Sakshi Student's Community Forum! Click here to Register free


Saturday, June 20, 2009

Eamcet 2009 results

About Eamcet


Engineering Agriculture and Medicine Common Entrance Test is conducted by JNT University on behalf of APSCHE. This examination is the gateway for entry into various professional courses offered in Government/Private Colleges in Andhra Pradesh. This site provides important information and links.

Eamcet 2009 Results


Final key
Notification

District Wise Engineering Colleges

Last Rank Admitted in EAMCET-2008 (Admissions)

Andhra University
Osmania University
S V University

BIOTECHNOLOGY COLLEGES


PHARMACY COLLEGES

Thursday, June 11, 2009

Ajax Ebooks

[Huge] Collection of Ajax programming and related E-books

and many more.....
http://rapidshare.com/files/110812513/Apress.Ajax.and.REST.Recipes.Dec.2006.pdf.html

http://rapidshare.com/files/110812780/Ajax_Patterns_and_Best_Practices.pdf.html

http://rapidshare.com/files/110813576/Apress.Beginning.Ajax.with.PHP.From.Novice.to.Professional.Oct.2006.pdf.html

http://rapidshare.com/files/110813995/Apress.Beginning.Google.Maps.Applications.with.PHP.and.Ajax.Aug.2006.pdf.html

http://rapidshare.com/files/110814626/Apress.Beginning.JavaScript.with.DOM.Scripting.and.Ajax.From.Novice.to.Professional.Jul.2006.pdf.html

http://rapidshare.com/files/110815068/Apress.Beginning.XML.with.DOM.and.Ajax.From.Novice.to.Professional.Jun.2006.pdf.html

http://rapidshare.com/files/110815786/Apress.Foundations.of.Atlas.Rapid.Ajax.Development.with.ASP.NET.2.0.May.2006.pdf.html

http://rapidshare.com/files/110816119/Foundations_of_Ajax.pdf.html

http://rapidshare.com/files/110816179/Apress.Pro.Apache.Struts.with.Ajax.Oct.2006.pdf.html

http://rapidshare.com/files/110816980/Apress.Pro.JSF.and.Ajax.Building.Rich.Internet.Components.Feb.2006.pdf.html

http://rapidshare.com/files/110817078/FriendsofED.The.Essential.Guide.to.Dreamweaver.CS3.with.CSS.Ajax.and.PHP.Jul.2007.pdf.html

http://rapidshare.com/files/110817222/Packt.Publishing.Ajax.And.Php.Building.Responsive.Web.Applications.Mar.2006.pdf.html

http://rapidshare.com/files/110817318/Pragmatic.Bookshelf.Pragmatic.Ajax.A.Web.2.0.Primer.Apr.2006.pdf.html

http://rapidshare.com/files/110817338/Ajax_for_Dummies.pdf.html

http://rapidshare.com/files/110817374/Professional_Ajax__2Ed.pdf.html

http://rapidshare.com/files/110817744/AjaxWorld_-_2007_-_05.pdf.html

http://rapidshare.com/files/110817843/Beginning_Ajax_with_ASP.NET.pdf.html

http://rapidshare.com/files/110818070/Beginning_Ajax.pdf.html

http://rapidshare.com/files/110818212/Bring_your_website_to_live_with_AJAX_and_DHTML.pdf.html

http://rapidshare.com/files/110818237/Build_Your_Own_AJAX_Web_Applications.pdf.html

http://rapidshare.com/files/110818479/Head_Rush_Ajax.pdf.html

http://rapidshare.com/files/110818582/Manning__Ajax_in_Action_2006.pdf.html

http://rapidshare.com/files/110818592/Manning.Ajax.in.Practice.Jun.2007.pdf.html

http://rapidshare.com/files/110819359/Manning.ASP.NET.AJAX.in.Action.Aug.2007.pdf.html

http://rapidshare.com/files/110819624/Packt.Publishing.Google.Web.Toolkit.GWT.Java.AJAX.Programming.Feb.2007.pdf.html

http://rapidshare.com/files/110820323/Peachpit.Press.Building.a.Web.Site.with.Ajax.Oct.2007.pdf.html

http://rapidshare.com/files/110820697/Practical_Ajax_Projects_with_Java_Technology.pdf.html

http://rapidshare.com/files/110820968/Pragmatic.Prototype.and.script.aculo.us.Dec.2007.pdf.html

Wednesday, June 10, 2009

Security

SANS SECURITY 560 Network Penetration Testing & Ethical Hacking


SANS SECURITY 560 Network Penetration Testing & Ethical Hacking | 1.5 GB

SANS Security 560 is one of the most technically rigorous courses offered by the SANS Institute. Attendees are expected to have a working knowledge of TCP/IP, cryptographic routines such as DES, AES, and MD5, and the Windows and Linux command lines before they step into class. Although SANS Security 401 (Security Essentials) and then next SANS Security 504 (Hacker Techniques, Exploits, and Incident Handling) are not pre-requisites for 560, these courses cover the groundwork that all 560 attendees are expected to know. While 560 is technically in-depth, it is important to note that programming knowledge is NOT required for the course

download
http://hotfile.com/dl/5818570/3d4edf0/SS560.NetworkPenetration_tdk.part01.rar.html
http://hotfile.com/dl/5818606/37eebef/SS560.NetworkPenetration_tdk.part02.rar.html
http://hotfile.com/dl/5818653/2aab7ee/SS560.NetworkPenetration_tdk.part03.rar.html
http://hotfile.com/dl/5818689/c015048/SS560.NetworkPenetration_tdk.part04.rar.html
http://hotfile.com/dl/5818725/4819575/SS560.NetworkPenetration_tdk.part05.rar.html
http://hotfile.com/dl/5818795/47d1129/SS560.NetworkPenetration_tdk.part06.rar.html
http://hotfile.com/dl/5818840/19516e3/SS560.NetworkPenetration_tdk.part07.rar.html
http://hotfile.com/dl/5818867/2ed8bdb/SS560.NetworkPenetration_tdk.part08.rar.html
http://hotfile.com/dl/5818871/f75b8ea/SS560.NetworkPenetration_tdk.part09.rar.html
OR
http://rapidshare.com/files/242573233/SS560.NetworkPenetration_tdk.part01.rar
http://rapidshare.com/files/242573387/SS560.NetworkPenetration_tdk.part02.rar
http://rapidshare.com/files/242573347/SS560.NetworkPenetration_tdk.part03.rar
http://rapidshare.com/files/242576294/SS560.NetworkPenetration_tdk.part04.rar
http://rapidshare.com/files/242576218/SS560.NetworkPenetration_tdk.part05.rar
http://rapidshare.com/files/242576163/SS560.NetworkPenetration_tdk.part06.rar
http://rapidshare.com/files/242575701/SS560.NetworkPenetration_tdk.part07.rar
http://rapidshare.com/files/242576360/SS560.NetworkPenetration_tdk.part08.rar
http://rapidshare.com/files/242574519/SS560.NetworkPenetration_tdk.part09.rar

