Securing & Optimizing Linux: The Hacking Solution


Securing & Optimizing Linux: The Hacking Solution Securing & Optimizing Linux: The Hacking Solution by Gerhard Mourani By * Publisher: Open Network Architecture * Number Of Pages: 1208 * Publication Date: 2002-06-26 * Sales Rank: 1314966 * ISBN / ASIN: 0968879314 * EAN: 9780968879313 * Binding: Paperback * Manufacturer: Open Network Architecture * Studio: Open Network Architecture * Average Rating: 4 * Total Reviews: 3 Book Description: This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system administrators, managers, or Linux users who wish to protect their Linux systems from unauthorized intrusions and other external attacks. This new edition contains many tips and useful information related to security and optimization to help you get complete control of what could happen on your Linux server and network. The book provides through its 47 chapters, a comprehensive collection of Linux security products and explains in the most simple and structured manner how to safely and easily configure and run many popular Linux-based applications and services, including Exim, Qmail, Apache 2, DHCP, Anti-Virus, Anti-Spam, Anti-Relaying, ProFTPD, and many others. The author of the book relentlessy searches and document new hacking solutions to bring you in this manual the most up-to-date security developments. Date: 2006-10-07 Rating: 5 Review: great book on linux This is far the greatest linux book that I have read. I used this book for 4 yrs, eventhough i spill water on it, i did recover it and still used it. I hope GM can create a new book for the new linux distros like this. Date: 2004-08-25 Rating: 2 Review: Get a grammar checker The great content is marred by countless grammatical foibles which make the book nearly unreadable. Here's an example: "By default denying access to every one, is the first step of a reliable security policy. In this way we eliminate the possibility of forgetting someone or to making a mistake.

http://rapidshare.com/files/52756863/securing-optimizing-linux-the-hacking-solution.rar__1c59b56__via_gigapedia.info__.html


Password: gigapedia.org

[Image: untitledcopy-3.jpg]
The Unofficial Guide to Ethical Hacking Network Security: A Hacker's Perspective The Ethical Hacking Guide to Corporate Security Hacking Mobile Phones Email Hacking Windows Hacking Google Hacking Intrusion Alert
Encryption

http://depositfiles.com/files/iprn0omjq

http://letitbit.net/download/2954.2b610d7b30ba1e91ccefa4e38/Ankit_Fadia_Hacking_Book_Collections.exe.html

Mac OS X: The Complete Reference

[Image: oivyut.jpg]
On the surface, Mac OS X isn't all that different from Mac OS 9.1. Indeed, most users will be just as happy with the slightly older version of the Macintosh operating system as with version X. But for people who have longed for a more robust kernel with true preemptive multitasking, better graphics support, and a stronger suite of programming tools, Mac OS X is manna. Like too many other books that choose to focus on Mac OS X as just another Mac System for everyday home and office users, Mac OS X: The Complete Reference explores the new Mac OS in terms of its basic features before delving into its new architecture, server capabilities, and BSD Unix-derived features.
Feiler's coverage of the new features isn't terribly deep--readers might expect more from a "Complete Reference." In explaining the new low-level architecture of Mac OS X, for example, Feiler does a fine job of explaining that Mach manages system resources and that an implementation of BSD Unix handles tasks associated with networking, the filesystem, and threads of execution. Great, but there's nothing about configuring a machine at the BSD command line or the "Unix way" of thinking about hardware and settings. Read this book if you're a beginner or interested in a high-level guide to the new features, but look elsewhere for deep documentation. --David Wall
Topics covered: The features of Mac OS X, explained at a level suitable for everyday users, with some sections of interest to administrators and power users. Specialized sections address architectural fundamentals, hardware and software setup, networking, and programming with AppleScript, Carbon, and Cocoa.

download link.
:

http://rapidshare.com/files/251411440/Mac_OS_X_The_Complete_Reference.rar.




