W E L C O M E!!!

This is a web blog that provides video training, tutorials and other materials for educational purposes, self-practice only. You can download everything for free of charge, so you "CAN’T SELL", or use it for any commercial purposes. Please support the authors and buy with your money if they could help you earn money or improve your career.

If u need help or have a request for materials just comment it.

http://kompyuterinfo.blogspot.com/

Thanks..

Saturday, June 14, 2008

A.I.O Tracing Utilities


Tracing Utilities AIO

Visual Route 2006 Server
SmartWhois
Visual IP Trace 2006
VisualWhois
CallerIP
CommView

Visual Route 2006 Server

VisualRoute helps determine if a connectivity problem is due to an ISP, the Internet, or the web site you -- or your customers -- are trying to reach, and pinpoints the network where a problem occurs.

VisualRoute 2006 is available in six specialized editions, enabling on-demand and continuous connectivity analysis from a single computer, a remote customer desktop, a remote server, or multiple points on a global network.

All editions include integrated traceroute, ping tests, reverse DNS and Whois lookups, and display the actual route of connections and IP address locations on a global map.

SmartWhois

SmartWhois is a useful network information utility that allows you to look up all the available information about an IP address, hostname or domain, including country, state or province, city, name of the network provider, administrator and technical support contact information. It helps you find answers to these important questions:

* Who is the owner of the domain?
* When was the domain registered and what is the owner's contact information?
* Who is the owner of the IP address block?

With SmartWhois you can focus on your work; the program will unmistakably choose the right database from over 60 whois databases all over the world and fetch the most complete results within a few seconds.

Features:

* Smart operation: The program always looks up whois data in the right database; you don't have to waste your time trying them all.
* Integration with Mcft Internet Explorer and Mcft Outlook. Look up domain owners and IP addresses in e-mail headers instantly!
* Saving results into an archive: you can build your own database that can be viewed offline.
* Batch processing of IP addresses or domain lists.
* Caching of obtained results.
* Hostname resolution and DNS caching.
* Integration with CommView Network Monitor: Can be accessed from CommView for quick, easy lookup.
* Calling SmartWhois directly from your application. See SmartWhois FAQ.
* Wildcard queries.
* Whois console for custom queries.
* Country code reference.
* Customizable interface.
* SOCKS5 firewall support.

Visual IP Trace 2006

Trace and report hackers, investigate web sites with Visual IP Trace:

Knowing where a suspect intruder is located, where a malicious email originated, or validating the location of a website is key information to identify security threats, track and report abusers.

While many IP lookup tools only provide network provider locations, Visual IP Trace's unique IP address location technology provides a much higher level of accuracy by identifying the actual physical city and country location of servers and routers, key forensics information for investigating hackers or suspects. In addition, by seeing the actual route path to the destination point, the locations of last few network hops provide valuable clues to the end-point's true location.

VisualWhois

Visual WhoIs allows you to find relevant information about domains, ip addresses and email addresses. The program retrieves the WHOIS information, Network details and displays the country location on a 3D globe. In addition, it integrates with Internet Explorer, so you can quickly trace any web site by simply clicking a button in the IE toolbar.

CallerIP

Similar to Caller ID for your telephone, CallerIP shows you who is connecting to your system, so you can protect your privacy and confidential information.

* Receive instant alerts for high risk connections and back doors
* Identify spyware and suspicious connections to your system
* Report abuse and illicit activity

KEY FEATURES:

# NEW! CallerIP Server (Professional Edition only) allows you to monitor your machine from a remote location.
# NEW! Plot all connections feature that plots all current connections on the world map to allow for easy analysis of where connections reside.
# NEW! New look table which includes gradient fill depending on the threat of the connection.
# NEW! Improved logging technique means searching large log files is literally hundreds of times faster!
# Realtime monitoring instantly identifies suspect activity and spyware
# Identifies the country of origin for all connections
# Worldwide Whois reports
# Network Provider reports with abuse contact information
# Automated alerts of high-risk connections
# Detailed log of connection history with search options

CommView

CommView, a product of Tamosoft, is a powerful network monitor and packet analyzer designed for LAN administrators, security professionals, network programmers, home users … virtually anyone who wants a full picture of the traffic flowing through a PC or LAN segment.

