21584 Breach.2001
TCP 21684 Intruse.134
TCP 22068 AcidShiver.110
TCP 22115 Cyn.120
TCP 22222 Prosiak.047, Ruler.141, Rux.300, Rux.400, Rux.500, Rux.600
TCP 22223 Rux.400, Rux.500, Rux.600
TCP 22456 Bla.200, Bla.503
TCP 22457 AcidShiver.120, Bla.200, Bla.503
TCP 22784 Intruzzo.110
TCP 22845 Breach.450
TCP 22847 Breach.450
TCP 23005 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23006 Infinaeon.110, NetTrash.100, Oxon.110, WinRat.100
TCP 23032 Amanda.200
TCP 23432 Asylum.010, Asylum.012, Asylum.013, Asylum.014, MiniAsylum.110
TCP 23456 EvilFTP.100, VagrNocker.400
TCP 23476 DonaldDick.153, DonaldDick.154, DonaldDick.155
TCP 23477 DonaldDick.153
TCP 24000 Infector.170
TCP 24307 Wildek.020
TCP 25386 MoonPie.220
TCP 25486 MoonPie.220
TCP 25555 FreddyK.100, FreddyK.200
TCP 25556 FreddyK.100
TCP 25685 MoonPie.010, MoonPie.012, MoonPie.130, MoonPie.220, MoonPie.240, MoonPie.400
TCP 25686 MoonPie.135, MoonPie.200, MoonPie.400
TCP 25982 MoonPie.135, MoonPie.200
TCP 26274 Delta.050
TCP 27160 MoonPie.135, MoonPie.200
TCP 27184 Alvgus.100, Alvgus.800
TCP 27374 Muerte.110, Subseven.210, SubSeven.213
TCP 28429 Hack'a'Tack.2000
TCP 28430 Hack'a'Tack.2000
TCP 28431 Hack'a'Tack.2000
TCP 28432 Hack'a'Tack.2000
TCP 28433 Hack'a'Tack.2000
TCP 28434 Hack'a'Tack.2000
TCP 28435 Hack'a'Tack.2000
TCP 28436 Hack'a'Tack.2000
TCP 29559 DuckToy.100, DuckToy.101, Katux.200, Latinus.140, Latinus.150, Pest.100, Pest.400
TCP 29891 Unexplained.100
TCP 30000 Infector.170
TCP 30001 Error32.100
TCP 30003 LamersDeath.100
TCP 30029 AOLTrojan.110
TCP 30100 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30101 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30102 NetSphere.127, NetSphere.130, NetSphere.131
TCP 30103 NetSphere.131
TCP 30947 Intruse.134
TCP 31320 LittleWitch.400, LittleWitch.420
TCP 31337 BackOrifice.120, Khaled.100, OPC.200
TCP 31415 Lithium.101
TCP 31416 Lithium.100, Lithium.101
TCP 31557 Xanadu.110
TCP 31631 CleptoManicos.100
TCP 31745 Buschtrommel.100, Buschtrommel.122
TCP 31785 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31787 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31789 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31791 Hack'a'Tack.100, Hack'a'Tack.112
TCP 31887 BDDT.100
TCP 31889 BDDT.100
TCP 32100 ProjectNext.053
TCP 32418 AcidBattery.100
TCP 32791 Akropolis.100, Rocks.100
TCP 33291 RemoteHak.001
TCP 33333 Blackharaz.100, Prosiak.047, SubSeven.214
TCP 33577 SonOfPsychward.020
TCP 34324 TelnetServer.100
TCP 34763 Infector.180, Infector.190, Infector.200
TCP 35000 Infector.190, Infector.200
TCP 35600 Subsari.140
TCP 36794 BugBear.100
TCP 37237 Mantis.020
TCP 37651 YAT.210
TCP 37653 YAT.310
TCP 40308 Subsari.140
TCP 40412 TheSpy.100
TCP 40421 MastersParadise.970
TCP 40422 MastersParadise.970
TCP 40999 DiemsMutter.110, DiemsMutter.140
TCP 41626 Shah.100
TCP 44444 Prosiak.070
TCP 45673 Akropolis.100, Rocks.100
TCP 47262 Delta.050
TCP 48006 Fragglerock.200
TCP 49683 HolzPferd.210
TCP 50000 Infector.180
TCP 50130 Enterprise.100
TCP 50766 Fore.100
TCP 51234 Cyn.210
TCP 51966 Cafeini.080, Cafeini.110
TCP 54321 PCInvader.010
TCP 57341 NetRaider.100
TCP 57922 Bionet.084
TCP 58008 Tron.100
TCP 58009 Tron.100
TCP 59090 AcidReign.200
TCP 59211 DuckToy.100, DuckToy.101
TCP 59345 NewFuture.100
TCP 60000 DeepThroat.300, MiniBacklash.100, MiniBacklash.101, MiniBacklash.101
TCP 60411 Connection.100, Connection.130
TCP 60412 Connection.130
TCP 60552 RoxRat.100
TCP 63536 InsaneNetwork.500
TCP 63878 AphexFTP.100
TCP 63879 AphexFTP.100
TCP 64969 Lithium.100
TCP 65000 Socket.100
UDP 1 SocketsDeTroie.250
UDP 666 Bla.200, Bla.400, Bla.503, Noknok.820
UDP 1130 Noknok.800, Noknok.820
UDP 2140 DeepThroat.100, DeepThroat.200, DeepThroat.310
UDP 2989 Rat.200
UDP 3128 MastersParadise.970
UDP 3129 MastersParadise.920, MastersParadise.970
UDP 3150 DeepThroat.100, DeepThroat.200, DeepThroat.310, MiniBacklash.110
UDP 3333 Daodan.123
UDP 3800 Eclypse.100
UDP 3996 RemoteAnything.364
UDP 4000 RemoteAnything.364
UDP 5555 Daodan.123
UDP 5881 Y3KRat.110, Y3KRat.140
UDP 5882 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.140, Y3KRat.150
UDP 5883 Y3KRat.110, Y3KRat.140
UDP 5884 Y3KRat.140, Y3KRat.150
UDP 5885 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5886 Y3KRat.120, Y3KRat.140
UDP 5887 Y3KRat.110, Y3KRat.120, Y3KRat.140
UDP 5888 Y3KRat.100, Y3KRat.110, Y3KRat.120, Y3KRat.150
UDP 6953 Lithium.100
UDP 8012 Ptakks.217
UDP 10067 PortalOfDoom.100
UDP 10167 PortalOfDoom.100
UDP 10666 Ambush.100
UDP 11225 Cyn.100, Cyn.103, Cyn.120
UDP 11306 Noknok.800, Noknok.820
UDP 12389 KheSanh.210
UDP 12623 Buttman.090, Buttman.100
UDP 12625 Buttman.100
UDP 14100 Eurosol.100
UDP 23476 DonaldDick.155
UDP 26274 Delta.050
UDP 27184 Alvgus.100
UDP 28431 Hack'a'Tack.2000
UDP 28432 Hack'a'Tack.2000
UDP 28433 Hack'a'Tack.2000
UDP 28434 Hack'a'Tack.2000
UDP 28435 Hack'a'Tack.2000
UDP 28436 Hack'a'Tack.2000
UDP 29891 Unexplained.100
UDP 30103 NetSphere.131
UDP 31320 LittleWitch.400, LittleWitch.420
UDP 31337 BackOrifice.120, OPC.200
UDP 31416 Lithium.100, Lithium.101
UDP 31789 Hack'a'Tack.100, Hack'a'Tack.112
UDP 31791 Hack'a'Tack.100, Hack'a'Tack.112
UDP 33333 Blackharaz.100
UDP 47262 Delta.050
UDP 49683 HolzPferd.210
UDP 60000 MiniBacklash.100

8 People Can Use The Same Msn Dial Up Account

8 People Can Use The Same Msn Dial Up Account

its easy really. want to have an entire family on dial-up with just one bill?

step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..

say the secondary account is johnsmith@msn.com type in the Dial up connection

USER : MSN/johnsmith
PASS: ******* (whatever)

connect to your local msn phone number and the other people you gave secondary accounts to will be able to do the same, while you are connected. Its a sweet deal considering everyone is paying about 2 bucks a month for internet access, especially if you cannot get broadband. if you wanted to sell off the access to people you could actually make money doing this.. but i do not suggest it.

I used to be an msn tech and this was a little known secret even to most of the employees.

After you do this you do not need the software any more. I would suggest keeping it on to micromanage everyone else's accounts. and for the simple fact that if they don't pitch in, cut them off HEHEHE

i'm on broadband now so i dont care if i tell you my little secret. anyone else knew of this?

July 6, 2010

Rename Recycle Bin

1. Start, Run, 'Regedit'.
2. Press 'Ctrl'+'F' to open find box and type 'Recycle Bin' to search.
3. Change any value data with 'Recycle Bin' to whatever name you want to give it ( ie, like 'Trash Can' or 'Dump' etc).
4. Press F3 to continue searching for 'Recycle Bin' and change wherever you come across 'Recycle Bin' to new its new name.
5. Repeat step 4 until you have finished with searching and changed all values to its new name.
6. Close regedit and hit F5 on desktop to see the new name on screen.

Note: As a good practice, always backup your registry before changing anything although changing 'Recycle Bin' name is a simple tweak and doesnt affect anything else.

How to Bypass BIOS Passwords

How to Bypass BIOS Passwords

BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS

DISCLAIMER
This article is intended for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to crack the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.


Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


--------------------------------------------------------------------------------

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot


--------------------------------------------------------------------------------

Password cracking software

The following software can be used to either crack or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

--------------------------------------------------------------------------------

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


--------------------------------------------------------------------------------

Removing the CMOS Battery

The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


--------------------------------------------------------------------------------

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


--------------------------------------------------------------------------------

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.


--------------------------------------------------------------------------------

Using a professional service

If the manufacturer of the laptop or desktop PC can't or won't reset the BIOS password, you still have the option of using a professional service. Password Crackers, Inc., offers a variety of services for desktop and laptop computers for between $100 and $400. For most of these services, you'll need to provide some type of legitimate proof of ownership. This may be difficult if you've acquired the computer second hand or from an online auction.

Windows Update without registration

Would you like to use the Windows Update feature without being forced to register with Microsoft? OK then, this is what you can do:

Launch good ol' Regedit.
Go down to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion.
Look for a value named RegDone. If it isn't there create a new value with that name.
Right click the new value and choose Modify. Make the value 1.
Close Regedit and
Enjoy!

Google secrets

Google secrets

--------------------------------------------------------------------------------

method 1
?ww.google.com

put this string in google search:

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that i am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

voila!

method 2
?ww.google.com

put this string in google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson

Dreamweaver Tutorial

Ok, this should work...First of all, there is one great extension for DW & PHP ADODB object model that is free and great! Download it and install from www.interakt.ro its called PHAKT (NOT impakt, because its not free)
Install it and you will have another type of PHP ADODB document type
Start project with PHP ADODB (not old PHP MySQL)
Page 1
Create form that has one Editbox and one button.
Name Edit box smething like e.g. "search" without quotes.
That form should have form action="results.php" and type set to POST
Not, create Page 2 and name it results.php. Create new recordset in dw
like this
SELECT *
FROM table
WHERE table.colum.you.r.searching LIKE '%colname%' OR table.other.column LIKE '%colname%' ORDER BY table.tableid
this means that we want to select ALL (*) records in table WHERE content of column is similar (Dav, will return Dave, David, Davidof...) to search keyword.
Next, in variables click + and add variable name colname default value set to % if you want to show all records if form is submited blank, or -1 if You want to show none if form is submited blank. Finaly for Run-time value type $HTTP_POST_VARS['search'] Runtime value is equal name of Edit box name you set up in first page...
Now, from bindings tab, select values and insert it on page, that You would like to show on page. Ill skip this part assuming You know how to format output and how to limit it but if you dont know ask in reply...
So now You have page with results. Test it and see if its working.
If it is, create page 3 and name it details.php. Now, select value from page that you want to link with details page and click on link. Select details.php page and click on parameters. For param name enter something like id since this should be PK in table and unique value, and for value click on lightning icon, and select primary key in your table. In live page link should be like details.php?id=.
As for details page recordset it should look like
SELECT *
FROM table
WHERE table.id = 'colname'
create vars as for page 2, but change Runtime to $HTTP_GET_VARS['id']
and format output on page. That should be it, but since im typing it in "realtime" maby i forgot something...
Home I did helped You

Delete files from Recent File List

This tip requires a change to the Windows Registry. Please see the MSFN Guide "Backup Your Registry" if you are new to the Windows Registry.

Windows Media Player (WMP) is a built-in application that allows you to play multimedia files. Like many other applications, WMP remembers the most recently played files and displays them in the Recent File List under the File menu. This feature is useful if you regularly play certain files, but you may want to clear the list if you share the computer and a user account or create archives and CDs.

There are two ways you can clear the list:

I. The ClearMRU.exe Utility is available for free in the Windows Media Player Bonus Pack from Microsoft, but Microsoft does not support this tool.

II. You can also manually delete the list through the Windows Registry:

1. Start the Windows Registry Editor, regedit.exe, by typing regedit in the Windows Run Command Line.

2. Go to HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Player\RecentFileList.

3. Delete the RecentFileList subkey.

4. If you've also streamed content from the Internet, you can delete the RecentURLList subkey.

5. Exit the Registry Editor.

6. Restart the computer.

To keep certain files in the list, don't delete the entire key. Deleting individual entries within the key will get rid of the files that you no longer want in the Recent File List.

July 3, 2010

Sniper Ghost Warrior + UPDATE 1 [English]

Click the link to download the game


http://www.torrentzap.com/torrent/1400822/Sniper+Ghost+Warrior+%2B+UPDATE+1+[English]
Installation:

1. Unpack release
2. Mount image or burn
3. Install
4. Copy the content from the SKIDROW folder on the DVD to your
installation directory and overwrite
5. Play the game

ESET NOD32

ESET NOD32 antivirus with serial key


http://www.torrentreactor.net/torrents/1658803/ESET-NOD32-Version-2-7-with-serialkey

Malwarebite Anti-Malware 1.25

install, update the definitions

then register with the following

ID: 6HD51
Key: 3KMK-1NM4-013N-NNYX

enjoy

-mazuki


100% working

Avast Pro Antivirus 4.8 Serial key

Avast Pro Antivirus 4.8Serial Key 100% working


W1208070R9900D1199-T549MYK0

TCP/IP networks

***********************************************************************
ADVISORY: TCP packet fragment attacks against firewalls and filters
System: TCP/IP networks
Source: http://all.net, Dr. Frederick B. Cohen
***********************************************************************
Packet Fragmentation Attacks
Introduction to Packet Fragmentation
Packet fragmentation is the part of the Internet Protocol (IP) suite of
networking protocols that assures that IP datagrams can flow through any
other sort of network. (For details, see Internet Request For Comments 791
(rfc791) and are available and searchable in electronic form from Info-Sec
heaven on the World-Wide-Web at http://all.net, through gopher service at
all.net, or by ftp service from rs.internic.net.) Fragmentation works by
allowing datagrams created as a single packet to be split into many smaller
packets for transmission and reassembled at the receiving host.
Packet fragmentation is necessary because underlying the IP protocol, other
physical and or logical protocols are used to transport packets through
networks. A good example of this phenomena is on the difference between
Ethernet packets (which are limited to 1024 bytes), ATM packets (which are
limited to 56 bytes), and IP packets which have variable sizes up to about
1/2 million bytes in length.
The only exception to this rule is in the case of an internet datagram
marked don't fragment . Any internet datagram marked in this way is
supposed to not be fragmented under any circumstances. If internet
datagrams marked don't fragment cannot be delivered to their destination
without being fragmented, they are supposed to be discarded instead. Of
course, this rule doesn't have to be obeyed by the IP software actually
processing packets, but it is supposed to be.
How Packet Reassembly Attacks Work
The packet fragmentation mechanism leads to attacks that bypass many
current Internet firewalls, but the reason these attacks work is not
because of the way fragmentation is done, but rather because of the way
datagrams are reassembled.
Datagrams are supposed to be fragmented into packets that leave the header
portion of the packet intact except for the modification of the fragmented
packet bit and the filling in of an offset field in the IP header that
indicates at which byte in the whole datagram the current packet is
supposed to start. In reassembly, the IP reassembler creates a temporary
packet with the fragmented part of the datagram in place and adds incoming
fragments by placing their data fields at the specified offsets within the
datagram being reassembled. Once the whole datagram is reassembled, it is
processed as if it came in as a single packet.
According to the IP specification, fragmented packets are to be reassembled
at the receiving host. This presumably means that they are not supposed to
be reassembled at intermediate sites such as firewalls or routers. This
decision was made presumably to prevent repeated reassembly and
refragmentation in intermediate networks. When routers and firewalls
followed the rules, they found a peculiar problem.
The way firewalls and routers block specific services (such as telnet )
while allowing other services (such as the world wide web http service) is
by looking into the IP packet to determine which Transfer Control Protocol
(TCP) port is being used. If the port corresponds to 80, the datagram is
destined for http service, while port 23 is used for telnet . In normal
datagrams, this works fine. But suppose we didn't follow the rules for
fragmentation and created improper fragmented packets? Here's what one
attacker did:
* Create an initial packet which claims to be the first fragment of a
multi-packet datagram. Specify TCP port 80 in the TCP header so it
looks like a datagram going to http service, which is allowed to pass
the firewall.
* The firewall passes the packet to the host under attack and passes
subsequent packet fragments in order to allow the destination host to
reassemble the packet.
* One of the subsequent packets has an offset of 0 which causes the
reassembler to overwrite the initial part of the IP packet. This is
the part of the IP packet that specifies the TCP port. The attacker
overwrites the IP port number which was originally 80 with a new port
number such as 23, and is now granted telnet access to the host under
attack despite the firewall that is supposed to block the service.

Hacker's League

The Hacker's League
Lee Felsenstein
18 March 1992

Theory

The Hacker's League is modeled loosely after the American
Radio Relay League (A.R.R.L.), an organization of technological
adventurers of the Edwardian period. In its heyday, the radio
amateurs moved from being nuisances to being important
contributors to the development of radio technology. In a field
which demanded governmental regulation for orderly operation, the
A.R.R.L. represented the interests of amateurs in the councils of
government and organized ongoing educational activities through
which newcomers to the field could learn not only the technology
involved, but also the human interactions which connect the
technology to the outside world.

The most recent triumph of radio amateurs has been the
development of packet radio, which has recently been adopted by
Motorola as the basis for its "wireless local loop" for wireless
telephone operation. Thanks to the amateurs, it was developed
and tried out in an open environment outside of commercial
pressures which tend toward secrecy and exclusion.

In the area of computers and telecommunication, there are
several parallels between today's hackers and the radio amateurs
of 1915. Hackers are seen by the respectable technological
players as nuisances capable of doing great damage and generally
without redeeming qualitites. They were indistinguishable from
rogue broadcasters who trampled on other signals in their urge to
cover the longest distance. In the corridors of power there was
a movement toward outlawing them. Nontechnical people did not
know quite what to think about this problem and its suggested
solution.

The A.R.R.L. was more than a lobbying organization, though.
It provided a means for the mutual education essential to the
growth of any technology, a route of entry open to all comers,
and a social scene to accompany the technological forum. Through
the A.R.R.L. green kids could encounter grizzled oldtimers who
would be unapproachable in their positions the industry. At
field days and other events the cameraderie of being explorers
overcame the barriers of class and position as well as those
engendered by commercial competition. Networking was possible in
the amateur environment which forwarded the operation in the
commercial and professional environments.

The concept of the Hacker's League is similar but different
as befits the different nature of the technology. The aim is to
provide a situation in which otherwise unqualified entrants to
the field can engage in informal learning situations, test their
skills as a means of exercising their craft, gain hands-on
experience with systems which would be unobtainable otherwise,
and participate on both sides of mentoring and tutorial
relationships.

The Hacker's League would provide an outlet for the creative
energies which are otherwise expended making life worse for
perceived or imagined enemies through unauthorized entry to
systems and other illegal or unethical conduct. Such energies
would be turned toward projects which advance the state of the
art, and in a way which undermines the arrogance and exclusivity
of the corporate managers which hackers find so tempting a
target.

To the charge that the Hacker's League would become a front
for the interests of industry may be raised the defense that by
exploiting industry's fear of low-level disorder it would provide
an organizing platform for higher-level attack upon the
technological underpinnings of the existing structure. Consider
the difference between outcomes had hackers in the 1970's been
content to organize politically for access to mainframes. There
would have been no personal computer industry, and the power
relationships would not have undergone the radical changes
brought about by the triumph of open architecture. One might
well have said then that the amateur computer activity was a
distraction from the true task of tugging at the sleeve of power,
yet we can all see the effects of that activity.

The Hacker's League could be seen as a guild serving to
restrict entry to the membership of the technical elite. In
fact, the League would be far more open than the current system
of university education. It would provide a means of testing to
see whether one is suited to the demands of the technology
without exacting years of commitment to learning prerequisites.
Within the Hacker's League there would be much more mobility
among specialties than exists in university curricula, and the
doors would be open to underage entrants and those who come later
in life after entrance to a university becomes difficult or
impossible.

Still, the human tendencies which lead toward exclusivity
and the formation of cliques will always be with us, and we must
bear themin mind as we proceed in conceptualizing and realizing
the Hacker's League. The technology in which we work tends to
eliminate the need for centralization, and one of the important
outcomes of the Leagues's development would be the demonstration
of the decentralized mode of organization, as noble an
exploration as might be contemplated, int he opinion of many.

After all, the primary challenge is not so much in the
hardware, or the physical form of the systems of
intercommunication and interaction around which society develops.
The important work is in developing the social forms of use of
this technology which forwards the common good as well as that of
the individual. New ways of thinking, as Einstein said, are the
urgently needed ingredient for the humanization and survivalof
society. The Hacker's League would not only provide a
development bed for social innovations involving the use of
information technology, but it would empower those innovations
through the parallel development of the technology and, most
importantly, of the human network through which the technology is
made to come alive.

Practice

The Hacker's League would be membership organization open
to nonmembers for certain functions. It would be organized as a
nonprofit educational and scientific organization. Its
publications would be freely available to all interested readers.

The League would hold periodic local events demonstrating
technical achievements of members or chapters, and offering
places for individuals outside the League to exhibit or to engage
in low-level trade, such as swap meets. A newcomer would most
probably make first contact at such events, and might decide to
attend a local chapter meeting.

Meetings of local chapters would be high in information
exchange and low in structure. Newcomers would be acknowledged
and provided with a brief orientation so that they would not feel
put off by displays of technical virtuosity or cliquishness. If
the newcomer desired further involvement, there would be a set of
course tracks available as suggested paths for establishing,
through achievement, one's level of skill. These might be
thought of as Scout Merit Badges, although the name would
probably not be used.

In the early stages of involvement, the newcomer might
interact with a designated instructor who is also working to
establish skill in teaching and coaching. Later, as the newcomer
gains skill and established competence, he or she would be
recommended for more individual instruction and consultation from
more highly skilled mentors. Such mentoring relationships would
be an important feature of the League, both as a means and and
end.

The League at the local level would acquire maintain
obsolescent equipment which would be operated and imporved by the
members through development projects proposed from the
membership. Telecommunication resource would also be solicited
as donations from carriers, on the none-too-subtle suggestion
that the availability of such resource in such a context is
conducive to the developmentof skilled citizens instead of
antisocial attackers. Through this resource the League would
maintain its larger structure, which would be a communication-
based overlay of networks and ad-hocracies.

Through these structures conflicitng positions could be
discussed and debated in a functioning participatory democracy.
Informed plebiscites would be conducted both as a means of
determining the senseof the League on issues of importsnce and as
development projects testing the capabilities of information
technology under various arrangements of use. The highest
structure of orgnization would be at the local level, and the
administrators at wider levels might be given titles, such as
Janitor, which tend to prevent puffery and self-glorification.
Sapiential authority would be fostered within the League as
opposed to positional authority.

The newcomer would progress from establishing his or her
level of skill to a process of exploring the available courses of
self-development. It would be possible to propose a specific
course different from the recommended courses. The newcomer
would then engage in projects which require the improvement in
skill level under the supervision or review of competent skilled
members.

This should be seen as professional development (where the
word has no connotation of "earning a livelihood") and since it
is a responsibility of all professionals to teach adn transmit
their skills, the newcomer would along the way be expected to
perform as an instructor and later a supervisor and mentor to future
newcomers. Thus, progress in self-development would not be
simply a matter of the "neat hacks" one could accomplish, but
would require an integration into the society first of hackers,
then the broader society. There is no reason why technologists
must rely on others to represent their work to the public or the
polity.

One of the public service functions performed by the
members of the Hacker's League (and this performance would be
explicitly carried out by the members and not by the
"organization") would be consultation on informational security
and integrity of communications within everyday society. Members
of the League would provide a service of analysis of proposals,
investigations of system misuse and pursuit of abusers which
would rest on itsown professional foundation rather than serving
direct commercial ends which might distort the conclusions of
investigations.

To use a popular metaphor, members ofthe HAcker's League
might be compared to doctors on the Electronic Frontier, with
their own loose medical association to keep quackery at bay and
serving a public health function. Or perhaps the analogy might
be to schoolteachers who also write literature and literary
criticism, as well as turningout works of art and organizing
criticism of the same. Obviously, this metaphoric space needs
work.

One can expect to betterone's material condition through
participating inthe networks of relationships which would be the
Hacker's League, if one has the skill and aptitude to improve
one's skills. If not, it would be no shame to cease
participation. An important function of the League would be to
encourage the incompetent to go elsewhere without opprobium.
They may well turn up as administrators within industry, and it
is in no ones' interest for there to be hostile relations based
upon "loser" status.

In fact, the Hacker's League would be a way to do away with
the "winner/loser" dichotomy. If you try, you win to some
degree, and younger members less secure in themselves need to
learn this, at times to a desperate degree. One can take on more
thnone can handle, be allowed to fail with support from those
more experienced, and not incur actual or emotional costs which
would otherwise drive one away from such experimentation. The
Hacker's League wouldn't be working without a measurable degree
of honestly won failure on the partofits members.

What types of projects would be undertaken? Perhaps the
development of distributed operating systems suitable for
networks of variegated intelligent devices; elegant user front-
ends and development environments for intuitive system
configuration; pidgin speech (unnatural language) recognition
systems; new structures of groupware; posibly neural networks at
higher levels.

But these are my own conjectures, and what would actually
transpire would almost certainly make these guesses look
ridiculously quaint and primitive. Let's give it a chance to
happen.

Hack RemoteAccess

Why the "Fun with RA boards" hacking method is LAME!
(The REAL way to hack RemoteAccess)
-----------------------------------

Knocked up by ByTe RyDeR of the
ÚÂÄÄ ÄÄ Ä úú ú
ijÅÄÄ FundeMäNTAL CoNNeCtiON ijÄÄÄ
:ÃÄÄ ÄÄ Ä úú ú


"Saving the Brain Forest"


Well dewdz, ya seen the file text about hacking RemoteAccess and you wanna
crack that H/P or warez RA board for mega ratios? Get Real!

RA *CAN* be hacked but only in the same way as any other BBS sox... no
sysop reading that file was shat themselves .. here's why not:

Basically the technique outlined involved you writing a trojan and
disguising it as some program the sysop is really gagging for in the hope
is he'll run it on his system. Wot it'll really do is copy his USER.BBS
onto the filebase so you can call back later and d/l it... neat idea, and
one that in *theory* will work with most BBS sox (most are EVEN easier coz
they don't encrypt the users file like RA) but their execution of it sucks!

Firstly, their compiled batch file relied on the sysop running RA off their
C: drive from the directory \RA... Yeah, maybe some lame PD board they
hang out on is like that but most sysops I know run multiple drives and
many have more complex directory structures... Lame Hacker 0 - Sysop 1

Okay... letz assume they got on some lame fucking board and the users file
*is* C:\RA\USERS.BBS - next step is to copy the file into the filebase and
make it d/lable. How do they do that? (patronising Dez Lymon voice) .

Their idea was to copy the file into D:\FILES\UPLOAD .. Yeah sure guyz...
EVERY board uses the D: drive for the filebase and happen to have a file
area in \FILES\UPLOAD - NOT!!!!!! Lame Hacker 0 - Sysop 2

Right, so they got better odds than winning the national fucking lottery and
all the above worked (yeah man, we're dreamin' but let's give 'em a chance).
What next? The file has to be d/lable... you found a sysop that makes
UNCHECKED & UNSCANNED files available for download? Fuck off! Get a life!
Lame Hacker 0 - Sysop 3

So... okay.... we got a sysop that's so fucking lame he doesn't deserve
to to breath the same air as the rest of the human race and uses all the
above paths and makes unchecked uploads d/lable. RA by default won't allow
files to be d/led UNLESS they're in the file database. Unless the USERS.BBS
destination ALREADY EXISTED in that area and was previously in the area
database there's NO WAY you can d/l it.

The way they "solved" this was to add an entry to FILES.BBS in the file
directory. Nice one... EXCEPT RA DOESN'T USE FILES.BBS AS IT'S FILE
DATABASE. Unless you happen to be lucky enough that the sysop does an
import from FILES.BBS to the REAL file database before checking out your
planted file (most RA sysops only import from FILES.BBS when adding CDROMs)
the addition of this entry will do FUCK ALL! Lame Hacker 0 - Sysop 4

To quote from the author "This is a generic program and you will have to
tailor it so it will meet your needs." - yeah man, fucking rethink, redesign
and rewrite it more like!

Oh yeah... EVEN IF YOU DO get a copy of the USER.BBS file downloaded THE
PASSWORDS ARE ENCRYPTED!!! Lame Hacker :( - Sysop:-)


So how can U hack RA? Well, the idea was okay but, like hacking any system,
you gotta KNOW the system ya gonna hack b4 U stand a chance.