Or

http://www.mediafire.com/?jqk1imjyeyk

[Image: 2vtcoq9.jpg]

Michael Jackson – Tribute to a Legend
True PDF | 131 Pages | English | 17.5 MB



http://rapidshare.com/files/252717482/MJTTAL.rar

Computer Active - No.296 (25 june to 8 july 2009)

[Image: 34g0wgm.jpg]

Computer Active - No.296
PDF | 76 pages | 34.5 Mb | English



http://rapidshare.com/files/248598307/ca-295.rar

http://uploading.com/files/MA24HYNG/ca-295.rar.html

[Image: 2w2ld0m.jpg]
Book Description

Scott Mueller has gone where no computer book author has gone before right past all the warranty stickers, the hidden screws, and the fear factor to produce a real owner's manual that every laptop owner should have on his desk. Upgrading and Repairing Laptops, Second Edition shows the upgrades users can perform, the ones that are better left to the manufacturer, and how to use add-on peripherals to make the most of a laptop. This second edition has been updated to include:

* The latest processors and motherboards
* Complete assembly and disassembly information
* Updated memory standards
* Upgrading your hard drive to increase performance
* Changes in networking and firewalls

# 912 pages
# Publisher: Que; 2 edition (December 26, 2005)
# Language: English


http://rapidshare.com/files/84172090/Up_Lap.pdf.html
OR
http://uploading.com/files/VJNA8D38/Up_Lap.rar.html

contents of book

1. FREE FOOD
¥ Restaurants
¥ Food Programs
¥ Supermarkets
¥ Wholesale Markets
¥ Food Conspiracies
¥ Cheap Chow
2. FREE CLOTHING AND FURNITURE
¥ Free Clothing
¥ Sandals
¥ Free Furniture
3. FREE TRANSPORTATION
¥ Hitch-Hiking
¥ Freighting
¥ Cars
¥ Buses
¥ Airlines
¥ In City Travel
4. FREE LAND
5. FREE HOUSING
¥ Communes
¥ Urban Living
¥ Rural Living
¥ List of Communes
6. FREE EDUCATION
¥ List of Free Universities
7. FREE MEDICAL CARE
¥ Birth Control Clinics
¥ Abortions
¥ Diseases Treated Free
8. FREE COMMUNICATION
¥ Press Conference
¥ Wall Painting
¥ Use of the Flag
¥ Radio
¥ Free Telephones
¥ Pay Phones
9. FREE PLAY
¥ Movies and Concerts
¥ Records and Books
10. FREE MONEY
¥ Welfare
¥ Unemployment
¥ Panhandling
¥ Rip-Offs
¥ The International Yippie Currency Exchange
11. FREE DOPE
¥ Buying, Selling and Giving It Away
¥ Growing Your Own
12. ASSORTED FREEBIES
¥ Laundry
¥ Pets
¥ Posters
¥ Security
¥ Postage
¥ Maps
¥ Ministry
¥ Attrocities
¥ Veteran's Benefits
¥ Watch
¥ Vacations
¥ Drinks
¥ Burials
¥ Astrodome Pictures
¥ Diploma
¥ Toilets
FIGHT!
1. TELL IT ALL, BROTHERS AND SISTERS
¥ Starting a Printing Workshop
¥ Underground Newspapers
¥ High School Papers
¥ G.I. Papers
¥ News Services
¥ The Underground Press
¥ Switchboards
2. GUERRILLA BROADCASTING
¥ Guerrilla Radio
¥ Guerrilla Television
3. DEMONSTRATIONS
¥ Dress
¥ Helmets
¥ Gas Masks
¥ Walkie-Talkies
¥ Other Equipment
4. TRASHING
¥ Weapons for Street Fighting
¥ Knife Fighting
¥ Unarmed Defense
¥ General Strategy Rep
5. PEOPLE'S CHEMISTRY
¥ Stink Bomb
¥ Smoke Bomb
¥ CBW
¥ Molotov Cocktail
¥ Sterno Bomb
¥ Aerosol Bomb
¥ Pipe Bombs
¥ General Bomb Strategy
6. FIRST AID FOR STREET FIGHTERS
¥ What to Do
¥ Medical Committees
7. HIP-POCKET LAW
¥ Legal Advice
¥ Lawyer's Group
¥ Join the Army of Your Choice
¥ Canada, Sweden & Political Asylum
8. STEAL NOW, PAY NEVER
¥ Shoplifting
¥ Techniques
¥ On the Job
¥ Credit Cards
9. MONKEY WELFARE
10. PIECE NOW
¥ Handguns
¥ Rifles
¥ Shotguns
¥ Other Weapons
¥ Training
¥ Gun Laws
11. THE UNDERGROUND
¥ Identification Papers
¥ Communication
LIBERATE!
1. FUCK NEW YORK
2. FUCK CHICAGO
3. FUCK LOS ANGELES
4. FUCK SAN FRANCISCO

download
http://www.ziddu.com/download/5465964/Hackers_Survival_Guide.rtf.html


Course

Package Includes:
Featuring live instructor-led classroom sessions with full audio, video and demonstration components
Printable courseware
300+ Penetration Testing Review Questions
eWorkbook - 725 pages Student eWorkbook by Logical Security