* Maintain efficient network data transmission, test firewalls and intrusion detection systems
* See what, where, and how information leaves and enters your systems and network -- critical information for secure Internet computing
* Quickly troubleshoot and debug network-based applications

KEY FEATURES:

* Captures all data packets flowing through a PC or LAN segment
* Automated alarms notify you about important events
* Protocol decoding
* Generates traffic reports in real time
* Reconstructs TCP data streams
* Enables real-time browsing of captured and decoded packets

size=22mb

Download:
http://rapidshare.com/files/32138601/Tracing_Utilities.rar

AIO Antivirus 2008 v2.0


AIO Antivirus 2008 v2.0
size: 269 MB
Format: ISO

Download Links:
http://rapidshare.com/files/118991967/AIO_Av2_0.part1.rar http://rapidshare.com/files/118992032/AIO_Av2_0.part2.rar http://rapidshare.com/files/118992332/AIO_Av2_0.part3.rar http://rapidshare.com/files/118992322/AIO_Av2_0.part4.rar http://rapidshare.com/files/118992336/AIO_Av2_0.part5.rar http://rapidshare.com/files/118992459/AIO_Av2_0.part6.rar

Wednesday, June 11, 2008

Photoshop Photorealism


Lynda.com Photoshop Photorealism by Bert Monroy Vol1 and Vol2 - 982 Mb
Photorealism with Bert Monroy: using Adobe Photoshop and Illustrator” will take you inside the creative mind of renowned artist Bert Monroy and show you how to produce ultra-realistic images using Adobe Photoshop and Illustrator. These movies showcase Bert Monroy’s personal methods for getting realistic details into an image. He demonstrates his techniques for creating lighting, fire, smoke, grass, reflections and even mold. In these movies you will get up close and personal with Bert’s paintings as well as learn to make your own photorealistic imagery. Though these movies were created using Adobe’s latest releases of Photoshop CS and Illustrator CS, the principles and techniques apply to older versions of both programs in addition to other paint or vector-based drawing tools. lynda.com is very pleased to bring you Bert’s work and we hope you will find it as exciting as we do!
Using Adobe Photoshop and Adobe Illustrator

Download:
http://rapidshare.com/files/99127316/
http://rapidshare.com/files/99132247/
http://rapidshare.com/files/99242977/
http://rapidshare.com/files/99263203/
http://rapidshare.com/files/99265499/
http://rapidshare.com/files/99279694/
http://rapidshare.com/files/99278684/

http://rapidshare.com/files/99296499/
http://rapidshare.com/files/99298069/
http://rapidshare.com/files/99312055/
http://rapidshare.com/files/99309017/

Teaching Acrobat 8 Pro.For Graphic Designers



Teaching Acrobat 8 Pro.For Graphic Designers With Terry White

Learn how to create PDFs for print and web, as well as how to use Acrobat to collaborate with your peers.

* Lesson 01 Creating PDFs from InDesign (5:40)
* Lesson 02 Using PDF Presets (9:48)
* Lesson 03 Changing your Output Options (6:37)
* Lesson 04 Creating PDFs from Photoshop (4:00)
* Lesson 05 Creating PDFs from a Website (14:38)
* Lesson 06 Creating PDFs from Illustrator (2:40)
* Lesson 07 Creating PDFs from Non-Adobe Apps (5:07)
* Lesson 08 Creating PDFs Directly from a File (2:08)
* Lesson 09 Creating PDFs from a Scanner (6:47)
* Lesson 10 Doing a Shared Review (17:35)
* Lesson 11 Creating and Working with PDF Forms (8:29)
* Lesson 12 Sending Forms to Gather Feedback (8:56)
* Lesson 13 Creating a Multimedia PDF (7:26)
* Lesson 14 Using Digital Signatures (8:30)
* Lesson 15 Print Production Features of Acrobat 8 Pro (14:11)
Size: 450Mb

Downloads:
http://rapidshare.com/files/120200701/nsid-kta8pfgd.nfo
http://rapidshare.com/files/120201637/nsid-kta8pfgd.r00
http://rapidshare.com/files/120202676/nsid-kta8pfgd.r01
http://rapidshare.com/files/120203684/nsid-kta8pfgd.r02
http://rapidshare.com/files/120204614/nsid-kta8pfgd.r03
http://rapidshare.com/files/120205569/nsid-kta8pfgd.r04
http://rapidshare.com/files/120206561/nsid-kta8pfgd.r05
http://rapidshare.com/files/120207388/nsid-kta8pfgd.r06
http://rapidshare.com/files/120208309/nsid-kta8pfgd.r07
http://rapidshare.com/files/120208736/nsid-kta8pfgd.r08
http://rapidshare.com/files/120209701/nsid-kta8pfgd.rar

