Thursday, 04.18.2024, 8:24 AM

Ethical Hacking - By Chintan Gurjar

Site menu
Calendar
«  April 2024  »
SuMoTuWeThFrSa
 123456
78910111213
14151617181920
21222324252627
282930
Our poll
Rate my site
Total of answers: 171

Main » Entries archive

Ubuntu 10.10 Netbook Edition i386 (1xCD/2010) | 695 MB

Ubuntu Netbook Edition - a simple, safe and reliable way to use your laptop computer. Ubuntu Netbook gives you instant access to all the free applications that you need, wherever you are.

Costoyalsya long-awaited release a new version of the popular Linux distribution Ubuntu. In the first few hours, if not minutes, the network was filled with joyful messages with links for downloading images. T ... Read more »
Views: 1160 | Added by: handsome_devil | Date: 11.23.2010 | Comments (0)


Download Free C++ Books: C++: A Dialog: Programming with the C++ Standard Library


Prentice Hall PTR | August-30-2002 | ISBN: 0130094021 | 1122 pages | PDF | 2.5MB

Simply the best way for beginners to learn standard C++.

C++: A Dialog is the easiest, most effective way for beginners to learn C++ 
Views: 1404 | Added by: handsome_devil | Date: 11.22.2010 | Comments (0)


Download ASP.NET Cookbook: ASP.NET Book Free Download

O'Reilly Media; 1 edition | August 2004 | ISBN-10: 0596003781 | 650 pages | CHM | 2.1 MB

Developers who want to create dynamic, data-driven web sites running on Microsoft
... Read more »
Views: 1447 | Added by: handsome_devil | Date: 11.22.2010 | Comments (0)

Audacity :- 


Views: 1139 | Added by: handsome_devil | Date: 11.21.2010 | Comments (0)

Software Name :- Endpoint Protector

Features :- Prevent Malwares spreding from USB ports & other computer interface.



Views: 1121 | Added by: handsome_devil | Date: 11.20.2010 | Comments (0)



There are so many proxy websites but i personally found these sites are very fast and clean.

So use these websites to bypass the proxy and firewall.

Views: 1410 | Added by: handsome_devil | Date: 11.20.2010 | Comments (0)

As Per the innocent peoples are using internet hackers are always interested to do the social engineering on them.

so here i am going to tech you that how to be careful with the email shown below listed come to your Email ID.



Whenever You See All Below Shown Title In Your Email Id Delete Mail Immediately. 

Views: 845 | Added by: handsome_devil | Date: 11.19.2010 | Comments (0)

GFI Lan Guard 9.6 is the Network security software.It has many advance features.

The Features Are shown as below.

  1. Patches Detection
  2. Remediation for the top five Web browsers - Firefox,IE,Google Chrome,Opera,Safari
  3. Vulnerability Scanning
  4. Patches Management
  5. ... Read more »
Views: 850 | Added by: handsome_devil | Date: 11.19.2010 | Comments (0)


Cybercrime experts have found proof that China hijacked the Internet for 18 minutes last April. China absorbed 15% of the traffic from US military and civilian networks, as well as from other Western countries—a massive chunk. Nobody knows why.

On April 8, China Telecom's routers sent messages declaring that their network channels were the fastest available at that point. Since the traffic routing is based on trust between the world's telecommunication providers, other Internet routers redirected their traffic through China's network.

Security expert Dmitri Alperovit ... Read more »
Views: 829 | Added by: handsome_devil | Date: 11.18.2010 | Comments (0)


Hirens Boot CD v.12.0 RESTORED EditionEdition | 615 MB

Hiren's BootCD-an indispensable tool used by many computer technicians and system administrators. At one bootable CD assembled dozens of the most popular programs and utilities for running DOS. This is a utility for working with hard drive, its recovery and diagnostic tools diagnosis of all the computer nodes, file managers, utilities for the network, as well as many others. Hiren's BootCD eliminates the need to keep on hand dozen ... Read more »
Views: 1575 | Added by: handsome_devil | Date: 11.16.2010 | Comments (1)

« 1 2 ... 6 7 8 9 10 ... 12 13 »