Module 1
  • Ethical Hacking and Penetration Testing
  • Security 101
  • Hacking Hall of Fame
  • What are Today's hackers Like?
  • Today's Hackers
  • Risk Management
  • Evolution of Threats
  • Typical Vulnerability Life Cycle
  • What is Ethical Hacking?
  • Rise of the Ethical Hacker
  • Types of Security Test
  • Penetration Test (Pen-test)
  • Red Teams
  • Testing Methodology
  • VMWare Workstation
  • Windows and Linux Running VMWare
  • Linux Is a Must
  • Linux Survival Skills
  • Useful vi Editor Commands
  • Module 1 Review
Module 2
  • Footprinting and Reconnaissance
  • Desired Information
  • Find Information by the Target (Edgar)
  • terraserver.microsoft.com
  • Network Reconnaissance & DNS Search
  • Query Whois Databases
  • Command-Line Whois Searches
  • ARIN whois: Search IP Address Blocks
  • SamSpade Tool and Website
  • Internet Presence
  • Look Through Source Code
  • Mirror Website
  • Find Specific Types of Systems
  • Big Brother
  • AltaVista
  • Specific Data Being Available?
  • Anonymizers
  • Countermeasures to Information Leakage
  • Social Engineering
  • DNS Zone Transfer
  • Nslookup command-line utility
  • Zone Transfer from Linux
  • Automated Zone Transfers
  • Zone Transfer Countermeasures
  • www.CheckDNS.net
  • Tracing Out a Network Path
  • tracert Output
  • Free Tools
  • Paratrace
  • War Dialing for Hanging Modems
  • Manual and Automated War Dialing
  • Case Study
  • Guide Dogs for the Blind: Pairing blind people with Guide Dogs since 1942
  • Footprinting Countermeasures
  • Demo - Footprinting & Info Gathering
  • Module 2 Review
Module 3
  • TCP/IP Basics and Scanning
  • The OSI Model
  • TCP/IP Protocol Suite Layers
  • Encapsulation
  • Data-Link Protocols
  • IP - Internet Protocol, Datagram (Packet)
  • ICMP Packets
  • UDP – User Datagram Protocol
  • UDP Datagram
  • TCP – Transmission Control Protocol
  • TCP Segment
  • TCP/IP 3-Way Handshake and Flags
  • TCP and UDP Ports
  • Ping Sweeps
  • Good Old Ping, Nmap, TCP Ping Sweep
  • TCP Sweep Traffic Captured
  • Unix Pinging Utilities
  • Default TTLs
  • Pinging Countermeasures
  • Port Scanning
  • Nmap
  • Advanced Probing Techniques
  • Scanrand
  • Port Probing Countermeasures
  • Watch Your Own Ports
  • Demo - Scanning Tools
  • Module 3 Review
Module 4
  • Enumeration and Verification
  • Operating System Identification
  • Differences Between OS TCP/IP Stack
  • Nmap -O
  • Active vs Passive Fingerprinting
  • Xprobe/Xprobe2
  • Countermeasures
  • SNMP Overview
  • SNMP Enumeration
  • SMTP, Finger, and E-mail Aliases
  • Gleaning Information from SMTP
  • SMTP E-mail Alias Enumeration
  • SMTP Enumeration Countermeasures
  • CIFS/SMB
  • Attack Methodology
  • Find Domains and Computers
  • NetBIOS Data
  • NBTscan
  • NULL Session
  • Local and Domain Users
  • Find Shares with net view
  • enum: the All-in-one
  • Winfo and NTInfoScan (ntis.exe)
  • Digging in the Registry
  • NetBIOS Attack Summary
  • NetBIOS Countermeasures
  • What’s this SID Thing Anyway?
  • Common SIDs and RIDs
  • whoami
  • RestrictAnonymous
  • USER2SID/SID2USER
  • psgetsid.exe and UserDump Tool
  • LDAP and Active Directory
  • GUI Tools to Perform the Same Actions
  • Demo - Enumeration
  • Module 4 Review
Module 5
  • Hacking & Defending Wireless/Modems
  • Phone Numbers & Modem Background
  • Phone Reconnaissance
  • Modem Attacks
  • Wireless Reconnaissance
  • Wireless Background
  • Wireless Reconnaissance Continued