Most sysops will use the DOS environment variable RA set to the RA system
directory so that external doors can find the system files... that's very
helpful of the sysop, to show us where we can find his config files.

In the RA system directory should be the file CONFIG.RA. You might want to
include a check for this file within your program and possibly do a disk
and directory scan for the file if RA isn't defined or is set incorrectly.

I'm not *entirely* sure about other versions of RA, but in the current
release (2.02) the CONFIG.RA offset &h3E4 is where the name of the mail
directory starts. This is the path where USERS.BBS will be found.

Next you need to know for SURE the name of a directory which stores the
files for a filearea from which you are able to download.

I suggest you do this in one of three ways:

1) Interogate the file FILES.RA in the RA system directory which contains
the filebase area configs. You *could* just search the directory for a
valid path but you'd wouldn't know if you had d/l access to the area.

2) If you want to be a bit more clever you could interpret the file and
find out the minimum security level required to d/l from each area and
dump your copy of USERS.BBS in the area with the lowest access level,
pretty much guaranteeing that you'll be able to get to the file. This
doesn't take security flags into account so there's still a SLIM
possiblity you won't be able to d/l the file unless you also write flag
testing into your program.

3) My favourite technique is to have the program read a small config file
which is uploaded with your archive. This file just contains the name
of a file you KNOW you have d/l access from. You can then either do a
global search for that filename or, preferably (coz it's faster) read
FILES.RA for the paths used by the filebase and search those.

So now you have the location of the USERS.BBS and the destination directory
you simply need to copy the file. However, even though the file is sitting
in a filebase directory it STILL isn't available for d/l... why? Because
it's not in the filearea database.

You could get clever and find amend filearea database files directly if you
get the fileareas path from CONFIG.RA (offset &hC12) and write to the files
HDR\FBD#####.HDR (header) IDX\FDB#####.IDX (index) and, if you want to add
a description, TXT\FBD#####.TXT, where ##### is the RA file area number.

There *is* an easier way. Shell out to DOS and execute the RAFILE utility
from the RA program path, passing the arguments "ADOPT filename #####".

E.g. the BASIC command would be:

SHELL "RAFILE ADOPT "+filename$+STR$(areanum)

Where filename$ contains the name of your USERS.BBS copy and areanum is the
RA filearea number. If your filename was USERTEST.ZIP and you'd copied it
to the directory used for RA file area 10 you'd be executing:

RAFILE ADOPT USERTEST.ZIP 10

This will "adopt" the file, adding it to the RA file database, making it
available for d/l (assuming you have the appropriate rights to the area).

All you need to do now is to package this trojan file to entice the sysop
into running it... In the LAME method for hacking RA the author used DSZ
as an example. That was about the most realistic part of the file and the
only bit worth leaching!


Your archive:
DSZ.EXE (your program)
DSZ.DAT (the *real* DSZ.EXE)
DSZ.CFG (small file containing the name of a *known*
d/lable file - preferabbly encrypted)
+ any other files that normally come with DSZ



Flow diagram for DSZ.EXE trojan:

_______
/ \
| Start |
\_______/
|
|
+--------+--------+
| Read enviroment |
| variable RA |
+--------+--------+
|
|
/ \
/ \
/CONFIG.RA\ +---------------------+
/ exist in \___>____| Scan drives & paths |
\ that path / No | search for the file |
\ ? / +----------+----------+
\ / |
\ / |
Yes | |
+------------<-------------+
|
+--------+--------+
| Read CONFIG.RA |
| to get location |
| of USERS.BBS |
+--------+--------+
|
|
+--------+--------+
| Read DSZ.CFG to |
| get a filename |
+--------+--------+
|_____________<____________
| |
+--------+--------+ |
| Read FILES.RA to| |
| get name of the | |
| next filearea | |
+--------+--------+ |
| |
| |
/ \ |
/ \ |
/does area\ |
/ contain the \________>__________|
\ file / No
\ ? /
\ /
\ /
Yes |
|
+--------+--------+
| Copy USERS.BBS |
| to the filearea |
| directory |
+--------+--------+
|
|
+--------+--------+
| Run RAFILE with |
| ADOPT to update |
| RA database |
+--------+--------+
|
|
+--------+--------+
| Delete DSZ.EXE |
| and DSZ.CFG |
+--------+--------+
|
|
+--------+--------+
| Rename DSZ.DAT |
| to DSZ.EXE |
+--------+--------+
|
___|___
/ \
| Stop! |
\_______/

Once you've uploaded the file, preferably using a pseudonym, post the sysop
a message telling him how c00l your upload is. Wait a day or so and dial
back. Do a filename search using the name you decided to use for your copy
of USERS.BBS and d/l it.

The next step, now you have the USERS.BBS file is to crack the passwords.
I only know of ONE crack program out there which has the RA password
encryption algorythm, a program based on the popular Unix CRACKERJACK
program called RA-CRACK. This simply takes a given word, encrypts it, and
compares it to the USERS.BBS file to find a user with a matching password.

RA-CRACK takes it's source words from a text file so it would be possible
to either:

a) Use a TXT dictionary file as the source. All passwords that are
normal words will be found. This method will usually find about 90%
of the user passwords.

b) Write a "brute force" cracker using a small routine that "counts"
through valid ASCII character combinations from "!" (ASCII 33) upto
a string containing 25 (max length of a RA password) null characters
(ASCII 255), passing these via a text file to RA-CRACK. This SHOULD
be _100%_ successful, but SLOW!

l8r!

>ByTe<>RyDeR<

UNIX operating system-Berkley 4.2

Following is all the information that you need to understand the workings of
the UNIX operating system (Berkley 4.2).

Patched together by The War


On the security side of UNIX:
-----------------------------
On the Security of UNIX Dennis M. Ritchie Recently there has been much interest
in the security aspects of operating systems and software. At issue is the
ability to prevent undesired disclosure of information, destruction of
information, and harm to the functioning of the system. This paper discusses
the degree of security which can be provided under the system and offers a
number of hints on how to improve security. The first fact to face is that was
not developed with security, in any realistic sense, in mind; this fact alone
guarantees a vast number of holes. (Actually the same statement can be made
with respect to most systems.) The area of security in which is theoretically
weakest is in protecting against crashing or at least crippling the operation
of the system.
The problem here is not mainly in uncritical acceptance of bad parameters
to system calls there may be bugs in this area, but none are known- but rather
in lack of checks for excessive consumption of resources. Most notably, there
is no limit on the amount of disk storage used, either in total space allocated
or in the number of files or directories. Here is a particularly ghastly shell
sequence guaranteed to stop the system:

while :; do
mkdir x
cd x
done

Ether a panic will occur because all the i-nodes on the device are used up,
or all the disk blocks will be consumed, thus preventing anyone from
writing files on the device. In this version of the system, users are
prevented from creating more than a set number of processes simultaneously, so
unless users are in collusion it is unlikely that any one can stop the
system altogether. However, creation of 20 or so CPU or disk-bound jobs
leaves few resources available for others. Also, if many large jobs are
run simultaneously, swap space may run out, causing a panic. It should be
evident that excessive consumption of disk space, files, swap space, and
processes can easily occur accidentally in malfunctioning programs
as well as at command level. In fact is essentially defenseless against

this kind of abuse, nor is there any easy fix. The best that can be said is
that it is generally fairly easy to detect what has happened when disaster
strikes, to identify the user responsible, and take appropriate action.
In practice, we have found that difficulties in this area are rather rare,
but we have not been faced with malicious users, and enjoy a fairly generous
supply of resources which have served to cushion us against accidental
overconsumption. The picture is considerably brighter in the area of protection
of information from unauthorized perusal and destruction. Here the degree of
security seems (almost) adequate theoretically, and the problems lie more in
the necessity for care in the actual use of the system. Each file has
associated with it eleven bits of protection information together
with a user identification number and a usergroup identification number (UID
and GID). Nine of the protection bits are used to specify independently
permission to read, to write, and to execute the file to the user himself,
to members of the user's group, and to all other users. Each process
generated by or for a user has associated with it an effective UID and
a real UID, and an effective and real GID. When an attempt is made to access
the file for reading, writing, or execution, the user process's effective
UID is compared against the file's UID; if a match is obtained, access is
granted provided the read, write, or execute bit respectively for the user
himself is present. If the UID for the file and for the process fail to
match, but the GID's do match, the group bits are used; if the GID's do
not match, the bits for other users are tested. The last two bits of each
file's protection information, called the set-UID and set-GID bits, are used
only when the file is executed as a program. If, in this case, the set-UID
bit is on for the file, the effective UID for the process is changed to the
UID associated with the file; the change persists until the process

terminates or until the UID changed again by another execution of a set-UID
file. Similarly the effective group ID of a process is changed to the GID
associated with a file when that file is executed and has the set-GID bit
set. The real UID and GID of a process do not change when any file is
executed, but only as the result of a privileged system call. The basic
notion of the set-UID and set-GID bits is that one may write a program which
is executable by others and which maintains files accessible to others
only by that program. The classical example is the game-playing program
which maintains records of the scores of its players. The program itself has
to read and write the score file, but no one but the game's sponsor can be
allowed unrestricted access to the file lest they manipulate the game to their
own advantage. The solution is to turn on the set-UID bit of the game program.
When, and only when, it is invoked by players of the game, it may update the
score file but ordinary programs executed by others cannot access the
score. There are a number of special cases involved in determining access
permissions. Since executing a directory as a program is a meaningless
operation, the execute-permission bit, for directories, is taken instead to
mean permission to earch he directory for a given file during the scanning of
a path name; thus if a directory has execute permission but no read
permission for a given user, he may access files with known names in the
directory, but may not read (list) the entire contents of the directory. Write
permission on a directory is interpreted to mean that the user may
create and delete files in that directory; it is impossible for any
user to write directly into any directory. Another, and from the point
of view of security, much more serious special case is that there is a ``super
user'' who is able to read any file and write any nondirectory. The
super-user is also able to change the protection mode and the owner UID and

GID of any file and to invoke privileged system calls. It must be
recognized that the mere notion of a super-user is a theoretical, and
usually practical, blemish on any protection scheme. The first necessity
for a secure system is of course arranging that all files and
directories have the proper protection modes. Traditionally, software has been
exceedingly permissive in this regard; essentially all commands create files
readable and writable by everyone. In the current version, this policy may be
easily adjusted to suit the needs of the installation or the individual
user. Associated with each process and its descendants is a mask, which is in
effect with the mode of every file and directory created by that process. In
this way, users can arrange that, by default, all their files are no more
accessible than they wish. The standard mask, set by allows all
permissions to the user himself and to his group, but disallows writing by
others. To maintain both data privacy and data integrity, it is necessary,
and largely sufficient, to make one's files inaccessible to others. The lack
of sufficiency could follow from the existence of set-UID programs created
by the user and the possibility of total breach of system security in one
of the ways discussed below (or one of the ways not discussed below). For
greater protection, an encryption scheme is available. Since the editor
is able to create encrypted documents, and the command can be used to pipe
such documents into the other text-processing programs, the length of time
during which cleartext versions need be available is strictly limited. The
encryption scheme used is not one of the strongest known, but it is judged
adequate, in the sense that cryptanalysis is likely to require
considerably more effort than more direct methods of reading the encrypted
files. For example, a user who stores data that he regards as truly secret
should be aware that he is implicitly trusting the system administrator not

to install a version of the crypt command that stores every typed
password in a file. Needless to say, the system administrators must be at
least as careful as their most demanding user to place the correct
protection mode on the files under their control. In particular, it is
necessary that special files be protected from writing, and probably
reading, by ordinary users when they store sensitive files belonging to
other users. It is easy to write programs that examine and change files
by accessing the device on which the files live. On the issue of password
security, is probably better than most systems. Passwords are stored in an
encrypted form which, in the absence of serious attention from specialists in
the field, appears reasonably secure, provided its limitations are
understood. In the current version, it is based on a slightly defective
version of the Federal DES; it is purposely defective so that easily-
available hardware is useless for attempts at exhaustive key-search.
Since both the encryption algorithm and the encrypted passwords are available,
exhaustive enumeration of potential passwords is still feasible up to a
point. We have observed that users choose passwords that are easy to
guess: they are short, or from a limited alphabet, or in a dictionary.
Passwords should be at least six characters long and randomly chosen
from an alphabet which includes digits and special characters. Of course
there also exist feasible non-cryptanalytic ways of finding out
passwords. For example: write a program which types out ``login:'' on
the typewriter and copies whatever is typed to a file of your own. Then
invoke the command and go away until the victim arrives. The set-UID (
set-GID) notion must be used carefully if any security is to be maintained.
The first thing to keep in mind is that a writable set-UID file can have
another program copied onto it. For example, if the super-user command is

writable, anyone can copy the shell onto it and get a password-free version
of A more subtle problem can come from set-UID programs which are not
sufficiently careful of what is fed into them. To take an obsolete
example, the previous version of the command was set-UID and owned by the
super-user. This version sent mail to the recipient's own directory. The
notion was that one should be able to send mail to anyone even if they want
to protect their directories from writing. The trouble was that was
rather dumb: anyone could mail someone else's private file to himself. Much
more serious is the following scenario: make a file with a line like one in
the password file which allows one to log in as the super-user. Then make a
link named ``.mail'' to the password file in some writable directory on the
same device as the password file (say/tmp). Finally mail the bogus login
line to /tmp/.mail; You can then login as the superuser, clean up the
incriminating evidence, and have your will. The fact that users can mount
their own disks and tapes as file systems can be another way of gaining
superuser status. Once a disk pack is mounted, the system believes what is on
it. Thus one can take a blank disk pack, put on it anything desired, and
mount it. There are obvious and unfortunate consequences. For
example: a mounted disk with garbage onit will crash the system; one of the
files on the mounted disk can easily be a password-free version of other
files can be unprotected entries for special files. The only easy fix for
this problem is to forbid the use of to unprivileged users. A partial
solution, not so restrictive, would be to have the command examine the
special file for bad data, set-UID programs owned by others, and
accessible special files, and balk at unprivileged invokers.

-
Info about the /etc/passwd file:

---

NME
passwd - password file

DSCRIPTION
Passwd contains for each user the
following information:

name (login name, contains no
upper case)
encrypted password
numerical user ID
numerical group ID
user's real name, office,
extension, home phone.
initial working directory
program to use as Shell

The name may contain `&', meaning insert the login name.
This information is set by the chfn(1) command and used by
the finger(1) command.

This is an ASCII file. Each field within each user's entry
is separated from the next by a colon. Each user is
separated from the next by a new line. If the password
field is null, no password is demanded; if the Shell field
is null, then /bin/sh is used.

This file resides in directory / etc. Because of the
encrypted passwords, it can and does have general read
permission and can be used, for example, to map numerical user
ID's to names.

Appropriate precautions must be taken to lock the file
against changes if it is to be edited with a text editor;
vipw(8) does the necessary locking.

FLES
/etc/passwd

SE ALSO

getpwent(3), login(1), crypt(3),
passwd(1), group(5),
chfn(1), finger(1), vipw(8),
adduser(8)

BGS
A binary indexed file format should be available for fast access.

User information (name, office, etc.) should be stored elsewhere.
---

Now if you have had the patience to read all of this and you have digested
it you know everything that you need to know about the Unix system to hold up
your end of an intelligent conversation.

Have fun!

Trojan

23. What is a trojan/worm/virus/logic bomb?

This FAQ answer was written by Theora:

Trojan:
Remember the Trojan Horse? Bad guys hid inside it until they could get
into the city to do their evil deed. A trojan computer program is
similar. It is a program which does an unauthorized function, hidden
inside an authorized program. It does something other than what it
claims to do, usually something malicious (although not necessarily!),
and it is intended by the author to do whatever it does. If it's not
intentional, its called a 'bug' or, in some cases, a feature :) Some
virus scanning programs detect some trojans. Some virus scanning
programs don't detect any trojans. No virus scanners detect all
trojans.
Virus:
A virus is an independent program which reproduces itself. It may
attach to other programs, it may create copies of itself (as in
companion viruses). It may damage or corrupt data, change data, or
degrade the performance of your system by utilizing resources such as
memory or disk space. Some virus scanners detect some viruses. No
virus scanners detect all viruses. No virus scanner can protect
against "any and all viruses, known and unknown, now and forevermore".
Worm:
Made famous by Robert Morris, Jr. , worms are programs which reproduce
by copying themselves over and over, system to system, using up
resources and sometimes slowing down the systems. They are self
contained and use the networks to spread, in much the same way viruses
use files to spread. Some people say the solution to viruses and worms
is to just not have any files or networks. They are probably correct.
We would include computers.
Logic Bomb:
Code which will trigger a particular form of 'attack' when a
designated condition is met. For instance, a logic bomb could delete
all files on Dec. 5th. Unlike a virus, a logic bomb does not make
copies of itself.

July 2, 2010

How to modify *.exe files

How to modify *.exe files

learn how to change *.exe files, in 5 easy steps:

1) Don't try to modify a prog by editing his source in a dissasembler.Why?
Cause that's for programmers and assembly experts only.

try to view it in hex you'll only get tons of crap you don't understand.
First off, you need Resource Hacker(last version). It's a resource editor-
very easy to use, You can download it at h**p://www.users.on.net/johnson/resourcehacker/

2) Unzip the archive, and run ResHacker.exe. You can check out the help file too


3) You will see that the interface is simple and clean. Go to the menu FileOpen or press Ctrl+O to open a file. Browse your way to the file you would like to edit. You can edit *.exe, *.dll, *.ocx, *.scr and *.cpl files, but this tutorial is to teach you how to edit *.exe files, so open one.

4) In the left side of the screen a list of sections will appear.
The most common sections are
-String table;
-RCData;
-Dialog;
-Cursor group;
-Bitmap;
-WAV.
*Icon: You can wiew and change the icon(s) of the program by double-clicking the icon section,chossing the icon, right-clicking on it an pressing "replace resource". After that you can choose the icon you want to replace the original with.
*String table: a bunch of crap, useful sometimes, basic programming knowladge needed.
*RCData: Here the real hacking begins. Modify window titles, buttons, text, and lots more!
*Dialog:Here you can modify the messages or dialogs that appear in a program. Don't forget to press "Compile" when you're done!
*Cursor group: Change the mouse cursors used in the program just like you would change the icon.
*Bitmap: View or change images in the programs easy!
*WAV:Change the sounds in the prog. with your own.


5) In the RCData,Dialog,Menu and String table sections you can do a lot of changes. You can modify or translate the text change links, change buttons, etc.


TIP: To change a window title, search for something like: CAPTION "edit this".
TIP: After all operations press the "Compile Script" button, and when you're done editing save, your work @ FileSave(Save as).
TIP: When you save a file,the original file will be backed up by default and renamed to Name_original and the saved file will have the normal name of the changed prog.
TIP: Sometimes you may get a message like: "This program has a non-standard resource layout... it has probably been compressed with an .EXE compressor." That means that Resource Hacker can't modify it because of it's structure.

How To Make Your Own Radio Station

How To Make Your Own Radio Station

Must HAVE Winamp (Any Version)
First, things First your speed has to be at least 256/64 kbps (which means Dial-up users, will have alot of latency, just dnt bother)
Second, your going to have to have a domain, an updated one with the current i.p active. (Could be anything e.g. My sig)

Now, Your gonna have to download the Shoutcast Files.

Go to www.shoutcast.com to get the files.

Ok After downloading these, installing Both of them in any order i dnt care. Go to START>PROGRAM FILES>SHOUTcast DNAS>EDIT SHOUTCAST DNS CONFIG.

Ok your gonna have to Configure it:
Go Down and where it says password: change (that means your gonna have to change it to whatever, make sure u remember)
The Portbase: change it to whatever port you want it
Maxusers: (lets be realistic here, dnt put in 10000, like NXS's radio station) your bandwidth has to be extremely good, if your cable, 50 user max is ok, ADSL should stay below 10 users, and T1 connections should do whatever tickles there fantasy.

Open winamp, RIGHT CLICK>OPTIONS>PREFRENCES>DSP EFFECT> and choose the NULLSOFT SHOUTCAST.

Go to OUTPUT, and then click on Connection, Through the ADDRESS, type your address which you have done through www.no-ip.com, PORT NUMBER, whatever u did in the EDIT.txt, and your password.

Then go to Encoder, and choose your quality of your music. Go back to OUTPU>OUTPUT CONFIG> YELLOW PAGES. this is your advertisemant information. dow hatever you like there.

Now Connect. to check that your Radio os on-line go to http://(your address that you added in the prefrence)

Services You Can Disable(Make XP work faster)

Services You Can Disable

There are quite a few services you can disable from starting automatically.
This would be to speed up your boot time and free resources.
They are only suggestions so I suggestion you read the description of each one when you run Services
and that you turn them off one at a time.

Some possibilities are:
Alerter
Application Management
Clipbook
Fast UserSwitching
Human Interface Devices
Indexing Service
Messenger
Net Logon
NetMeeting
QOS RSVP
Remote Desktop Help Session Manager
Remote Registry
Routing & Remote Access
SSDP Discovery Service
Universal Plug and Play Device Host
Web Client


--------------------------------------------------------------------------------

Cleaning the Prefetch Directory

WindowsXP has a new feature called Prefetch. This keeps a shortcut to recently used programs.
However it can fill up with old and obsolete programs.

To clean this periodically go to:

Star / Run / Prefetch
Press Ctrl-A to highlight all the shorcuts
Delete them

--------------------------------------------------------------------------------

Not Displaying Logon, Logoff, Startup and Shutdown Status Messages

To turn these off:

Start Regedit
Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem
If it is not already there, create a DWORD value named DisableStatusMessages
Give it a value of 1

--------------------------------------------------------------------------------
Clearing the Page File on Shutdown

Click on the Start button
Go to the Control Panel
Administrative Tools
Local Security Policy
Local Policies
Click on Security Options
Right hand menu - right click on "Shutdown: Clear Virtual Memory Pagefile"
Select "Enable"
Reboot

For regedit users.....
If you want to clear the page file on each shutdown:

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementClearPageFileAtShutdown
Set the value to 1

--------------------------------------------------------------------------------

No GUI Boot

If you don't need to see the XP boot logo,

Run MSCONFIG
Click on the BOOT.INI tab
Check the box for /NOGUIBOOT

---------------------------------------------------------------------------------
Speeding the Startup of Some CD Burner Programs

If you use program other than the native WindowsXP CD Burner software,
you might be able to increase the speed that it loads.

Go to Control Panel / Administrative Tools / Services
Double-click on IMAPI CD-Burning COM Service
For the Startup Type, select Disabled
Click on the OK button and then close the Services window
If you dont You should notice

--------------------------------------------------------------------------------

Getting Rid of Unread Email Messages

To remove the Unread Email message by user's login names:

Start Regedit
For a single user: Go to HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionUnreadMail
For all users: Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUnreadMail
Create a DWORD key called MessageExpiryDays
Give it a value of 0

------------------------------------------------------------------------------

Decreasing Boot Time

Microsoft has made available a program to analyze and decrease the time it takes to boot to WindowsXP
The program is called BootVis

Uncompress the file.
Run BOOTVIS.EXE
For a starting point, run Trace / Next Boot + Driver Delays
This will reboot your computer and provide a benchmark
After the reboot, BootVis will take a minute or two to show graphs of your system startup.
Note how much time it takes for your system to load (click on the red vertical line)
Then run Trace / Optimize System
Re-Run the Next Boot + Drive Delays
Note how much the time has decreased
Mine went from approximately 33 to 25 seconds.

--------------------------------------------------------------------------------
Increasing Graphics Performance

By default, WindowsXP turns on a lot of shadows, fades, slides etc to menu items.
Most simply slow down their display.

To turn these off selectively:

Right click on the My Computer icon
Select Properties
Click on the Advanced tab
Under Performance, click on the Settings button
To turn them all of, select Adjust for best performance
My preference is to leave them all off except for Show shadows under mouse pointer and Show window contents while dragging

---------------------------------------------------------------------------

Increasing System Performance

If you have 512 megs or more of memory, you can increase system performance
by having the core system kept in memory.

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementDisablePagingExecutive
Set the value to be 1
Reboot the computer

---------------------------------------------------------------------------

Increasing File System Caching

To increase the amount of memory Windows will locked for I/O operations:

Start Regedit
Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management
Edit the key IoPageLockLimit

-----------------------------------------------------------------------------

Resolving Inability to Add or Remove Programs

If a particular user cannot add or remove programs, there might be a simple registry edit neeed.

Go to HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesUninstall
Change the DWORD NoAddRemovePrograms to 0 disable it

4096 - 32megs of memory or less
8192 - 32+ megs of memory
16384 - 64+ megs of memory
32768 - 128+ megs of memory
65536 - 256+ megs of memory

Increase your Internet speed by 100-200 Kbsec

How To Increase Download Speeds By 100-200 Kbsec

First of all download this wonderful program:

http://www.speedguide.net/files/TCPOptimizer.exe

Then when u start trhe program goto settings goto cable modem or dsl whatevcer u have.

Go to MaxMTU and set it to 1500 this is optimal anything above this will not work as well.

Thats bout it!! Enjoy the speed!!

Windows Installer

Do you experience this kind of problem whenever you attemp to install an application in windows box (2k, xp)?

"The Windows Installer service could not be accessed. This can occur if you are running Windows in safe mode, or if the Windows Installer is not correctly installed. Contact your support personnel for assistance."

The ms website knowledge article 324516 gives 2 methods as a way of fixing this problem, but you might be very lucky if any of the 2 fixes the problem, alot of guys end up formating their systems and doing fresh windows installations or try wired ways of fixing it.

Well, the solution is very easy:

1. right click your root windows installation drive i.e drive where you installed windows
2. click properties at the bottom
3. select security tab
4. click Add and scroll down to SYSTEM account click add and click OK.
5. allow Full control permission and click Apply and then Ok.

This should solve your problem with windows installer.

Getting Counter-Strike Source to work

Getting Counter-Strike Source to work

Step 1- Download cssource_notcracked_beta_emporio.rar, cssource_cracked_emporio.rar and cssource_updates_emporio.rar (make sure this update is V2).

Step 2- Extract cssource_notcracked_beta_emporio.rar to a folder (for this example we will use E:/CS: Source*), then extract cssource_cracked_emporio.rar to E:/CS: Source*(overwrite all files) and finally extract cssource_updates_emporio.rar(V2) to E:/CS: Source* (overwrite all files).

Step 3- Make a NEW steam account(We will use Bob1g2** for this example).

Step 4- Now here comes the tricky part. After you have made a NEW steam account, get any counter strike: condition zero key (and no i won't tell you one) off the internet. Launch steam and click on Condition Zero in the Avaible Games list. Click on Register this product and click next. Once you get to the point where it says, "Steam is processing you request" open up Task Manager (Ctrl, Alt, Delete at the same time) and click on steam.exe and once the steam window has 1 bar that is yellow, click terinate process on the task manager.

Step 5- Open up steam again and check if Condition Zero is in your My Games list. If it isn't then repeat Step 3 using a different key untill you get Condition Zero is your My Games list. Once you get it in your My Games list then, download Codename Gordon and once it has finished downloading, launch it. Once you get into the menu, then click exit.

Step 6- Go into the folder where you installed steam and copy ClientRegistry.blob into the folder where you installed CS: Source.

Step 7- Go into the folder where you installed CS: Source and open up SteamApp.cfg.

Step 8- Once you have opened up SteamApp.cfg, edit it so it only has this in it:

CODE

SteamAppId=10
#SteamAppVersionId=0
SteamInstallPath="E:/CS: Source*"
# [as is clearified later on, this should be your email address:]
#SteamAppUser=aalb002@cafe.boomtown.net
SteamAppUser=Bob1g2**


Make sure you change the Bob1g2** bit to the new steam account you created and the E:/CS: Source* to where you installed counter-strike source.

Step 9- Make a sortcut of hl2.exe with these in the sortcut(without the quotes) "-steam -game cstrike"

*Change this to where you installed CS: Source.
**Change this to your new steam account.

Downloads

cssource_notcracked_beta_emporio.rar- fxp://cs.rivera.ru/games/Counter-Strike/CS_Source/client/cssource_notcracked_beta_emporio.rar

cssource_cracked_emporio.rar- fxp://cs.rivera.ru/games/Counter-Strike/CS_Source/client/V2/cssource_cracked_emporio.rar

cssource_updates_emporio.rar(v2)- fxp://cs.rivera.ru/games/Counter-Strike/CS_Source/client/V2/cssource_updates_emporio.rar

Limit is 100 users max

Other things you should know

Don't download the V3 update since that doesn't work yet.

If you get a error saying that you are not subscribed, then do steps 4-6 to make it work again.

If you get unable to set mode then do this:
go to your registry -> HKEY_CURRENT_USER\Software\Valve\Source\Settings -> look up the entry "ScreenRefreshRate" -> doubleclick -> type your favourite monitor hz value into the field (i.e. 100hz, if your monitor can handle it) -> change the base setting from hexadecimal to decimal -> finished. (excerpt taken from flinkerhamster tutorial)

Some Servers

1. 66.199.235.42:27014

2. 24.141.2.86

These servers have being tested by me and are working.

Google Hacks

Excellent tricks and techniques of Google Hacks

ws_ftp.ini is a configuration file for a popular FTP client that stores usernames, (weakly) encoded passwords, sites and directories that the user can store for later reference. These should not be on the web!

That's some good stuff. Just copy/paste the text into your own WS FTP ini file and you're good as gold (assuming you're using the same version). Don't forget - even if they have taken the file offline, use the "cache:FULL_URL/wsftp.ini" to see the contents.
probably one of the best exploits I have seen in a long time, when I did it there were about 20 vulnerable computers, just recently there was 4 so I hope whitehats got to this before anyone else. really nice !!

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:index.of ws_ftp.ini

==============================================

Frontpage.. very nice clean search results listing !! I magine with me that you can steal or know the password of any web site designed by "Frontpage". But the file containing the password might be encrypted; to decrypt the file download the program " john the ripper".

