Wednesday, January 28, 2009

GTA 4 (240x320) JAVA


240x320 | Java | 1.5 Mb


Download

Popular Mechanics - February 2009


Popular Mechanics - February 2009
PDF | 112 pages | English | 25.78 MB


Download

Macworld February 2009


Macworld February 2009
English |pdf| 128 | 23.08 MB


Download

Sunday, January 18, 2009

Wireless Security Auditor 1.0.0.133


Examine Wireless Network Security

Elcomsoft Wireless Security Auditor allows network administrators to verify how secure a company’s wireless network is by executing an audit of accessible wireless networks. Featuring patent-pending cost-efficient GPU acceleration technologies, Elcomsoft Wireless Security Auditor attempts to recover the original WPA/WPA2-PSK text passwords in order to test how secure your wireless environment is.


Features and Benefits

* Determine how secure your wireless network is
* Test the strength of WPA/WPA2-PSK passwords protecting your wireless network
* Save time with patent-pending GPU acceleration technology when one or more compatible NVIDIA or ATI video cards are present
* Run advanced dictionary attacks with highly configurable variations
* Perform attacks from inside or outside of your network

How Secure Is Your Wireless Network?

A single weak link poses a valid security threat to the entire corporate network. Wireless (Wi-Fi) networks can provide sufficient security if configured properly and accompanied by an adequate password policy. Elcomsoft Wireless Security Auditor exposes security problems in your wireless network to allow network administrators taking appropriate measures and adopting a proper password policy.

Wireless Network Security Audit

Elcomsoft Wireless Security Auditor examines the security of your wireless network by attempting to break into the network from outside or inside. Elcomsoft Wireless Security Auditor works completely in off-line, undetectable by the Wi-Fi network being probed, by analyzing a dump of network communications in order to attempt to retrieve the original WPA/WPA2-PSK passwords in plain text.

Elcomsoft Wireless Security Auditor allows carrying out a password audit within a limited timeframe. Representing state-of-the-art in password recovery, Elcomsoft Wireless Security Auditor is one of the fastest and most advanced tools for recovering Wi-Fi passwords. If Elcomsoft Wireless Security Auditor fails to recover a Wi-Fi password within a reasonable time, the entire wireless network can be considered secure.

GPU Acceleration

ElcomSoft has pioneered many software innovations that have made it easier to recover passwords protecting various types of resources. For the first time in the industry, the company’s patent-pending GPU acceleration makes its way into Wi-Fi password recovery, reducing the time required to recover Wi-Fi passwords up to a hundred times. Supporting up to four NVIDIA boards such as GeForce 8, 9, and 200, as well as ATI video cards such as RADEON HD 3000 Series and up, Elcomsoft Wireless Security Auditor allows building servers with supercomputer performance at a fraction of the price.

Types of Attacks

Elcomsoft Wireless Security Auditor performs an advanced dictionary search attack in order to expose weak passwords consisting of words and phrases in spoken languages. Allowing highly customizable mutations of ordinary dictionary words, Elcomsoft Wireless Security Auditor performs hundreds of mutations to each word in order to ensure the widest coverage.

Compatibility with Other Elcomsoft Products

If one of your network workstations is compromised and a malicious person gets network access to at least one system, it may not even be necessary for an attacker to be physically close to the wireless network in order to obtain full access to data sent and received. A password hash is normally stored in the Windows Registry, and can be retrieved remotely for off-line analysis.

Elcomsoft Wireless Security Auditor can simulate attacks from the inside by automatically importing saved password hashes as retrieved by Elcomsoft Proactive System Password Recovery. This kind of attacks allows determining how secure your wireless network is to insider attacks.

Notes

Elcomsoft Wireless Security Auditor requires a valid log of wireless communications in standard tcpdump format. The tcpdump format is supported by all commercial Wi-Fi sniffers. In order to audit your wireless network, at least one handshake packet must be present in the tcpdump file.