Password: KELCYRA4EVER


Hacking Video tutorials




128 Bit Wep Cracking With Injection!.swf
A Penetration Attack Reconstructed.avi
A Quick and Dirty Intro to Nessus using the Auditor Boot CD!.swf
Adding Modules to a Slax or Backtrack Live CD from Windows.swf
Airplay replay attack - no wireless client required.swf
Anonym.OS LiveCD with build in Tor Onion routing and Privoxy.swf
BackTrack LiveCD to HD Installation Instruction Video .swf
Basic Nmap Usage!.swf
Basic Tools for Wardriving!.swf
Bluesnarfer attack tool demonstration.swf
Bluesnarfing a Nokia 6310i hand set.avi
Breaking WEP in 10 minutes.avi
BufferOverflowPart2-Shellcoding ByIDEspinner.avi
BufferOverflowPart3ExploitsByIDEspinner.avi
Cain to ARP poison and sniff passwords!.avi
Complete Hacking Video using Metasploit - Meterpreter.swf
Cracking a 128 bit WEP key (Auditor).swf
Cracking a 128 Bit Wep key + entering the cridentials.swf
Cracking Syskey and the SAM on Windows Using Samdump2 and John!.swf
Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text!.swf
Cracking WPA Networks (Auditor).swf
DoS attack against Windows FTP Server - DoS.avi
Droop s Box Simple Pen-test Using Nmap, Nikto, Bugtraq, Nslookup and Other Tools!.swf
Exploiting some bugs of tools used in Windows.swf.swf
Exploiting weaknesses of PPTP VPN (Auditor).swf
Finding Rogue SMB File Shares On Your Network!.swf
Fun with Ettercap Filters!.swf
hack.txt
How to crack the local windows passwords in the SAM database .swf
How to decrypt SSL encrypted traffic using a man in the middle attack (Auditor).swf
How to sniff around switches using Arpspoof and Ngrep!.avi
IDEspinner Buffer Overflows pt1.avi
IDEspinner Feature Addition pt1.avi
IDEspinner Feature Addition pt2.avi
IDEspinnerDNS-PoisonRouting.avi
Install VNC Remotely!.avi
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Hi-Res).avi
Internet Explorer Remote Command Execution Exploit (CMDExe) Client Side Attack (Lo-Res).avi
John The Ripper 1.7 password cracker Installation Instruction Video .swf
Local Password Cracking Presentation for the Indiana Higher Education Cybersecurity Summit 2005!.swf
MAC Bridging with Windows XP and Sniffing!.swf
Mass De-Authentication using void11 (Auditor).swf
Metasploit Flash Tutorial!.swf
MITM Hijacking.wmv
Nmap Video Tutorial 2 Port Scan Boogaloo!.swf
Sniffing logins and passwords.avi
Sniffing Remote Router Traffic via GRE Tunnels (Hi-Res).avi
Sniffing Remote Router Traffic via GRE Tunnels (Lo-Res).avi
Sniffing VoIP Using Cain!.swf
Snort Instruction video - howto install into backtrack.swf
SSH Dynamic Port Forwarding!.swf
Start a session and get interactive commandline access to a remote Windows box!.avi
Telnet Bruteforce.avi
Tunneling Exploits through SSH.avi
Use Brutus to crack a box running telnet!.avi
Using NetworkActiv to sniff webpages on a Wi-Fi network!.swf
WEP Cracking using Aireplay v2.2 Beta 7 (Whax 3.0).swf
WMF File Code Execution Vulnerability With Metasploit!.swf
WPA Cracking using Aireplay v2.2 Beta 7 (Whax 3.0).swf

Download:
http://rapidshare.com/files/112986178/Huge_Collection_Of_Hacking_Videos.part1.rar
http://rapidshare.com/files/112993588/Huge_Collection_Of_Hacking_Videos.part2.rar
http://rapidshare.com/files/113000538/Huge_Collection_Of_Hacking_Videos.part3.rar
http://rapidshare.com/files/112963118/Huge_Collection_Of_Hacking_Videos.part4.rar
http://rapidshare.com/files/112969973/Huge_Collection_Of_Hacking_Videos.part5.rar
http://rapidshare.com/files/112975843/Huge_Collection_Of_Hacking_Videos.part6.rar
http://rapidshare.com/files/112979640/Huge_Collection_Of_Hacking_Videos.part7.rar


Ec-Council Ceh V6


CEHv6 Module 00 Student Introduction.pdf
CEHv6 Module 01 Introduction to Ethical Hacking.pdf
CEHv6 Module 02 Hacking Laws.pdf
CEHv6 Module 03 Footprinting.pdf
CEHv6 Module 04 Google Hacking.pdf
CEHv6 Module 05 Scanning.pdf
CEHv6 Module 06 Enumeration.pdf
CEHv6 Module 07 System Hacking.pdf
CEHv6 Module 08 Trojans and Backdoors.pdf
CEHv6 Module 09 Viruses and Worms.pdf
CEHv6 Module 10 Sniffers.pdf
CEHv6 Module 11 Social Engineering.pdf
CEHv6 Module 12 Phishing.pdf
CEHv6 Module 13 Hacking Email Accounts.pdf
CEHv6 Module 14 Denial of Service.pdf
CEHv6 Module 15 Session Hijacking.pdf
CEHv6 Module 16 Hacking Webservers.pdf
CEHv6 Module 17 Web Application Vulnerabilities.pdf
CEHv6 Module 18 Web based Password Cracking Techniques.pdf
CEHv6 Module 19 SQL Injection.pdf
CEHv6 Module 20 Hacking Wireless Networks.pdf
CEHv6 Module 21 Physical Security.pdf
CEHv6 Module 22 Linux Hacking.pdf
CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf
CEHv6 Module 24 Buffer Overflows.pdf
CEHv6 Module 25 Cryptography.pdf
CEHv6 Module 26 Penetration Testing.pdf
CEHv6 Module 28 Writing Virus Codes.pdf
CEHv6 Module 29 Assembly Language Tutorial.pdf
CEHv6 Module 30 Exploit Writing.pdf
CEHv6 Module 31 Exploit Writing.pdf
CEHv6 Module 32 Exploit Writing.pdf
CEHv6 Module 33 Reverse Engineering Techniques.pdf
CEHv6 Module 34 MAC OS X Hacking.pdf
CEHv6 Module 35 Hacking Routers, Cable Modems and Firewalls.pdf
CEHv6 Module 36 Hacking Mobile Phones, PDA and Handheld Devices.pdf
CEHv6 Module 37 Bluetooth Hacking.pdf
CEHv6 Module 38 VoIP Hacking.pdf
CEHv6 Module 39 RFID Hacking.pdf
CEHv6 Module 40 Spamming.pdf
CEHv6 Module 41 Hacking USB Devices.pdf
CEHv6 Module 42 Hacking Database Servers.pdf
CEHv6 Module 43 Cyber Warfare- Hacking Al-Qaida and Terrorism.pdf
CEHv6 Module 44 Internet Content Filtering Techniques.pdf
CEHv6 Module 45 Privacy on the Internet.pdf
CEHv6 Module 46 Securing Laptop Computers.pdf
CEHv6 Module 47 Spying Technologies.pdf
CEHv6 Module 48 Corporate Espionage by Insiders.pdf
CEHv6 Module 49 Creating Security Policies.pdf
CEHv6 Module 50 Software Piracy and Warez.pdf
CEHv6 Module 51 Hacking and Cheating Online Games.pdf
CEHv6 Module 52 Hacking RSS and Atom.pdf
CEHv6 Module 53 Hacking Web Browsers.pdf
CEHv6 Module 54 Proxy Server Technologies.pdf
CEHv6 Module 55 Preventing Data Loss.pdf
CEHv6 Module 56 Hacking Global Positioning System.pdf
CEHv6 Module 57 Computer Forensics and Incident Handling.pdf
CEHv6 Module 58 Credit Card Frauds.pdf
CEHv6 Module 59 How to Steal Passwords.pdf
CEHv6 Module 60 Firewall Technologies.pdf
CEHv6 Module 61 Threats and Countermeasures.pdf
CEHv6 Module 62 Case Studies.pdf
CEHv6 Module 63 Botnets.pdf
CEHv6 Module 64 Economic Espionage.pdf
CEHv6 Module 65 Patch Management.pdf
CEHv6 Module 66 Security Convergence.pdf
CEHv6 Module 67 Identifying the Terrorists.pdf