To see results; just write in the (http://www.google.com/) search engine the code:

"# -FrontPage-" inurl:service.pwd

==============================================

This searches the password for "Website Access Analyzer", a Japanese software that creates webstatistics.

To see results; just write in the (http://www.google.com/) search engine the code:

"AutoCreate=TRUE password=*"

==============================================

This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net.

To see results; just write in the (http://www.google.com/) search engine the code:

"http://*:*@www" bangbus or "http://*:*@www"bangbus

Or

http://bob:bob@www

Or

http://admin:*@www

==============================================






This search is a cleanup of a previous entry by J0hnny. It uses "parent directory" to avoid results other than directory listings.

WS_FTP.ini is a configuration file for a popular win32 FTP client that stores usernames and weakly encoded passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:ini ws_ftp pwd

Or

"index of/" "ws_ftp.ini" "parent directory"

==============================================

Microsoft Frontpage extensions appear on virtually every type of scanner. In the late 90's people thought they where hardcore by defacing sites with Frontpage. Today, there are still vulnerable servers found with Google.

An attacker can simply take advantage from administrators who 'forget' to set up the policies for Frontpage extensions. An attacker can also search for 'filetype:pwd users'.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:pwd service

==============================================


Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are! And much adminstrated passwords and user passwords, a lot of emails and the such too…

To see results; just write in the (http://www.google.com/) search engine the code:

allinurl: admin mdb

==============================================

DCForum's password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun.

To see results; just write in the (http://www.google.com/) search engine the code:

allinurl:auth_user_file.txt

==============================================

This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. To see view the PHP files; there in lies the catch. Browsers are made to process the commands of PHP before display, so if no commands, nothing to show. You can't use that persay to get into the config file, but it would show potential threats if someone got into server anyway. (If that happens you're basically boned anyway, not much around that.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:index.of config.php

By the way, to know how to view the PHP file contents, you can use this code:

intitle:"Index of" phpinfo.php

==============================================

These files contain ColdFusion source code. In some cases, the pages are examples that are found in discussion forums. However, in many cases these pages contain live sourcecode with usernames, database names or passwords in plaintext.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:cfm "cfapplication name" password

==============================================

FlashFXP offers the easiest and fastest way to transfer any file using FTP, providing an exceptionally stable and robust program that you can always count on to get your job done quickly and efficiently. There are many, many features available in FlashFXP.

The flashFXP.ini file is its configuration file and may contain usernames/passwords and everything else that is needed to use FTP.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:ini inurl:flashFXP.ini

==============================================

The encryption method used in WS_FTP is _extremely_ weak. These files can be found with the "index of" keyword or by searching directly for the PWD= value inside the configuration file.

There is an easy way to decrypt the hash, use the decryptor at:


http://www.codebluehacks.com/Tools.php?ID=1

Or

http://www.hispasec.com/directorio/laboratorio/Software/ws_ftp.html

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:ini ws_ftp pwd

==============================================

These files contain cleartext usernames and passwords, as well as the sites associated with those credentials. Attackers can use this information to log on to that site as that user.
To see results; just write in the (http://www.google.com/) search engine the code:

filetype:log inurl:"password.log"
==============================================

Web Wiz Forums is a free ASP Bulletin Board software package. It uses a Microsoft Access database for storage. The installation instructions clearly indicate to change the default path and filename (admin/database/wwForum.mdb).
vendor: http://www.webwizguide.info/web_wiz_forums/

The forum database contains the members passwords, either encrypted or in plain text, depending on the version.

Please note: this search is proof that results can stay in Google's index for a long time, even when they are not on the site any longer. Currently only 2 out of 9 are actually still downloadable by an attacker.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:mdb wwforum

==============================================

VNC is a remote-controlled desktop product. Depending on the configuration, remote users may not be presented with a password. Even when presented with a password, the mere existance of VNC can be important to an attacker, as is the open port of 5800.

To see results; just write in the (http://www.google.com/) search engine the code:

"VNC Desktop" inurl:5800



By the way, New version of VNC changed title to VNC Viewer so now you can search for…

intitle:vnc.desktop inurl:5800

==============================================

linux vpns store their usernames and passwords for CHAP authentification in a file called "chap-secrets" where the usernames and the passwords are in cleartext.

To see results; just write in the (http://www.google.com/) search engine the code:

inurl:chap-secrets -cvs

==============================================

These lock files often contain usernames of the user that has locked the file. Username harvesting can be done using this technique.

To see results; just write in the (http://www.google.com/) search engine the code:

"index of" / lck

==============================================

A standard FTP configuration file that provides far too many details about how the server is setup, including installation paths, location of logfiles, generic username and associated group, etc.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:conf inurl:proftpd.conf -sample

==============================================

This search finds registry files from the Windows Operating system. Considered the "soul" of the system, these files, and snippets from these files contain sensitive information, in this case usernames and/or passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:reg reg HKEY_CURRENT_USER username

==============================================

Allows an attacker to create an account on a server running Argosoft mail server pro for windows with unlimited disk quota (but a 5mb per message limit should you use your account to send mail).

To see results; just write in the (http://www.google.com/) search engine the code:

"adding new user" inurl:addnewuser -"there are no domains"

==============================================

The famous Sun linux appliance. The default page displays this text:

"Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting. This page can easily be replaced with your own page. To replace this page, transfer your new content to the directory /home/sites/home/web".

To see results; just write in the (http://www.google.com/) search engine the code:

(inurl:81/cgi-bin/.cobalt/) | (intext:"Welcome to the Cobalt RaQ")

==============================================

WS_FTP.LOG can be used in many ways to find more information about a server. This query is very flexible, just substitute "+htpasswd" for "+FILENAME" and you may get several hits that you hadn't seen with the 'normal' search.

Filenames suggested by the forum to explore are: phpinfo, admin, MySQL, password, htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage, CMS, backend, https, editor, intranet . The list goes on and on..

A different approach might be "allinurl: "some.host.com" WS_FTP.LOG filetype:log" which tells you more about who's uploading files to a specific site.

To see results; just write in the (http://www.google.com/) search engine the code:

+htpasswd +WS_FTP.LOG filetype:log

==============================================

The Web Data Administrator is a utility program implemented in ASP.NET that enables you to easily manage your SQL Server data wherever you are. Using its built-in features, you can do the following from Internet Explorer or your favorite Web browser.
Create and edit databases in Microsoft SQL Server 2000 or Microsoft SQL Server 2000 Desktop Engine (MSDE) Perform ad-hoc queries against databases and save them to your file system Export and import database schema and data.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"Web Data Administrator - Login"

==============================================

The Aanval Intrusion Detection Console is an advanced intrusion detection monitor and alerting system. Currently supporting modules for Snort and syslog - Aanval provides real-time monitoring, reporting, alerting and stability. Aanval's web-browser interface provides real-time event viewing and system/sensor management.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"remote assessment" OpenAanval Console

==============================================

Google is so smart, it’s scary sometimes. I has found another interesting (to say the least) Google use.
I just ran across a pretty scary new google trick. It seems they have just recently added number span searching to their engine. Take a look at this example:

To see results; just write in the (http://www.google.com/) search engine the code:

visa 4356000000000000..4356999999999999

Basically, what this search does is search for the word “visa” [credit card] with any numbers that fit within your query. i.e. any Visa credit card number with the first four digits 4356.
As you can see, Google has searched the entire range against its DB. Within minutes I found some crazy sites like this one. Now please know that Google didn’t create this tool to be used like this. It’s actually quite handy when used correctly. Just an FYI for all of you.

==============================================

Tired of websearching ? Want something to read ? You can find Ebooks (thousands of them) with this search..LIT files can be opened with Microsoft Reader (http://www.microsoft.com/reader/).

To see results; just write in the (http://www.google.com/) search engine the code:

filetype:lit lit (books|ebooks)

==============================================

Using Google, and some finely crafted searches we can find a lot of interesting information.

For Example we can find: Credit Card Numbers / Passwords / Software / MP3's
...... (and on and on and on)Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.
To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"Index of" passwords modified

And

allinurl:auth_user_file.txt

And

"access denied for user" "using password"
And

"A syntax error has occurred" filetype:ihtml
And

allinurl: admin mdb
And

"ORA-00921: unexpected end of SQL command"
And

inurl:passlist.txt
And

"Index of /backup"
And

"Chatologica MetaSearch" "stack tracking:"
And

Amex Numbers: 300000000000000..399999999999999

And

MC Numbers: 5178000000000000..5178999999999999

And

visa 4356000000000000..4356999999999999

==============================================

Notice I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.

To see results; just write in the (http://www.google.com/) search engine the code:

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

And

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

And

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

And

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

And
"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

And

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Or

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.
Example: ?intitle:index.of? mp3 jackson
==============================================

You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…

To see results; just write in the (http://www.google.com/) search engine the code:

inurl:microsoft filetype:iso

==============================================

This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.

To see results; just write in the (http://www.google.com/) search engine the code:

"sets mode: +k"
==============================================
These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.

To see results; just write in the (http://www.google.com/) search engine the code:

eggdrop filetype:user user

==============================================

This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version).

Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.

see results; just write in the (http://www.google.com/) search engine the code:

filetype:bak inurl:"htaccess|passwd|shadow|htusers"

==============================================

Let's pretend you need a serial number for windows xp pro. The key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.
To see results; just write in the (http://www.google.com/) search engine the code:

"Windows XP Professional" 94FBR

By the way, don't forget to change "Window sXP Professional" to any product you need its serial number.

==============================================

Notice this excellent trick. You can search for any product whether hardware or software (between any prices price: for example, $250.. $350 ).

To see results; just write in the (http://www.google.com/) search engine the code:

DVD player $250..350

By the way, don't forget to change "DVD player" to any product you need to search for.

==============================================

At first glance, this search reveals even more examples of operating system users enabling the operating system default web server software. This is generally accepted to be a Bad Idea(TM) as mentioned in the previous example. However, the googleDork index on this particular category gets quite a boost from the fact that this particular screen should NEVER be seen by the general public. To quote the default index screen: "Any users attempting to connect to this site are currently receiving an 'Under Construction page'" THIS is not the 'Under Construction page.' I was only able to generate this screen while sitting at the console of the server. The fact that this screen is revealed to the general public may indicate a misconfiguration of a much more insidious nature...


To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"Welcome to Windows 2000 Internet Services"

==============================================

Suppose you want a certain song to a singer and you can not find it; by this trick you can find the song in the original directory of the original web site.

To see results; just write in the (http://www.google.com/) search engine the code:

"index of/" "Top Gun" .mp3

By the way, don't forget to change "Top Gun" to any song you need to search for.

==============================================

This is a fabulous link. This is the secret link of the web site "Google" to search for any "Crack" you need.

Just write the following link in the address bar:

http://www.googlecrack.com/WWW/

==============================================

By the way, for anyone who needs to have an account in the google mail for "One GigaByte", go to the following address bar. You will receive within "36 hours" the confirmation mail for your registration:

http://www.googlemail.cjb.net/

Or from:

http://www.gmailforums.com/index.php

By the way, you can open your Google mail from your browser through this link:

http://toolbar.google.com/gmail-helper/

==============================================

Imagine that when you enter any web site, and you are surprised that when searching for any program in it you can not find it. By this fabulous trick, you can find the link for downloading any program in this site through any search engine.

For example, suppose you want to search for the program "Norton" in the web site www.download.com ; when you go to www.google.com and write the following code, you will be surprised that the "Google" search engine searches only in the site www.download.com. To do this:

Write in the address bar of the web browser this address: www.google.com.
When opening the web site; write in the search engine this code: "norton site: www.download.com", and press the button search or "ÃÈÍË".
As mentioned earlier: the code is easy, you just write in the place of the word "Norton"; any word you need to search for in the site followed in the code.
The code again is....
norton site:www.download.com

By the way, you can practice this code at any search engine.

Another trick is that you can force the search engine of the "Google" web site to search for a certain category like "Linux" topics. When you add any category after the Google link and write any thing in the search engine, you will surprised that the site searched for Linux only. For example, if you wrote the following code:
http://www.google.com/linux
As I mentioned in the code earlier, the site followed by the word "Linux". So the web site is forced for searching for the Linux topics only all over the internet.
==============================================
Imagine that you can connect to another computer remotely through the internet from the feature called "Remote Desktop Web Connection".
To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"Remote Desktop Web Connection"

==============================================

Through this query you can find every web page "Google" has crawled for a specific site.

To see results; just write in the (http://www.google.com/) search engine the code:

Site: Microsoft.com

==============================================
Through this query, you can see web servers with default pages can serve as juicy targets.

To see results; just write in the (http://www.google.com/) search engine the code:

Intitle:test.page.for.apache "it worked"

==============================================

No one can deny that the directory listings can be a source of great information.

To see results; just write in the (http://www.google.com/) search engine the code:

Intitle:index.of/admin

==============================================

We will use this query to locate additional servers, subtract common hostnames from the query.

To see results; just write in the (http://www.google.com/) search engine the code:

Site: Microsoft.com - Site:www.Microsoft.com

==============================================

From this query you can get huge user names and passwords from huge sites for free.

To see results; just write in the (http://www.google.com/) search engine the code:

"Welcome to *" "Your password is *"

==============================================

From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.

To see results; just write in the (http://www.google.com/) search engine the code:

outlook filetype:pst

==============================================

allinurl:gmail.google.com

"NetLife" Exclusive: Security hole found in "Gmail"
An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.

So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.

"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".

When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".

The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.

Whether hackers have already used this method to compromise users' accounts is unclear at the moment.

Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".

"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".

"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"

Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".

I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:







From: accounts-noreply@google.com
To: xxxx@xxxx
Date: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)
Subject: Google Password Assistance
Reply | Reply to all | Forward | Print | Add sender to contacts list | Trash this message | Show original

To initiate the process for resetting the password for your
xxxxx@gmail.com Google Account, visit the link below

http://www.google.com/accounts/xxxx----removed----xxxx

Thank you for using Google.

For questions or concerns regarding your account, please send mail to
accounts-support@google.com.

This is a post-only mailing. Replies to this message are not monitored
or answered.


And this is the explanation to what mentioned earlier:

Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.

It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.

Impact: A local user can obtain a target user's GMail password.
Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.

==============================================





The Cisco VPN 3000 concentrator is a remote access VPN. This web-based logon portal is for remote management of the Concentrator; by submitting a correct UID and PASS you will '0wn' their concentrator. I. E. is able to delete, copy, and configure whatever your heart desires. You would be in control of all of their VPN's that concentrator has control of.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:Cisco Systems, Inc. VPN 3000 Concentrator

==============================================

This query searches for open root directories of servers running online shopping carts. This shopping cart has an online store 'manager'; in /online-store/StoreManager where you can edit everything from product lists, databases, taxes and passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:Index.Of /" stats merchant online-store cgi-local etc | cgi-bin

==============================================

Sometimes people make mistakes and post their Cisco configurations on "help sites" and don't edit info. So we might be able to find the enable passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

intext:"enable secret 5 $"


Or, for more specifications

intext:"enable secret 5 $" "Current configuration:"

==============================================

This query searches for the following in the servers:
Network Statistics
General Info
Total disk space/memory
Php environment!!!
Current network connections!!!
Running services...

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"sysinfo * " intext:"Generated by Sysinfo *

==============================================

Imagine that when you enter any web site, and you are surprised that when searching for any program in it you can not find it. By this fabulous trick, you can find the link for downloading any program in this site through any search engine.

For example, suppose you want to search for the program "norton" in the web site www.download.com ; when you go to www.google.com and write the following code, you will be surprised that the "google" search engine searches only in the site www.download.com. To do this:

Write in the address bar of the web browser this address: www.google.com.
When opening the web site; write in the search engine this code: "norton site:www.download.com", and press the button search or "ÃÈÍË".
As mentioned earlier: the code is easy, just write in the place of the word "norton"; any word you need to search for in the site followed in the code.

The code again is ....

norton site:www.download.com

By the way, you can practise this code at any seach engine.

-------------------------------------------------------------------------------------

Another trick is that you can force the search engine of the "google" web site to search for a certain category like "Linux" topics. when you add any category after the google link and write any thing in the search engine, you will surprised that the site searched for linux only. For example, if you wrote the following code:


http://www.google.com/linux


As we mentioned in the code earlier, the site followed by the word "linux". So the web site is forced for searching for the linux topics only all over the internet.
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:14 pm Post subject: Continue........... Reply with quoteBack to top
Imagine that you can connect to another computer remotely through the internet from the feature called "Remote Desktop Web Connection".
To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"Remote Desktop Web Connection"

==============================================

Through this query you can find every web page "Google" has crawled for a specific site.

To see results; just write in the (http://www.google.com/) search engine the code:

Site: Microsoft.com

==============================================
Through this query, you can see web servers with default pages can serve as juicy targets.

To see results; just write in the (http://www.google.com/) search engine the code:

Intitle:test.page.for.apache "it worked"

==============================================

No one can deny that the directory listings can be a source of great information.

To see results; just write in the (http://www.google.com/) search engine the code:

Intitle:index.of/admin

==============================================

We will use this query to locate additional servers, subtract common hostnames from the query.

To see results; just write in the (http://www.google.com/) search engine the code:

Site: Microsoft.com - Site:www.Microsoft.com

==============================================

From this query you can get huge user names and passwords from huge sites for free.

To see results; just write in the (http://www.google.com/) search engine the code:

"Welcome to *" "Your password is *"

==============================================

From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.

To see results; just write in the (http://www.google.com/) search engine the code:

outlook filetype:pst

==============================================

allinurl:gmail.google.com

"NetLife" Exclusive: Security hole found in "Gmail"
An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.

So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.

"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".

When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".

The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.

Whether hackers have already used this method to compromise users' accounts is unclear at the moment.

Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".

"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".

"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"

Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".

I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:







From: accounts-noreply@google.com
To: xxxx@xxxx
Date: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)
Subject: Google Password Assistance
Reply | Reply to all | Forward | Print | Add sender to contacts list | Trash this message | Show original

To initiate the process for resetting the password for your
xxxxx@gmail.com Google Account, visit the link below

http://www.google.com/accounts/xxxx----removed----xxxx

Thank you for using Google.

For questions or concerns regarding your account, please send mail to
accounts-support@google.com.

This is a post-only mailing. Replies to this message are not monitored
or answered.


And this is the explanation to what mentioned earlier:

Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.

It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.

Impact: A local user can obtain a target user's GMail password.
Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.

==============================================





The Cisco VPN 3000 concentrator is a remote access VPN. This web-based logon portal is for remote management of the Concentrator; by submitting a correct UID and PASS you will '0wn' their concentrator. I. E. is able to delete, copy, and configure whatever your heart desires. You would be in control of all of their VPN's that concentrator has control of.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:Cisco Systems, Inc. VPN 3000 Concentrator

==============================================

This query searches for open root directories of servers running online shopping carts. This shopping cart has an online store 'manager'; in /online-store/StoreManager where you can edit everything from product lists, databases, taxes and passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:Index.Of /" stats merchant online-store cgi-local etc | cgi-bin

==============================================

Sometimes people make mistakes and post their Cisco configurations on "help sites" and don't edit info. So we might be able to find the enable passwords.

To see results; just write in the (http://www.google.com/) search engine the code:

intext:"enable secret 5 $"


Or, for more specifications

intext:"enable secret 5 $" "Current configuration:"

==============================================

This query searches for the following in the servers:
Network Statistics
General Info
Total disk space/memory
Php environment!!!
Current network connections!!!
Running services...

To see results; just write in the (http://www.google.com/) search engine the code:

intitle:"sysinfo * " intext:"Generated by Sysinfo *

==============================================
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:20 pm Post subject: Continue........... Reply with quoteBack to top
http://e.pku.edu.cn/enindex.htm [Searching for books on FTP and HTTP servers]

intitle:index.of? pdf cisco [The Google Code]
===================================================================================================
http://en.fixdown.com/eall_1.htm

http://www.fixdown.com/sort/n_144_1.htm

http://www.fixdown.com/new/new04_1.htm

http://kazus.ru/modules.php?name=EBooks

http://max.hosting.ru/
===================================================================================================
http://safariexamples.informit.com/

You'll FIND ALL THE FOLLOWING EBOOKS IN THE ABOVE SITE:

0130084565 Mobile Location Services: The Definitive Guide
0130091154 The Linux Development Platform
0130094021 C++: A Dialog: Programming with the C++ Standard Library
0130122475 Informix Handbook
0130211192 XML Processing with Python (with CD-ROM)
0130220280 Practical Programming in Tcl and Tk (3rd Edition)
0130260363 Core Python Programming
0130281875 Real World Linux Security: Intrusion Prevention, Detection and Recovery
0130320722 Just Java 2 (5th Edition)
0130324108 Learning to Program in C++ (CD-ROM)
0130354732 Embedded Software Development with eCos
0130385603 Practical Programming in Tcl and Tk (4th Edition)
0130404462 XSLT and XPATH: A Guide to XML Transformations
0130412066 TrellixWeb Web Site Creation Kit
0130449113 Verilog HDL (2nd Edition)
0130463612 DB2 Universal Database V8 for Linux, UNIX, and Windows Database Administration Certification Guide (5th Edition)
0130463868 BEA WebLogic Server Administration Kit
0130463884 Advanced DBA Certification Guide and Reference for DB2 UDB v8 for Linux, Unix and Windows
0130463914 DB2 Universal Database v8 Application Development Certification Guide, Second Edition
0130464163 Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)
0130464562 Real World Linux Security (2nd Edition)
0130470651 Analog Electronics with LabVIEW (With CD-ROM)
0130474150 Image Processing with LabVIEW and IMAQ Vision
0130476765 J2EE and JAX: Developing Web Applications and Web Services
0130600814 HP-UX 11i System Administration Handbook and Toolkit
0130618861 LabVIEW for Electric Circuits, Machines, Drives, and Laboratories
0130621544 JumpStart Technology: Effective Use in the Solaris Operating Environment (With CD-ROM)
0130623385 Web Services: A Java Developer's Guide Using e-Speak (With CD-ROM)
0130650765 DB2 Universal Database for OS/390 Version 7.1 Certification Guide
0130654140 Planning Smarter: Creating Blueprint Quality Software Specifications with CDROM
013066538X UNIX Shells by Example (3rd Edition)
0130674494 Integrated Project Management
0130796662 Graphic Java 2, Volume 1: AWT (3rd Edition)
0130796670 Graphic Java 2, Volume 2: Swing (3rd Edition)
0130832928 Core Swing: Advanced Programming
0130844667 Advanced Java Networking (2nd Edition)
0130869856 Windows Graphics Programming: Win32 GDI and DirectDraw (With CD-ROM)
0130882488 Core JSP
0130894680 Core Java 2, Volume 1: Fundamentals (5th Edition)
0130907634 SOAP: Cross Platform Web Services Development Using XML
0130911119 J2EE Applications and BEA WebLogic Server
0130927384 Core Java 2, Volume II: Advanced Features (5th Edition)
0131002872 Thinking in Java (3rd Edition)
0131003135 Applications Interface Programming Using Multiple Languages: A Windows Programmer's Guide
0131007718 DB2 Universal Database for OS/390 v7.1 Application Certification Guide
0131007726 DB2 SQL Procedural Language for Linux, Unix and Windows
0131018833 HP-UX 11i Systems Administration Handbook and Toolkit, Second Edition
0131401580 DB2 Version 8: The Official Guide
0131401629 JavaScript by Example
0131407457 OpenOffice.Org 1.0 Resource Kit
0131493868 PANIC! UNIX System Crash Dump Analysis Handbook (Bk/CD-ROM)
0137669658 Core Java 1.1 Volume II Advanced Features
0201309726 Programming for the Java™ Virtual Machine
0201485397 Java Design Patterns: A Tutorial
0201485583 The Java Tutorial Continued: The Rest of the JDK
0201615762 The Guru's Guide to Transact-SQL
0201657589 LDAP Programming with Java™
0201675234 The Korn Shell: Linux and Unix Shell Programming Manual (3rd Edition)
0201699567 Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems
0201700468 The Guru's Guide to SQL Server Stored Procedures, XML, and HTML (With CD-ROM)
0201700476 The Guru's Guide to SQL Server Architecture and Internals
0201702622 Director 8 and Lingo Authorized (3rd Edition)
0201702657 Visual Basic Design Patterns VB 6.0 and VB.NET (With CD-ROm)
0201702843 Adobe® Acrobat® 4.0 Classroom in a Book (2nd Edition)
0201703092 The Practical SQL Handbook: Using SQL Variants (4th Edition)
0201703661 SAP BW: A Step by Step Guide for BW 2.0
0201703939 The Java™ Tutorial: A Short Course on the Basics (3rd Edition)
0201704218 JavaServer Pages
0201709201 Director 8 Demystified
0201710153 Adobe® Illustrator® 9.0 Classroom in a Book
0201710161 Adobe Photoshop 6.0 Classroom in a Book
020171017X Adobe® GoLive® 5.0 Classroom in a Book
0201710188 Adobe Premiere 6.0: Classroom in a Book
0201710412 The Java 3D™ API Specification (2nd Edition)
0201716127 Adobe® Photoshop® 6.0 Studio Techniques
0201719568 Hack I.T.: Security Through Penetration Testing
0201719622 Building Parsers With Java
020172796X Photoshop 6 ImageReady 3 Hands-On Training (With CD-ROM)
0201728281 A Programmer's Guide to Java Certification: A Comprehesive Primer, Second Edition
0201729318 Macromedia Flash 5: Training from the Source
0201729377 Adobe® Acrobat® 5.0 Classroom in a Book
0201729563 Building Scalable and High-Performance Java Web Applications Using J2EE Technology
020172989X Adobe® Photoshop® 6.0 and Illustrator® 9.0 Advanced Classroom in a Book
0201731355 Macromedia Dreamweaver 4: Training from the Source
0201731363 Maxon Cinema 4D 7
0201734028 Create Dynamic Web Pages Using PHP and MySQL
0201741318 Adobe After Effects 5.0: Classroom in a Book
0201741334 Dreamweaver 4 Hands-On Training
0201741644 Macromedia Director 8.5 Shockwave Studio for 3D: Training from the Source
0201750430 After Effects 5 for Macintosh and Windows: Visual QuickPro Guide
0201750775 Guerrilla Oracle: The Succinct Windows Perspective
0201752832 Microsoft SQL Server 2000: A Guide to Enhancements and New Features
0201752840 Database Design for Mere Mortals: A Hands-On Guide to Relational Database Design, Second Edition
0201752948 Oracle SQL and PL/SQL Handbook: A Guide for Data Administrators, Developers, and Business Analysts
020175469X After Effects 5.0/5.5 Hands-On Training
0201756242 Adobe Illustrator 10 Classroom in a Book
0201756250 Adobe PageMaker 7.0 Classroom in a Book
0201758210 Process Quality Assurance for UML-Based Projects
0201758466 Macromedia Flash MX Advanced for Windows and Macintosh Visual QuickPro Guide
0201768119 The Java Web Services Tutorial
0201770040 XML and Java: Developing Web Applications, Second Edition
0201770210 Macromedia Flash MX Game Design Demystified
0201770229 Macromedia Flash MX ActionScripting: Advanced Training from the Source
0201774259 Real World XML Web Services: For VB and VB .NET Developers
0201784203 Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications
0201787199 Adobe GoLive 6.0 Classroom in a Book (With CD-ROM)
0201787202 Adobe InDesign 2.0 Classroom in a Book
0201791684 The J2EE Tutorial
0201794829 Macromedia Flash MX: Training from the Source
0201795361 Macromedia MX eLearning: Advanced Training from the Source
0201799286 Macromedia Fireworks MX: Training from the Source
0201799294 Macromedia Dreamweaver MX: Training from the Source
0201799405 Code Reading: The Open Source Perspective
0201844532 C# Design Patterns: A Tutorial
0321108949 Applied C++: Techniques for Building Better Software
0321108957 Honeypots: Tracking Hackers
0321112555 Real Web Project Management: Case Studies and Best Practices from the Trenches
0321112768 Photoshop 7/ImageReady for the Web Hands-On Training
0321115627 Adobe Photoshop 7.0 Classroom in a Book
032111583X Final Cut Pro 3 for Macintosh (Visual QuickPro Guide)
0321123808 Java Data Objects
0321125169 ColdFusion MX Web Application Construction Kit, Fifth Edition
0321133455 Troubleshooting Microsoft Technologies: The Administrator's Repair Manual
0321150791 JavaServer Pages, Second Edition
0321154991 XForms: XML Powered Web Forms
0321158857 Adobe Premiere 6.5 Classroom in a Book
0321159985 Moving to Linux: Kiss the Blue Screen of Death Goodbye!
0321166809 Macromedia Dreamweaver MX Dynamic Applications: Advanced Training from the Source
0321168828 .NET-A Complete Development Cycle
0321180992 Mac OS X Hands-On Training
0672309998 Alison Balter's Mastering Access 97 Development, Premier Edition, Second Edition (2nd Edition)
0672312417 Visual C++ 6 Unleashed
0672315068 F. Scott Barker's Microsoft Access 2000 Power Programming
0672315149 XML Unleashed
0672315335 Sams Teach Yourself Visual Basic 6 in 24 Hours
0672316250 Sams Teach Yourself RoboHELP 2000 for HTML Help in 24 Hours (Teach Yourself -- Hours)
0672317427 Microsoft Windows 2000 Professional Unleashed (Unleashed)
0672317842 PHP and MySQL Web Development
0672317958 Building Java Enterprise Systems with J2EE
067231813X Professional Development with Visio 2000 (Other Sams)
0672318873 Com+ Unleashed (Unleashed)
0672318989 Sams Teach Yourself E-Commerce Programming with ASP in 21 Days (Teach Yourself -- 21 Days)
0672319012 Sams Teach Yourself Dreamweaver UltraDev 4 in 21 Days
067231973X Scot Hillier's COM+ Programming with Visual Basic
0672319853 Red Hat Linux 7 Unleashed
0672319977 Microsoft SQL Server 2000 Unleashed
0672320541 Applied XML Solutions (Sams Professional Publishing)
0672320606 Kylix Developers Guide (With CD-ROM)
0672320754 Sams Teach Yourself to Create Web Pages in 24 Hours (3rd Edition)
0672321157 Delphi 6 Developer's Guide (With CD-ROM)
0672321335 Zope Web Application Construction Kit
0672321777 Building Dynamic WAP Applications with MobileDev
0672322064 FreeBSD Unleashed (With CD-ROM)
0672322110 Enhydra XMLC Java Presentation Development
0672322242 Sams Teach Yourself C++ in 24 Hours, Complete Starter Kit (3rd Edition)
067232332X Peer-to-Peer Programming on Groove®
0672323478 JBoss Administration and Development
0672323699 Tricks of the Windows Game Programming Gurus (2nd Edition)
0672323842 Sams Teach Yourself J2EE in 21 Days (With CD-ROM)
0672324172 BEA WebLogic Workshop Kick Start
0672324245 Sams Teach Yourself FreeBSD in 24 Hours
067232427X Borland JBuilder Developer's Guide
0672324334 Sams Teach Yourself BEA WebLogic Server 7.0 in 21 Days
0672324598 Maximum Security, Fourth Edition
067232461X Sams Teach Yourself Game Programming in 24 Hours
0672324679 Microsoft SQL Server 2000 Unleashed (2nd Edition)
0672324725 Struts Kick Start
0672324806 Borland C++Builder 6 Developer's Guide
0672324873 BEA WebLogic Server 8.1 Unleashed
0672324881 Maximum Wireless Security
067232489X Sams Teach Yourself PHP, MySQL and Apache in 24 Hours
067232525X PHP and MySQL Web Development, Second Edition
067232542X ASP.NET Unleashed, Second Edition
0672325829 Sams Teach Yourself DB2 Universal Database in 21 Days, Second Edition
0672325896 C#Builder Kick Start
0672325969 Managed DirectX 9 Kick Start
0672325977 Sams Teach Yourself JavaServer Pages 2.0 in 24 Hours, Complete Starter Kit with Apache Tomcat
0735709475 Inside AutoCAD® 2000, Limited Edition
0735709718 Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)
0735709955 Cisco CCNP Support Exam Certification Guide (With CD-ROM)
0735709971 Web Application Development with PHP 4.0 (with CD-ROM)
073571052X C++ XML
0735710619 Windows 2000 Power Toolkit
0735710929 MCSE Training Guide (70-227): Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000
0735710945 Inside 3ds max 4
0735711054 Inside Flash (With CD-ROM)
0735711291 MCAD/MCSD/MCSE Training Guide (70-229): SQL Server 2000 Database Design and Implementation
0735711348 Inside LightWave 7 (With CD-ROM)
0735711488 Inside AutoCAD 2002
073571150X Building Accessible Websites (With CD-ROM)
0735711577 MCSE Training Guide (70-244): Supporting and Maintaining a Windows NT Server 4 Network
073571181X Inside Dreamweaver MX
073571195X Java for the Web with Servlets, JSP, and EJB: A Developer's Guide to J2EE Solutions
0735712352 Cocoon: Building XML Applications
0735712530 Inside Maya 5
0735712832 The Flash MX Project
0735713278 Maya 4.5 Fundamentals
0789713993 "Special Edition Using Microsoft Excel 97, Best Seller Edition" (2nd Edition)
0789715538 Using Microsoft Windows 95 With Internet Explorer 4.0 (Special Edition Using...)
0789716062 Special Edition Using Microsoft Access 2000
0789718146 Special Edition Using Lotus Notes and Domino R5
0789719045 Special Edition Using Microsoft PowerPoint 2000
0789722534 Using Microsoft Project 2000 (Special Edition)
0789722674 Special Edition Using HTML 4 (6th Edition)
0789724448 Special Edition Using Macromedia Flash 5 (with CD-ROM)
0789724472 Microsoft SQL Server 2000 Database Development From Scratch
078972510X Special Edition Using Microsoft Access 2002
0789725428 Upgrading and Repairing PCs (13th Edition)
0789725576 Upgrading and Repairing Networks (3rd Edition)
0789725673 Special Edition Using Enterprise JavaBeans (EJB) 2.0
0789726270 Special Edition Using Microsoft® Windows XP, Home Edition
0789726289 Special Edition Using Windows XP Professional
078972667X Special Edition Using Macromedia Director 8.5 (With CD-ROM)
0789726769 C++ by Example
0789727277 Special Edition Using Adobe GoLive 6
0789727609 Special Edition Using Adobe Photoshop 7
0789727625 Special Edition Using Macromedia Flash MX
0789727633 Special Edition Using Microsoft Commerce Server 2002
0789727730 MCSE Training Guide (70 270): Windows XP Professional (With CD-ROM)
0789727900 Platinum Edition Using Microsoft Windows XP
0789728001 Upgrading and Repairing Laptop Computers
078972801X CISSP Training Guide
0789728192 MCAD/MCSD Training Guide (70-306): Developing and Implementing Windows-Based Applications with Visual Basic.NET and Visual Studio.NET
0789728206 MCAD/MCSD Training Guide (70-310): Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework
0789728214 Sun Certification Training Guide (310-080): Java 2 Enterprise Edition (J2EE) Web Component Developer
0789728249 MCAD/MCSD Training Guide (70-320): Developing XML Web Services and Server Components with Visual C# .NET and the .NET Framework
0789728303 Network+ Training Guide
0789728362 Security+ Training Guide
0789728613 Java 2 Programmer Exam Cram (310-035)
0789728621 Java 2 Enterprise Edition (J2EE) Web Component Developer Exam Cram 2 (Exam Cram 310-080)
078972863X MCSE Windows 2000 Network Infrastructure Exam Cram 2 (Exam Cram 70-216)
0789728648 MCSE Windows 2000 Active Directory Services Design Exam Cram 2 (Exam Cram 70-219)
0789728656 Network+ Exam Cram 2 (Exam Cram N10-002)
0789728664 MCSA Managing a Windows 2000 Network Environment Exam Cram 2 (Exam Cram 70-218)
0789728672 A+ Exam Cram 2 (Exam Cram 220-221, Exam Cram 220-222)
0789728680 Solaris 8 System Administrator Exam Cram 2 (Exam CX-310-011 and CX-310-012)
0789728699 Solaris 9 System Administrator Exam Cram 2 (Exam Cram 310-014, Exam Cram 310-015)
0789728702 Solaris 9 Network Administration Exam Cram 2 (Exam Cram CX-310-044)
0789728710 MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)
0789728729 MCSE Windows 2000 Professional Exam Cram 2 (Exam Cram 70-210)
0789728737 MCSE Windows 2000 Server Exam Cram 2 (Exam Cram 70-215)
0789728745 MCSE Windows XP Professional Exam Cram 2 (Exam Cram 70-270)
0789728788 MCSE/MCSA Training Guide (70-216): Windows 2000 Network Infrastructure, Second Edition
0789728818 MCSE/MCSA Training Guide, Second Edition (70-215): Windows 2000 Server
0789728826 Special Edition Using Microsoft CRM
0789728974 MCAD Developing XML Web Services and Server Components with Visual C# .NET and the .NET Framework Exam Cram 2 (Exam Cram 70-320)
0789728982 MCAD Developing and Implementing Web Applications with Microsoft Visual Basic .NET and Microsoft Visual Studio .NET Exam Cram 2 (Exam Cram 70-305)
0789728990 MCAD Developing and Implementing Windows-based Applications with Microsoft Visual Basic .NET and Microsoft Visual Studio .NET Exam Cram 2 (Exam Cram 70-306)
0789729008 MCAD Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework Exam Cram 2 (Exam Cram 70-310)
0789729016 MCAD Developing and Implementing Web Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET Exam Cram 2 (Exam Cram 70-315)
0789729105 Security+ Exam Cram 2 (Exam Cram SYO-101)
0789729466 MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment Exam Cram 2 (Exam Cram 70-290)
0789729482 MCSA/MCSE 70-291 Training Guide: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure
0789729504 MCSE Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure Exam Cram 2 (Exam Cram 70-294)
0789729512 MCSA/MCSE Implementing and Administering Security in a Windows 2000 Network Exam Cram 2 (Exam Cram 70-214)
0789729520 Special Edition Using Microsoft Office Access 2003
0789729539 Special Edition Using Microsoft Office Excel 2003
0789729547 Special Edition Using Office Microsoft FrontPage 2003
0789729555 Special Edition Using Microsoft Office 2003
0789729563 Special Edition Using Microsoft Office Outlook 2003
078972958X Special Edition Using Microsoft Word 11
0789729725 Easy CDs & DVDs
0789729741 Upgrading and Repairing PCs, 15th Edition
0789729792 Novell's CNE Update to NetWare 6 Study Guide
0789729911 CCNP BCMSN Exam Cram 2 (642-811), Second Edition
078972992X Java 2 Developer Exam Cram 2 (Exam Cram CX-310-252A and CX-310-027)
0789729970 MCDBA, MCSE, MCSD, MCAD Training Guide (70-229): SQL Server 2000 Database Design and Implementation
0789730111 MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment Exam Cram 2 (Exam Cram 70-292)
078973012X MCSE Planning and Maintaining a Windows Server 2003 Network Infrastructure Exam Cram 2 (Exam Cram 70-293)
0789730170 Cisco BSCI Exam Cram 2 (Exam Cram 642-801)
0789730200 CCNP BCRAN Exam Cram 2
0789730219 CCNP CIT Exam Cram 2 (642-831)
0789730235 CCSP CSPFA Exam Cram 2 (Exam Cram 642-521)
0789730243 CCSP CSI Exam Cram 2 (9E0-131)
0789730251 CCSP SECUR Exam Cram 2 (642-501)
078973026X CCSP CSVPN Exam Cram 2 (Exam Cram 642-511)
0789730367 Easy Microsoft Windows XP Home Edition, Second Edition
0789730375 PMP Exam Cram 2
156830370X Adobe® PageMaker® 6.5 Classroom in a Book
1568304676 Adobe Premiere 5.0 Classroom in a Book
157870085X Solaris 2.6 Administrator Certification Training Guide, Part 1
1578702496 Solaris 7 Administrator Certification Training Guide: Part I and Part II
1578702615 Solaris 8 Network Administrator Training Guide (With CD-ROM)
1587050609 Developing Cisco IP Phone Services: A Cisco AVVID Solution
1587130173 High Availability Network Fundamentals (With CD-ROM)
1587200333 Cisco CID Exam Certification Guide
1587200538 CCIE Routing and Switching Exam Certification Guide
1587200554 Cisco CCNA Exam #640-607 Certification Guide (3rd Edition)
1587200767 CCDA Exam Certification Guide (CCDA Self-Study, 640-861), Second Edition
1587200775 CCNP BCMSN Exam Certification Guide (CCNP Self-Study, 642-811), Second Edition
1587200783 CCNP BSCI Exam Certification Guide (CCNP Self-Study), Second Edition
158720083X CCNA ICND Exam Certification Guide (CCNA Self-Study, 640-811, 640-801), Fourth Edition
0735711291 MCAD/MCSD/MCSE Training Guide (70-229): SQL Server 2000 Database Design and Implementation
0735711534 Fireworks MX Fundamentals
===================================================================================================
ftp://ftp.netz.ru/Books/

ftp://130.133.1.100/doc/

ftp://ftp2.trainingtools.com/

ftp://195.161.102.62/pub/books/

ftp://213.131.9.205/ftp/Polosko/

ftp://202.96.64.158/pub/

ftp://195.135.232.80/Books/
===================================================================================================
http://dlc.pconline.com.cn/list.jsp?dltypeid=6&kindid=1001 [MCSE exams]
===================================================================================================
http://www.vbforums.com/

http://www.excelforum.com/
===================================================================================================
http://www.winxpfix.com/page15.htm

http://www.tweakxp.com/

http://www.tipsdr.com/

http://www.greenhorntutor.com/

http://www.blackviper.com/WinXP/service411.htm

http://www.theexceladdict.com/

http://www.exceltip.com/
===================================================================================================
http://219.139.240.53/itebook/OReilly%20-%20-Dinamic%20HTML%20-%20The%20Definitive%20Reference.2ed.chm

http://219.139.240.53/itebook/OReilly%20-%20ActionScript%20Cookbook%20-%202003.chm

http://219.139.240.53/itebook/OReilly%20-%20Building%20Embedded%20Linux%20Systems.chm

http://219.139.240.53/itebook/OReilly%20-%20building%20secure%20servers%20with%20linux.chm

http://219.139.240.53/itebook/OReilly%20-%20C%20Sharp%20Language%20Pocket%20Reference.chm

http://219.139.240.53/itebook/OReilly%20-%20Cisco%20Cookbook.chm

http://219.139.240.53/itebook/OReilly%20-%20Dreamweaver%20MX%202004.The%20Missing%20Manual.chm

http://219.139.240.53/itebook/OReilly%20-%20Java%20Enterprise%20Best%20Practices.chm

http://219.139.240.53/itebook/OReilly%20-%20Java%20Servlet%20Programming%202nd.chm

http://219.139.240.53/itebook/OReilly%20-%20Kerberos%20-%20The%20Definitive%20Guide%20-%202003.chm

http://219.139.240.53/itebook/OReilly%20-%20Learning%20XML%202ed.chm

http://219.139.240.53/itebook/OReilly%20-%20Learning.Java.2ndEd.chm

http://219.139.240.53/itebook/OReilly%20-%20linux%20security%20cookbook.chm

http://219.139.240.53/itebook/OReilly%20-%20Linux%20Server%20Hacks,%202003.chm

http://219.139.240.53/itebook/OReilly%20-%20Linux%20Unwired.chm

http://219.139.240.53/itebook/OReilly%20-%20MySQL%20Pocket%20Reference.chm

http://219.139.240.53/itebook/OReilly%20-%20Perl%20CD%20Bookshelf,%20Version%204.0%20(2004)%20[0596006225].chm

http://219.139.240.53/itebook/OReilly%20-%20PHP%20Pocket%20Reference%20-%202nd%20Edition.chm

http://219.139.240.53/itebook/OReilly%20-%20practical%20unix%20&%20internet%20security,%203rd%20edition.chm

http://219.139.240.53/itebook/OReilly%20-%20Programming%20Embedded%20Systems%20in%20C%20and%20C++.chm

http://219.139.240.53/itebook/OReilly%20-%20Python%20Cookbook.chm

http://219.139.240.53/itebook/OReilly%20-%20Python%20Programming%20on%20Win32.chm

http://219.139.240.53/itebook/OReilly%20-%20Python%20Standard%20Library.chm

http://219.139.240.53/itebook/OReilly%20-%20Secure%20Coding.%20Principles%20and%20Practices.chm

http://219.139.240.53/itebook/OReilly%20-%20Sendmail.3rd.Edition.chm

http://219.139.240.53/itebook/OReilly%20-%20VBScript%20In%20Nutshell%20(CHM).chm

http://219.139.240.53/itebook/OReilly%20-%20Visual%20Basic%20Shell%20Programming.chm

http://219.139.240.53/itebook/OReilly%20-%20XML%20in%20a%20Nutshell%20(2nd%20Edition%20-%202002).chm

http://219.139.240.53/itebook/OReilly%20BLAST.chm

http://219.139.240.53/itebook/OReilly%20C%20Pocket%20Reference.chm

http://219.139.240.53/itebook/OReilly%20Learning%20the%20KORN%20Shell.chm

http://219.139.240.53/itebook/OReilly%20Mastering%20Oracle%20SQL.chm

http://219.139.240.53/itebook/OReilly%20Practical%20UNIX%20and%20Internet%20Security.chm

http://219.139.240.53/itebook/OReilly%20Tomcat%20-%20The%20Definitive%20Guide%20(2003)%20LiB.chm

http://219.139.240.53/itebook/OReilly-Malicious%20Mobile%20Code%20Virus%20Protection%20for%20Windows.chm

http://219.139.240.53/itebook/OReilly-Transact.Sql.Cookbook.chm

http://219.139.240.53/itebook/OReilly-Using%20Samba(0-56592-449-5).chm

http://219.139.240.53/itebook/OReilly.Access.Cookbook.Second.Edition.chm

http://219.139.240.53/itebook/OReilly.ADO.Dot.NET.Cookbook.chm

http://219.139.240.53/itebook/OReilly.ADO.Dot.Net.In.A.Nutshell.chm

http://219.139.240.53/itebook/OReilly.Amazon.Hacks.chm

http://219.139.240.53/itebook/OReilly.Apache.Cookbook.chm

http://219.139.240.53/itebook/OReilly.AppleScript.The.Definitive.Guide.chm

http://219.139.240.53/itebook/OReilly.ASP.Dot.NET.In.A.Nutshell.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.Cascading.Style.Sheets.The.Definitive.Guide.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.Cpp.In.A.Nutshell.chm

http://219.139.240.53/itebook/OReilly.CSharp.Cookbook.chm

http://219.139.240.53/itebook/OReilly.DNS.On.Windows.Server.2003.chm

http://219.139.240.53/itebook/OReilly.Dot.NET.Framework.Essentials.3rd.Edition.chm

http://219.139.240.53/itebook/OReilly.Dot.NET.Windows.Forms.In.A.Nutshell.chm

http://219.139.240.53/itebook/OReilly.eBay.Hacks.chm

http://219.139.240.53/itebook/OReilly.Eclipse.A.Java.Developers.Guide.chm

http://219.139.240.53/itebook/OReilly.ESSENTIAL.CVS.chm

http://219.139.240.53/itebook/OReilly.Excel.Hacks.chm

http://219.139.240.53/itebook/OReilly.Hardcore.Java.chm

http://219.139.240.53/itebook/OReilly.HTML.And.XHTML.The.Definitive.Guide.5th.Edition.chm

http://219.139.240.53/itebook/OReilly.J2EE.Design.Patterns.chm

http://219.139.240.53/itebook/OReilly.Java.Data.Objects.chm

http://219.139.240.53/itebook/OReilly.Java.Database.Best.Practices.chm

http://219.139.240.53/itebook/OReilly.Java.Examples.In.A.Nutshell.3rd.EditioneBook.chm

http://219.139.240.53/itebook/OReilly.Java.Extreme.Programming.Cookbook.chm

http://219.139.240.53/itebook/OReilly.Java.Performance.Tuning.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.Java.Server.Pages.3rd.Edition.chm

http://219.139.240.53/itebook/OReilly.Java.Servlet.And.JSP.Cookbook.chm

http://219.139.240.53/itebook/OReilly.JavaScript.Pocket.Reference.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.JavaServer.Faces.chm

http://219.139.240.53/itebook/OReilly.Learning.Perl.Objects.References.And.Modules.chm

http://219.139.240.53/itebook/OReilly.Learning.Python.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.Learning.UML.chm

http://219.139.240.53/itebook/OReilly.Learning.Unix.For.Mac.OS.X.Panther.chm

http://219.139.240.53/itebook/OReilly.Learning.Visual.Basic.Dot.Net.chm

http://219.139.240.53/itebook/OReilly.Learning.XML.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.Learning.XSLT.chm

http://219.139.240.53/itebook/OReilly.Linux.Security.Cookbook.chm

http://219.139.240.53/itebook/OReilly.Linux.Server.Hacks.chm

http://219.139.240.53/itebook/OReilly.Mac.OS.X.In.A.Nutshell.chm

http://219.139.240.53/itebook/OReilly.Mac.OS.X.The.Missing.Manual.Panther.Edition.chm

http://219.139.240.53/itebook/OReilly.Mac.OS.X.Unwired.chm

http://219.139.240.53/itebook/OReilly.Managing.The.Windows.2000.Registry.chm

http://219.139.240.53/itebook/OReilly.Mastering.Oracle.SQL.chm

http://219.139.240.53/itebook/OReilly.Mastering.Perl.For.Bioinformatics.chm

http://219.139.240.53/itebook/OReilly.Mastering.Regular.Expressions.2nd.Edition.eBook-FOS.chm

http://219.139.240.53/itebook/OReilly.Mastering.Visual.Studio.Dot.NET.chm

http://219.139.240.53/itebook/OReilly.Network.Security.Assessment.chm

http://219.139.240.53/itebook/OReilly.Network.Security.Hacks.chm

http://219.139.240.53/itebook/OReilly.Oracle.Essentials.Oracle.Database.10g.3rd.Edition.chm

http://219.139.240.53/itebook/OReilly.Oracle.PL.SQL.Language.Pocket.Reference.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.Oracle.Regular.Expressions.Pocket.Reference.chm

http://219.139.240.53/itebook/OReilly.PC.Hardware.In.A.Nutshell.3rd.Edition.chm

http://219.139.240.53/itebook/OReilly.Perl.6.Essentials.chm

http://219.139.240.53/itebook/OReilly.Perl.Cookbook.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.Perl.Template.Toolkit.chm

http://219.139.240.53/itebook/OReilly.Postfix.The.Definitive.Guide.chm

http://219.139.240.53/itebook/OReilly.Practical.Mod.Perl.chm

http://219.139.240.53/itebook/OReilly.Practical.RDF.chm

http://219.139.240.53/itebook/OReilly.Programming.ASP.Dot.NET.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.Programming.Dot.NET.Security.chm

http://219.139.240.53/itebook/OReilly.Programming.Dot.NET.Windows.Applications.chm

http://219.139.240.53/itebook/OReilly.PROGRAMMING.VISUAL.BASIC.DOT.NET.2ND.EDITION.chm

http://219.139.240.53/itebook/OReilly.ProgrammingColdFusionMX.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.Python.In.A.Nutshell.2003-CHM.chm

http://219.139.240.53/itebook/OReilly.RADIUS.chm

http://219.139.240.53/itebook/OReilly.Regular.Expression.Pocket.Reference.chm

http://219.139.240.53/itebook/OReilly.RELAX.NG.chm

http://219.139.240.53/itebook/OReilly.Secure.Programming.Cookbook.For.C.And.Cpp.chm

http://219.139.240.53/itebook/OReilly.Security.Warrior.chm

http://219.139.240.53/itebook/OReilly.Sendmail.Cookbook.chm

http://219.139.240.53/itebook/OReilly.Spidering.Hacks.chm

http://219.139.240.53/itebook/OReilly.SQL.Tuning.chm

http://219.139.240.53/itebook/OReilly.Squid.The.Definitive.Guide.chm

http://219.139.240.53/itebook/OReilly.Transact.Sql.Cookbook.chm

http://219.139.240.53/itebook/OReilly.VBScript.In.A.Nutshell.2nd.Edition.chm

http://219.139.240.53/itebook/OReilly.WebLogic.The.Definitive.Guide.chm

http://219.139.240.53/itebook/OReilly.Windows.Server.2003.In.A.Nutshell.chm

http://219.139.240.53/itebook/OReilly.Windows.Server.Hacks.chm

http://219.139.240.53/itebook/OReilly.Windows.XP.Hacks.chm

http://219.139.240.53/itebook/OReilly.Windows.XP.Pro.The.Missing.Manual.chm

http://219.139.240.53/itebook/OReilly.Windows.XP.Unwired.chm

http://219.139.240.53/itebook/OReilly.Wireless.Hacks.chm

http://219.139.240.53/itebook/OReilly_Mastering%20Visual%20Studio%20.NE.chm
===================================================================================================
http://www.almaktba.com/index.php?cid=139

http://list4test.com/members_tako/tech/lughat_alC.zip [Arabic Book]

http://list4test.com/tako/tec/pro/cpp.zip [Arabic Book]

http://list4test.com/tako/tec/pro/pro_assemply_part2_arabic.zip [Arabic Book]

http://list4test.com/tako/tec/pro/PROG_barmajah_gharaziah.zip [Arabic Book]

http://list4test.com/tako/tec/pro/PROG_win32api.zip [Arabic Book]

http://list4test.com/tako/tec/pro/PROGE_JavaScriptCourse_E.zip [Arabic Book]

http://list4test.com/tako/tec/pro/PROGE_Visual_E.zip [Arabic Book]

http://list4test.com/tako/tec/pro/pro_abo_program.zip [Arabic Book]

http://list4test.com/tako/tec/pro/pro_directx7_albdayahwalnhaya.zip [Arabic Book]

http://list4test.com/tako/tec/pro/PROG_learnphp_easy.zip [Arabic Book]

http://list4test.com/tako/tec/pro/PROGE_Java_E.zip [Arabic Book]

http://list4test.com/tako/tec/pro/PROGE_laern_perl_E.zip [Arabic Book]

http://list4test.com/members_tako/tech/tech_vb_liljami.zip [Arabic Book]

http://list4test.com/tako/tec/pro/pro_membersarea.zip [Arabic Book]

http://list4test.com/tako/tec/com/tjzeat_alkors_alsalb.zip [Arabic Book]

http://list4test.com/tako/tec/com/com_mashakel_badaltashghil.zip [Arabic Book]

http://list4test.com/tako/tec/com/COM_ASBAB_BOTALJEHAZ.zip [Arabic Book]

http://list4test.com/tako/tec/com/COME_harddisk2_E.zip [Arabic Book]

http://list4test.com/members_tako/tech/tech_tajmiwasyna_alhasebalali.zip [Arabic Book]

http://list4test.com/tako/tec/com/com_cp_coomands.zip [Arabic Book]

http://list4test.com/tako/tec/com/com_talam_al_cp.zip [Arabic Book]

http://list4test.com/members_tako/tech/Dos_arabic.zip [Arabic Book]

http://list4test.com/tako/tec/com/com_ekhtsarat_keyboard.zip [Arabic Book]

http://list4test.com/tako/tec/com/com_aarabic_linuxguide.zip [Arabic Book]

http://list4test.com/tako/tec/com/COME_dos_E.zip [Arabic Book]

http://list4test.com/members_tako/tech/tech_winxparabic.zip [Arabic Book]

http://list4test.com/tako/tec/com/com_hyallawhatul.zip [Arabic Book]

http://list4test.com/tako/tec/ent/ent_ftpprotocol.zip [Arabic Book]

http://list4test.com/tako/tec/ent/ENT_learn_navogator.zip [Arabic Book]

http://list4test.com/tako/tec/ent/ent_html.zip [Arabic Book]

http://list4test.com/tako/tec/mix/harakt.zip [Arabic Book]

http://list4test.com/tako/tec/mix/MIX_altejarah_alelktronyah_mata.zip [Arabic Book]

http://list4test.com/members_tako/tech/tech_SQL.zip [Arabic Book]

http://list4test.com/tako/tec/mix/nokat_tahawl_fitarikh.zip [Arabic Book]

http://list4test.com/tako/tec/mix/MIX_Hack_n_secur_AR.zip [Arabic Book]

http://list4test.com/tako/tec/mix/MIXE_330javatips_E.zip [Arabic Book]

http://list4test.com/tako/tec/mix/MIXE_MAIL_HIST_E.zip [Arabic Book]

http://list4test.com/members_tako/tech/tech_AffMasters.zip [Arabic Book]

http://list4test.com/members_tako/tech/actionSCRIPT.zip [Arabic Book]

http://list4test.com/tako/tec/mix/MIX_alaselah_alaksar_shoyuan_linux.zip [Arabic Book]

http://list4test.com/tako/tec/mix/MIX_muzakerat_alshabkat.zip [Arabic Book]

http://list4test.com/tako/tec/mix/MIXE_hack_reges_E.zip [Arabic Book]

http://list4test.com/tako/tec/mix/mix_albramejakhabisah.zip [Arabic Book]

http://list4test.com/tako/tec/pro/PROGE_VBNET4ASPNET_E.zip [Arabic Book]

http://lazurus.shacknet.nu:8000/O%27Reilly%20Refrence%20Library/index.htm

http://download.xdrive.com/s/370921074aDfMe4tSJVCHKSZxjd1&partner=plus

http://lazurus.shacknet.nu:8000/motbible.txt

http://lazurus.shacknet.nu:8000/utt/index.htm

http://lazurus.shacknet.nu:8000/itb/index.htm

http://lazurus.shacknet.nu:8000/docs.rinet.ru/index.html

http://www.ccxx.net/books/Cisco%20Press%20CCNA%20ICND%202004+.pdf

http://lazurus.shacknet.nu:8000/HUGECELL_TXT.htm

http://lazurus.shacknet.nu:8000/SIDs.txt

http://rahmat.zikri.com/books.html

http://bxteam.org/knjige.php

http://www.adobeevangelists.com/

http://kyberia.sk/kbase/

http://www.net130.com/ccna/

www.dhruvaraj.com

http://www.yaxoo.com/Books/

http://books.pdox.net/

http://www.msfirewall.org/

http://tinyurl.com/352gd

http://files3.webfile.ru/get/2099591332/John.Wiley.and.Sons.AutoCAD.2005.rar

http://www.we-r-here.com/cad/

http://www.geocities.com/wwwwarezbborg/E-Books/

http://books.pdox.net/Computers/

http://www.ebookcn.net/

http://www.click-now.net/ebooks.htm

http://www.free-ebooks.net/

http://www.nerd-star.com/books/

http://books.malonus.com/ebooks/computer_science/Apache/

http://books.malonus.com/ebooks/computer_science/OpenBSD/

http://books.malonus.com/ebooks/computer_science/Programing/

http://books.malonus.com/ebooks/computer_science/cisco/

http://books.malonus.com/ebooks/computer_science/crypthography/

http://books.malonus.com/ebooks/computer_science/dvd/

http://books.malonus.com/ebooks/computer_science/hacking_cracking/

http://books.malonus.com/ebooks/computer_science/linux/

http://books.malonus.com/ebooks/computer_science/networking/

http://books.malonus.com/ebooks/computer_science/security/

http://books.malonus.com/ebooks/computer_science/xml/

http://www.lubsecurity.org/

http://hellnet.perverz.hu/ebookz/

http://www.ex0dus.org/downloads/EBooks/

http://s87305863.onlinehome.us/download.html

http://202.41.85.117/~praveen/downloads/

http://hellnet.perverz.hu/ebookz/Adobe/

http://bookshelf.sleepnet.net/files/

http://argos.observatorio.unal.edu.co/virtual/books/

http://www.nr.cc.va.us/eaton/new-horizons/pages/guidedtour.htm

http://www.itcertifer.com/

http://www.itcertifer.com/download/default.asp

http://web.1asphost.com/justdreamsite/books.html

http://www.mcu.cz/atm/index.php

http://books.dimka.ee/

http://www.qodbc.com.au/downloads.htm

http://voodoo.mcomm.ru/Archive/Books/

http://hongphuc.homeip.net/home/upload/index.php?direction=0&order=&directory=Ebook