Professor Messers Nmap Secrets Training Course

I used to wade through pages of security log files and reports in the hopes of keeping my network safe and my systems secure. But even after all of my analysis, I still wasn't completely sure that my systems were really protected. I was testing my systems with well-known security tools that checked for vulnerabilities, and I was spending a large part of my day reading through log files that told me a lot of details about what happened AFTER the security breaches had already occurred. I was missing important reconnaissance that would have shown me exactly what the bad guys were seeing.


I knew Nmap could help, but I wasn't sure if I was taking advantage of everything it had to offer. Although it was simple to run the default Nmap scan, I wasn't completely certain what the output really meant and the hundreds of additional scan methods and options were almost overwhelming. I found many web sites that gave me pieces of what I needed, but detailed instructions and tutorials didn't seem to be available anywhere.

To get a complete picture of Nmap's operation, I broke down every Nmap scan and every option to gain an understanding of exactly what was happening over the network. Through my research, I've made thousands of Nmap scans and sifted through millions of network packets. I've created documentation that will help you understand exactly how Nmap interacts with the devices across the network. This Professor Messer "Nmap Secrets" training course is the result of this extensive research.

Download Links:

http://rapidshare.com/files/34280438/G-pmnst.r00
http://rapidshare.com/files/34284833/G-pmnst.r01
http://rapidshare.com/files/34330777/G-pmnst.r02
http://rapidshare.com/files/34333205/G-pmnst.r03
http://rapidshare.com/files/34335334/G-pmnst.r04
http://rapidshare.com/files/34337541/G-pmnst.r05
http://rapidshare.com/files/34339593/G-pmnst.r06
http://rapidshare.com/files/34341587/G-pmnst.r07
http://rapidshare.com/files/34343495/G-pmnst.r08
http://rapidshare.com/files/34345248/G-pmnst.r09
http://rapidshare.com/files/34347088/G-pmnst.r10
http://rapidshare.com/files/34348797/G-pmnst.r11
http://rapidshare.com/files/34350646/G-pmnst.r12
http://rapidshare.com/files/34352248/G-pmnst.r13
http://rapidshare.com/files/34353885/G-pmnst.r14
http://rapidshare.com/files/34355939/G-pmnst.r15
http://rapidshare.com/files/34357579/G-pmnst.r16
http://rapidshare.com/files/34359092/G-pmnst.r17
http://rapidshare.com/files/34359143/G-pmnst.r18
http://rapidshare.com/files/34360789/G-pmnst.rar
http://rapidshare.com/files/34360790/G-pmnst.sfv

Tuesday, June 10, 2008

Career Academy Hacking Penetration Testing and Countermeasures Training



-Company - careeracademy.
-Type - E-Learning.
-Language - English.
-3250 mb unpacked - 1950 mb packed - 17 cd's - (17 Iso's)
-You can mount the iso's.
-You can burn the iso's to cd's and play from cd.
-You can burn the iso's to a dvd as iso image and mount from the dvd.
-you can download everything (17 cd's) - or the cd that you interest !
-The 17 Modules (cd's) be individual uploaded.
-protection - NO

****************************
-price = $995 - Now $695
****************************

HOME :
http://www.careeracademy.com/index.asp?PageAction=VIEWPROD&ProdID=95

Career Academy Hacking Penetration Testing and Countermeasures Training:
***************************************************************************
Our training videos will show you how to scan, test, hack and secure your own systems. The intensive
demonstrations give each student in-depth knowledge and practical experience with the current security
systems. You will begin by understanding how perimeter defenses work and then be lead into scanning and
attacking your own networks. You will then learn how intruders escalate privileges and what steps can be
taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion
Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Includes :
Featuring live instructor-led classroom sessions with full audio, video and demonstration components
Printable courseware
300+ Penetration Testing Review Questions
eWorkbook - 725 pages Student eWorkbook developed by Shon Harris

Course Features:

Main Menu
Move through hours of in-depth content - quickly and easily due to the efficient and organized structure.