  • Wireless Sniffing
  • Cracking WEP Keys
  • Defending Wireless
  • Module 5 Review
Module 6
  • Hacking & Defending Web Servers
  • Web Servers in General: HTTP
  • Uniform Resource Locator: URL
  • Apache Web Server Functionality
  • Apache: Attacking Mis-configurations
  • Apache: Attacking Known Vulnerabilities
  • Defending Apache Web Server
  • Microsoft Internet Information Server (IIS)
  • IIS: Security Features
  • IIS: Attacking General Problems
  • IIS: IUSER or IWAM Level Access
  • IIS: Administrator or Sys Level Access
  • IIS: Clearing IIS Logs
  • IIS: Defending and Countermeasures
  • Web Server Vulnerability Scanners
  • Demo - Hacking Web Servers
  • Module 6 Review
Module 7
  • Hacking & Defending Web Applications
  • Background on Web Threat & Design
  • Basic Infrastructure Information
  • Information Leaks on Web Pages
  • Hacking over SSL
  • Use the Source, Luke…
  • Functional/Logic Testing
  • Attacking Authentication
  • Attacking Authorization
  • Debug Proxies: @stake webproxy
  • Input Validation Attacks
  • Attacking Session State
  • Attacking Web Clients
  • Cross-Site Scripting (XSS) Threats
  • Defending Web Applications
  • Module 7 Review
Module 8
  • Sniffers and Session Hijacking
  • Sniffers
  • Why Are Sniffers so Dangerous?
  • Collision & Broadcast Domains
  • VLANs and Layer-3 Segmentation
  • tcpdump & WinDump
  • Berkley Packet Filter (BPF)
  • Libpcap & WinPcap
  • BUTTSniffing Tool and dSniff
  • Ethereal
  • Mitigation of Sniffer Attacks
  • Antisniff
  • ARP Poisoning
  • MAC Flooding
  • DNS and IP Spoofing
  • Session Hijacking
  • Sequence Numbers
  • Hunt
  • Ettercap
  • Source Routing
  • Hijack Countermeasures
  • Demo - Sniffers
  • Module 8 Review
Module 9
  • Hacking & Defending Windows Systems
  • Physical Attacks
  • LANMan Hashes and Weaknesses
  • WinNT Hash and Weaknesses
  • Look for Guest, Temp, Joe Accounts
  • Direct Password Attacks
  • Before You Crack: Enum Tool
  • Finding More Account Information
  • Cracking Passwords
  • Grabbing the SAM
  • Crack the Obtained SAM
  • LSA Secrets and Trusts
  • Using the Newly Guessed Password
  • Bruteforcing Other Services
  • Operating System Attacks
  • Hiding Tracks: Clearing Logs
  • Hardening Windows Systems
  • Strong 3-Factor Authentication
  • Creating Strong Passwords
  • Authentication
  • Windows Account Lockouts
  • Auditing Passwords
  • File Permissions
  • Demo - Attacking Windows Systems
  • Module 9 Review
Module 10
  • Hacking & Defending Unix Systems
  • Physical Attacks on Linux
  • Password Cracking
  • Brute Force Password Attacks
  • Stack Operation
  • Race Condition Errors
  • Format String Errors
  • File System Attacks
  • Hiding Tracks
  • Single User Countermeasure
  • Strong Authentication
  • Single Sign-On Technologies
  • Account Lockouts
  • Shadow Password Files
  • Buffer Overflow Countermeasures
  • LPRng Countermeasures
  • Tight File Permissions
  • Hiding Tracks Countermeasures
  • Removing Unnecessary Applications
  • DoS Countermeasures
  • Hardening Scripts
  • Using SSH & VPNs to Prevent Sniffing
  • Demo - Attacking Unix Systems
  • Module 10 Review
Module 11
  • Rootkits, Backdoors, Trojans & Tunnels
  • Types Of Rootkits
  • A Look at LRK
  • Examples of Trojaned Files
  • Windows NT Rootkits
  • NT Rootkit
  • AFX Windows Rootkit 2003
  • Rootkit Prevention Unix
  • Rootkit Prevention Windows
  • netcat
  • netcat: Useful Unix Commands
  • netcat: What it Looks Like