http://market.renderosity.com/index.ez?Form.sess_id=19272991&Form.sess_key=1095526980

http://www.planet-source-code.com/

http://dragon.rulez.cz/e-buk/

http://www.learnvisualstudio.net/

http://www.ya-q8.com/download.php?action=list&cat_id=11&s=

http://sudhirmangla.i6networks.com/dotnet/books.htm

http://www.narada.nl/

http://lazurus.shacknet.nu:8000/itb/index.htm

http://lazurus.shacknet.nu:8000/utt/index.htm

http://lazurus.shacknet.nu:8000/O%27Reilly%20Refrence%20Library/index.htm

http://lazurus.shacknet.nu:8000/docs.rinet.ru/index.html

http://babis.homeip.net/computers/

http://www.gylka.com.ua/books/John%20Wiley%20&%20Sons%20-%20Adobe%20Premiere%20Pro%20Bible.rar

http://www.shteker.com/sasa/World_Atlas.pdf

http://www.davehilla.com/ebooks/

http://66.194.238.238/~avaxhome/download/5/New.Riders.3ds.MAX.6.Fundamentals.eBook-LiB.chm

http://jztele.com/~coldice/book/net/

http://www.et.utt.ro/public/Docs/

http://cisco.cumt.edu.cn/ciscodown/en_CCNA1_v31.zip

http://cisco.cumt.edu.cn/ciscodown/en_CCNA2_v31.zip

http://cisco.cumt.edu.cn/ciscodown/en_CCNA3_v31.zip

http://cisco.cumt.edu.cn/ciscodown/en_CCNA4_v31.zip

http://s6.yousendit.com/d.aspx?id=C6244ED072216A978C0322776D4311DC

http://www.adobe.com/education/pdf/cib/encore/encore_cib_gs.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_01.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_02.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_03.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_04.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_05.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_06.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_07.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_08.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_09.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_10.pdf
http://www.adobe.com/education/pdf/cib/encore/encore_cib_11.pdf

http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_gs.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_01.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_02.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_03.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_04.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_05.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_06.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_07.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_08.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_09.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_10.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_11.pdf

http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_gs.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_tour.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_01.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_02.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_03.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_04.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_05.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_06.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_07.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_08.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_09.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_10.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_11.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_12.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_13.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_14.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_15.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_16.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_17.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_18.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_19.pdf

http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_gs.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_dv.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_tour.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_01.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_02.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_03.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_04.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_05.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_06.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_07.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_08.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_09.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_10.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_11.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_12.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_13.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_14.pdf

http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_gs.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_tour.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_01.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_02.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_03.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_04.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_05.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_06.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_07.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_08.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_09.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_10.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_11.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_12.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_13.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_14.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_15.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_vc.pdf

http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_gs.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_01.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_02.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_03.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_04.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_05.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_06.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_07.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_08.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_09.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_10.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_11.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_12.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_13.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_vc.pdf

http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_gs.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_01.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_02.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_03w.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_03m.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_04.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_05.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_06.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_07.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_08.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_09.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_10.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_11.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_12.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_13.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_14.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_15.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_16.pdf

http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cibgs.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib_tour.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib01.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib02.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib03.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib04.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib05.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib06.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib07.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib08.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib09.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib10.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib11.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib12.pdf

http://download.adobe.com/pub/adobe/magic/audition/win/2.02/audition_user_guide.pdf
===================================================================================================
Total Training for Photoshop 7.0 - (9 CDs)
1- Download "BitTorrent" from (http://bitconjurer.org/BitTorrent/download.html).
Install CD 310.4 Mb
http://66.90.75.92/suprnova//torrents/1733/Total%20Training%20for%20Photoshop%207%20-%20Install%20CD(6).torrent
CD1 667.7 Mb
http://66.90.75.92/suprnova//torrents/1750/Total%20Training%20for%20Photoshop%207%20-%20CD%201%20of%208(2).torrent
CD2 673.2 Mb
http://66.90.75.92/suprnova//torrents/1750/Total%20Training%20for%20Photoshop%207%20-%20CD%202%20of%208(3).torrent
CD3 725.7 Mb
http://66.90.75.92/suprnova//torrents/1739/Total%20Training%20for%20Photoshop%207%20-%20CD%203%20of%208(2).torrent
CD4 686.4 Mb
http://66.90.75.92/suprnova//torrents/1706/Total%20Training%20for%20Photoshop%207%20-%20CD%204%20of%208(2).torrent
CD5 295.1 Mb
http://66.90.75.92/suprnova//torrents/1703/Total%20Training%20for%20Photoshop%207%20-%20CD%205%20of%208(3).torrent
CD6 711.1 Mb
http://66.90.75.92/suprnova//torrents/1697/Total%20Training%20for%20Photoshop%207%20-%20CD%206%20of%208(2).torrent
CD7 706.2 Mb
http://66.90.75.92/suprnova//torrents/1697/Total%20Training%20For%20Photoshop%207%20-%20CD%207%20of%208(3).torrent
CD8 319.5 Mb
http://66.90.75.92/suprnova//torrents/1697/Total%20Training%20for%20Photoshop%207%20-%20CD%208%20of%208(2).torrent

===================================================================================================

New Updates:
------------------

http://www.ebook.singcat.com/Ebook/

http://rtfm.rdslink.ro/Books/

http://books.baubas.net/

ftp://195.222.134.71/Bookz/Other/

http://bad.zazone.net/flash%20tutors/

http://harry.studentenweb.org/hackerinfo/

http://61.129.70.16/~shengjun/

http://alexander.pmf.ukim.edu.mk/predmeti/is/chitanje/

http://www.srdc.metu.edu.tr/~yavuz/Ceng490/resources/

http://examen.tazmanonline.nl/mcse/

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/ [all about Cisco]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/CCIE/ [CCIE books]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/CCIP/ [CCIP books]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/CCSP/ [CCSP books]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/CISCO%20IP%20TELEPHONY/ [CISCO IP telephony]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/MPLS/ [MPLS books]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/QOS/ [QOS books]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/Simulation/ [many simulations]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/TELEPHONY%20SPECIALIZATION/ [telephony specializations books]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/bccran/ [BCCRAN books]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/ccnpdoc/ [CCNP books]

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/password_recovery/ [password recovery books]

http://ftp.cdut.edu.cn/pub3/uncate_doc/Network/

http://www.viacom.com.br/~silici0/

http://ftp.cdut.edu.cn/pub3/uncate_doc/ [alllllllllllllllllllllllllllllllllll Oreilly books]

http://ftp.cdut.edu.cn/pub3/uncate_doc/Programming/ [programming books]

http://ftp.cdut.edu.cn/pub3/uncate_doc/Misc/The_Code-Linux/ [The code Linux]

http://ftp.cdut.edu.cn/ [download many operating systems]

http://jztele.com/~coldice/book/

http://www.hackemate.com.ar/textos/Nsa/

http://newsroom.cisco.com/dlls/tln/exec_team/powell/pdf/

http://www.uni-konstanz.de/RZ/wlan/ipsec/software/

https://rsvj.ath.cx/documentation/Networking/Cisco/

https://rsvj.ath.cx/documentation/Networking/courses/Animated/

https://rsvj.ath.cx/documentation/

http://www.hackemate.com.ar/textos/Nsa/

http://hysteria.sk/redtime/books/

http://ftp.ux0.de/pub/network/Cisco/multicast/tutorial/

http://mankmok.sdf-eu.org/dotNet/

http://ftp3.cdut.edu.cn/

http://sparcs.kaist.ac.kr/~force/archive/Books/

http://www.davehilla.com/ebooks/

http://0xf47a.afraid.org/docs-n-ebooks/

http://people.arcada.fi/~sinnc/

http://www.u-n-f.com/books/archive/

http://www.greenandwhite.net/~kkip/Coursework%20Project/

http://docs.cafe-philo.net/

http://www.csie.ntu.edu.tw/~piaip/docs/

http://www.blacksheepnetworks.com/security [Hacking and Security]

http://www.blacksheepnetworks.com/security/hack/ [Hacking and Security]

http://marathon.csee.usf.edu/~kwb/nsf-ufe/ [Hacking and Security]

http://www.net.ohio-state.edu/security/talks/199x/199x_state-of-the-hack/ [Hacking and Security]

http://www.linux-france.org/prj/inetdoc/telechargement/ [Hacking and Security]

http://www.telematik.informatik.uni-karlsruhe.de/lehre/seminare/LinuxSem/downloads/netfilter/?C=S;O=A [Hacking and Security]

http://www.microalcarria.com/descargas/documentos/Wireless/ [Hacking and Security]

http://www.ifi.uio.no/doc/ [Hacking and Security]

http://www.anakata.hack.se/files/ [Hacking and Security]

http://www.planetpdf.com/mainpage.asp?webpageid=2365 [Hacking and Security]

http://opensees.berkeley.edu/OpenSees/?C=M;O=A [Hacking and Security]

http://linux.ucla.edu/~dap24/libdbi/ [Hacking and Security]

http://www.moreilly.com/CISSP/ [Hacking and Security]

http://www.networkcommand.com/docs/ [Hacking and Security]

http://fringe.davesource.com/Fringe/Hacking/ [Hacking and Security]

http://adsl.cutw.net/ [Hacking and Security]

http://bokeoa.com/~core/files/ [Hacking and Security]

http://jztele.com/~coldice/ [Hacking and Security]

http://jinshi.homelinux.net/Docs/computer/ [Hacking and Security]

http://www.c-lab.de/java/ [Java Books]

http://books.pdox.net/Computers/ [Java Books]

http://xarch.tu-graz.ac.at/autocad/stdlib/ [Java Books]

http://haje.kaist.ac.kr/~oedalpha/tips/ [Java Books]

http://hspf.com/pub/java/ [Java Books]

http://acm2.ustc.edu.cn/~roger/files/ [Java Books]

http://mediamaniac.dyndns.org/Downloads/BUECHER/ [Java Books]

http://www.cs.wustl.edu/~schmidt/PDF/ [Java Books]

http://www.mirrors.wiretapped.net/security/cryptography/apps/ssh/Java/sshtools/ [Java Books]

http://www.arts-festival.com/ [Java Books]

http://www.ibiblio.org/pub/Linux/docs/HOWTO/translations/it/pdf/ [Java Books]

http://books.malonus.com/ebooks/computer_science/security/

http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/DOCUMENTS_BGP_SECURITY_SWICTHCONF_IOS_REFERENCE_DESIGN/

http://lorien.s2s.msu.ru/pub/docs/

http://www.elo.utfsm.cl/~respaldo/

http://www.thelawlers.com/essays.html

http://www.wz2k.co.uk/pages/downloads/downloads-index.php?uploadCat=Photoshop%20Video#top [Photoshop Videos]

http://www.psdland.com:8080/zwaed/kotb/index.php [excellent arabic tutorial site]

http://www.sudanixpro.net/bookz/Super.XP.Tweaking.Guide.rar

http://www.eit.ihk-edu.dk/0803/Aoopi/MS%20press%20-%20Microsoft.NET%20Remoting.pdf

http://www.mansoorbinsaeed.com/docs/how%20to/
=============================================================================

Magazines:
--------------

PC Magazine - Nov-02-04
http://imgs.zinio.com/magazines/200062/64746857.zno

Popular Science - Oct-04;
http://imgs.zinio.com/magazines/330042/62028585.zno

Electronic Gaming Monthly - Dec-04; http://imgs.zinio.com/magazines/6505574/66699811.zno

Personal Computer World - Nov-04; http://imgs.zinio.com/magazines/52054981/63547757.zno

Computer Gaming World - Nov-04; http://imgs.zinio.com/magazines/6502696/62416507.zno

Better Software - Oct-04; http://images.zinio.com/magazines/11151027/63927244.zno

Internet Works - Nov-04; http://imgs.zinio.com/magazines/35712781/63770444.zno

CIO Insight - Oct-04;
http://images.zinio.com/magazines/6949638/64255793.zno

Digital Camera World - Nov-04; http://imgs.zinio.com/magazines/6459963/66764346.zno

Talk Middle East - Oct-04; http://imgs.zinio.com/magazines/36182943/63971469.zno

Laptop Magazine - Sep-04; http://imgs.zinio.com/magazines/35710241/59722114.zno

Microsoft Windows XP - Dec-04; http://imgs.zinio.com/magazines/2110680/64681181.zno

PC Answers - Nov-04;
http://imgs.zinio.com/magazines/6459960/64627777.zno

CosmoGIRL - Oct-04;
http://imgs.zinio.com/magazines/48965789/61844047.zno

Seventeen - Nov-04;
http://imgs.zinio.com/magazines/6391719/63936877.zno

Mobile PC - Nov-04;
http://imgs.zinio.com/magazines/45243363/66706030.zno

PC Magazine (UK) - Sep-04; http://imgs.zinio.com/magazines/1828690/63600271.zno

Dynamic Graphics - Oct-Nov-04; http://images.zinio.com/magazines/17164010/63016953.zno

http://images.zinio.com/download/1.6.0.815b-EN/ZinioReader_2202894149.exe [Zinio Reader]
=============================================================================

The Broken Videos:
-------------------------

Code:
http://www.thebroken.org


Video Release 0003: return of thebroken
We kick it off with Windows password hash extraction and cracking. Also learn the basics of modding the Xbox, PS2 and GameCube. Plus, Ramzi’s back with a mission: impossible self-destructing laptop. And we sit down with Kevin Mitnick to find out what life is like for a hacker in prison.
Encoded: DivX Runtime: 31:33 Size: 152MB
Download Mirrors:
Code:
http://homepage.mac.com/kevinrose/thebroken3.avi
http://www.thebroken.org/episodes/03/thebroken_3.avi


Video Release 0002: Hacking with Ramzi "door buster"
If you've ever watched an episode of "Cops", then you've probably seen a door battering ram in use. Now Ramzi shows you how to build a door buster for your own home use. For only $20 in parts from your local Home Depot, the door's history.
Encoded: DivX Runtime: 05:39 Size: 27.3MB
Download Mirrors:
Code:
http://homepage.mac.com/kevinrose/thebroken2.avi
http://www.thebroken.org/episodes/01.5/thebroken_15.avi


Video Release 0001: Enter thebroken
Our first episode jumps right into wardriving and wap hacking. Also learn the basics of social engineering with "free pizza 4 life". And of course, a hacker tip with Ramzi.
Encoded: DivX Runtime: 17:00 Size: 82.1MB
Download Mirrors:
Code:
http://homepage.mac.com/kevinrose/thebroken1.avi
http://www.thebroken.org/episodes/01/thebroken_1.avi
=============================================================================

Free trick for downloading the famous [Syngress Books] more than "80" books:
---------------------------------------------------------------------------------------------

1- Go to the web site [www.syngress.com].
2- Click on [create an account] at upper right hand side of screen to register for free.
3- Enter any garbage information in all fields in the registration.
4- Once you are registered, enter the following URL: [http://www.syngress.com/solutions/XXXX/download.cfm], and replace the "XXXX" with the code of the book. For example, to download "70-290 Study Guide", use the URL: "http://www.syngress.com/solutions/274_MCSE_70290/download.cfm".

5- Codes of books:

CODE BOOK NAME
175_Net_mobile_web - .NET Mobile Web Developer's Guide
230_lgo_ris2 - 10 Cool Lego Mindstorm Robotics Invention System 2 Projects
229_lgo_ubp - 10 Cool LEGO Mindstorm Ultimate Builder Projects
227_lgo_dsdk - 10 Cool Lego Mindstorms Dark Side Robots
24670214 - 70-214 Study Guide
274_MCSE_70290 - 70-290 Study Guide
254_MCSE_70291 - 70-291 Study Guide
271_MCSE_70292 - 70-292 Study Guide
255_MCSE_70293 - 70-293 Study Guide
272_MCSE_70296 - 70-296 Study Guide
110_Avd_App - Administering Cisco QoS in IP Networks
130_mig_asp - ASP Configuration Handbook
166_asp_dev - ASP.NET Web Developers Guide
253_BD_Cisco_Intrntwkg - Best Damn Cisco Internetworking Book Period
252_BD_Firewall - Best Damn Firewall Book Period
145_biztalk - BizTalk Server 2000
160_bluetooth - Bluetooth Application Developer's Guide
169_cisco_wlan - Building a Cisco Wireless LAN
71_Conf_CNSAD_Win2000 - Building Cisco Networks for Windows 2000
93_sbcran - Building Cisco Remote Access Networks
250_DMZs - Building DMZs for Enterprise Networks
174_lego_robo - Building Robots with Lego Mindstorms
140_san_broc - Building SANs with Brocade Fabric Switches
223_C_Java - C# for Java Programmers
167_C# - C#.NET Web Developer's Guide
ccna_superpack - CCNA Super Pack
192_chk_pt - Check Point Next Generation Security Administration
259_chkpt - Check Point NG VPN-1/FireWall-1
109_ciscoip - Cisco AVVID & IP Telephony Design and Implementation
267_cssp_ids - Cisco Security Professional's Guide to Secure Intrusion Detection Systems
235_pix - Cisco Security Specialist's Guide to PIX Firewalls
189_xp - Configuring and Troubleshooting Windows XP Professional
94_avvid - Configuring Cisco Avvid
70_voip - Configuring Cisco Voice Over IP
228_VOIP2E - Configuring Cisco Voice Over IP, Second Edition
111_ctrx - Configuring Citrix Metaframe for Windows 2000 Terminal Services
220_CitrixXP - Configuring Citrix MetaFrame XP for Windows Including Feature Release 1
128_mc_em - Configuring Exchange 2000 Server
208_ipv6 - Configuring IPv6 for Cisco IOS
132_isa - Configuring ISA Server 2000
245_symntc - Configuring Symantec AntiVirus Enterprise Edition
68_Win2000_Sec - Configuring Windows 2000 Server Security
147_w2K_noad - Configuring Windows 2000 Without Active Directory
165_cell - Consumer's Guide to Cell Phones & Wireless Service Plans
73_odba - DBA's Guide to Databases on Linux
92_Win2000_Deploy - Deploying Windows 2000 with Support Tools
152_wan_luc - Designing a Wireless Network
114_SQL_Dna - Designing SQL Server 2000 Databases for .net Enterprise Servers
206_XML_Web - Developing .NET Web Services with XML
210_Java_APIs_dev - Developing Web Services with Java APIs for XML Using WSDP
226_InfoWar - Dr. Tom Shinder's ISA Server and Beyond
119_email - E-mail Virus Protection Handbook
193_hck_cf5 - Hack Proofing ColdFusion
138_hack_lnx - Hack Proofing Linux
158_hack_sun - Hack Proofing Sun Solaris 8
181_hackproofW2K - Hack Proofing Windows 2000 Server
224_hack_xml - Hack Proofing XML
134_hack_ecomm - Hack Proofing Your E-commerce Site
221_hck_identity - Hack Proofing Your Identity in the Information Age
194_Hck_net2e - Hack Proofing Your Network, Second Edition
95_hack - Hack Proofing Your Network: Internet Tradecraft
137_hack_app - Hack Proofing Your Web Applications
182_Hack_wireless - Hack Proofing Your Wireless Network
287_HRD_HCK - Hardware Hacking
69_ipad - IP Addressing and Subnetting: Including IPv6
190_Journey_Internet - Journey to the Center of the Internet
243_lgo_mstr - LEGO Mindstorms Masterpieces
240_lgo_tools - Lego Software Power Tools
76_Mng_ActDir_Win2000_Ser - Managing Active Directory for Windows 2000 Server
112_ipsec - Managing Cisco Network Security
218_CiscoSec2e - Managing Cisco Network Security Second Edition
75_Mng_Win2000_NetServs - Managing Windows 2000 Network Services
115_mc_sec - Mission Critical! Internet Security
113_MC2k - Mission Critical! Windows 2000 Server Administration
234_nokia - Nokia Network Security Solutions Handbook
139_palm_dev - Palm OS Web Application Developers Guide
177_lego_JAVA - Programming Lego Mindstorms with Java
183_Ruby - Ruby Developer's Guide
225_Cybercrime - Scene of The Cybercrime: Computer Forensics Handbook
286_NSA_IAM - Security Assessment Case Studies for Implementing the NSA IAM
236_secplus - Security+ Study Guide
219_sniffer - Sniffer Pro Network Optimization & Troubleshooting Handbook
244_snort - Snort 2.0 Intrusion Detection
232_SpecialOps - SPECIAL OPS: Host and Network Security
241_sscp - SSCP Study Guide
249_STL_NTW - Stealing the Network: How to Own the Box
91_Win2000_TCPIP - Troubleshooting Windows 2000 TCP/IP
153_vb_net - VB.NET Developer's Guide
159_wg_wi - Webmaster's Guide to the Wireless Internet
180_AD_2e - Windows 2000 Active Directory Second Edition
77_Win2000_Conf_Wiz - Windows 2000 Configuration Wizards
74_Sysad - Windows 2000 Server System Administration Handbook
155_xml_NET - XML .NET Developer's Guide

6- For quick downloading, use my account and password:
User Name: [mhany@virgitech.com]
Password: [poiuytrewq]

=============================================================================

Huge excellent arabic links for books and tutorials:
-------------------------------------------------------------

** ÇáÈÑãÌå **

ÇÓã ÇáßÊÇÈ : ÇáÈÑãÌå ÇáßÇÆäíå
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/gen/oop.htm
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:21 pm Post subject: Continue........... Reply with quoteBack to top
Huge excellent arabic links for books and tutorials:
-------------------------------------------------------------

** ÇáÈÑãÌå **

ÇÓã ÇáßÊÇÈ : ÇáÈÑãÌå ÇáßÇÆäíå
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/gen/oop.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ ÈÑãÌÉ ÇáÓí
áÛÉ ÇáÈÑãÌå: C /ÇáÓí
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/c/c1.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÓí - ÏÑæÓ
áÛÉ ÇáÈÑãÌå: C /ÇáÓí
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/c/c2lessons.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÃÓãÈáí
áÛÉ ÇáÈÑãÌå: ÇáÃÓãÈáí/ Assembley
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/assm/assm1.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÃÓãÈáí
áÛÉ ÇáÈÑãÌå: ÇáÃÓãÈáí/ Assembley
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programmin...assmlessons.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ãæÓæÚÉ ÇáÈÑãÌÉ ÈÇá ++C
áÛÉ ÇáÈÑãÌå: ÇáÓí ÈáÓ ÈáÓ/ ++C
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/cplus/cplus.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ØÑíÞ ÇáÈÑãÌÉ Ýí ++C
áÛÉ ÇáÈÑãÌå: ÇáÓí ÈáÓ ÈáÓ/ ++C
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/cplus/cplus1.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÚáã ÇáÈÑãÌÉ ÈæÇÓØÉ MFC
áÛÉ ÇáÈÑãÌå: MFC æÇá++C
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/cplus/mfc.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÝÌæÇá ÈíÓß ÏæÊ äÊ
áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß . äÊ VB.NET
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vbnet/vbnet.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÅÍÊÑÇÝ ÇáÝÌæÇá ÈíÓß ÏæÊ äÊ
áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß . äÊ VB.NET
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vbnet/masvbnet.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : æÇÌåÉ ÈÑãÌÉ ÇáÊØÈíÞÇÊ(API)
áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VB
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/api.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáæÓÇÆØ ÇáãÊÚÏÏÉ ÈÅÓÊÎÏÇã DirectX
áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VB
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/dx.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÝÌæÇá ÈíÓß ááÌãíÚ
áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VB
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/oop.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÊÚÇãá ãÚ ãÓÌá ÇáäÙÇã
áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VB
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/reg.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ ÑÇÆÚ ááÝÌæÇá ÈíÓß
áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VB
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/good.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÚáã ÇáÝÌæÇá ÈíÓß 6 ááãÈÊÏÆä
áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VB
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/beg.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÞæÇÚÏ ÇáÈíÇäÇÊ Ýí ÇáÝÌæÇá ÈíÓß 6
áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VB
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/vbdatabase.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÊÚÇãá ãÚ æÓÇÆØ ÇáÊÎÒíä
áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VB
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/save.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÊÚÇãá ãÚ ÞæÇÚÏ ÇáÈíÇäÇÊ
áÛÉ ÇáÈÑãÌå: SQL
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/database/sql.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÃÓÇÓíÇÊ Ýí ÇáÊÚÇãá ãÚ ÞæÇÚÏ ÇáÈíÇäÇÊ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programmin...se/database.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ãÇíßÑæÓæÝæÊ ÂßÓíÓ
áÛÉ ÇáÈÑãÌå: Microsoft Access
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programmin...base/Access.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÚáíã ÂßÓíÓ 1
áÛÉ ÇáÈÑãÌå: Microsoft Access
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programmin...ase/Access1.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÚáíã ÂßÓíÓ 2
áÛÉ ÇáÈÑãÌå: Microsoft Access
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programmin...ase/Access2.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ


** ÈÑãÌÉ ÇáãæÇÞÚ **

ÇÓã ÇáßÊÇÈ : ÏæÑÉ Ýí ÇáÅÊÔ Êí Åã Åá
áÛÉ ÇáÈÑãÌå: HTML
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/netpro/html/html.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáãÑÌÚ ÇáßÇãá Ýí Çá HTML
áÛÉ ÇáÈÑãÌå: HTML
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/netpro/html/htmlfull.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÚáã Çá PHP ÈÓåæáÉ
áÛÉ ÇáÈÑãÌå: PHP
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/netpro/php/easyphp.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÚáã Çá PHP
áÛÉ ÇáÈÑãÌå: PHP
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/netpro/php/learnphp.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÚÑÝ Úáì Çá PHP æÇá MYSQL
áÛÉ ÇáÈÑãÌå: PHP - MYSQL
ÇáÜÜÊÊÜÜÍãíÜá: http://www.cb4a.com/book/netpro/php/learnphp&mysql.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÜ ASP
áÛÉ ÇáÈÑãÌå: ASP
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/netpro/asp/asp.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáãæÇÞÚ ÈÇáÝáÇÔ
áÛÉ ÇáÈÑãÌå: FLASH Action Script
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/netpro/Act...tion_Script.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ãÞÏãå äÍæ ÌÇÝÇ ÓßÑÈÊ
áÛÉ ÇáÈÑãÌå: Java Script
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/netpro/jav...ojavascript.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ ãÊãíÒ Ýí ÊÚáíã ÇáÌÇÝÇ ÓßÑÈÊ
áÛÉ ÇáÈÑãÌå: Java Script
ÇáÜÜÜÜÊÍãíÜá: http://www.cb4a.com/book/netpro/jav.../javascript.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÅÓÊÇíá
áÛÉ ÇáÈÑãÌå: CSS
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/netpro/CSS/css.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ ãÊãíÒ Ýí ÊÚáíã ÇáÌÇÝÇ ÓßÑÈÊ
áÛÉ ÇáÈÑãÌå: Java Script
ÇáÜÜÜÜÊÍãíÜá: http://www.cb4a.com/book/netpro/jav.../javascript.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÅÓÊÇíá
áÛÉ ÇáÈÑãÌå: CSS
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/netpro/CSS/css.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ


** ÇáÌÑÇÝíßÓ æÇáÊÕãíã **

ÇÓã ÇáßÊÇÈ : ÇáÝæÊæÔæÈ ááãÍÊÑÝíä 1
áÛÉ ÇáÈÑãÌå: PhotoShop
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/photoshop/photo1.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÝæÊæÔæÈ ááãÍÊÑÝíä 2
áÛÉ ÇáÈÑãÌå: PhotoShop
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/photoshop/photo2.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÝæÊæÔæÈ ááãÈÊÏÇíä
áÛÉ ÇáÈÑãÌå: PhotoShop
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/des/photos...nphotoshope.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ ÑÇÆÚ Ýí ÇáÝÑæäÊ ÈíÌ
áÛÉ ÇáÈÑãÌå: FrontPage
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/des/frontpage/frontpage.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÝÑæäÊ ÈíÌ
áÛÉ ÇáÈÑãÌå: FrontPage
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/des/frontp...ntpagesmall.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : vBulletin ÊÑßíÈ ãäÊÏì
áÛÉ ÇáÈÑãÌå: vBulletin
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/vb/vb1.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : PHPÊÑßíÈ ãäÊÏì æÊÑßíÝ ÓíÑÝÑ áá
áÛÉ ÇáÈÑãÌå: vBulletin & PHP
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/vb/vbphp.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÝáÇÔ Åã ÅßÓ MX
áÛÉ ÇáÈÑãÌå: Flash MX
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/flashmx/flashmx.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÔÇãá Ýí ÝáÇÔ
áÛÉ ÇáÈÑãÌå: Flash MX
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/flash/flashmx.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÇæÊæßÇÏ
áÛÉ ÇáÈÑãÌå: AutoCad 2000
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/autocad/autocad.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÇáÓí Èäá
áÛÉ ÇáÈÑãÌå: Cpanel
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/des/cpanel/cpanel.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßíÝ íßæä ãæÞÚß äÇÌÍÇ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/des/gen/howto.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÕãíã ÇáÃáÚÇÈ ÈÈÑäÇãÌ game maker
áÛÉ ÇáÈÑãÌå: Games
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/des/games/gamemaker.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ


** ÃäÙãÉ ÇáÊÔÛíá **

ÇÓã ÇáßÊÇÈ : äÙÇã ÇáÊÔÛííá Dos
áÛÉ ÇáÈÑãÌå: MS - DOS
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/os/dos/dos.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÚáíã äÙÇã ÇáÊÔÛííá Dos
áÛÉ ÇáÈÑãÌå: MS - DOS
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/os/dos/learndos.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ãæÓæÚÉ æíäÏæÒ 2000
áÛÉ ÇáÈÑãÌå: Windows 2000
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/os/windows2000/windows2000.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ãÑÔÏß ÇáÃãíä áÅßÊÔÇÝ ÇáæíäÏæÒ XP
áÛÉ ÇáÈÑãÌå: Windows XP
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/os/winxp/winxp.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ãÔÇßá ÈÏÆ ÇáÊÔÛííá æßíÝíÉ ÊÎØíåÇ
áÛÉ ÇáÈÑãÌå: Windows
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/os/problems/problems.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ Úãá ÝæÑãÇÊ æÊäÕíÈ XP
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/os/gen/format.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : Ïáíá äÙÇã ÇáÊÔÛííá áíäßÓ
áÛÉ ÇáÈÑãÌå: Linux
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/os/linux/liunx.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÃÓÆáÉ ÇáãÊßÑÑÉ Ýí áíäßÓ
áÛÉ ÇáÈÑãÌå: Linux
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/os/linux/faq.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÑÏåÇÊ áíäßÓ 9
áÛÉ ÇáÈÑãÌå: Linux
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/os/linux/redhat.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ


** ÇáåÇÑÏæíÑ æÚÊÇÏ ÇáßãÈíæÊÑ **

ÇÓã ÇáßÊÇÈ : ßÊÇÈ ãÊãíÒ Ýí ÚÊÇÏ ÇáÍÇÓÈ
áÛÉ ÇáÈÑãÌå: ÚÊÇÏ ÇáÍÇÓÈ
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/hardware/hardwaregood.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÚáã ÈÏæä ÊÚÞíÏ ÊÌãíÚ æÕíÇäÉ ÇáÍÇÓæÈ
áÛÉ ÇáÈÑãÌå: ÚÊÇÏ ÇáÍÇÓÈ
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/hardware/learneasy.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ßÇãá ááÞÑÕ ÇáÕáÈ
áÛÉ ÇáÈÑãÌå: ÚÊÇÏ ÇáÍÇÓÈ
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/hardware/harddisk.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ááÚÊÇÏ æÇáãÚÇáÌÇÊ Úáì Ôßá HTML
áÛÉ ÇáÈÑãÌå: ÚÊÇÏ ÇáÍÇÓÈ
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/hardware/waha.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ


** ÇáÔÈßÇÊ **

ÇÓã ÇáßÊÇÈ : ãÓÇÑ ÇáÔÈßÇÊ
áÛÉ ÇáÈÑãÌå: CISCO
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/networks/cisco.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÔÈßÇÊ
áÛÉ ÇáÈÑãÌå: MCSE
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/networks/mcse.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ãÐßÑå Ýí ÇáÔÈßÇÊ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/networks/note.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÈæÑÈæíäÊ ÌÏíÏ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/powerpoint.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÅÚÏÇÏ ÇáÈíæÓ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/gen/bios.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÇäÊÑäÊ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/internet.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÅÎÊÕÇÑÇÊ áæÍÉ ÇáãÝÇÊíÍ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÜÊÍãíÜá: http://www.cb4a.com/book/gen/keyboard.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ãÑÔÏß ÇáÃãíä ááÊÚÑÝ Úáì ÇáÐÇßÑÉ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/gen/memory.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÍãÇíÉ Ýí ÚÇáã ÇáÅäÊÑäÊ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/gen/secinternet.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ãÕØáÍÇÊ ÇáÍÇÓÈ ÇáÃáí
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/mos.htm
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:23 pm Post subject: Continue........... Reply with quoteBack to top
ÇÓã ÇáßÊÇÈ : ßÊÇÈ áÔÑÍ ÈÑäÇãÌ ÇáäíÑæ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/gen/nero.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÊÕÇÑÍ Ýí (nix.*)
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/permission.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáãæÓæÚÉ ÇáÍÇÓæÈíå
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/mosoa.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáãæÓæÚÉ ÇáÍÇÓæÈíå 2
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/mosoa2.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÈÑæÊæßæáÇÊ ÇáÜÜFTP
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/ftp.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ ÇáææÑÏ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/word.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ ÇáÅßÓá
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/gen/excel.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÊÍáíá ÇáÈíÇäÇÊ ÇáÅÍÕÇÆíÉ ÈÇáÅßÓá
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/gen/excel_2.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÊÌÇÑÉ ÇáÅáßÊÑæäíÉ( ÌÏíÏ)
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/gen/Ecommerce.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ ãÖÇÏ ÇáÝÇíÑæÓ äæÑÊæä
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/norton.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈÉ ãæÓæÚÉ ÇáãäÊÏíÇÊ áÊÚáã ßíÝíÉ ÊÑßíÈ ãäÊÏí
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.alsayra.com/download/paf...ion=file&id=290

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ Black Ice
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://members.lycos.co.uk/absbateam14/blackice.html

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ 3D-Effect
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://members.lycos.co.uk/geosemsem07/effect_3d.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ eBook Workshop áÕäÚ ßÊÈ ÇáßÊÑæäíÉ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://www.alsayra.com/download/paf...ion=file&id=293

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍÇ áÈÑäÇãÌ ÇáÊÍãíá Mass Downloader 2.5
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.alsayra.com/download/paf...ion=file&id=294

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ MPEG Eitor
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://members.lycos.co.uk/geosemsem07/mpeg.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ Safe House
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://members.fortunecity.com/geosemsem/index.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ ReGet Deluxe áÊÓÑíÚ ÇáÊÍãíá æÇáÈÍË Úä ÇáÈÑÇãÌ+ÊÍæíá ÔÇÔÉ ÈÏÁ xp Åáì 2000 ÑæÚÉ+ ÈÑäÇãÌ íÎÈÑß ÈÇáÈÑäÇãÌ ÇáãäÇÓÈ áÃãÊÏÇÏ ãÚíä.
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://www.powow.com/flashnet/

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ãÔÇßá ÇáßãÈíæÊÑ æÍáæáåÇ+áãäÚ ÇáãæÇÞÚ Çá***íÉ anti-porn ÔÑÍ ÈÇáÕæÑ+ßíÝ ÊæÕá åÇÑÏíä ÈÌåÇÒß ÔÑÍ ÈÇáÕæÑ+ÔÑÍ ÈÇáÕæÑ áÚãáÇÞ ÇáÖÛØ_Wainrar+ÔÑÍ áÝÍÕ ÊæÇÝÞ directx ãÚ ßÑÊ ÇáÔÇÔÉ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.powow.com/nasoriiii5/
ÇáÊÍãíá ÇíÖÇ: http://www.geocities.com/nasoriiii5/

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßíÝíÉ Úãá ÕíÇäÉ áÌåÇÒß ãä ÇáæíäÏæÒ+ÔÑÍ áæÍÉ ÇáÊÍßã ÇáÎÇÕÉ ÈæíäÏæÒ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.geocities.com/nasoriiii/
ÇáÊÍãíá ÇíÖÇ: http://www.powow.com/nasoriiii4

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ áÔÑÍ ÇáÊÓÌíá ÈáÇíßæÓ + ÊÑßíÈ ãäÊÏíÇÊ iB
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://www.powow.com/nasoriiii/index.html
ÇáÊÍãíá ÇíÖÇ: http://www.geocities.com/nasoriiii4/

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ áÔÑÍ ÈÑäÇãÌSystem Mechanic v4
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://www.members.lycos.co.uk/absba4ever/Index.html

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÔÑÍ ÈÇáÕæÑ áÈÑäÇãÌ ÇáÊÚÑíÈ ýResHacker+ÔÑÍ ÈÑäÇãÌ EO Video áÊÍæíá ÕíÛ ÇáÃÝáÇã æäÓÎå
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.geocities.com/nasoriiii6/

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ Throttle áÊÓÑíÚ ÌãíÚ ÇäæÇÚ ÇáÇÊÕÇá+- ÔÑÍ ßÇãá áÈÑäÇãÌ ÇáÍãÇíå Norton AntiVirus 2003
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÍãíÜá: http://www.geocities.com/nasoriiii6/

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇáÔÑÍ ÇáßÇãá áÈÑäÇãÌ ÇáäíÑæ( ÇáÇÕÏÇÑ ÇáÎÇãÓ)+ÔÑÍ ÈÑäÇãÌ win fax+ÔÑÍ Total Recorder ÇáÑÇÆÚ áÊÓÌíá ÇáÃÕæÇÊ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://www.geocities.com/nasoriiii8/
ÇáÊÍãíá ÇíÖÇ: http://www.powow.com/nasoriiii8

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ Çáßáß æßíÝíÉ ÇáÊÚÇãá ãÚå+ßíÝ ÊäÓÎ Úáì ÃÞÑÇÕ 800 - 900 ãíÛÇ --¿¿¿
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.geocities.com/nasoriiii10/
ÇáÊÌãíá ÇíÖÇ: http://www.powow.com/nasoriiii9/

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ØÑíÞÉ äÓÎ ÞÑÕ ãÍãí ÈæÇÓØÉ ËáÇË ÈÑÇãÌ+ÔÑÍ ãÈÓØ áÜ ZoneAlarmPro4 ÂÎÑ ÇÕÏÇÑ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.geocities.com/nasoriiii11/
ÇáÊÍãíá ÇíÖÇ: http://www.powow.com/nasoriiii11

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ Easy GIF Animator 2_11 ÈÇáÊÝÕíá+ÔÑÍ æÊÚÑíÈ GifArt's Button Maker 1_1áÕäÚ ÓãÇÊ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://members.lycos.co.uk/mon99/
Çæ http://members.lycos.co.uk/aly999/index.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ The 911 CD Builder v2_0 ÇáÑÇÆÚ+ÔÑÍ ÈÇáÕæÑ ááÈÑäÇãÌ ÇáÔåíÑ Ýì ÇáÈÍË copernic
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://members.lycos.co.uk/mon99/
Çæ http://members.lycos.co.uk/aly999/index.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ãÝÕá ßíÝ ÊÍãá Çí ÈÑäÇãÌ ãä ãßÊÈÉ ÇáãÔÇÛÈ ÈGetRight+ÔÑÍ ÈÑäÇãÌ webexe áÚãá ßÊÈ ÅáßÊÑæäíÉ ÑÇÆÚÉ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://members.lycos.co.uk/mon99/
Çæ http://members.lycos.co.uk/aly999/index.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ leap ftp 2_7_2 áäÞá ÇáãáÝÇÊ ÈÇáÕæÑ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://members.lycos.co.uk/mon99/
Çæ http://members.lycos.co.uk/aly999/index.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÇÓÇÓíÇÊ ÇáåÇÑÏæíÑ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://members.lycos.co.uk/mon99/
Çæ http://members.lycos.co.uk/aly999/index.htm

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ íÍÊæí Úáí ÇáÔÑÍ ÈÑäÇãÌ AntiPorn áãäÚ ÇáãæÇÞÚ Çá***íÉ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.shohra.com/members/abosalma/antiporn.rar
Çæ http://www.shohra.com/members/abosalma1/antiporn.rar

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ íÍÊæí Úáí ÇáÔÑÍ ÈÑäÇãÌ Get Data Back áÇÓÊÚÇÏÉ ÇáãáÝÇÊ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÜÊÜÍãíÜá: http://www.shohra.com/members/abosalma/getdata.rar
Çæ http://www.shohra.com/members/abosalma1/getdata.rar

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ íÍÊæí Úáí ÇáÔÑÍ ÈÑäÇãÌ Xing MPEG Encoder áÖÛØ ãáÝÇÊ ÇáÝíÏíæ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÊÜÜÜÍãíÜá: http://www.shohra.com/members/abosalma/xingencod.rar
Çæ http://www.shohra.com/members/abosalma1/xingencod.rar

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ßÊÇÈ íÍÊæí Úáí ÇáÔÑÍ ÈÑäÇãÌ Golden Eye áãÑÇÞÈÉ ÇáÌåÇÒ ÇËäÇÁ ÛíÇÈß
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.shohra.com/members/abosalma1/goldeneye.rar
Çæ http://www.shohra.com/members/abosalma2/goldeneye.rar

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÈÑäÇãÌ ÕÇäÚ ÑãæÒ ãäÊÏíÇÊ ÇáãÔÇÛÈ
áÛÉ ÇáÈÑãÌå: ÚÇã
ÇáÜÜÊÜÜÍãíÜá: http://www.shohra.com/members/abosalma1/absbacode.rar
Çæ http://www.shohra.com/members/abosalma2/absbacode.rar

ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ

ÇÓã ÇáßÊÇÈ : ÍæÇáí 13 ßÊÇÈ áÊÚáíã ÇáÝæÊæÔæÈ æÏÑæÓ Úäå
áÛÉ ÇáÈÑãÌå: ÝæÊæÔæÈ
ÇáÜÊÜÜÜÍãíÜá: http://www.psdland.com:8080/zwaed/kotb/index.php
======================================================

Huge Rare Programs:
--------------------------

ÈÑÇãÌ ÇáÓÇÈ ÓÝä
ÇáÔÑÍ æÇáÊÍãíá
http://www.geocities.com/ala_kifk/p...rogrem_sub7.htm

ÈÑäÇãÌ sub seven GOLD
ÊÍãíá ÇáÈÑäÇãÌ
http://portwolf.hack3r.com/zips/sub72.1gold.zip
ÊÚÑíÈ ÇáÈÑäÇãÌ
http://mypage.ayna.com/leza/21.s7m
ÔÑÍ ÇáÈÑäÇãÌ
http://geocities.com/samysw/nowsub7.htm


ÈÑäÇãÌ sub seven BONUS
ÊÍãíá
ÇáÈÑãhttp://portwolf.hack3r.com/zips/sub7bonus.zip
ÊÚÑíÈ ÇáÈÑäÇãÌ
http://mypage.ayna.com/leza/21.s7m
ÔÑÍ ÇáÈÑäÇãÌ
http://geocities.com/samysw/nowsub7.htm


ÈÑÇãÌ ÇáäÊ ÈíæÓ
http://aljar7.4t.com/hpc.htm
ÔÑÍ ÇáäÊ ÈíæÓ
http://aljar7.4t.com/nb.htm

ÈÑÇãÌ áÃÎÊÑÇÞ ÇáÃÌåÒÉ ÊÌÏåÇ åäÇ
http://jehad.itgo.com/com.htm


ÃÎÊÑÇÞ ÇáÈÑíÏÇÊ

ÈÑäÇãÌ wwwhack
ÇáÊÍãíá
http://faisalm.50megs.com/download/hack/wwwhack.zip
ÇáÔÑÍ
http://www.ahliz.net/vb/showthread....mp;pagenumber=1

æÈÑÇãÌ ÇÎÑì áÃÎÊÑÇÞ ÇáÈÑíÏ ÊÌÏåÇ åäÇ
http://aljar7.4t.com/hemail.htm

ÕÝÍÉ ÇÎÊÑÇÞ ÇáÈÑíÏ ÇáÇáßÊÑæäí
http://jehad.itgo.com/email.htm


ÇÎÊÑÇÞ ÇáãæÇÞÚ

ÈÑäÇãÌ wwwhack
ÇáÊÍãíá
http://faisalm.50megs.com/download/hack/wwwhack.zip
ÇáÔÑÍ1
http://aljar7.4t.com/whack1.htm
ÇáÔÑÍ2
http://aljar7.4t.com/whack2.htm

ÈÑäÇãÌ WebCracker4.0
ÇáÊÍãíá
http://www.haqerz.com/files/anti-le...ebCrack40.crack

ÇáÔÑÍ
http://www.geocities.com/arabhacker2000/webcracker.htm


ÈÑäÇãÌ Brutus
ÇáÊÍãíá
http://geocities.com/kaser01/brutus.jpg
ÇáÔÑÍ
http://www.ahliz.net/vb/showthread....mp;pagenumber=1

ÈÑäÇãÌ Unsecure2.1
ÇáÊÍãíá
http://packetstorm.securify.com/Cra...NT/uns12exe.zip

ÇáÔÑÍ
http://aljar7.4t.com/uns.htm
ÈÑÇãÌ ÎÇÕÉ ÈÇáãæÇÞÚ ÊÌÏåÇ åäÇ
http://jehad.itgo.com/web.htm

ÖÑÈ ÇáÇíãíá

ØÑÞ ÊÏãíÑ ÇáÈÑíÏ ÊÌÏåÇ åäÇ
http://www.geocities.com/eljehad/hackmail.htm

ØÑÞ ÊÏãíÑ ÇáÈÑíÏ ãÚ ÇáÈÑäÇãÌ æÈÇáÚÑÈí
http://www.geocities.com/ala_kifk/drq_mail.htm

ÈÑäÇãÌ Kaboom
http://mypage.ayna.com/devil2k/kaboom30.zip

ÈÑäÇãÌ Euthan
http://mypage.ayna.com/devil2k/euthan15.zip

ÈÑäÇãÌ aenima
http://www.arabshacker.com/aenima.zip

ÈÑäÇãÌ upyours4beta3
http://******s.nbci.com/hacknowledge/upyours4beta3.zip

ÈÑäÇãÌ sneaky Mail
http://******s.nbci.com/hacknowledge/sneaky.zip

ÖÑÈ ÇáãæÇÞÚ

ßíÝ ÊÏãÑ ÓíÑÝÑÇÊ ÇáãæÇÞÚ ÇáíåæÏíÉ¿¿ åäÇ ÇáÌæÇÈ
http://www.home4arab.com/******s//i...ews_servers.htm


ÈÑäÇãÌ ÇáÏÑÉ ÇáÍÑÈí ááåÌæã Úáì ÇáãæÇÞÚ ÇáÅÓÑÇÆíáíÉ ¡¡
ÊÌÏå åäÇ ãÚ ÇáÔÑÍ
http://www.yaroun.8m.com/dorrah.htm

ØÑíÞÉ ãä ØÑÞ ÊÏãíÑ ÇáãæÇÞÚ

ÇÝÊÍ ÇáÏæÓ æãä Ëã ÇßÊÈ åÐÇ ÇáÇãÑ Úáì ÓÈíá ÇáãËÇá

ping http://******x/

ÈÏá ÇáÃ**ÇÊ ÇßÊÈ ÇÓã ÇáãæÞÚ

ÊÏãíÑ ÇáãæÇÞÚ ÈÏæä ÈÑÇãÌ ááÊÏãíÑ ¡¡ åäÇ ØÑíÞÉ ÇáÔÑÍ
http://www.geocities.com/ala_kifk/drq_battle.htm


ÓÑÞÉ ÇáÇÑÞÇã ÇáÓÑíÉ - ÇáÈÇÓæÑÏ

BiosHackíÎÊÑÞ ÚÏÉ ÇäæÇÚ ãä ÇáÈíæÓ
http://paragon.revoluti0n.org/Bios/bioshack.zip

ARJ á**Ñ ÇáÜ
http://www.hackpalace.com/cracking/...swords/arj1.zip


FTP ááÈÍË Ýì ÇáÔÈßÉ Úä
http://hackersclub.com/km/files/hfi...check-0_31.perl


áÇÙåÇÑ ãÇ ÊÍÊ ÇáäÌæã
http://paragon.revoluti0n.org/PassCrack/passthief*****

ÞæÇÆã ÚÏ - ææÑÏ áÓÊ

ÊÓÊÚãá Ýì ÈÚÖ ÇáãæÇÞÚ
http://paragon.revoluti0n.org/PassCrack/adult2lst.zip

ÇÓãÇÁ ÐßæÑ
http://paragon.revoluti0n.org/PassCrack/male-names.zip


ÇÓãÇÁ ÇäÇË
http://paragon.revoluti0n.org/PassC...emale-names.zip


áÕäÇÚÉ ÞÇÆãÉ
http://hackersclub.com/km/files/pas...ts/dictmake.zip


áÇÑÞÇã ÇáÏíÌíÊÇá
http://paragon.revoluti0n.org/PassCrack/4digits.zip


ÇáÝíÑæÓÇÊ

¡¡¡ ÃÏæÇÊ ÊÕäíÚ ÇáÝíÑæÓÇÊ ¡¡¡ÅÎØÑ ÇáÝíÑæÓÇÊ æÇáßËíÑ
ÇáßËíÑ ÊÌÏåÇ åäÇ // ÇÎæÇäí ÇÎæÇÊí ÇÑÌæ ÇÎÐ ÇáÍÐÑ ÚäÏ
ÊäÒíáåÇ áÇäåÇ ÞÏ ÊÚØÈ ÇáãÇÐÑ ÈæÑÏ///

http://jehad.itgo.com/vairuses.htm

ãáÝ íÍÊæí Úáì 130 ÝíÑæÓ
http://www.vbzor.4t.com/w6/130vs.zip

ÈÑäÇãÌ áÕäÇÚÉ ÝíÑæÓÇÊ (ÇáÏíÏÇä) ãÚ ÔÑÍ áå
ÇáÊÍãíá
http://www.virtue.nu/kaser/vbswg2.zip
ÇáÔÑÍ
http://ahliz.net/vb/showthread.php3?threadid=5941

ãßÊÈÉ ÊÍÊæì Úáì ßÊÈ ááÊÚáíã æÇáÔÑÍ
http://e-jehad.8m.com/Library/index.html
ÊÍÊæí åÐå ÇáãßÊÈÉ Úáì ÓáÓáÉ ãä ÇáÏÑæÓ æ ÇáßÊÈ ÇáãÊÚáÞÉ
ÈÊÚáíã ÇÎÊÑÇÞ ÇáãæÇÞÚ æ ÇáÈÑíÏ ÇáÅáßÊÑäí æ ÇáÃÌåÒÉ ..
ÇáÞÓã ÞíÏ ÇáÊØæíÑ æ ÇáÊÍÏíË .. äÊãäì áßã ÍÓä ÇáÞÑÇÁÉ æ
ÇáÊÚáã .. ßãÇ äÓÃáßã ÇáÏÚÇÁ áßÊÇÈ æ äÇÔÑí ÇáÏÑæÓ .. æ
Çááå ÇáãæÝÞ .

ãáÇÍÙÉ :- íÝÖá ÊäÒíá ÇáßÊÈ æ ÇáÏÑæÓ ÈÏæä ÈÑÇãÌ ÇáÊäÒíá
¡ áÃäåÇ ÞÏ áÇ ÊÚãá .


æåäÇ ÚÔÑÇÊ ÇáÏÑæÓ æÈÇáÚÑÈíÉ ¡¡ ÑÇÆÚÉ
http://www.geocities.com/ala_kifk/dros.htm

ÏÑæÓ ÈÇáÚÑÈíÉ áÃÎÊÑÇÞ ÇáãæÇÞÚ ÊÌÏåÇ åäÇ
http://www.geocities.com/eljehad1/learn.htm

ÏÑæÓ ÈÇáÚÑÈíÉ áÃÎÊÑÇÞ ÇáÃÌåÒÉ ÊÌÏåÇ åäÇ
http://www.geocities.com/eljehad1/learn.htm

ÏÑæÓ ÈÇáÚÑÈíÉ áÊÏãíÑ ÇáãæÇÞÚ ÊÌÏåÇ åäÇ
http://www.geocities.com/eljehad1/learn.htm

æåäÇ ãÌãæÚÉ ÏÑæÓ ÈÇááÛÉ ÇáÃäÌáíÒíÉ
http://www.geocities.com/eljehad1/learn.htm


ÇäæÇÚ ÇáåÇßÑÒ
http://aljar7.4t.com/hinfo.htm

ÈÚÖ ÇáÊæÖíÍÇÊ æÇáÏÑæÓ

ãÇÇáÐí ÊÓÊØíÚ ÝÚáå áßí ÊÌÇåÏ ÇáßÊÑæäíÇ ¿
http://e-jehad.8m.com/Tips/e-jehad_HowTo.htm

ÇáÇÎÊÑÇÞ ÈÏæä ÓíÑÝÑ - ÈÇÊÔ
http://www.ahliz.net/vb/showthread....mp;pagenumber=1


ÇÒÇáÉ ÊÑæÌÇä ÈÑÇãÌ ÇáåßÑÒ
http://www.ahliz.net/vb/showthread.php3?threadid=1196
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:25 pm Post subject: Continue........... Reply with quoteBack to top
Nuke - äíæß
http://www.ahliz.net/vb/showthread....mp;pagenumber=1


ÈÑÇãÌ ãäæÚÉ

" ÈÑÇãÌ åÇßíäÌ ÚÑÈíÉ " ÈÇáÇÖÇÝÉ Åáì ÈÑäÇãÌ ÇáãÌÇåÏ ÇáÃáßÊÑæäí ÊÌÏåÇ åäÇ
http://e-jehad.8m.com/Hack/ArProgz/index.html

ÕäÚ ÃÑÞÇã ÇáÝíÒÇ
http://www.geocities.com/ala_kifk/p...ogrem_visia.htm

ÈÑäÇãÌ ãÌÇåÏíä ÇáäÊ ¡ ÈÑäÇãÌ ÚÑÈí ¡¡ æÕáÇÊ ÇáÊÍãíá Ýí ÇáÃÓÝá

http://mypage.ayna.com/drmmm/mojahdin.zip

http://mypage.ayna.com/drmmm/mojahdin*****


íÑÇãÌ ÇáÃÊÕÇá æÇáãÍÇÏËÉ

mIRC (32-bit) v5.91t
ftp://ftp.dal.net/dalnet/clients/mirc/mirc591t.exe
Name: Dhafer Al-holaisi
s/n: 15448-1432890
ÈÑäÇãÌ ÇáÔÇÊ ÇáÔåíÑ


Gooey 2.1
http://a648.g.akamaitech.net/f/648/.../gooey21eng.exe
äÓÎÉ ÃÍÏË ááÊÍÏË ãÚ ÒÇÆÑí ÇáãæÞÚ ÇáÐí ÊÊÕÝÍå


PalTalk v3.5 build 344
http://216.74.151.142/download/0.x/pal_install.exe
ÈÑäÇãÌ ÃäíÞ ááãÍÇÏËÉ ÈÇáÕæÊ æÇáßáÇã ÚÈÑ ÇáÅäÊÑäÊ


Microsoft Chat v2.9
http://www.bdr130.com/soft/MicrosoftChatarb.exe
ÈÑäÇãÌ ÏÑÏÔÉ ãä ãíßÑæÓæÝÊ ãÚÑÈ


ÈÑÇãÌ ÎÏãíÉ ááÌåÇÒ æÇáÃäÊÑäÊ


WinZip8 Final
ftp://ftp.download.com/pub/ppd/winzip80.exe
Name: Dhafer Al-holaisi
s/n: 85143383
ÇáÈÑäÇãÌ ÇáÔåíÑ áÝß ÇáãáÝÇÊ ÇáãÖÛæØÉ


WinRAR v2.80
http://209.235.4.116/rar/wrar280tc.exe
ÈÑäÇãÌ ÂÎÑ ÃÞá ÔåÑå ãä Win zip áÝß ÇáãáÝÇÊ ÇáãÖÛæØÉ


Shut Down Timer
http://aloud.virtualave.net/software/ShutdownTimer.zip
ÈÑäÇãÌ íØÝÆ ÌåÇÒ ÇáßãÈíæÊÑ Ýì ÇáÓÇÚÉ Çáäì ÊÍÏÏåÇ áå


WebFerret v3.02
ftp://zdftp.zdnet.com/pub/private/s...sers/wferet.exe
äÓÎÉ ßÇãáÉ ááÈÍË ÇáÓÑíÚ Úä Ãí ãÚáæãÉ ÏÇÎá ÇáÅäÊÑäÊ


Pal 1.6a
http://www.kburra.com/downloads/cp1setup.exe
áÍãÇíÉ ÌåÇÒß ãä ÇáßæßíÒ ÇáÛíÑ ãÑÛæÈ Ýí ÒÑÚå
Name: Dhafer Al-holaisi
s/n: 3335201


Advanced dialer v2.4
ftp://zdftp.zdnet.com/pub/private/s...ools/advdlr.zip
íÞæã ÈÍÓÇÈ ÇáæÞÊ æÇáÊÇÑíÎ ÇáÐí ÃÊÕáÊ Ýíå ÈÇáÇäÊÑäÊ ÎáÇá ÇáÔåÑ


CD-R Win v4.0a
ftp://ftp.cdarchive.com/pub/goldenh...ad/cdr40a-e.exe
Name: Dhafer Al-holaisis
CompanyE-mail: abuturky
ulockkey: CB59A206-7F8D8D1A-A38BFFCA-FB7B879E
checkkey:30222598-B4D42F1C-DC0672D0-58F07854
ÈÑäÇãÌ ãÔåæÑ æÑÏíÝ ááßáæä áäÓÎ ÇáÓíÏí æÇáÓíÏí ÇáãÍãí


Part it 2.03
4Windows 9x/NT/ME
http://www.skylarkutilities.com/download/part-it.zip
Name: dhafer
s/n: PRT-F1B9A337-65C06874-6
Úãáå ÊÌÒÆÉ ÇáãáÝÇÊ ÇáßÈíÑÉ áäÓÎåÇ Úáì ÃÞÑÇÕ ÝáæÈí æÓåæáÉ ÅÓÊÚÇÏÊåÇ


PortFlash v2.0
http://www.webroot.com/pfinstall.exe
íãÓÍ ÎØæÇÊß Ýì ÇáÃäÊÑäÊ


WinFax Pro v10 full
http://212.252.113.91/yardimci/wnfaxpro.exe
ftp://63.124.222.11/.tmpD/.%20thede...%20Pro%2010.zip
: http://65.108.63.78/abuturky/winfaxpro10.zip


