Welcome Guys

Penggemar :D

Ethical hacking complete

Written By pcbolong on Tuesday, June 28, 2011 | 1:23 PM



Materi komplit Ethical Hacking.

Download here
1:23 PM | 7 comments | Read More

BSD Hack

Dari A sampai Z mengenai Sistem operasi BSD.

Download here
1:02 PM | 2 comments | Read More

eBooks.OReilly.-.Wireless.Hacks.100.Industrial.-.Strength.Tips.and.Tools

Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done.

download here
12:53 PM | 0 comments | Read More

database hacker handbook

database hacker handbook

Table of Contents
The Database Hacker's Handbook — Defending Database Servers
Preface
Introduction
Part I - Introduction
Chapter 1 - Why Care About Database Security?
Part II - Oracle
Chapter 2 - The Oracle Architecture
Chapter 3 - Attacking Oracle
Chapter 4 - Oracle: Moving Further into the Network
Chapter 5 - Securing Oracle
Part III - DB2
Chapter 6 - IBM DB2 Universal Database
Chapter 7 - DB2: Discovery, Attack, and Defense
Chapter 8 - Attacking DB2
Chapter 9 - Securing DB2
Part IV - Informix
Chapter 10 - The Informix Architecture
Chapter 11 - Informix: Discovery, Attack, and Defense
Chapter 12 - Securing Informix
Part V - Sybase ASE
Chapter 13 - Sybase Architecture
Chapter 14 - Sybase: Discovery, Attack, and Defense
Chapter 15 - Sybase: Moving Further into the Network
Chapter 16 - Securing Sybase
Part VI - MySQL
Chapter 17 - MySQL Architecture
Chapter 18 - MySQL: Discovery, Attack, and Defense
Chapter 19 - MySQL: Moving Further into the Network
Chapter 20 - Securing MySQL
Part VII - SQL Server
Chapter 21 - Microsoft SQL Server Architecture
Chapter 22 - SQL Server: Exploitation, Attack, and Defense
Chapter 23 - Securing SQL Server
Part VIII - PostgreSQL
Chapter 24 - The PostgreSQL Architecture
Chapter 25 - PostgreSQL: Discovery and Attack
Chapter 26 - Securing PostgreSQL http://www.blogger.com/img/blank.gif
Part IX - Appendixes
Appendix A - Example C Code for a Time-Delay SQL Injection Harness
Appendix B - Dangerous Extended Stored Procedures
Appendix C - Oracle Default Usernames and Passwords


Download here
12:44 PM | 0 comments | Read More

Dummies - Hack How To Create Keygens (1)

Dummies - Hack How To Create Keygens (1)

download here
12:39 PM | 0 comments | Read More

DangerousGoogle-SearchingForSecrets

Pertama kali mengenal hacking, handbook saya adalah ebook ini :D

http://www.blogger.com/img/blank.gif

Download here
12:24 PM | 1 comments | Read More

Attacking the DNS Protocol

ebook about Attacking the DNS Protocol

download here
12:15 PM | 0 comments | Read More

hack windows registry

ebook about hacking windows registry


download here
12:09 PM | 0 comments | Read More

Jasakom.Wireless.KungFu.Networking.n.Hacking



Jasakom.Wireless.KungFu.Networking.n.Hacking.Des_.2007.eBook_


download here
11:59 AM | 3 comments | Read More