PowerPoint
Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the
user. This type of representation allows the user to better interpret the material through charts,
definitions, graphs, and more...

Exclusive Learning Zone
Train around the clock, around the world. Our certified online instructors are located at global support
centers in the U.S., U.K., Australia, and Singapore to provide real-time answers to
technology- and soft-skill-related questions 24x7. This means access to a live subject matter expert no
matter where you are - day or night. This level of student/instructor interaction provides real-time training
specific support and extends training beyond content and instructor-led solutions by providing flexibility to
accommodate individual needs and schedules.

Controls
Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance
through exercises.

Full Motion Video
All courses feature full-motion videos of instructors teaching the information as if they are speaking
directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal
lesson and learning experience.

Study Guides
Printable study guides for the entire course are available. This allows all material to be viewed, reviewed,
and printed for viewing at a later date.

Review Exercises
Each section has a review quiz to aid in the learning process by validating the comprehension of the material
covered before moving on to a new section.
Resume
All courses are resumed to where you left off last session allowing you to learn when it is convenient for
you without the hassle of remembering where you where.

Live Demonstrations
Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing
it on screen in front of them. In this format it gives the user the power to see things done by a
professional in the intended environment as many times as they would like.

Ethical Hacking and Penetration Testing eWorkbook - 725 pages Ethical Hacking and Penetration Testing Student
eWorkbook developed by Shon Harris
This workbook' content is rich with expertly created slides, professionally developed graphics, and extensive
text explaining all of the Hacking, Penetration Test and Countermeasure concepts. It contains the very same
tools that Shon Harris has used over the past four years to effectively teach thousands of individuals all
over the world with fantastic results. You can watch the vital video lectures and explore all of the topics
and concepts that are critical for Penetration Testing and Countermeasures.
The Ethical Hacking and Penetration Testing Workbook contains complete explanations, real-world examples,
and scenarios that are not available in any other resource.
***************************************************

-DOWNLOADINFO: traininga=cd1 – trainingb=cd2 – trainingc=cd3 – trainingd=cd4 ...

Password for all Cd's = jL4XyiI7MxX3afM0

Download Links:

-Training Module 1 Ethical Hacking and Penetration Testing - cd 1 - 250 mb

http://rapidshare.com/files/6870957/traininga.part1.rar.html
http://rapidshare.com/files/6875509/traininga.part2.rar.html
http://rapidshare.com/files/6880184/traininga.part3.rar.html
http://rapidshare.com/files/6884786/traininga.part4.rar.html
http://rapidshare.com/files/6889797/traininga.part5.rar.html
http://rapidshare.com/files/6890170/traininga.part6.rar.html

-Training Module 2 Footprinting and Reconnaissance - cd 2 - 210 mb

http://rapidshare.com/files/6920123/trainingb.part1.rar.html
http://rapidshare.com/files/6925380/trainingb.part2.rar.html
http://rapidshare.com/files/6930474/trainingb.part3.rar.html
http://rapidshare.com/files/6935598/trainingb.part4.rar.html
http://rapidshare.com/files/6937268/trainingb.part5.rar.html

-Training Module 3 TCP IP Basics and Scanning - cd 3 - 153 mb

http://rapidshare.com/files/6950222/trainingc.part1.rar.html
http://rapidshare.com/files/6954540/trainingc.part2.rar.html
http://rapidshare.com/files/6958405/trainingc.part3.rar.html
http://rapidshare.com/files/6958651/trainingc.part4.rar.html

-Training Module 4 Enumeration and Verification - cd 4 - 200 mb

http://rapidshare.com/files/6995889/trainingd.part1.rar.html
http://rapidshare.com/files/6999123/trainingd.part2.rar.html
http://rapidshare.com/files/7002551/trainingd.part3.rar.html
http://rapidshare.com/files/7005909/trainingd.part4.rar.html
http://rapidshare.com/files/7006074/trainingd.part5.rar.html

-Training Module 5 Hacking Defending Wireless Modems - cd 5 - 94 mb

http://rapidshare.com/files/7017480/traininge.part1.rar.html
http://rapidshare.com/files/7021255/traininge.part2.rar.html