  • VNC-Virtual Network Computing
  • Backdoor Defenses
  • Trojans
  • Back Orifice 2000
  • NetBus
  • SubSeven
  • Defenses to Trojans
  • Tunneling
  • Loki
  • Other Tunnels
  • Q-2.4 by Mixter
  • Starting Up Malicious Code
  • Defenses Against Tunnels
  • Manually Deleting Logs
  • Tools to Modify Logs
  • Demo - Trojans
  • Module 11 Review
Module 12
  • Denial of Service and Botnets
  • Denial-of-Service Attacks
  • CPUHog
  • Ping of Death
  • Teardrop Attacks
  • Jolt2
  • Smurf Attacks
  • SYN Attacks
  • UDP Floods
  • Distributed DoS
  • DDoS Tool: Trin00
  • Other DDoS Variation
  • History of Botnets
  • Anatomy of a Botnet
  • Some Common Bots
  • Demo - Denial of Service
  • Module 12 Review
Module 13
  • Automated Pen Testing Tools
  • General: Definitions
  • General:What?
  • General: Why?
  • Core Impact™ Framework
  • Core Impact™ Operation
  • Canvas™ Framework
  • Canvas™ Operation
  • Metasploit Framework
  • Metasploit Operation
  • Demo - Automated Pen Testing
  • Module 13 Review
Module 14
  • Intrusion Detection Systems
  • Types of IDSs
  • Network IDSs
  • Distributed IDSs (DIDSs)
  • Anomaly Detection
  • Signature Detection
  • Common IDS Software Products
  • Introduction to Snort
  • Attacking an IDS
  • Eluding Techniques
  • Testing an IDS
  • Hacking Tool - NIDSbench
  • Hacking Tool - Fragroute
  • Hacking Tool - SideStep
  • Hacking Tool - ADMmutate
  • Other IDS Evasion Tools
  • Demo - IDS and Snort
  • Module 14 Review
Module 15
  • Firewalls
  • Firewall Types
  • Application Layer Gateways
  • ALGs (Proxies)
  • Stateful Inspection Engine
  • Hybrid Firewall
  • Host-Based Firewall
  • Network-Based Firewall
  • DMZ (Demilitarized Zone)
  • Back-to-Back Firewalls
  • Bastion Hosts
  • Control Traffic Flow
  • Multiple DMZs
  • Controlling Traffic Flow
  • Why Do I Need a Firewall?
  • What Should I Filter?
  • Egress Filtering
  • Network Address Translation (NAT)
  • Firewall Vulnerabilities
  • IPTables/NetFilter
  • Default Tables and Chains
  • iptables Syntax 1
  • iptables Syntax 2
  • Sample IPTables Script 1
  • Sample IPTables Script 2
  • Persistent Firewalls
  • Firewall Identification
  • Firewalk
  • Tunneling with Loki
  • Tunneling with NetCat/CryptCat
  • Port Redirection with Fpipe
  • Denial-of-Service Attacks Risk?
  • Demo - Firewalls and IP Tables
  • Module 15 Review
Module 16
  • Honeypots and Honeynets
  • What Is a Honeypot?
  • Advantages and Disadvantages
  • Types and Categories of Honeypots
  • Honeypot: Tarpits
  • Honeypot: Kfsensor
  • Honeypot: Honeyd
  • Sample Honeyd Configuration
  • High-Interaction Honeypot
  • Project HoneyNet
  • Types of Honeynets
  • The Main Difference is Data Control
  • GEN II Data Control: Honeywall CD
  • Gen II Data Capture: Sebek & Sebek II
  • Automated Alerting
  • Testing
  • Legal Issues
  • Demo - Setting up a Honeypot
  • Module 16 Review
Module 17
  • Ethics and Legal Issues
  • The Costs
  • Relation to Ethical Hacking?
  • The Dual Nature of Tools
  • Good Instead of Evil?
  • Recognizing Trouble When It Happens
  • Emulating the Attack
  • Security Does Not Like Complexity
  • Proper and Ethical Disclosure
  • CERT’s Current Process
  • Full Disclosure Policy
  • Organization for Internet Safety (OIS)
  • What Should We Do from Here?
  • Legal Meets Information Systems
  • Addressing Individual Laws
  • 18 USC SECTION 1029
  • 18 USC SECTION 1030
  • 1030: Worms and Viruses
  • Blaster Worm Attacks