Approx 250MB
New Files 10.12.2008 Update
http://rapidshare.com/files/171714960/CEHv6.n-force.org.part1.rar
http://rapidshare.com/files/171714962/CEHv6.n-force.org.part2.rar
http://rapidshare.com/files/171733732/CEHv6.n-force.org.part3.rar
http://rapidshare.com/files/171733733/CEHv6.n-force.org.part4.rar


Ec-Council Ceh V6 Slides


Theses are the slides i have:

CEHv6 Module 00 Student Introduction.pdf
CEHv6 Module 01 Introduction to Ethical Hacking.pdf
CEHv6 Module 02 Hacking Laws.pdf
CEHv6 Module 03 Footprinting.pdf
CEHv6 Module 04 Google Hacking.pdf
CEHv6 Module 05 Scanning.pdf
CEHv6 Module 06 Enumeration.pdf
CEHv6 Module 07 System Hacking.pdf
CEHv6 Module 08 Trojans and Backdoors.pdf
CEHv6 Module 09 Viruses and Worms.pdf
CEHv6 Module 10 Sniffers.pdf
CEHv6 Module 11 Social Engineering.pdf
CEHv6 Module 12 Phishing.pdf
CEHv6 Module 13 Hacking Email Accounts.pdf
CEHv6 Module 14 Denial of Service.pdf
CEHv6 Module 15 Session Hijacking.pdf
CEHv6 Module 16 Hacking Webservers.pdf
CEHv6 Module 17 Web Application Vulnerabilities.pdf
CEHv6 Module 18 Web based Password Cracking Techniques.pdf
CEHv6 Module 19 SQL Injection.pdf
CEHv6 Module 20 Hacking Wireless Networks.pdf
CEHv6 Module 21 Physical Security.pdf
CEHv6 Module 22 Linux Hacking.pdf
CEHv6 Module 23 Evading IDS Firewall and Honeypot.pdf
CEHv6 Module 50 Software Piracy and Warez.pdf
CEHv6 Module 51 Hacking and Cheating Online Games.pdf
CEHv6 Module 61 Threats and Countermeasures.pdf
CEHv6 Module 62 Case Studies.pdf
CEHv6 Module 63 Botnets.pdf
CEHv6 Module 64 Economic Espionage.pdf
CEHv6 Module 65 Patch Management.pdf
CEHv6 Module 66 Security Convergence.pdf
CEHv6 Module 67 Identifying the Terrorists.pdf

Approx 180MB

http://rapidshare.com/files/158978423/ceh6_videolessons4free.blogspot.com.part1.rar
http://rapidshare.com/files/158983964/ceh6_videolessons4free.blogspot.com.part2.rar
new link will be added Soon!

New Links !!!
All slides!!
Approx 250MG
http://rapidshare.com/files/165244311/slides.part1.rar
http://rapidshare.com/files/165265350/slides.part2.rar
http://rapidshare.com/files/165265546/slides.part3.rar
http://rapidshare.com/files/165270232/slides.part4.rar
http://rapidshare.com/files/165242442/slides.part5.rar



Astalavista's Security Toolbox DVD 2008 - v5.0



Astalavista's Security Toolbox DVD 2008 (v5.0)
is considered to be the largest and most comprehensive Information Security archive. As always we are committed to provide you with a resource for all of your security and hacking interests, in an interactive way! The Information found on the Security Toolbox DVD has been carefully selected, so that you will only browse through quality information and tools. No matter if you are a computer enthusiast, a computer geek, a newbie looking for information on "how to hack", or an IT Security professional looking for quality and up to date information for offline use or just for convenience, we are sure that you will be satisfied, even delighted by the DVD!


Direct Download:

http://cnc.wget4u.com/index.php?dir=CBT/AST%20v%205.0/&file=astalavista_dvd_2008_www.s4cnc.com.part1.rar
http://cnc.wget4u.com/index.php?dir=CBT/AST%20v%205.0/&file=astalavista_dvd_2008_www.s4cnc.com.part2.rar
http://cnc.wget4u.com/index.php?dir=CBT/AST%20v%205.0/&file=astalavista_dvd_2008_www.s4cnc.com.part3.rar



LearnKey CISSP Certification Course


LearnKey understands that security certification is highly desired by students. Partnering with International Information Systems Security Certification Consortium or (ISC)², enables LearnKey to compile a comprehensive CISSP course that covers the topics in the (ISC)² exam such as, Access Control Systems, Cryptography, and Security Management Practices. This enables students to confidently prepare for the (ISC)² CISSP exam.