Mail Alert
http://www.conducent.com/affiliate/...ilAlertInst.exe
áÅÎÈÇÑß ÈæÌæÏ ÑÓÇÆá ÈÑíÏíÉ áÅÓÊÞÈÇáåÇ


ÈÑÇãÌ ÇáÊÕÝÍ æÊÕãíã ÇáãæÇÞÚ

FrontPage98 , Size (25M)
http://64.41.78.229/uaesawah/microsoft_frontpage_98.zip
s/n: 11121111111


WebStyle v2.0
http://www.xara.com/downloads/software/wstyle2dl.exe
ÈÑäÇãÌ ÑÓæãí áÊÕãíã ÇáÚäÇæíä æÇáÃÒÑÇÑ áÕÝÍÇÊ ÇáÅäÊÑäÊ
unlock code: 1234567
ÇáßÑÇß: http://65.108.63.78/abuturky/xarawebstyle2crk.zip


Smart Explorer v4.8
http://65.108.63.78/abuturky/smarte48.zip
äÓÎÉ ßÇãáÉ ãÊÕÝÍ ÕÛíÑ æÐßí Èå ßá ÇáÎíÇÑÇÊ ÇáÖÑæÑíÉ
Name: craig stroup
s/n: 1023105344
ÇáÃÍÏË
Smart Explorer v4.9
http://65.108.63.78/abuturky/sesetupfull.exe
äÓÎÉ ßÇãáÉ ãÊÕÝÍ ÕÛíÑ æÐßí Èå ßá ÇáÎíÇÑÇÊ
Name: Abuturky_Dhafer Al-holaisi
s/n: 965277253
Ãæ
User: Steven Kern s/n: 736191262


DreamWaver4
http://a23.g.akamai.net/7/23/2740/0...weaver4TBYB.exe
ÈÑäÇãÌ Þæí æãÊßÇãá áÊÍÑíÑ ÕÝÍÇÊ ÇáÅäÊÑäÊ ãÚ ÏÚãå ááÚÑÈíÉ áÇÊÓÌáå æÇäÊ
ãÊÕá ÈÇáÅäÊÑäÊ
s/n: DWW400-03771-57289-73501


HomeSite v4.52
http://www.l0tek.com/downloads/fo-h452.zip
äÓÎÉ ßÇãáÉ ãÍÑÑ ÕÝÍÇÊ ÇäÊÑäÊ ÓÑíÚ æÞæí äÙÇã æíÒæíÌ æíÏÚã ÇáÚÑÈíÉ
Name : Anything
s/n: HS45EE-5030480010

äÝÓ ÇáÈÑäÇãÌ ÇáÓÇÈÞ ãÚ ÇáßËíÑ ãä ÇáãíÒÇÊ ÇáÃÎÑì
Directory Snoop 3.14
ftp://zdftp.zdnet.com/pub/private/s...ties/dirsnp.zip


æíÚãá ãÚ ÇáãáÝÇÊ ÇáÚÑÈíÉFormat áÅÓÊÚÇÏÉ ÇáãáÝ ãä ÇáÃãÇßä ÇáãÚØæÈÉ ÈÓÈÈ ÝíÑæÓ ãÇ Ãæ ÊåíÆÉ
Final Data v1.0
http://65.108.63.78/abuturky/finaldata10.zip
ßÑÇß:http://65.108.63.78/abuturky/finaldata1crk.zip


æåÐÇ ÇáÈÑäÇãÌ áÍÐÝ ÇáãáÝÇÊ æáä íãßä ÅÓÚÇÏÊåÇ ÝíãÇ ÈÚÏ ÈÇáØÑÞ ÇáÓÇÈÞÉ
Eraser v4.11
ftp://zdftp.zdnet.com/pub/private/s...es/eraserfl.zip


ÈÑäÇãÌ áÅÓÊÑÌÇÚ ÇáÈíÇäÇÊ ÈÚÏ ãÓÍ ÇáÌåÇÒ
Norton Ghost2002
http://65.108.63.78/abuturky/ghost.zip


ÈÑäÇãÌ áÅÏÇÑÉ ÇáÈíÇäÇÊ æÇáÞíÇã ÈÇáÚãáíÇÊ Úáì ÇáãáÝÇÊ
Norton_Utilities2001
ftp://ftp.download.com/pub/win95/ut...200_5.0_618.exe
s/n: 07-31-90069-NL


åÐÇ ÇáÈÑäÇãÌ áÝß ÖÛØ ÇáãáÝÇÊ ÇáãÖÛæØÉ æåæ íÝß ãÇ íáí
zip, cab, rar, lha, uue, xxe
CoolZIPv 1.01
http://www.innersky.com/cgi-bin/dnload.cgi?coolzip.exe
ßÑÇß:http://202.103.100.253/hambo/othergroup2/dsicz101.zip


ÈÑäÇãÌ ÕÛíÑ áÝß ÇáÖÛØ
winrar v2.8
http://dl1.51soft.com:8080/soft/126/winrar280.zip
ßÑÇß:http://abuturky,eksa.net/winrar280bkrk.zip


ÈÑäÇãÌ áÖÛØ æÝß ÖÛØ ÇáãáÝÇÊ æíÏÚã ÌãíÚ ÇááæÇÍÞ ÇáãÚÑæÝÉ
ZipAll
http://tucows.qualitynet.net/files2/ZA433.EXE


ÈÑäÇãÌ íÖÛØ áãáÝÇÊ
Easy Zip 2000 v 4.6
http://www.alhosoon.com/ezip46.exe


íÔÝÑ ÇáãáÝÇÊ ÈßáãÇÊ ÓÑ áÇ ÊÝÊÍ ÈÏæäåÇ
Secret
ftp://ftp.symantec.com/misc/nss.exe


ÈÑäÇãÌ áÊÔÝíÑ ÇáãáÝÇÊ æÇáãÌáÏÇÊ æåæ ÇáÃÞæì Èíä ÇáÑÈÇãÌ
ddCrypt v. 1.4
http://dd-soft.tripod.com/ddcrypt.exe


ÍãÇíÉ ÇáãáÝÇÊ ÈßáãÇÊ ÓÑíÉ ÊÎÊÇÑåÇ ÃäÊ áÇ ÊÝÊÍ ÈÏæäåÇ
Norton Secret Stuff v1.0
http://members.tripod.com/progrmz/NSecret.zip


åÐÇ ÇáÈÑäÇãÌ íÓÊÚíÏ ÇáãáÝÇÊ ÇáÎÇÕÉ ÈÈÑäÇãÌ ÇáææÑÏ ÍÕÑÇð ÇáÊÇáÝÉ
Word Recovery v1.0.1
ftp://zdftp.zdnet.com/pub/private/s...ng/wordrecv.zip


ÈÑÇãÌ ÕíÇäÉ
ãÓÑÚ ááÃáÚÇÈ ÏÇÎá ÇáßãÈíæÊÑ æåæ ÈÑäÇãÌ Úãáí ÌÏÇð
SciTech Display Doctor
ftp://ftp.scitechsoft.com/sdd/sdd653.exe
Name: CoKeBoTtLe99 R/ 20000-529D848E-00000


åÐÇ ÇáÈÑäÇãÌ íÚØí ÊÞÑíÑÇð ãÝÕáÇð Úä ÞØÚ ÇáßãÈíæÊÑ æÃÏÇÄåÇ áãÚÑÝÉ Ãíä ÇáÚØá ÈÇáÊÍÏíÏ
SiSoft Sandra 2001se Pro
http://213.93.58.90/kekforce/downloadz/fo-s01se.zip


åÐÇ ÇáÈÑäÇãÌ íÝÍÕ äæÚ ßãÈíæÊÑß æíÚØíß ÓÑÚÊå ÇáÍÞíÞíÉ
ShowMHZ
http://65.108.63.78/abuturky/showmhz.exe


ÇäÓÎ ãáÝÇÊ äÙÇã ÇáæíäÏæÒ ááÞÑÕ æÃÖÝ Åáíå åÐå ÇáãáÝÇÊ ÈÚÏ Ýß ÖÛØåÇ æÅÊÑß ÇáÈÇÞí Úáíå ÅÐ íÚÑÝ ÇáÓíÏí æãä Ëã íÞæã ÈÅäÒÇá ÇáæíäÏæÒ ãÈÇÔÑÉ æÈÏæä æÞÝÉ
Starter
http://65.108.63.78/abuturky/starter.zip


åÐÇ ÇáÈÑäÇãÌ áÊÕÝÍ ÇáÑíÌíÓÊÑí
StartEd 3.80
ftp://ftp.uni-hamburg.de/pub/os/win...til/started.zip


åÐÇ ÇáÈÑäÇãÌ áÕíÇäÉ ÇáÑíÌíÓÊÑí
RegCleaner v3.4
http://www.vtoy.fi/jv16/RegCleaner.exe


ßËíÑÇð ãÇ íÊáÝ ÓíÏí ãåã ÈÓÈÈ Ãæ ÈÂÎÑ æíßæä Úáíå ãáÝÇÊ ãåãÉ åÐÇ ÇáÈÑäÇãÌ áÅäÞÇÐ ÇáãáÝÇÊ
CDR-Diagnostic 1.6.4
http://www.cdrom-prod.com/pub/cdrdiag.exe


äÝÓ ÇáÈÑäÇãÌ ÇáÓÇÈÞ áßí íäÞÐ ÇáãáÝÇÊ ãä ÇáÓíÏí ÇáÊÇáÝ
BadCopy 99 v2.0
http://www.jufsoft.com/download/bcopy99v2.exe
Name: Dhafer Al-holaisi s/n: 405419


ÈÑäÇãÌ áÕíÇäÉ ßÇÝÉ ÃÌÒÇÁ ÇáßãÈíæÊÑ æíÌÚá ÇáÈÑÇãÌ ÊÚãá ÈÔßá ÃÓÑÚ áÇ ÊÓÊåÇä ÈÞæÉ åÐÇ ÇáÈÑäÇãÌ
System Mechanic v3.6e
ftp://ftp1.iolohost.com/system_mechanic.exe
Name: Abuturky s/n: 83866-ST954-0776755445


ÈÑäÇãÌ áÊÓÑíÚ ÃÏÇÁ ÇáæíäÏæÒ ÈÔßá ÚÇã æÊÓÑíÚ Úãá ÇáãáÍÞÇÊ
Power Tools v2.85
http://www.dmisoftware.com/drptools.exe
s/n: b87d789wnfijwefh87eyf87h


íÚÑÖ áß ÃäæÇÚ ÇáÞØÚ ÇáãæÌæÏÉ Ýí ÌåÇÒß ÈÇáÅÖÇÝÉ Åáì ÏÑÌÉ ÍÑÇÑÉ ÇáãÚÇáÌ æÇáÐÇßÑÉ ÇáãÄÞÊå
CPUCooL v6.2.2
http://65.108.63.78/abuturky/CPUcool622.zip
s/n: 10983040


ÊÓÑíÚ ÌåÇÒ ÇáßãÈíæÊÑ ÈãÚÇáÌÉ æÊÑÊíÈ ÐÇßÑÉ ÇáßÇÔ Åäå ÈÑäÇãÌ Úãáí æãÝíÏ
Cacheman 5.0
http://65.108.63.78/abuturky/cachem50.exe
s/n: 322_11_222_9


íäÙÝ åÐÇ ÇáÈÑäÇãÌ ÇáåÇÑÏ ãä ÇáãáÝÇÊ ÇáãåãáÉ æíÞæã ÈÅÒÇáÉ ÇáÈÑÇãÌ ÇáÚÇáÞÉ ÇáÊí áíÓ ÈåÇ ÎÇÕíÉ UnInstall ÇáÍÐÝ Ãí ÇáÊí áíÓ ãÚåÇ ÈÑäÇãÌ
Norton CleanSweep
http://soft.hardware.ru/files/ncs2001.zip


åÐÇ ÇáÈÑäÇãÌ íäÙã Úãá ÇáÐÇßÑÉ æíÏíÑåÇ æíÈíä ßã ÅÓÊÎÏãÊ ãäåÇ æåæ ãÝíÏ
RAM Idle SE v2.6
http://www.simtel.net/pub/simtelnet...il/ramidl26.zip


íÞæã åÐÇ ÇáÈÑäÇãÌ ÈÇáÊÎÝíÝ Úä ÇáÐÇßÑÉ ÈÇáÊÞáíá ãä ÍãæáÊåÇ ßãÇ ÊÓÊØíÚ Úãá Ðáß ÈäÝÓß Ãæ ÊÊÑßå ááÈÑäÇãÌ áíÞæã ÈåÐÇ ÇáÚãá ããÇ íÄÏí Åáì ÃÏÇÁ ããÊÇÒ ááÌåÇÒ
FreeMem Professional
ftp://zdftp.zdnet.com/pub/private/s...es/fremem32.zip
s/n: 235612617935


ÊäÙíã Úãá ÇáÐÇßÑÉ æÅäÞÇÐåÇ ÞÈá Ãä ÊãÊáÆ ÊãÇãÇð æÊÄÏí Åáì ÚãáíÇÊ ããäæÚÉ
MemWatcher v3.0.2
http://65.108.63.78/abuturky/mw302.zip


Ýí ßËíÑ ãä ÇáÃÍíÇä æÚäÏ ÅÛáÇÞ ÈÑäÇãÌ ãÇ ÝÅäå íÈÞì ÚÇáÞÇð Ýí ÇáÐÇßÑÉ ããÇ íÄÏí Åáì ÊÒÇÍã æÅÈØÇÁ ÃÏÇÁ æÚãá ÇáÌåÇÒ æÇáÍá åæ åÐÇ ÇáÈÑäÇãÌ ääÕÍ Èå ÈÔÏÉ
Memory Cleaner v2.4.02
http://65.108.63.78/abuturky/memclnr.zip


åÐÇ ÇáÈÑäÇãÌ íÚØíß ÊÞÑíÑÇð ßÇãáÇð æãÝÕáÇð Úä ßá ÔÆ Ýí ÇáßãÈíæÊÑ
Sys check
http://65.108.63.78/abuturky/syscheck.exe


åÐÇ ÇáÈÑäÇãÌ íÞæã ÈÝÍÕ ÇáãáÝÇÊ ÇáãæÌæÏÉ Ýí ãÌáÏ ÇáäÙÇã áÏíß æíÞæã ÈÝÑÒ ÇáãáÝÇÊ ÇáÊí áã íÚÏ áåÇ Úãá äåÇÆíÇð æãä Ëã íÞæã ÈÍÐÝåÇ æáßä ÈÚÏ ÓÄÇáß æÃÎÐ ÅÐäß ØÈÚÇð
Clean System Directory
http://www.ozemail.com.au/~kevsol/clnsysdr.zip


ÈÑäÇãÌ áÊÞÓíã ÇáåÇÑÏ æÊÌÒÆÊå ãä ÔÑßæ æíÓÊÑä ÏíÌíÊÇá æåæ ÇáäÓÎÉ ÇáÍÏíËÉ ãäå ÊÚãá ãÚ æíäÏæÒ ãåãÇ ßÇäÊ äÓÎÊå
EZ-drive
http://65.108.63.78/abuturky/EZ9.zip


ÈÑäÇãÌ áÊÍÑíÑ ÇáÕÝÍÇÊ æÈå ÞæÇáÈ ÌÇåÒÉ íÏÚã ÇáÌÇÝÇ
PageBuilder v 3.0c
http://www.tafweb.force9.co.uk/download/pbldr_30.zip
ßÑÇß:http://65.108.63.78/abuturky/cr-pb30c.zip


íÏÚã ÇááÛÉ ÇáÚÑÈíÉ æÇáÌÇÝÇæÃäÕÍ Èå ÈÔÏÉ
Aceexpert v3.02i
ftp://zdftp.zdnet.com/pub/private/s...ls/acexpert.exe
Name: C0Ke2000 s/n: E8VN-2Z3Q-PWZC-LHN1


æåæ ÈÑäÇãÌ ááÊÕãíã ÇáÓÑíÚ æíÏÚã ÇáÌÇÝÇ ßãÇ Ãäå íÍæí Úáì ãÊÕÝÍ ÏÇÎáí
Alex's HTML Editor v1.1
ftp://zdftp.zdnet.com/pub/private/s...ls/alexhtml.zip


ÃíÖÇ ãÍÑÑ ÕÝÍÇÊ ÓÑíÚ æÚãáí æíÏÚã ÇááÛÉ ÇáÚÑÈíÉ
HomeSite v4.52
http://www.l0tek.com/downloads/fo-h452.zip
s/n: HS45EE-5030480010


ãÍÑÑ áßÊÇÈÉ ãáÝÇÊ ÇáÓí Ìí Ãí ÇáÊí íãßä Ãä ÊÞæã ãä ÎáÇáåÇ ÈÈÑãÌÉ ÇáÚÏíÏ ãä ÇáÃãæÑ ÇáãÈåãÉ ãËá ÏÝÊÑ ÇáÒæÇÑ æÇáãäÊÏíÇÊ ÇáÍæÇÑíÉ
Perl Code Editor
http://aloud.virtualave.net/software/PerlCodeEditor.zip


ÊÓÊØíÚ ÈæÇÓØÉ åÐÇ ÇáÈÑäÇãÌ ÅäÔÇÁ ãÇ íÓãì ÇáãÓÇÚÏÉ áÈÑäÇãÌ ãÇ Úä ØÑíÞ ÕÝÍÇÊ ÇáæÈ
Microsoft HTML Help
http://msdn.microsoft.com/library/t...hp/htmlhelp.EXE


ÈÑäÇãÌ ÊÑíÑ ÕÝÍÇÊ ÇáÅäÊÑäÊ ÈÇáÅÖÇÝÉ Åáì æÌæÏ ÞæÇáÈ ÌÇÝÇ ÌÇåÒÉ ÝÞØ ÑßÈ
Webford v2.1
http://65.108.63.78/abuturky/webford.zip


áÊÕãíã ÇáÃÒÑÇÑ ÈáÛÉ ÇáÌÇÝÇ ãÚ ÅÚØÇÆåÇ ÌãíÚ ÃäæÇÚ ÇáÊÃËíÑÇÊ
JavaScript Buttons
http://www.lonewolf.gr/apps/jsbp.zip


áÊÕãíã ÇáÞæÇÆã ÈáÛÉ ÇáÌÇÝÇ
JavaScript Menu
http://www.lonewolf.gr/apps/jmenu.zip


ÊÕãíã ÃÒÑÇÑ ÇáÌÇÝÇ ÇáÐåÈíÉ
Applet Button Factory v5.0
ftp://ftp.blackdomino.com/pub/applet50.exe
ßÑÇß:http://krack.tzo.com/crack/abf50.zip
Name: 12aew s/n: 9j8f5


ÊÕãíã ÃÒÑÇÑ æÚäÇæíä áÕÝÍÇÊ ÇáæíÈ
WebStyle1.2
ftp://onyx.xara.net/pub/xaraltd/style110.exe
ßÑÇß:http://65.108.63.78/abuturky/webstyle12.zip


HTML Java Visual basic ãÍÑÑ ÕÝÍÇÊ
Scribbler 2000 v1.9.1
http://www.creamsoft.com/download/scribbler.zip
Name: DSCeNe 2000 Code: 0dE98202555f2454


ÈÑÇãÌ ãÍÇÏËÉ
Åäå ÈÑäÇãÌ ãÍÇÏËÉ Ìãíá ÌÏÇð íÊãíÒ ÈæÌæÏ ÕæÑ ãÚÈÑÉ Úä ßá ÌãáÉ ãä ÇáÌãá
Microsoft Chat 2.5A
http://www.anti-leech.com/antileech...:microsoft_chat


ÈÑäÇãÌ ãÍÇÏËÉ Ðßí íÌÈ Ãä ÊÌÑÈå áßí ÊÑì ÈÃäå áíÓ ÖÑæÑí Ãä Êßä ãÔÊÑßÇð áÊÊÍÏË
AOL Messenger
http://www.anti-leech.com/antileech...0:aol_messenger


ÊÓÊØíÚ Ãä ÊÊÍÇæÑ ãä ÒæÇÑ ÇáæÞÚ ÇáÐí ÃäÊ Ýíå ÇáÂä Ãí ÇáÐíä íÔáÑßæäß ÈÊÕÝÍ ãæÞÚ ãÇ æáßä ãÔßáÊå ÈÃäå íÌÈ Ãä íßæä åÐÇ ÇáÈÑäÇãÌ ãæÌæÏ áÏì ÌãíÚ ÇáãÊÍÏËíä
Gooey 2
http://www.anti-leech.com/antileech.cgi?sali90:gooey_2


ÈÑäÇãÌ áÊÈÇÏá ÇáãáÝÇÊ æÇáãÍÇæÑÉ ÈÇáßÊÇÈæ æÇáÕæÊ æÇáÕæÑÉ
Messenger
ftp://ftp.uni-stuttgart.de/pub/syst...t/messenger.zip


æåæ ÈÑäÇãÌ ÑÇÆÚ ááãÍÇÏËÉ æíÚÊãÏ Úáì ÍÓÇÈ ÇáåæÊãíá
MSN Messenger v3.5
http://65.108.63.78/abuturky/mmssetup.exe


ÈÑäÇãÌ ááÏÑÏÔÉ ÈÇááÛÉ ÇáÚÑÈíÉ
Odigo Messenger v2.5
http://www.odigo.com/download/odigo25b_smart.exe


äÝÓ ÇáÈÑäÇãÌ ÇáÓÇÈÞ æáßä åÐå ÇáäÓÎÉ ÇáÅäßáíÒíÉ ÝÞØ
Odigo Messenger v3.0
http://www.odigo.com/30/odigo3b_537eng.exe


åÇÊÝ ÃäíÞ ááÅÊÕÇá ÚÈÑ ÇáÅäÊÑäÊ æáßä áíÓ ãÚ åÇÊÝ ÅäãÇ ãÚ ØÑÝ ÂÎÑ ÚäÏå äÝÓ ÇáÈÑäÇãÌ
MediaRing Talk
http://a160.g.akamaitech.net/7/160/...RTALK-SETUP.EXE


ÈÑäÇãÌ ÌíÏ ááãÍÇÏËÉ íÌÈ Ãä ÊÝÊÍ ÍÓÇÈ ÚäÏåã ÃíÖÇ
Get Firtalk
http://multitude-svca.www.conxion.c...etalk_setup.exe/


ááãÍÇÏËÉ ÈÇáÕæÊ æÇáßáÇã
PalTalk v3.5
http://216.74.151.142/download/0.x/pal_install.exe


ÈÑäÇãÌ ÏÑÏÔÉ Úãáí æÕÛíÑ æÈÓíØ ÌÏÇð
Fun Chat v2.0
http://www.softseek.com/cgi-bin/dow...ck/pkd-fc2i.zip


ÈÑäÇãÌ ßÇãá ÇáæÙÇÆÝ ááãÍÇÏËÉ æÇáÏÑÏÔÉ
CheetaChat v6.3.22
ftp://ftp.zdnet.com/pub/private/sWl...rc/cchatful.exe


ãÍÇÏËÉ ÕæÊ æÕæÑÉ æßÇãíÑÇ æíÈ
Iris Phone v3.0
http://irisphone.com/demo/iris_30.exe
ßÑÇß:http://www.wtcracks.com/dl/i/irisphon.zip
sn/ #93763176421934759356482953


ááÊÍÏË ãÚ ÃßËÑ ãä æÇÍÏ Ãæ ãÚ ÌãÇÚÉ
HearMe VoiceContact v2.0
http://download.hearme.com/HearMeVC2Setup.exe


ÈÑÇãÌ ÎÏãÉ ãáÝÇÊ
áÊÌÒÆÉ ÇáãáÝ Åáì ãáÝÇÊ ÕÛíÑÉ ÈÅãßÇäß æÖÚåÇ Úáì ÇáÞÑÕ ÇáãÑä æåæ ãÝíÏ ÌÏÇð Ýí ÍÇá Åäß ÊÚãá ãÚ ÇáãáÝÇÊ ÇáßÈíÑÉ ÇáÍÌã æáÇ ÊÓÊØíÚ æÖÚåÇ Úáì ÞÑÕ ãÑä
Part it 2.03
http://www.skylarkutilities.com/download/part-it.zip
ßÑÇß:http://202.103.100.253/hambo/others3/cr-pa203.zip
name :dhafer s/n: PRT-F1B9A337-65C06874-6


ÃíÖÇð ÈÑäÇãÌ áÊÞØíÚ ÇáãáÝÇÊ æáßäå íÊãíÒ Úä ÓÇÈÞå ÈÃäå áÇ íÑíÏ ÇáÈÑäÇãÌ äÝÓå áÊÌãíÚ åÐå ÇáãáÝÇÊ æÅäãÇ íßÝí äÙÇã ÇáæíäÏæÒ áÊÑßíÈåã
1ToX File Spliter v2.57
http://j.piquemal.free.fr/1tox.zip
Name: dusko FirstName: nadia s/n:3684123256


ÈÑäÇãÌ ãÊÎÕÕ æßÇãá ãåãÊå ÊÌÒÆÉ ÇáãáÝÇÊ ÇáßÈíÑÉ æíÞÓãåÇ Åáì ÃÞÓÇã ÊÊäÇÓÈ ãÚ ÇáãßÇä ÇáÊí ÓæÝ ÊæÖÚ Ýíå ãËáÇð ÞÑÕ ãÑä Ãæ ÈÑíÏ ÅáßÊÑæäí
KW_Split'Em v1.5
http://www.knowware-soft.com/freeware/kw_splitem.exe


íÞÓã ÇáãáÝÇÊ ÇáßÈíÑÉ Åáì ÕÛíÑÉ æíÔßá ãáÝ ÊØÈíÞí áßí íÌãÚåã Ýí ãßÇä ÂÎÑ
File Split PRO V4.6
http://65.108.63.78/abuturky/fspro46.zip
s/n: F863-1300-2390-EXJW-017-FY


áÊÓåíá ÇáÊÚÇãá ãÚ ÇáãáÝÇÊ ÈÔßá ÚÇã
shellgem v 1.36
ftp://zdftp.zdnet.com/pub/private/s...es/shellgem.zip


ßËíÑÇð ãä ÇáÃÍíÇä ãÇ äÞæã ÈÍÐÝ ãáÝÇÊ Åáì ÇáÓáÉ æäÝÑÛ ÇáÓáÉ æÝíãÇ ÈÚÏ äßÊÔÝ ÈÃä åÐå ÇáãáÝÇÊ ãåãÉ ÌÏÇð æáÇ äÓÊØíÚ ÅÑÌÇÚåã ÅáÇ ÈæÇÓØÉ åÐÇ ÇáÈÑäÇãÌ
R4A v1.04
http://65.108.63.78/abuturky/r4a104.zip
Name: Mr_GReeN [WkT!] s/n: MW3XPC85TE3J


ÈÑäÇãÌ íÊíÍ áß ÇáÇÊÕÇá åÇÊÝíÇ Èãä ÊÔÇÁ Úä ØÑíÞ ÇáÅäÊÑäÊ
Free World Dialup
http://www.pulver.com/fwd/


ÇÊÕÇá ÈÇáåÇÊÝ Úä ØÑíÞ ÇáÅäÊÑäÊ
WinPhone
http://www.prog.arch.unige.it/~aodd...hone/Wphone.htm


ÇÊÕÇá ÈÇáåÇÊÝ Úä ØÑíÞ ÇáÅäÊÑäÊ
Really Easy Voice
ftp://download.really-easy.com/pub/revsetup.exe


áÅÙåÇÑ ÑÞã åÇÊÝ ÇáÐí ÇÊÕá Èß ÅÐÇ ßäÊ ãÔÊÑß ÈåÐå ÇáãíÒÉ æåæ ÝÚÇá ÌÏÇð
Call Display v1.0
http://members.tripod.com/get2him/calldisp.exe


ÊÓÊØíÚ Ãä ÊÊÕá ÈÃí åÇÊÝ Ãæ ßãÈíæÊÑ Ýí ÇáÚÇáã Úä ØÑíÞ ÇáÅäÊÑäÊ æáÇ ÊÍÊÇÌ ÅáÇ áßÑÊ ÇáÝÇßÓ æÇáãÇíßÑæÝæä æáÇ ÊÍÓÈ áß Óæì ÏÞÇÆÞ ÅäÊÑäÊ
PhoneFree v6.0
http://phonefree.interactive.net/Ph...etup_6_2_22.exe


ÃíÖÇð ãËá ÓÇÈÞå ãÌÇäÇð æááÅÊÕÇá ÈÃí ÏæáÉ Ýí ÇáÚÇáã
HATF Telephone Software
http://www.hatf.com/Download/HATFTelephone.exe


ááÊÍË ãÚ ÇáÚÇáã ÇáÎÇÑÌí ÚÈÑ ÇáÅäÊÑäÊ
Internet phone
http://www.pt.lu/comnet/files/comms/iphone5.exe
sn/ V1Q7-SC97-NNNN-1X-0000-3BFF/A2BE


ÃíÖÇð ÈÄäÇãÌ ááÅÊÕÇá ãä ÌåÇÒ ÇáßãÈíæÊÑ Åáì Ãí åÇÊÝ ÚÈÑ ÇáÅäÊÑäÊ æåæ ãÌÇäí ÃíÖÇð
PC-to-Phone v2.1
ftp://194.165.206.9/pub/PC-to-Phone.exe


ÈÑäÇãÌ ãÊßÇãá áÅÏÇÑÉ ÇáÝÇßÓ æåæ ÈÑäÇãÌ ÊÎÕÕí æÔÇãá áßá ÇáæÙÇÆÝ
WinFax Pro v10.0
http://212.252.113.91/yardimci/wnfaxpro.exe
sn/231-6736-472-2928
ßÑÇß:http://65.108.63.78/abuturky/winfaxpro10.zip


ÈÑäÇãÌ áÅÑÓÇá æÇÓÊÞÈÇá ÇáÝÇßÓÇÊ
Just The Fax v2.9y
http://ourworld.cs.com/rkssoft1/jtf32.exe
Name: Dhafer s/n: RKS-2600724