  • Civil vs. Criminal
  • 18 USC SECTIONS 2510 and 2701
  • Digital Millennium Copyright Act
  • Cyber Security Enhancement Act
  • Module 17 Review
  • Course Closure
  • Enjoy M8's
CD1.Ethical.Hacking.and.Penetration
CD2 Footprinting and Reconnaissance
CD3 TCP/IP Basics and Scanning
Code:
http://rapidshare.com/files/24321107/mod.3.part1.rar
Code:
http://rapidshare.com/files/24321109/mod.3.part2.rar
Code:
http://rapidshare.com/files/24339724/mod.3.part3.rar
CD4 Enumeration and Verification
Code:
http://rapidshare.com/files/25291513/module.4.part1.rar
Code:
http://rapidshare.com/files/25291516/module.4.part2.rar
Code:
http://rapidshare.com/files/25297786/module.4.part3.rar
Code:
http://rapidshare.com/files/25297787/module.4.part4.rar
CD5 Hacking & Defending Wireless/Modems
Code:
http://rapidshare.com/files/24480780/module_5.part1.rar
Code:
http://rapidshare.com/files/24480781/module_5.part2.rar
Code:
http://rapidshare.com/files/24480784/module_5.part3.rar
Code:
http://rapidshare.com/files/24480785/module_5.part4.rar
Code:
http://rapidshare.com/files/24480786/module_5.part5.rar
Code:
http://rapidshare.com/files/24480787/module_5.part6.rar
CD6 Hacking & Defending Web Servers
Code:
http://rapidshare.com/files/28925031/Module.6.Hacking.Defending.Web.Servs.part01.rar
Code:
http://rapidshare.com/files/28925032/Module.6.Hacking.Defending.Web.Servs.part02.rar
Code:
http://rapidshare.com/files/28925034/Module.6.Hacking.Defending.Web.Servs.part03.rar
Code:
http://rapidshare.com/files/28925035/Module.6.Hacking.Defending.Web.Servs.part04.rar
Code:
http://rapidshare.com/files/28931012/Module.6.Hacking.Defending.Web.Servs.part05.rar
Code:
http://rapidshare.com/files/28931013/Module.6.Hacking.Defending.Web.Servs.part06.rar
CD7.Hacking.Defending.Web.Applications
Code:
http://rapidshare.com/files/26188740/Module.7.part1.rar
Code:
http://rapidshare.com/files/26188742/Module.7.part2.rar
Code:
http://rapidshare.com/files/26196529/Module.7.part3.rar
CD8. .Sniffers.and.Session.Hijacking
Code:
http://rapidshare.com/files/26196533/Module.8.part1.rar
Code:
http://rapidshare.com/files/26360406/Module.8.part2.rar
Code:
http://rapidshare.com/files/26360407/Module.8.part3.rar
CD9.Hacking.Defending.Windows.Systems
Code:
http://rapidshare.com/files/26370153/Module.9.part1.rar
Code:
http://rapidshare.com/files/26376136/Module.9.part2.rar
Code:
http://rapidshare.com/files/26370156/Module.9.part3.rar
CD10.Hacking.Defending.Unix.Systems
Code:
http://rapidshare.com/files/28216732/Module_10.part01.rar
Code:
http://rapidshare.com/files/28216733/Module_10.part02.rar
Code:
http://rapidshare.com/files/28216734/Module_10.part03.rar
Code:
http://rapidshare.com/files/28216735/Module_10.part04.rar
Code:
http://rapidshare.com/files/28216737/Module_10.part05.rar
Code:
http://rapidshare.com/files/28216740/Module_10.part06.rar
Code:
http://rapidshare.com/files/28222043/Module_10.part07.rar
Code:
http://rapidshare.com/files/28222044/Module_10.part08.rar
Code:
http://rapidshare.com/files/28222045/Module_10.part09.rar
Code:
http://rapidshare.com/files/28222046/Module_10.part10.rar
CD .11.Rootkits.Backdoors.Trojans.Tunnels
Code:
http://rapidshare.com/files/28236225/Module_11.part01.rar
Code:
http://rapidshare.com/files/28236226/Module_11.part02.rar
Code:
http://rapidshare.com/files/28236228/Module_11.part03.rar
Code:
http://rapidshare.com/files/28236229/Module_11.part04.rar
Code:
http://rapidshare.com/files/28236231/Module_11.part05.rar
Code:
http://rapidshare.com/files/28236233/Module_11.part06.rar