http://rapidshare.com/files/89571034/LearnKey.CISSP.Solutions-CD2.part4.rar
http://rapidshare.com/files/89571028/LearnKey-Cissp.Solutions-CD8.part2.rar
http://rapidshare.com/files/89571025/LearnKey.CISSP.Solutions-CD10.part2.rar
http://rapidshare.com/files/89571024/LearnKey-Cissp.Solutions-CD5.part3.rar
http://rapidshare.com/files/89571018/LearnKey-Cissp.Solutions-CD8.part1.rar
http://rapidshare.com/files/89571011/LearnKey-Cissp.Solutions-CD7.part3.rar
http://rapidshare.com/files/89571005/LearnKey.CISSP.Solutions-CD3.part2.rar
http://rapidshare.com/files/89571004/LearnKey.CISSP.Solutions-CD11.part2.rar
http://rapidshare.com/files/89571001/LearnKey-Cissp.Solutions-CD6.part3.rar
http://rapidshare.com/files/89571000/LearnKey.CISSP.Solutions-CD5.part1.rar
http://rapidshare.com/files/89570997/LearnKey-Cissp.Solutions-CD9.part1.rar
http://rapidshare.com/files/89570989/LearnKey-Cissp.Solutions-CD7.part2.rar
http://rapidshare.com/files/89570984/LearnKey.CISSP.Solutions-CD1.part1.rar
http://rapidshare.com/files/89570983/LearnKey-Cissp.Solutions-CD9.part2.rar
http://rapidshare.com/files/89570980/LearnKey.CISSP.Solutions-CD4.part2.rar
http://rapidshare.com/files/89570979/LearnKey.CISSP.Solutions-CD10.part3.rar
http://rapidshare.com/files/89570974/LearnKey.CISSP.Solutions-CD2.part6.rar
http://rapidshare.com/files/89570969/LearnKey-Cissp.Solutions-CD8.part3.rar
http://rapidshare.com/files/89570967/LearnKey.CISSP.Solutions-CD5.part2.rar
http://rapidshare.com/files/89570962/LearnKey.CISSP.Solutions-CD2.part3.rar
http://rapidshare.com/files/89570960/LearnKey.CISSP.Solutions-CD2.part5.rar
http://rapidshare.com/files/89570954/LearnKey.CISSP.Solutions-CD2.part2.rar
http://rapidshare.com/files/89570953/LearnKey.CISSP.Solutions-CD2.part1.rar
http://rapidshare.com/files/89570933/LearnKey.CISSP.Solutions-CD1.part3.rar
http://rapidshare.com/files/89570924/LearnKey.CISSP.Solutions-CD4.part4.rar
http://rapidshare.com/files/89570899/LearnKey-Cissp.Solutions-CD9.part3.rar
http://rapidshare.com/files/89570894/LearnKey.CISSP.Solutions-CD11.part3.rar
http://rapidshare.com/files/89570884/LearnKey.CISSP.Solutions-CD3.part3.rar
http://rapidshare.com/files/89570882/LearnKey.CISSP.Solutions-CD10.part1.rar
http://rapidshare.com/files/89570878/LearnKey.CISSP.Solutions-CD2.part7.rar
http://rapidshare.com/files/89570877/LearnKey.CISSP.Solutions-CD11.part1.rar
http://rapidshare.com/files/89570866/LearnKey-Cissp.Solutions-CD6.part1.rar
http://rapidshare.com/files/89570863/LearnKey-Cissp.Solutions-CD5.part5.rar
http://rapidshare.com/files/89570862/LearnKey-Cissp.Solutions-CD5.part4.rar
http://rapidshare.com/files/89570853/LearnKey.CISSP.Solutions-CD4.part3.rar
http://rapidshare.com/files/89570852/LearnKey-Cissp.Solutions-CD7.part1.rar
http://rapidshare.com/files/89570845/LearnKey-Cissp.Solutions-CD8.part4.rar
http://rapidshare.com/files/89570844/LearnKey.CISSP.Solutions-CD3.part1.rar
http://rapidshare.com/files/89570841/LearnKey.CISSP.Solutions-CD4.part1.rar
http://rapidshare.com/files/89570839/LearnKey-Cissp.Solutions-CD6.part2.rar
http://rapidshare.com/files/89570838/LearnKey-Cissp.Solutions-CD6.part4.rar
http://rapidshare.com/files/89570833/LearnKey-Cissp.Solutions-CD9.part4.rar
http://rapidshare.com/files/89570829/LearnKey.CISSP.Solutions-CD1.part2.rar
http://rapidshare.com/files/89570828/LearnKey-Cissp.Solutions-CD7.part4.rar

Password: yoknall


VTC Microsoft Windows Vista Security



Title: Microsoft Windows Vista Security
Release Date: 2007-10-19
Duration: 6 hrs / 67 lessons

Windows Vista is Microsoft’s newest operating system. Although it’s considered to be the most secure version of the Microsoft Windows operating system to date, configuring its new security features and winding your way through Vista’s new user interfaces can be a daunting task. VTC author & experienced security administrator Bobby Rogers will guide you to the key information that both beginners and seasoned professionals will need to securely deploy Windows Vista in a home, small business, or enterprise-level environment.


http://rapidshare.com/files/89598288/VTCMWVSTNSD.part1.rar
http://rapidshare.com/files/89589115/VTCMWVSTNSD.part2.rar
http://rapidshare.com/files/89588759/VTCMWVSTNSD.part3.rar

Offensive Security 101 v.2.0



This site is an Online Training spinoff of the BackTrack live CD. Our courses are tailored for System Administrators and Security Professionals who want to learn how to get the most out of BackTrack - directly from it's creators! Our two flagship online courses are "Offensive Security 101" and "BackTrack to the Max".

What Is BackTrack?

BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions - Whax and Auditor. BackTrack has been dubbed as the best Security Live CD today, and has been rated 1st in its category, and 32nd overall in Insecure.org. Based on SLAX (Slackware), BackTrack provides user modularity. This means the distribution can be easily customised by the user to include personal scripts, additional tools, customised kernels, etc.

About the Courses

The courses are designed for busy professionals who need to step into the offensive security world, but do not have the time to attend a full blown course. Pre recorded sessions can be viewed in your own free time, at your leisure - and can be played over in case a topic needs further clarification.

A student chatroom and forum allow you to interact with our trainers as well as other students and experience hacking tools and techniques in a real live computer lab. The lab is confined to a local network and is legally safe and sterile for exercise.

Upon completion of the course, you may decide to take the Certification Challenge. In this final exam, your newly learned skills will be tested by a Hack Challenge in an unfamiliar environment. Once the challenge has been successfully completed, you will receive an OSCP (Offensive Security Certified Professional) Certification.

About the Trainers

The trainers giving the online courses are seasoned security professionals with over 10 years of experience in offensive security, pentesting and risk assessment. In addition, all trainers have at least 6 years of experience in public speaking and corporate security training.


http://rapidshare.com/files/128661423/Offsec101_Release.part1.rar
http://rapidshare.com/files/128673846/Offsec101_Release.part2.rar

1x195mb + 1x125mg


Backtrack Shmoo to the max!




the Backtrack phenomenom is very amazing,especially the tools which is provide in 1 packet cd,in the 25/02/2008 the Shmoo people present the teaser of some how to use B2m (backtrack 2 the max).

http://rapidshare.com/files/96411747/WarungPlus.Backtrack.2.the.max.part5.rar
http://rapidshare.com/files/96419319/WarungPlus.Backtrack.2.the.max.part1.rar
http://rapidshare.com/files/96428613/WarungPlus.Backtrack.2.the.max.part2.rar
http://rapidshare.com/files/96434338/WarungPlus.Backtrack.2.the.max.part3.rar
http://rapidshare.com/files/96442408/WarungPlus.Backtrack.2.the.max.part4.rar
password: warungplus.com


Certified Penetration Testing Specialist (CPTS) Training by Mile2[ReUpload]



CPTS is built upon proven hands-on Penetration Testing methodologies as utilized by our international group of vulnerability consultants. Mile2 trainers keep abreast of their expertise by practicing what they teach because we believe that an equal emphasis on theoretical and real world experience is essential for effective knowledge transfer to you, the student. The CPTS presents information on the latest vulnerabilities and defenses. This class also enhances the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk. We go far beyond simply teaching you to “Hack” -- the norm with the classes that have been available until now. Our course is developed based on principles and methods used by malicious hackers, but its focus is professional penetration testing and securing information assets.