ÈÑäÇãÌ ÔÈíå áÓÇÈÞÉ æåæ áÅÑÓÇá æÇÓÊÞÈÇá ÇáÝÇßÓ
MightyFax v2.9y
http://ourworld.cs.com/rkssoft1/mf32.exe
Name: TEAM DiSTiNCT s/n: RKS-5525013


æåÐÇ ÇáÈÑäÇãÌ áæÕá ÌåÇÒíä ãÚ ÈÚÖåã áÊÈÇÏá ÇáãáÝÇÊ ÝíãÇ Èíäåã
Zow v3.1
http://65.108.63.78/abuturky/zow310.exe


ÈÑÇãÌ ÇáÕæÊ æÇáÕæÑÉ
ÈÑäÇãÌ ãÔåæÑ ÌÏÇð áÞÑÇÁÉ ÇáãáÝÇÊ ÇáÕæÊíÉ ãä ÇáÅäÊÑäÊ æåæ ãåã ÌÏÇð æÛäí Úä ÇáÊÚÑíÝ
RealPlayer Plus8
http://www.anti-leech.com/antileech...90:real_player8
sn/ 1016-10-1160


ÈÑäÇãÌ ÌíÏ ÌÏÇð ÅÐ íÏÚã ÇáßËíÑ ãä ÇááæÇÍÞ ÍÊì ÇáÊí íÏÚãåÇ ÓÇÈÞå æÐæ æÇÌåÉ ÌãíáÉ ßãÇ íÊãíÒ æíÚØíåÇ ÑæäÞÇð ÎÇÕÇð ãÚ ÊÍßã æÇÓÚ ÈãæÌÇÊ ÇáÕæÊ æíÔÛá ÝíÏíæ ÃíÖÇðMp3 ÈÞÑÇÁÉ ãáÝÇÊ
JetAudio 4.8
http://www.anti-leech.com/antileech...i90:jetaudio4.8


ÈÑäÇãÌ ÊÔÛíá ÇáÝíÏíæ ÇáããÊÇÒ æÈÇáäÓÈÉ áäÇ åæ ÃÝÖá ÈÑäÇãÌ ÊÔÛíá ÝíÏíæ Úáì ÇáÅØáÇÞ ßãÇ Ãäå íÏÚã áæÇÍÞ ÕæÊíÉ ÃíÖÇð ÈÇáÅÖÇÝÉ Åáì ãíÒÊå ÇáãÔåæÑÉ ÈÃÎÐ áÞØÉ ãä ÇáÝáã Åáì ÕæÑÉ
Xing Player3.30
http://www.anti-leech.com/antileech...90:xing_player3


RealProducer Plus G2
http://www.anti-leech.com/antileech...:real_producer8
sn/ 212-08806-1648


Real Player íÞæã ÈÇáÊÍæíá ãä ßÇÝÉ ÇááæÇÍÞ ÇáÕæÊíÉ æÇáÕæÑíÉ Åáì ãáÝÇÊ Çá
Real Juke Box V2
http://www.anti-leech.com/antileech...0:real_jukebox8
sn/ 352-88760-1716


ÈÑäÇãÌ Ìãíá ÌÏÇð æåæ ÃíÖÇð Ûäí Úä ÇáÊÚÑíÝ íÊãíÒ ÈÓåæáÊå æÈÏÚãå ááßËíÑ ãä áæÇÍÞ ÇáãáÝÇÊ ÇáÕæÊíÉ ÇáßËíÑÉ
WinAmp Full v 2.75
http://download.nullsoft.com/winamp...amp275_full.exe


Mp3 áÊÍæíá ÇáãáÝÇÊ ÇáÕæÊíÉ ãåãÇ ßÇäÊ ÈãÇ Ýí Ðáß ãáÝÇ ÇáÓíÏí Åáì ááÇÍÞÉ
MpegDJ Encoder v1.98b
http://www.anti-leech.com/antileech..._encoder_v1.98b
ßÑÇß:http://www.anti-leech.com/antileech...encoder_v1.98bc


æåæ ãÝíÏ áÊÍæíá ÇáãáÝÇÊ Åáì äÛãÇÊ ãæÈÇíá Midi Åáì ãáÝÇÊ Wav åÐÇ ÇáÈÑäÇãÌ íÍæá ÇáãáÝÇÊ
Amidi 1.6
http://www.anti-leech.com/antileech.cgi?sali90:amidi16
ßÑÇß:http://www.anti-leech.com/antileech.cgi?sali90:amidi16c


æåæ ÈÑäÇãÌ ÖÎã ÌÏÇð æÞæí æãåãÊå ÑÄíÉ ÇáÃÝáÇã æÇáãáÝÇÊ æÇáÊáÝÒíæä ÇáãæÌæÏ Úáì ÇáÅäÊÑäÊ æåæ ãä ÔÑßÉ ÃÈá ãÇßíäÊæÔ æíãÊÇÒ Úä ÛíÑå ÈÓÑÚÊå ÇáÑåíÈÉ ÈÇáÊÍãíá ãä ÇáÅäÊÑäÊ
Quick Time5
http://www.anti-leech.com/antileech...li90:quicktime5
Name: microke Company: wamadhat
S/N : PMME-GGQM-EMRU-UPE3-5678


ãäå æÅáíå Real Player åæ ÈÑäÇãÌ ÊÍæíá æíÊãíÒ Úä ÛíÑå ÈÅãßÇäíÊå ÈäÍæíá ãáÝÇÊ
Streambox Ripper2009
http://www.anti-leech.com/antileech...0:streambox2009
ßÑÇß:http://www.anti-leech.com/antileech...ali90:sbox2009c


ÈÑÇãÌ áäÞá ãáÝÇÊ

áÊÚÏíá æÍÝÙ ÇáãáÝÇÊ ÈÔßá ÓÑíÚ æÈÏæä ÍÇÌÉ ááÈÑãÌÉ
SiteEZ v1.9
http://ftp.hyperpres.com/ftp/SiteEZ/setup.exe


áÊÍãíá æÍÝÙ ÇáãáÝÇÊ æäÞáåã Åáì ÇáÓíÑÝÑ æíãßäå ÇáãÊÇÈÚÉ ÈÇáÚãáíÉ ÅÐÇ ÅäÞØÚ ÇáÅÊÕÇá ÅÐÇ ßÇä ÇáÓíÑÝÑ íÏÚã åÐå ÇáãíÒÉ ÃáÇ æåí ãÊÇÈÚÉ ÇáÌáÓÉ ÈÚÏ ÇáÅäÞØÇÚ
FTP Voyager v8.0.0.2
http://davesworld.tucows.com/files/ftpvsetup.exe
ßÑÇß:http://65.108.63.78/abuturky/d-fv8001.zip


ÈÑäÇãÌ áäÞá ÇáãáÝÇÊ ãä æÅáì ÇáÓíÑÝÑ
LeapFTP v2.7.1
ftp://ftp1.enet.com.cn/pub/game/too...ork/lftp271.exe
Name: Dhafer Al-holaisi s/n: 214065-49410835290


ÇáÌãíÚ íÚãáæä ãÚ åÐÇ ÇáÈÑäÇãÌ áÈÓÇØÊå
AceFTP V 1.31
ftp://visicom.superb.net/aftp131.exe
Name: CZY s/n: 673JLA-VPAM85-FT74N7-L5643E


ÇáÈÑäÇãÌ ÇáÃÝÖá áÃäå íÍæí ÌãíÚ ÇáãíÒÇÊ ÇáßØáæÈÉ æåæ íÝíÏ ÇáÎÈÑÇÁ ääÕÍ Èå ÈÔÏÉ
WS_FTP Pro v7
http://65.108.63.78/abuturky/fo-wftp7.zip


áäÞá ÇáãáÝÇÊ Åáì ÇáÓíÑÝÑ Úáì ÇáÔÈßÉ ÈããíÒÇÊ åÇÆáÉ
3D-FTP 3.0 beta1
ftp://ftp.3dftp.com/pub/3dftp3b1.zip
s/n: 3D-A563E9-NL2Q72


ÈÑÇãÌ áÊÕãíã ÇáãæÇÞÚ

íÍÊæí Úáì ãæËÑÇÊ ÌÇÝÇ ÌÇåÒÉ
Applet FX Freeware v1.1
ftp://ftp.unina.it/pub/Pcibm/winsit...til/afxfe11.exe


ãÍÑÑ ÕÝÍÇÊ ÇáÅäÊÑäÊ ÇáãÔåæÑ æåæ ÇáÃÝÖá ÏÇÆãÇ ãä ÔÑßÉ ãÇíßÑæÓæÝÊ
FrontPage2000
ftp://gatekeeper.dec.com/pub/micro/...1stpage2000.exe
sn/ GC6J3-GTQ62-FP876-94FBR-D3DX8


ÈÑäÇãÌ áÊÍÑíÑ ÇáÕÝÍÇÊ æåæ ãÊßÇãá æáíÓ Èå Ãí ÚíÈ ßãÇ Åäå íÏÚã ÇáÚÑÈíÉ
DreamWaver4
http://a23.g.akamai.net/7/23/2740/0...weaver4TBYB.exe
ßÑÇß:http://202.103.100.253/newtrends/200012/tmgmdw40.zip
s/n: DWW400-03771-57289-73501


ÂáÉ ÍÇÓÈÉ ÚáãíÉ ãÊÎÕÕÉ
Calc98 v4.52
http://www.fdgroup.co.uk/neo/fsi/c9845w.exe


ÈÑäÇãÌ áßÔÝ ßáãÇÊ ÇáÓÑ ÇáÊí åí ÚÈÇÑÉ Úä äÌæã
Alhajisstars
http://65.108.63.78/abuturky/alhajisstars.exe


ÈÑäÇãÌ áäØÞ ÇáßáãÇÊ ÇáÊí ÊßÊÈåÇ ÈÚÏÉ ÃÕæÇÊ ÊÎÊÇÑåÇ æåæ ÈÑäÇãÌ ÑÇÆÚ ÌÏÇð
Talk
http://65.108.63.78/abuturky/talk.zip


áãÚÑÝÉ ÇáÊæÞíÊ ÇáÚÇáãí Ýí Ãí ãßÇä
ActiveEarth
http://www.cadi.com/AppZ/ActiveEarth.zip


æåæ áÅÖÇÝæ æÙÇÆÝ Úáì ÇáÃÒÑÇÑ Ýí áæÍÉ ÇáãÝÇÊíÍ
Hotkeys
ftp://zdftp.zdnet.com/pub/private/s...es/hotkey95.zip


åÐÇ ÇáÈÑäÇãÌ íÚØíß ÚÏÓÉ ÊÞæã ÈÊßÈíÑ ÌÒÁ ãä ÃÌÒÇÁ ÓØÍ ÇáãßÊÈ Åáì ãÖÇÚÝÇÊ ßËíÑÉ æÈÏÞÉ ÚÇáíÉ
Lens v1.31ftp://zdftp.zdnet.com/pub/private/sWlIB/utilities/desktop_accessories/lensmagn.exe


åÐÇ ÇáÈÑäÇãÌ íÞæã ÈÊÑÌãÉ ÇáÞæÇÆã ááÈÑÇãÌ ÇáÃÌäÈíÉ Åáì ÞæÇÆã ÚÑÈíÉ áßí íÓåá ÇáÚãá ãÚåÇ
RC-WinTrans v6.0
http://www.schaudin.com/data/rct60lit.exe


ãáÝÇÊ ãåãÉ áÊäÝíÐ ÈÑÇãÌ ÝíÌæÇá ÈíÓíß Úáì Ãí ÌåÇÒ áÇ íÍæí ÇáÝíÌæÇá ÈíÓíß Ýíå
VB6 Runtime Files
http://msvaus.www.conxion.com/downl.../vbrun60sp4.exe


ÃÝÖá ÈÑÇãÌ ÊÕãíã ÇáÎØæØ
ScanFont v313
ftp://zdftp.zdnet.com/pub/private/s...ools/scnfnt.zip
ßÑÇß:http://65.108.63.78/abuturky/scanfont313crk.zip


ãÔÛá ÃáÚÇÈ ÇáÓæäí ÈáÇí ÓÊÇíÔä ÇáÌÏíÏ æíÚãá Úáì ÇáÅäÊá
Bleem15b
http://www.anti-leech.com/antileech...90:bleem15intel
Intel


AMD ãÔÛá ÃáÚÇÈ ÇáÓæäí ÈáÇí ÓÊÇíÔä ÇáÌÏíÏ æíÚãá Úáì
Bleem15b
http://www.anti-leech.com/antileech...li90:bleem15amd


ÈÑäÇãÌ ÕÇäÚ ÇáÔÚÇÑÇÊ
LogoMaker
http://www.shahid.org.uk/Logos.zip


íãßäß ÒíÇÏÉ ÇáÕæÑ æÇáäÛãÇÊ ááÎáíæí Úä ØÑíÞ åÐÇ ÇáÈÑäÇãÌ æãä ããíÒÇÊå Ãäå íãßäß ãä ÓãÇÚ ÇáäÛãÉ ÞÈá ÊÍãíáåÇ æíÏÚã ÇáäÛãÇÊ ÇáØæíáÉ ÌÏÇð
LogoManager 1.2.3
http://mypage.ayna.com/alwahed2000/lm123.EXE
ßÑÇß:http://arabsgate.net/vb/attachment....p;postid=303718


áãä áã íÚÌÈå ÇáÈÑÇãÌ ÇáÓÇÈÞÉ Ýí ÊÔÛíá ÇáÓæäí ÈáÇí ÓÊÇíÔä
ps2
http://www.nease.net/~jack/ps/cvgs141.zip


áÊÚÑíÈ ÇáÈÑÇãÌ ÇáÛíÑ ãÚÑÈÉ
ResHack
http://www.arabsgate.com/cgi-bin/so...
_________________
Best Regards,
Mahmoud Hany,
Country: Egypt,
Title: IT instructor,
Mobile: 0106354485

View user's profile Send private message
blackwood
Kiddie
Kiddie


Joined: 21 Sep 2004
Posts: 22
Location: Egypt

PostPosted: Thu Nov 18, 2004 1:26 pm Post subject: Continue........... Reply with quoteBack to top
áÊÚÑíÈ ÇáÈÑÇãÌ ÇáÛíÑ ãÚÑÈÉ
ResHack
http://www.arabsgate.com/cgi-bin/so...jump.cgi?ID=333
ãáÝ ÇáÊÚÑíÈ:http://www.tietovayla.fi/dsp/ftp/tools/ResHack.zip


ÞÇÚÏÉ ÈíÇäÇÊ ÖÎãÉ ÊÍæí ÇáÂáÇÝ ãä ÇáÃÑÞÇã ÇáÊÓáÓáíÉ ááÈÑÇãÌ ÇáÚÏíÏÉ ÇáãæÌæÏÉ ääÕÍ Èå ÈÔÏÉ ÝÅÐÇ áã ÊÌÏ ÑÞã ÈÑäÇãÌ ãÇ ÝÅäß ÓæÝ ÊÌÏå åäÇ ÈÇáÅÖÇÝÉ Åáì Ãä Èå ãÍÑß ÈÍË Úä ÇáÃÑÞÇã ÇáÊÓáÓáíÉ æÇáÔæÇÑÎ Ýí ÇáÅäÊÑäÊ ßáåÇ ÅÐÇ áã ÊÌÏ ØáÈß Ýíå ÝæÑÇð
serial cracker
http://trustme.fateback.com/Sc380win.zip


ÈÑÇãÌ ÇÊÕÇáÇÊ
ÈÑäÇãÌ ÕÛíÑ áÅÑÓÇá æÅÓÊÞÈÇá ÇáÝÇßÓÇÊ ßãÇ Ãäå íÏÚã ÇááÛÉ ÇáÚÑÈíÉ ÊãÇãÇð æíæÌÏ Èå ãíÒÉ ÃÎÑì ÈÃäå íÓÊØíÚ ÅÑÓÇá ÝÇßÓÇÊ Åáì ÇáÈÑíÏ ÇáÅáßÊÑæäí
Fax2000
http://www.anti-leech.com/antileech.cgi?sali90:fax2000
sn/ J1018200381


ÈÑäÇãÌ ÑÇÆÚ ÌÏÇð æåæ íãßä ÇáãÓÊÎÏã ãä æÕá ÌåÇÒå ãÚ ÌåÇÒ ÂÎÑ Úáì Ãä íÊæÇÌÏ äÝÓ ÇáÈÑäÇãÌ ããÇ íãßä ãä ÌáÈ ÓØÍ ãßÊÈ ÇáßãÈíæÊÑ ÇáãÖíÝ Åáì ÌåÇÒß áÊÑì ÃÏÞ ÇáÊÝÇÕíá Çáããßäå Ýí ÇáÌåÇÒ ÇáãÖíÝ ßãÇ Ãäß ÊÓÊØíÚ ÇáæáæÌ Åáì ÔÈßÉ ÇáÅäÊÑäÊ ÅÐÇ ßÇä åÐÇ ÇáßãÈíæÊÑ ÇáãÖíÝ ÏÇÎá Åáì ÇááÅäÊÑäÊ ßãÇ ÈÅãßÇäß äÓÎ ÇáãáÝÇÊ æÅÚØÇÄå ãáÝÇÊ ÃÎÑì ÃËäÇÁ ÝÊÍ ÌáÓÉ Úãá ßãÇ ÈÅãßÇäß ÅäÔÇÁ ãÓÊÎÏãíä Ýí ÇáßãÈíæÊÑ ÇáãÖíÝ æÅÚØÇÆåã ÕáÇÍíÇÊ ßãÇ áæ Ãäß Ýí äÙÇã ÊãÇãÇð ÓÊÝÇÌà ÈÃäß ÚäÏ ÊÍÑíß ÇáãÇæÓ ãä ÌåÇÒß ÓæÝ ÊÊÍÑß äÝÓ ÇáÍÑßÉ Ýí ÇáßãÈíæÊÑ ÇáãÖíÝ NT æíäÏæÒ
LapLink2000
http://www.anti-leech.com/antileech...i90:laplink2000
sn/ L95-SSSS-994001-75B


æåæ ÈÑäÇãÌ Úãáí æÝÚÇá áÂáå ÇáÑÏ ÇáÊáÞÇÆí Úáì ÇáåÇÊÝ ßãÇ Ãäå íãßä Ãä íãíÒ ÕæÊ ÇáÝÇßÓ ÚäÏ ÝÊÍ ÇáÝÇßÓ ãä ÌåÉ ÇáÅÊÕÇá áßí íÍæá ÇáØáÈ Åáì ãÓÊáã ÇáÝÇßÓ Ãæ Ãí ÈÑäÇãÌ ÂÎÑ
Advanced Call Center
http://www.anti-leech.com/antileech...ced_call_center
ßÑÇß:http://www.anti-leech.com/antileech...ed_call_centerc


ÈÑäÇãÌ Úãáí áÅÑÓÇá æÅÓÊÞÈÇá ÇáÝÇßÓÇÊ íãßä Ãä íÊÔÇÑß ãÚ ÈÑÇãÌ ÃÎÑì ßÇáææÑÏ
MightyFax2.9Win98
http://www.anti-leech.com/antileech...ghtyfax_29win98
Name : wamadhat visitor Serial : RKS-7996413


ÈÑäÇãÌ íÓÇÚÏ Úáí ÇáßÊÇÈÉ ÈÇáÚÑÈíÉ Ýí ÇáÈÑÇãÌ ÇáÊí áÇíãßä ÇáßÊÇÈÉ ÈÇáÍÑæÝ ÇáÚÑÈíÉ ÈåÇ ãËá ÇáÝáÇÔ æÛíÑå æááÊÚÑÝ ÇßËÑ Úáì ããíÒÇÊ åÐÇ ÇáÈÑäÇãÌ æáãÒíÏ ãä ÇáÔÑÍ
http://www.geocities.com/cppnow/alwaseet.htm


Swish v1.51
ÈÑäÇãÌ ÑÓã ÌÏíÏ íäÇÝÓ ÈÑäÇãÌ ÇáÝáÇÔ æÊÓÊØíÚ ÇáÇØáÇÚ ÇßËÑ Úáì ããíÒÇÊ åÐÇ ÇáÈÑäÇãÌ æáãÒíÏ ãä ÇáÔÑÍ
http://www.noorah.com/surprise_may.html


RealPlayer 7 Plus
Ñíá ÈáíÑ ÇáÕÏÇÑ ÇáÓÇÈÚ ãä ÇÔåÑ ÇáÈÑÇãÌ ÇáãÓÊÎÏãÉ ÇáÊí ÊÊíÍ áß ãÔÇåÏÉ ÇáÕæÑ ÇáÊáÝÒíæäíÉ æßÐáß ÓãÇÚ ÇáÕæÊ ãä ÎáÇá ÇáÇäÊÑäÊ ÑÞã ÇáÊÓÌíá ÓæÝ ÊÌÏå ãÚ ÇáãáÝ æáãÒíÏ ãä ÇáÔÑÍ
http://www.muslm.net/vb/showthread.php3?threadid=4716


RealPlayer 8 Plus
äÓÎÉ ÌÏíÏÉ ãä åÐÇ ÇáÈÑäÇãÌ æåæ ãä ÇÔåÑ ÇáÈÑÇãÌ ÇáãÓÊÎÏãÉ ÇáÊí ÊÊíÍ áß ãÔÇåÏÉ ÇáÕæÑ ÇáÊáÝÒíæäíÉ æßÐáß ÓãÇÚ ÇáÕæÊ ãä ÎáÇá ÇáÇäÊÑäÊ æáãÒíÏ ãä ÇáÔÑÍ
http://www.ashya.net/learn/softlearn-realp.html


GoldWave 32-bit v4.21
ÈÑäÇãÌ ÌæáÏ æÇíÝ æåæ ÈÑäÇãÌ íÞæã ÈÚãá ÊÓÌíáÇÊ ÕæÊíå æÈÏÞÉ ããÊÇÒÉ æáãÚÑÝÉ ÇáãÒíÏ Úä åÐÇ ÇáÈÑäÇãÌ æáãÒíÏ ãä ÇáÔÑÍ
http://abomaged.virtualave.net/ubb/...TML/000005.html


Ulead MediaStudio Pro 6.0
ÊÍÑíÑ ÇáÝíÏíæÇáãÊÞÏã ÃÏÇÉ ÓåáÉ æÛíÑ ãÚÞÏÉ Êãßäß ãä Úãá ÚÑæÖ ÝíÏíæ ÕæÊ æÕæÑÉ Ýí ãäÊåì ÇáÞæÉ æÇáÌæÏÉ æáãÒíÏ ãä ÇáÔÑÍ
http://www.abobadr.net/3dsmax/bonus/mstudio6-1.htm


RealProducer Plus G2
åÐÇ ÇáÈÑäÇãÌ íÓÊÎÏã áÊÍæíá äÓÞ ÇáãáÝÇÊ ÇáÊÇáíÉ : AVI, MOV, QT, WAV, AU, MPG Åáì ãáÝÇÊ RealPlayer ÇáÕæÊíå Ãæ ÇáÝíÏíæíå¡ ßÐáß íãßä ÈæÇÓØÉ åÐÇ ÇáÈÑäÇãÌ Úãá ÕÝÍÇÊ æíÈ ÕæÊíÉ æÝíÏíæíÉ Èßá ÓåæáÉ æáãÒíÏ ãä ÇáÔÑÍ
http://www.geocities.com/sultan33a/prod.htm


SoundForge 4.5h
ÊÓÊØíÚ ÈæÇÓØÉ åÐÇ ÇáÈÑäÇãÌ ãä äÞá ÇáÕæÊ ãä ÇáßÇÓíÊ Çáì ÇáßãÈíæÊÑ æãä Ëã Çáì ÇáÇäÊÑäÊ æáãÒíÏ ãä ÇáÔÑÍ
http://www.al-atheer.com/vb/showthr...p?threadid=5170


Macromedia Dreamweaver 3
ãÕãã ÕÝÍÇÊ ããíÒ æÞæí æáãÒíÏ ãä ÇáÔÑÍ
http://www.saudint.com/dream/index.htm


Windows Media On-Demand Producer V4.0.0.85
ÈÑäÇãÌ áÊÍæíá ÕíÛ WAV æ AVI Åáì ÕíÛÉ ÃÎÑì áäÔÑåÇ Úáì ÇáæíÈ ÈÓÑÚÉ æÓåæáÉ æáãÒíÏ ãä ÇáÔÑÍ
http://www.masaher.org/vb/showthread.php?threadid=4230


Edit Plus 2.01b
ÈÑäÇãÌ ããÊÇÒ áÊÍÑíÑ ÇáäÕæÕ æÕÝÍÇÊ ÇáÇäÊÑäÊ æáãÒíÏ ãä ÇáÔÑÍ
http://www.masaher.org/vb/showthread.php?threadid=2569


FrontPage Xpress
ãÍÑÑ ÕÝÍÇÊ æíÈ íÏÚã ÇááÛÉ ÇáÚÑÈíÉ æáãÒíÏ ãä ÇáÔÑÍ
http://www.saqr.f2s.com/fpe.htm


Nero Burner 5.0.3.1
ÊÓÊØíÚ ÈåÐÇ ÇáÈÑäÇãÌ ÊÍæíá ãáÝÇÊ (MP3) Çáì ãáÝÇÊ (CDA) Ãí Çáì ÇÓØæÇäÇÊ ÓãÚíÉ íãßä ÊÔÛíáåÇ ÈãÔÛá ÇáÓí Ïí ÇáãæÌæÏ ÈÇáÓíÇÑÉ æáãÒíÏ ãä ÇáÔÑÍ
http://www.moltaqa.com/forums/showt...3?threadid=3673


Photo-Brush V1.3c
ÈÑäÇãÌ ÑÓæãí ããÊÇÒ æÑÇÆÚ íÓÇÚÏß Úáì æÖÚ áãÓÇÊ ÌãÇáíÉ Úáì ÇáÕæÑÉ æíÌÚáß ÊÊÍßã ÈåÇ ãä ÎáÇá ÇáÇÏæÇÊ ÇáãÊæÝÑÉ ãÚ ÇáÈÑäÇãÌ æíÊÚÇãá ãÚ ÇáäÕ ÇáÚÑÈí æáãÒíÏ ãä ÇáÔÑÍ
http://www.mediachance.com/pbrush/


PicaView v1.32
ÈÑäÇãÌ áÇÓÊÚÑÇÖ ÇáÕæÑ ÈÇáÖÛØ ÈÒ ÇáãÇæÓ ÇáÇíãä æáãÒíÏ ãä ÇáÔÑÍ
http://www.moltaqa.com/forums/showt...3?threadid=8195


ßíÝ ÊåíÁ ÌåÇÒß ááÇäÊÑäÊ
ßíÝ ÊÊÕÝÍ ÇáÇäÊÑäÊhttp://209.237.157.69/alshamlani/droos.htm


ÔÑÍ ßíÝíÉ ÃÚÏÇÏ ÈÑíÏ HOTMAIL Úáì ÈÑäÇãÌ ÇáÃæÊ áæß
http://www.omania.net/vip/ubb/Forum...27.html?3526757


ÔÑÍ ßíÝíÉ ÃÖÇÝÉ ÇáÚäÇæíä Çáì ÈÑíÏß
http://www.omania.net/vip/ubb/Forum...89.html?3421787


ÔÑÍ ØÑíÞÉ ÊÑßíÈ Çáubb
http://www.omania.net/vip/ubb/Forum4/HTML/001400.html


ßíÝíÉ ÇÓÊÎÏÇã ÇáãÇÓÍÉ
http://www.omania.net/vip/ubb/Forum...14.html?7387383


ßíÝíÉ ÃÑÓÇá ÑÓÇáÉ ÈåÇ ÕæÑÉ íÔÇåÏåÇ ÇáãÓÊÞÈá ÚäÏ ÝÊÍ ÇáÑÓÇáÉ
http://www.omania.net/vip/ubb/Forum...87.html?6613568


ÔÑÍ ßíÝ ÊÝÍÕ ÌåÇÒß ãä ÇáÝíÑæÓÇÊ Úä ØÑíÞ ÇáÃäÊÑäÊ
http://www.omania.net/vip/ubb/Forum...70.html?2718322


ÔÑÍ ßíÝíÉ ÇáÃÊÕÇá ãä ãæÞÚ hottelephone
http://www.omania.net/vip/ubb/Forum4/HTML/001691.html


ßíÝíÉ ÅÑÓÇá æÅÓÊÞÈÇá ÇáÝÇßÓ Úä ØÑíÞ ÌåÇÒ ÇáßãÈíæÊÑ
http://www.crosswinds.net/~abuzaben/droos/winfax.htm


ÈÑÇãÌ ÇäÊÑäíÊ

Åä åÐÇ ÇáÈÑäÇãÌ íÞæã ÈãÓÇÚÏÊß Ýí ÊÍãíá ÇáãáÝÇÊ ãä Úáì ÇáÔÈßÉ ÈØÑíÞÉ ÓÑíÚÉ æÂãäÉ ÍíË ÈÅãßÇäå ãÊÇÈÚÉ ÊäÒíá åÐÇ ÇáãáÝ ÅÐÇ ÞØÚ ÇáÅÊÕÇá ÈÏæä ÇáÚæÏÉ áÊÍãíáå ãä ÌÏíÏ æíãßä ÅÏÇÑÉ ÇáãáÝÇÊ ÇáæÇÌÈ ÊÍãíáåÇ ÈÏÇÎáå æíÛáÞ ÇáÌåÇÒ áæÍÏå ÈÚÏ ÇáÊßãíá Åä ÃÍÈÈÊ
GetRight (32-bit) v4.5
http://www.get-right.com/getrt450.exe
s/n: 146647922132

ÝíÑæÓÇÊ ÎØíÑÉ ÇÏÎá åäÇ ¡¡ æÑÈäÇ íÓÊÑ
http://aljar7.4t.com/virus.htm