Code:
http://rapidshare.com/files/28238956/Module_11.part07.rar
Code:
http://rapidshare.com/files/28238959/Module_11.part08.rar
CD.12.Denial.of.Service.and.Botnets
Code:
http://rapidshare.com/files/28250428/Module_12.part1.rar
Code:
http://rapidshare.com/files/28250430/Module_12.part2.rar
Code:
http://rapidshare.com/files/28250431/Module_12.part3.rar
Code:
http://rapidshare.com/files/28250432/Module_12.part4.rar
Code:
http://rapidshare.com/files/28250433/Module_12.part5.rar
Code:
http://rapidshare.com/files/28250434/Module_12.part6.rar
Code:
http://rapidshare.com/files/28250435/Module_12.part7.rar
CD.13..Automated.Pen.Testing.Tools
Code:
http://rapidshare.com/files/28259605/Module.13.part01.rar
Code:
http://rapidshare.com/files/28259607/Module.13.part02.rar
Code:
http://rapidshare.com/files/28259608/Module.13.part03.rar
Code:
http://rapidshare.com/files/28259610/Module.13.part04.rar
Code:
http://rapidshare.com/files/28259612/Module.13.part05.rar
Code:
http://rapidshare.com/files/28259613/Module.13.part06.rar
Code:
http://rapidshare.com/files/28259614/Module.13.part07.rar
CD.14.Intrusion.Detection.Systems
Code:
http://rapidshare.com/files/28268932/Module_14.part01.rar
Code:
http://rapidshare.com/files/28268933/Module_14.part02.rar
Code:
http://rapidshare.com/files/28268935/Module_14.part03.rar
Code:
http://rapidshare.com/files/28268936/Module_14.part04.rar
Code:
http://rapidshare.com/files/28268937/Module_14.part05.rar
Code:
http://rapidshare.com/files/28268938/Module_14.part06.rar
Code:
http://rapidshare.com/files/28275713/Module_14.part07.rar
Code:
http://rapidshare.com/files/28275714/Module_14.part08.rar
Code:
http://rapidshare.com/files/28275715/Module_14.part09.rar
Code:
http://rapidshare.com/files/28275716/Module_14.part10.rar
CD .15.Firewalls
Code:
http://rapidshare.com/files/28283458/Module_15.part01.rar
Code:
http://rapidshare.com/files/28283459/Module_15.part02.rar
Code:
http://rapidshare.com/files/28283460/Module_15.part03.rar
Code:
http://rapidshare.com/files/28283461/Module_15.part04.rar
Code:
http://rapidshare.com/files/28283464/Module_15.part05.rar
Code:
http://rapidshare.com/files/28283465/Module_15.part06.rar
Code:
http://rapidshare.com/files/28338024/Module_15.part07.rar
Code:
http://rapidshare.com/files/28338028/Module_15.part08.rar
Code:
http://rapidshare.com/files/28338029/Module_15.part09.rar
Code:
http://rapidshare.com/files/28338030/Module_15.part10.rar
Code:
http://rapidshare.com/files/28338032/Module_15.part11.rar
CD. 16.Honeypots.and.Honeynets
Code:
http://rapidshare.com/files/28345006/Module_16.part01.rar
Code:
http://rapidshare.com/files/28345007/Module_16.part02.rar
Code:
http://rapidshare.com/files/28345008/Module_16.part03.rar
Code:
http://rapidshare.com/files/28345009/Module_16.part04.rar
Code:
http://rapidshare.com/files/28345010/Module_16.part05.rar
Code:
http://rapidshare.com/files/28345011/Module_16.part06.rar
Code:
http://rapidshare.com/files/28354433/Module_16.part07.rar
Code:
http://rapidshare.com/files/28354435/Module_16.part08.rar

CD. 17 .Ethics.and.Legal.Issues
Code:
http://rapidshare.com/files/28354436/Module_17.part1.rar
Code:
http://rapidshare.com/files/28354437/Module_17.part2.rar
Code:
http://rapidshare.com/files/28354438/Module_17.part3.rar
Code:
http://rapidshare.com/files/28354439/Module_17.part4.rar
Code:
http://rapidshare.com/files/28357536/Module_17.part5.rar
Code:
http://rapidshare.com/files/28357537/Module_17.part6.rar

free counters

Followers