Upon completion, CPTS - Certified Penetration Testing Specialist students will be able to confidently undertake the Thompson Prometric CPTS examination (recommended) or the easier Certified Ethical Hacker (312-50) Self Study. Students will enjoy an in-depth course that is continuously updated to maintain and incorporate the ever changing security environment. This course offers up-to-date proprietary laboratories that have been researched and developed by leading security professionals from around the world .

Competitive Advantages

Career Academy Computer-Based Training is a cost effective method that meets the critical demands of computer users. Experience our expert-led computer training courses in a comfortable and convenient environment. You get the feel of a computer training school delivered through flexible and familiar technology.

Following 9/11 ** Career Academy's security training partner, Mile2 has through necessity, been thrust into position as the World's largest specialty IT security training organization. Mile2 has provided training services to every US military and intelligence agency, as well as similar agencies for some of the USA's closest allies. These same classes are available to the corporate world with students coming from industries ranging from charities, banking, insurance, health, communications, transport, law enforcement, education and almost any sector imaginable. Mile2's distinction over the competition is that our instructors eat, drink, sleep and breath IT security.
Training comes to life with our full motion video, challenging labs, critical assessment and real-world insight from experts with vast experience in the subject matter. Engage in dynamic learning where multiple senses help reinforce learning concepts. See the steps, hear the explanations then put your skills to work. Our proven methodology provides an unequalled training experience with exceptional results.

Choosing Career Academy’s training with our expert-created study guides and interactive labs will result in an engaging learning experience. You will find that Career Academy’s training is second to none. Career Academy alone is the best site to offer the equivalent to an actual Microsoft training. See the steps, hear the explanations then put your skills to work. Our proven methodology provides an unequalled training experience with exceptional results. Distinguish your knowledge. Enhance your career.

Course Outline

Module 1 - Business and Technical Logistics for Pen Testing
Module 2 - Reconnaissance: Information Gathering
Module 3 - Linux Fundamentals
Module 4 - Reconnaissance: Detecting Live Systems
Module 5 - Reconnaissance: Enumeration
Module 6 - Cryptography: Decrypting the Cipher
Module 7 - Vulnerability Assessments
Module 8 - Windows Hacking: Staying Ahead of the Hacker
Module 9 - Advanced Exploit Techniques
Module 10 - Malware: Software Goes Undercover
Module 11 - Attacking Wireless Networks: Securing the Air
Module 12 - Networks, Sniffing and IDS: Intercept and Redirect!
Module 13 - Injecting the Database
Module 14 - Attacking Web Technologies


http://rapidshare.com/files/132712663/CPTS-DVD1.part1.rar
http://rapidshare.com/files/132740216/CPTS-DVD1.part2.rar
http://rapidshare.com/files/132740229/CPTS-DVD1.part3.rar
http://rapidshare.com/files/132740233/CPTS-DVD1.part4.rar
http://rapidshare.com/files/132736099/CPTS-DVD1.part5.rar

http://rapidshare.com/files/132851019/CPTS-DVD2.part1.rar
http://rapidshare.com/files/132851391/CPTS-DVD2.part2.rar
http://rapidshare.com/files/132850864/CPTS-DVD2.part3.rar
http://rapidshare.com/files/132850061/CPTS-DVD2.part4.rar

http://rapidshare.com/files/132855346/CPTS-DVD3.part1.rar
http://rapidshare.com/files/132932422/CPTS-DVD3.part2.rar
http://rapidshare.com/files/133018977/CPTS-DVD3.part3.rar
http://rapidshare.com/files/132855847/CPTS-DVD3.part4.rar

no password

upload by : http://videolessons4free.blogspot.com/


Offensisive-security 101



This site is an Online Training spinoff of the BackTrack live CD. Our courses are tailored for System Administrators and Security Professionals who want to learn how to get the most out of BackTrack - directly from it's creators! Our two flagship online courses are "Offensive Security 101" and "BackTrack to the Max".

What Is BackTrack?

BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions - Whax and Auditor. BackTrack has been dubbed as the best Security Live CD today, and has been rated 1st in its category, and 32nd overall in Insecure.org. Based on SLAX (Slackware), BackTrack provides user modularity. This means the distribution can be easily customised by the user to include personal scripts, additional tools, customised kernels, etc.

About the Courses

The courses are designed for busy professionals who need to step into the offensive security world, but do not have the time to attend a full blown course. Pre recorded sessions can be viewed in your own free time, at your leisure - and can be played over in case a topic needs further clarification.

A student chatroom and forum allow you to interact with our trainers as well as other students and experience hacking tools and techniques in a real live computer lab. The lab is confined to a local network and is legally safe and sterile for exercise.

Upon completion of the course, you may decide to take the Certification Challenge. In this final exam, your newly learned skills will be tested by a Hack Challenge in an unfamiliar environment. Once the challenge has been successfully completed, you will receive an OSCP (Offensive Security Certified Professional) Certification.

About the Trainers

The trainers giving the online courses are seasoned security professionals with over 10 years of experience in offensive security, pentesting and risk assessment. In addition, all trainers have at least 6 years of experience in public speaking and corporate security training.


http://rapidshare.com/files/128661423/Offsec101_Release.part1.rar
http://rapidshare.com/files/128673846/Offsec101_Release.part2.rar

1x195mb + 1x125mg


CRACKING (Reverse Engineering) Video Tutorials



This cracking video tutorials is very good for beginner until advance user,
who like to learn more about cracking (it's really recomended).

No previous knowledge is really needed !!!


With this video, you will learn :



• Olly + assembler + patching a basic reverseme
• Keyfiling the reverseme + assembler
• Basic nag removal + header problems
• Basic + aesthetic patching
• Comparing on changes in cond jumps, animate over/in, breakpoints
• "The plain stupid patching method", searching for textstrings
• Intermediate level patching, Kanal in PEiD
• Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor
• Explaining the Visual Basic concept, introduction to SmartCheck and configuration

download:

http://rapidshare.com/files/87331229/_file_snd-reversingwithlena-tutorial9.tutorial.zip
http://rapidshare.com/files/87331227/_file_snd-reversingwithlena-tutorial10.tutorial.zip
http://rapidshare.com/files/87331226/_file_snd-reversingwithlena-tutorial8.tutorial.zip
http://rapidshare.com/files/87331224/_file_snd-reversingwithlena-tutorial5.tutorial.zip
http://rapidshare.com/files/87331221/_file_snd-reversingwithlena-tutorial7.tutorial.zip
http://rapidshare.com/files/87331217/_file_snd-reversingwithlena-tutorial4.tutorial.zip
http://rapidshare.com/files/87331215/_file_snd-reversingwithlena-tutorial6.tutorial.zip
http://rapidshare.com/files/87331210/_file_snd-reversingwithlena-tutorial1.tutorial.zip
http://rapidshare.com/files/87331209/_file_snd-reversingwithlena-tutorial2.tutorial.zip
http://rapidshare.com/files/87331206/_file_snd-reversingwithlena-tutorial3.tutorial.zip


• Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick
• Intermediate patching using Olly's "pane window"
• Guiding a program by multiple patching.
• The use of API's in software, avoiding doublechecking tricks
• More difficult schemes and an introduction to inline patching
• How to study behaviour in the code, continued inlining using a pointer
• Reversing using resources
• Insights and practice in basic (self)keygenning
• Diversion code, encryption/decryption, selfmodifying code and polymorphism
• Debugger detected and anti-anti-techniques
• Packers and protectors : an introduction

download:

http://rapidshare.com/files/87333440/_file_snd-reversingwithlena-tutorial11.tutorial.zip
http://rapidshare.com/files/87332606/_file_snd-reversingwithlena-tutorial13.tutorial.zip
http://rapidshare.com/files/87332603/_file_snd-reversingwithlena-tutorial20.tutorial.zip
http://rapidshare.com/files/87332596/_file_snd-reversingwithlena-tutorial12.tutorial.zip
http://rapidshare.com/files/87332595/_file_snd-reversingwithlena-tutorial14.tutorial.zip
http://rapidshare.com/files/87332594/_file_snd-reversingwithlena-tutorial18.tutorial.zip
http://rapidshare.com/files/87332592/_file_snd-reversingwithlena-tutorial15.tutorial.zip
http://rapidshare.com/files/87332589/_file_snd-reversingwithlena-tutorial19.tutorial.zip
http://rapidshare.com/files/87332584/_file_snd-reversingwithlena-tutorial16.tutorial.zip
http://rapidshare.com/files/87332582/_file_snd-reversingwithlena-tutorial17.tutorial.zip


• Imports rebuilding
• API Redirection
• Stolen bytes
• Patching at runtime using loaders from lena151 original
• Continued patching at runtime & unpacking armadillo standard protection
• Machine specific loaders, unpacking & debugging armadillo
• tElock + advanced patching
• Bypassing & killing server checks
• Killing & inlining a more difficult server check
• SFX, Run Trace & more advanced string searching

dwonload:

http://rapidshare.com/files/87334609/_file_snd-reversingwithlena-tutorial25.tutorial.zip
http://rapidshare.com/files/87334596/_file_snd-reversingwithlena-tutorial26.tutorial.zip
http://rapidshare.com/files/87334583/_file_snd-reversingwithlena-tutorial21.tutorial.zip
http://rapidshare.com/files/87334581/_file_snd-reversingwithlena-tutorial24.tutorial.zip
http://rapidshare.com/files/87334576/_file_snd-reversingwithlena-tutorial22.tutorial.zip
http://rapidshare.com/files/87334567/_file_snd-reversingwithlena-tutorial23.tutorial.zip
http://rapidshare.com/files/87334564/_file_snd-reversingwithlena-tutorial29.tutorial.zip
http://rapidshare.com/files/87334563/_file_snd-reversingwithlena-tutorial27.tutorial.zip
http://rapidshare.com/files/87334561/_file_snd-reversingwithlena-tutorial28.tutorial.zip


• Delphi in Olly & DeDe
• Author tricks, HIEW & approaches in inline patching
• The FPU, integrity checks & loader versus patcher
• Reversing techniques in packed soft & A S&R loader for aspr
• Inlining inside polymorphic code
• Keygenning


download:
http://rapidshare.com/files/87335366/_file_snd-reversingwithlena-tutorial33.tutorial.zip
http://rapidshare.com/files/87335337/_file_snd-reversingwithlena-tutorial37.tutorial.zip
http://rapidshare.com/files/87335317/_file_snd-reversingwithlena-tutorial31.tutorial.zip
http://rapidshare.com/files/87335316/_file_snd-reversingwithlena-tutorial40.tutorial.zip
http://rapidshare.com/files/87335314/_file_snd-reversingwithlena-tutorial30.tutorial.zip
http://rapidshare.com/files/87335307/_file_snd-reversingwithlena-tutorial32.tutorial.zip
http://rapidshare.com/files/87335301/_file_snd-reversingwithlena-tutorial35.tutorial.zip
http://rapidshare.com/files/87335294/_file_snd-reversingwithlena-tutorial34.tutorial.zip
http://rapidshare.com/files/87335292/_file_snd-reversingwithlena-tutorial36.tutorial.zip
http://rapidshare.com/files/87335289/_file_snd-reversingwithlena-tutorial39.tutorial.zip
http://rapidshare.com/files/87335285/_file_snd-reversingwithlena-tutorial38.tutorial.zip
http://rapidshare.com/files/87334609/_file_snd-reversingwithlena-tutorial25.tutorial.zip
http://rapidshare.com/files/87334596/_file_snd-reversingwithlena-tutorial26.tutorial.zip

AppDev - .NET Security


View the Course Outline
(Level 1 Level 2)
Entire course includes...
• 700 pages of courseware
• 32 hours of hands-on content
• Step-by-step hands-on labs
• Sample Files
• PowerPoint slides for instructors


AppDev - .NET Security

In this course, you'll learn about the security features in .NET. You'll gain an understanding of the new security architecture in the .NET Framework, and about Code Access Security in the Common Language Runtime. You'll explore how to administer security policy using visual and command-line tools. You also learn how to write script to implement security.



http://pointupload.com/en/server/C3AAE9725/AppD---NET-Sec-part06-rar.html
http://pointupload.com/en/server/C1E6AE715/AppD---NET-Sec-part08-rar.html
http://pointupload.com/en/server/C65958445/AppD---NET-Sec-part01-rar.html
http://pointupload.com/en/server/5CCA82075/AppD---NET-Sec-part07-rar.html
http://pointupload.com/en/server/DE9226AE5/AppD---NET-Sec-part03-rar.html
http://pointupload.com/en/server/FEF5A2F15/AppD---NET-Sec-part02-rar.html
http://pointupload.com/en/server/D4BED25A5/AppD---NET-Sec-part10-rar.html
http://pointupload.com/en/server/4AE715205/AppD---NET-Sec-part05-rar.html
http://pointupload.com/en/server/A9AE9E5B5/AppD---NET-Sec-part09-rar.html
http://pointupload.com/en/server/90B56BCB5/AppD---NET-Sec-part04-rar.html
http://pointupload.com/en/server/E1A5CF535/AppD---NET-Sec-part16-rar.html
http://pointupload.com/en/server/832B7E175/AppD---NET-Sec-part11-rar.html
http://pointupload.com/en/server/C28372D95/AppD---NET-Sec-part13-rar.html
http://pointupload.com/en/server/8D4275045/AppD---NET-Sec-part12-rar.html
http://pointupload.com/en/server/C3C41F575/AppD---NET-Sec-part15-rar.html
http://pointupload.com/en/server/6B305EC55/AppD---NET-Sec-part14-rar.html

mirror:
Code:

http://rapidshare.com/files/51242195/AppD.--NET_Sec.part01.rar
http://rapidshare.com/files/51242304/AppD.--NET_Sec.part02.rar
http://rapidshare.com/files/51242428/AppD.--NET_Sec.part03.rar
http://rapidshare.com/files/51242523/AppD.--NET_Sec.part04.rar
http://rapidshare.com/files/51242699/AppD.--NET_Sec.part05.rar
http://rapidshare.com/files/51242921/AppD.--NET_Sec.part06.rar
http://rapidshare.com/files/51243251/AppD.--NET_Sec.part07.rar
http://rapidshare.com/files/51243534/AppD.--NET_Sec.part08.rar
http://rapidshare.com/files/51243810/AppD.--NET_Sec.part09.rar
http://rapidshare.com/files/51244053/AppD.--NET_Sec.part10.rar
http://rapidshare.com/files/51244302/AppD.--NET_Sec.part11.rar
http://rapidshare.com/files/51244522/AppD.--NET_Sec.part12.rar
http://rapidshare.com/files/51244717/AppD.--NET_Sec.part13.rar
http://rapidshare.com/files/51244892/AppD.--NET_Sec.part14.rar
http://rapidshare.com/files/51245075/AppD.--NET_Sec.part15.rar
http://rapidshare.com/files/51242052/AppD.--NET_Sec.part16.rar