-Training Module 6 Hacking Defending Web Servers - cd 6 - 150 mb

http://rapidshare.com/files/7029199/trainingf.part1.rar.html
http://rapidshare.com/files/7034545/trainingf.part2.rar.html
http://rapidshare.com/files/7039580/trainingf.part3.rar.html
http://rapidshare.com/files/7040200/trainingf.part4.rar.html

-Training Module 7 Hacking Defending Web Applications - cd 7 - 110 mb

http://rapidshare.com/files/7049302/trainingg.part1.rar.html
http://rapidshare.com/files/7054559/trainingg.part2.rar.html
http://rapidshare.com/files/7056051/trainingg.part3.rar.html

-Training Module 8 Sniffers and Session Hijacking - cd 8 - 115 mb

http://rapidshare.com/files/7069844/trainingh.part1.rar.html
http://rapidshare.com/files/7076146/trainingh.part2.rar.html
http://rapidshare.com/files/7084439/trainingh.part3.rar.html

-Training Module 9 Hacking Defending Windows Systems - cd 9 - 120 mb

http://rapidshare.com/files/7090868/trainingi.part1.rar.html
http://rapidshare.com/files/7095821/trainingi.part2.rar.html
http://rapidshare.com/files/7097885/trainingi.part3.rar.html

-Training Module 10 Hacking Defending Unix Systems - cd 10 - 150 mb

http://rapidshare.com/files/7136591/trainingJ.part1.rar.html
http://rapidshare.com/files/7139658/trainingJ.part2.rar.html
http://rapidshare.com/files/7142501/trainingJ.part3.rar.html

-Training Module 11 Rootkits Backdoors Trojans Tunnels - cd 11 - 115 mb

http://rapidshare.com/files/7147118/trainingk.part1.rar.html
http://rapidshare.com/files/7159091/trainingk.part2.rar.html
http://rapidshare.com/files/7160611/trainingk.part3.rar.html

-Training Module 12 Denial of Service and Botnets - cd 12 - 100 mb

http://rapidshare.com/files/7182977/trainingL.part1.rar.html
http://rapidshare.com/files/7187533/trainingL.part2.rar.html

-Training Module 13 Automated Pen Testing Tools - cd 13 - 102 mb

http://rapidshare.com/files/7202752/trainingm.part1.rar.html
http://rapidshare.com/files/7208149/trainingm.part2.rar.html
http://rapidshare.com/files/7208549/trainingm.part3.rar.html

-Training Module 14 Intrusion Detection Systems - cd 14 - 140 mb

http://rapidshare.com/files/7224433/trainingn.part1.rar.html
http://rapidshare.com/files/7230417/trainingn.part2.rar.html
http://rapidshare.com/files/7234950/trainingn.part3.rar.html

-Training Module 15 Firewalls - cd 15 - 160 mb

http://rapidshare.com/files/7252545/trainingo.part1.rar.html
http://rapidshare.com/files/7255895/trainingo.part2.rar.html
http://rapidshare.com/files/7258850/trainingo.part3.rar.html
http://rapidshare.com/files/7259491/trainingo.part4.rar.html

-Training Module 16 Honeypots and Honeynets - cd 16 - 120 mb

http://rapidshare.com/files/7262593/trainingp.part1.rar.html
http://rapidshare.com/files/7265259/trainingp.part2.rar.html
http://rapidshare.com/files/7266075/trainingp.part3.rar.html

-Training Module 17 Ethics and Legal Issues - cd 17 - 90 mb

http://rapidshare.com/files/7268140/trainingq.part1.rar.html
http://rapidshare.com/files/7269823/trainingq.part2.rar.html

Live CD For Wireless Hacking



This version is for all systems except systems with the Intel B/G wireless cards (IPW2200). Live CD with all the tools you need to hack a WLAN / wireless Access point.

WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.

Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong" encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.

Traditionally, crackinging WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrack would be used to find the WEP key.

Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!"

Basic Directions:

* Boot From CD
* Get The WEP Key
* Write It Down
* Reboot Into Windows
* Connect Using Wep Key.

DOWNLOAD:

http://www.filefactory.com/file/0ecdf2/
http://www.filefactory.com/file/247443/
http://www.filefactory.com/file/7b401f/
http://www.filefactory.com/file/1f42f3/
http://www.filefactory.com/file/a12e33/
http://www.filefactory.com/file/13e2b2/
http://www.filefactory.com/file/7a9bf0/

 
Free Blog CounterJoytech