Download

Flash Decompiler Gold v2.0.4.1204 WinALL


Flash Decompiler Gold v2.0.4.1204 WinALL | 5 MB |
Flash Decompiler Gold is a powerful and reliable flash extractor. It allows exporting all resources such as images, shapes, sounds, fonts, dynamic texts, buttons, sprites, scripts, and frames from any SWF file. Moreover, those resources can be exported as FLA format. With one click, you can effortlessly convert files to (*.swf) or (*.exe) format.
What you can do with it:


* Preview flash movie and every element before exporting
* Edit dynamic texts and replace images
* Extract element of the Flash movie such as shapes, morph shapes, images, sounds, videos, frames, fonts, texts, buttons, sprites and ActionScripts.
* Export FLA data that can be rebuilt in native flash environment
* Convert flash files between exe and swf format
* Edit flash files, add innovation to current flash movie

Great feature recommended:

1. Start a flash file.
2. Tick the components you want to export in Resources list then click Expoet FLA button on resources list
3. Export rebuild data dialog appeared under the movie information dialog
4. Browse the file path, check or uncheck the "Open the folder after export" box. Click Export button to start the export process. Now, you can edit the exported files to rebuild the FLA files at your will.

Rapidshare

Thursday, January 8, 2009

PC World Magazine - February 2009


PDF | English | 124 Pages | 32 MB


Download

ProxyCap 3.15 - Proxy Internet Tunnel


ProxyCap enables you to tunnel Internet applications through HTTP, SOCKS v4, and SOCKS v5 Proxy Servers. You can tell ProxyCap which applications will connect to the Internet through a proxy and under what circumstances. This is done through a user friendly interface, without the need to reconfigure any of your Internet clients. ProxyCap provides flexible rule system and allows you to define your own “tunneling” rules. You can add a new rule with just a few mouse clicks.

Download

Wednesday, January 7, 2009

Internet Download Manager 5.15 Build 5 Portable


Internet Download Manager (IDM) - a convenient tool to increase download speeds up to 500 percent, supporting the download and resume as scheduled. According to the users, Internet Download Manager - an excellent program that allows you to download your favorite software, games, cd, dvd and mp3-music, movies, free of charge and is free of much faster! Internet Download Manager has a built-logic accelerator download, including intellectual dynamic file segmentation and safe multi-boot technology that helps accelerate boot. A comprehensive system of analysis errors and the possibility dokachki help continue the download after an interruption due to a loss of connection to network problems, turn off the computer or a change in the supply of electricity. Simple graphical user interface makes IDM user-friendly and user-friendly. Internet Download Manager has a multilanguage interface, ample opportunities for setting up, loading skin, supports proxy servers, protocols, FTP, HTTP and HTTPS, work behind a firewall, forwarding files, work with files cookie, boot with authorization, predosmotr the contents of files ZIP, category handles the content of MP3-audio and MPEG-video and a large number of server platforms. IDM easily integrated into browsers such as Microsoft Internet Explorer, Netscape, AOL, MSN Explorer, Opera, and Mozilla for automatic links. You can also drag files or run the Internet Download Manager from command line. Internet Download Manager can connect your modem to the network at the scheduled time, you download these files, then disconnect or even shut down the computer.


Features of IDM: • Dynamic segmentation of the file that uses the rule of dividing into two parts • Multiple use of compounds that have completed their parts of the file download at no additional stages log on • Tune timeout and the number of connections for IDM settings to your connection type Unlike other accelerators and load management, where segmentiruyutsya files before downloading, Internet Download Manager segmentiruet downloaded files dynamically during the boot process. In addition, Internet Download Manager repeatedly uses the available connections, bypassing the additional stages of connection and authentication to achieve better speed performance. When IDM is running, it displays its icon in the taskbar at piramidkoy. Menu IDM can be caused by right-clicking the icon. You can close the IDM, selecting "Exit" in the menu.

Download

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Powered by Blogger
Free Flash TemplatesRiad In FezFree joomla templatesAgence Web MarocMusic Videos OnlineFree Website templateswww.seodesign.usFree Wordpress Themeswww.freethemes4all.comFree Blog TemplatesLast NewsFree CMS TemplatesFree CSS TemplatesSoccer Videos OnlineFree Wordpress ThemesFree CSS Templates Dreamweaver