VTC Microsoft Windows Vista Security


Title: Microsoft Windows Vista Security
Release Date: 2007-10-19
Duration: 6 hrs / 67 lessons

Windows Vista is Microsoft’s newest operating system. Although it’s considered to be the most secure version of the Microsoft Windows operating system to date, configuring its new security features and winding your way through Vista’s new user interfaces can be a daunting task. VTC author & experienced security administrator Bobby Rogers will guide you to the key information that both beginners and seasoned professionals will need to securely deploy Windows Vista in a home, small business, or enterprise-level environment.

To begin learning simply click the links.

http://rapidshare.com/files/89598288/VTCMWVSTNSD.part1.rar
http://rapidshare.com/files/89589115/VTCMWVSTNSD.part2.rar
http://rapidshare.com/files/89588759/VTCMWVSTNSD.part3.rar

Bank2

Revison Notes on IT Questions

Questions on Computer Awareness have recently been introduced in most Bank Recruitment exams. To help you prepare better for the Bank exams we present to you the revision notes on Computer Awareness.

The earlier computers, which were massive in size, were based on vacuum tubes.

Early computing machines, like the ENIAC, were actually meant to assist the armed forces.

The printers in pre-1950s were punch cards.

An improvement on the ENIAC, which pioneered ‘stored program’, was made possible with the help of the mathe-matician John von Neumann.

Before the 1950s, computers were mostly owned by universities and research labs.

The B-programming language was developed by Ken Thompson.

Famous people, associated with the ENIAC, EDVAC, UNIVAC computers are Eckert & Mauchly.

The 1st commercially produced and sold computer (1951) was UNIVAC.

IBM was provided software for PCs by Microsoft.

Time-sharing, teletyping, were associated with mainframe computers.

The transformation from heavy computers to PCs was made possible using microprocessors.

The first microprocessor was developed in 1971 by Intel.

The term ‘micro’ (extremely small) denotes 10–6 m.

The Harvard student, who chose to write computer programs and dropped studies was Bill Gates.

A pentium 4 (P-4) employs roughly 40 million transistors.

Mark-1, Apple-1, and collossus were initial desktop computers.

Binary digits are briefed as bit.

A collection of bits is called byte.

C++, is a computer language.

The process of eliminating pro-gramming faults is called debugging.

Starting up on operating system is called booting.

A program used to browse the web is called browser.

An error in software designing which can even cause a computer to crash is called bug.

Click and double-click are achieved using the mouse.

Java, C, ForTran, Pascal and BASIC are computer programming languages.

The device which sends computer data using a phone line is called MODEM.

‘Worm’ and ‘virus’ are actually programs.

A ‘file’ is a unit of information.

A megabyte has 106 (million) bytes.

A small, single-site network is called LAN.

A processor that collects several data and sends them over a single line is called bridge.

‘Nano’ stands for one billionth part.

The number of bit patterns using an n-bit code is 2n.

The part of a computer that works with the data/programs is called CPU.

To convert a binary number to a decimal, we have to express it in power of 2.

www stands for world wide web.

Mathematics employed in compu-ters is called Boolean algebra.

A collection of 8 bits is called byte.

The first home computer (1977), which was sold in millions of units was Apple II.

‘PARAM’ is a supercomputer.

A website containing periodic posts is called blog.

While cutting and pasting, the cut item is temporarily stored in the clipboard.

http stands for hypertext transfer protocol.

The unwanted or non-requested e-mails are called “spam”.

A computer framed to give various network services is called server.

Sunday, June 7, 2009

Networking (CBT) Complete Collection

Complete CBT IT training videos - Including All Titles Released in 2008 & 2009


Nugget Archive Server - with 2008 Video LibraryOur complete catalog of IT training videos - Including All Titles Released in 2008

$18,999.00 - Includes 3019 Videos You save $22,875.00 on this package

In-House IT Training Library KeepsAll Your Employees Well-Trained
The Nugget Archive Server is the perfect in-house training solution for corporations, universities and other organizations with multiple IT staff members to train. It contains every CBT Nuggets IT video in our inventory†, and comes with 10 concurrent user licenses for up to 10 people to train at once. (Plus additional user licenses can be added at any time.)

This is the link to make sure
http://www.cbtnuggets.com/webapp/product?id=428
Running Time: 1489 Hours
CONTENTS

Windows
Windows NT
Windows 2000: Exam-Pack 70-210: Professional
Windows 2000: Exam-Pack 70-214: Security
Windows 2000: Exam-Pack 70-215: Server
Windows 2000: Exam-Pack 70-216: Network Infrastructure
Windows 2000: Exam-Pack 70-217: Directory Services
Windows 2000: Exam-Pack 70-218: Managing a Network Environment
Windows 2000: Exam-Pack 70-219: Designing a Directory Services Infrastructure
Windows 2000: Exam-Pack 70-220: Designing Network Security
Windows 2000: Exam-Pack 70-221: Designing a Networking Services Infrastructure
Windows XP: Exam-Pack 70-270: Professiona
lWindows XP: Exam-Pack 70-271: Supporting XP
Windows XP: Exam-Pack 70-272: Supporting Apps in XP
Windows 2003: Exam-Pack 70-292: MCSA 2003 Upgrade
Windows 2003: Exam-Pack 70-296: MCSE 2003 Upgrade
Windows 2003: Exam-Pack 70-290: Maintaining Windows Server 2003
Windows 2003: Exam-Pack 70-291: Windows 2003 Network Infrastructure
Windows 2003: Exam-Pack 70-293: Planning and Maintaining a 2003 NetworkWindows 2003: Exam Pack 70-294: Planning/Maintaining Windows 2003 Active DirectoryWindows 2003: Exam-Pack 70-297: Designing 2003 Active Directory and NetworkWindows 2003: Exam-Pack 70-298: Designing SecurityWindows 2003: Exam-Pack 70-299: Administering Security in Windows 2003
Security
Security+ SeriesCISSP Certification PackageCertified Ethical HackerOn The Job Training Series: End-User SecuritySSCP SeriesWindows 2000: Exam-Pack 70-214: SecurityWindows 2000: Exam-Pack 70-220: Designing Network SecurityWindows 2003: Exam-Pack 70-298: Designing SecurityWindows 2003: Exam-Pack 70-299: Administering Security in Windows 2003Microsoft ISA ServerMicrosoft ISA Server 2004Cisco CCSP-SECUR - Exam-Pack 642-501Cisco CCSP-CSI - Exam-Pack: 642-541Cisco CCSP-CSIDS - Exam-Pack: 642-531Cisco CCSP-SNPA - Exam-Pack: 642-522Cisco CCSP-CSVPN - Exam-Pack: 642-511
Exchange
Exchange 5.5Exchange 2000 AdministrationExchange 2003 AdministrationExchange 2003 DesignMOS Series: Outlook 2003
Cisco
Cisco CCNA Certification PackageCisco CCNP-BSCI Certification PackageCisco CCNP-BCMSN Certification PackageCisco CCNP-CIT Certification PackageCisco CCNP-BCRAN Series (Remote Access)Cisco CCSP - Exam-Pack: 642-551 SNDCisco CCDA SeriesCisco CCSP - Exam-Pack: 642-532 IPSCisco CCDP - Exam-Pack: 642-871 ARCHCisco CCIE Certification PackageCisco CCIE Video Practice LabCisco CCSP-SECUR - Exam-Pack 642-501Cisco CCSP-CSI - Exam-Pack: 642-541Cisco CCSP-CSIDS - Exam-Pack: 642-531Cisco CCSP-SNPA - Exam-Pack: 642-522Cisco CCSP-SNRS - Exam-Pack 642-502Cisco CCSP-CSVPN - Exam-Pack: 642-511Cisco CCVP-CVOICE - Exam Pack: 642-432Cisco CCVP-QoS - Exam-Pack: 642-642
CompTIA
2005 A+ Series2005 Network+ SeriesServer+ Certification PackageSecurity+ SeriesLinux+ Series
Web Development
CIW Perl FundamentalsCIW JavaScript FundamentalsCIW Associate Series - CIW FoundationsiNet+ Series
Project Mgt
PMP Certification PackageProject+ SeriesMicrosoft Project
Citrix
Citrix MetaFrame XP CCA Certification Package
MCDBA
Oracle 9i/10g OCA SeriesSQL FundamentalsSQL 2000 AdministrationSQL 2000 Implementation and DesignWindows 2000: Exam-Pack 70-215: ServerWindows 2000: Exam-Pack 70-216: Network Infrastructure
Programming
On The Job Training Series: C#On The Job Training Series: JavaJava - SCJP Certification PackageIntro to Programming with VB.NETIntro to XML and Programming using the Microsoft.NET PlatformDeveloping Web Apps with VB.NET: Exam-Pack 70-305Developing Windows Apps with VB.NETDeveloping XML Web Services and Server Components with VB.NETAnalyzing Requirements and Defining Microsoft .NET Solution ArchitecturesVB 6.0 Fundamentals PackageVB 6.0 Desktop ApplicationsVB 6.0 Distributed Applications
MS Office
MOS Series: Excel 2000MOS Series: Word 2000MOS Series: PowerPoint 2000MOS Series: Outlook 2003MOS Series: Excel 2003MOS Series: Word 2003MOS Series: PowerPoint 2003
Wireless
Wireless# Certification PackageCWNA Certification PackageCWNA Certification Package Update
Linux
Linux+ SeriesIntermediate to Advanced Linux SeriesLinux LPIC-1 SeriesLinux LPIC-2 Series
Here are the links(Size : 20 GB)

Download:

Networking


K.Alliance Interconnecting Cisco Networking Devices
K.Alliance Interconnecting Cisco Networking Devices DVD 1 & 2 1.45 GB


Interconnecting Cisco Networking Devices Part 1 (ICND1) Online / CBT Training Course
If you are looking for a cost-effective IT course to enhance your skills and knowledge then our ICND1 training course is just what you have been looking for. Not only will you learn from subject matter experts who have years of experience on the subject, but you also never need to buy any additional materials since everything you need to learn successfully is included in the Interconnecting Cisco Networking Devices Part 1 video course. This ICND1 training course will not only help those preparing for the certification, but it will also help those who would like to learn more about Cisco.
Interconnecting Cisco Networking Devices Part 2 (ICND2) Online / CBT Training CourseSo, you're a bit familiar with Cisco, but would like to dive a bit deeper into it, so why not take our ICND2 training course that will help you master it. Taught by certified professionals in the industry, know that when taking our course, you will be receiving quality IT training that is also cost-effective since you do not need to purchase any additional materials to be successful in the Interconnecting Cisco Networking Devices Part 2 video course since everything is included in it already for you. This ICND2 training course is best intended for those looking to enhance their knowledge and skills, as well as for those looking to obtain a Cisco Certified Network Associate certification.



Download Interconnecting Cisco Networking Devices Part 1 (ICND1) Online / CBT Training Course













http://hotfile.com/dl/4326212/367ad5a/K.A.I.C.N.D.D1-i.part05.rar.html






Download Interconnecting Cisco Networking Devices Part 2 (ICND2) Online / CBT Training Course











Friday, June 5, 2009

bank1

Computer General Awareness : Bank PO's, Bank Clerk

1. Which of the following is a part of the Central Processing unit?

a. Printer

b. Key board

c. Mouse

d. Arithmetic & Logic unit

e. None of these

2. CAD stands for

a. Computer aided design

b. Computer algorithm for design

c. Computer application in design

d. All of the above

e. None of these

3. Which of the following printer cannot print graphics?

a. Ink-jet

b. Daisy Wheel

c. Laser

d. Dot-matrix

e. None of these

4. A program written in machine language is called?

a. Assembler

b. Object

c. Computer

d. Machine

e. None of these

5. The father of Modern Computer is

a. Charles Babbage

b. Von-nuumann

c. Danies Ritchel

d. Blaise Pascal

e. None of these

6. The Word FTP stands for

a. File Translate Protocol

b. File Transit Protocol

c. File Transfer protocol

d. file typing protocol

e. None of these

7. The lowest form of Computer language is called

a. BASIC

b. FORTRAN

c. Machine Language

d. COBOL

e. None of these

8. Best Quality graphics is produced by

a. Dot Matix

b. Laser Printer

c. Inkjet Printer

d. Plotter

e. None of these

9. Memory which forgets every thing when you switch off the power is known as

a. Corrupted

b. Volatile

c. Non-Volatile

d. Non-Corrupted

e.None of these

10.The linking of computers with a communication system is called

a. Networking

b. Pairing

c. Interlocking

d. Assembling

e. Sharing

11.The 16 bit Microprocessor means that it has

a. 16 address lines

b. 16 Buses

c. 16 Data lines

d. 16 routes

e. None of these

12. Data going into the computer is called

a. Output

b. algorithm

c. Input

d. Calculations

e. flow chart

13. Which of the following refers to a small, single-site network?

a. LAN

b. DSL

c. RAM

d. USB

e. CPU

14. Microsoft Office is

a. Shareware

b.Public domain software

c. Open-sourse software

d. A vertical market application

e. An application
suite

15
. How many options does a BINARY choice offer

a. None of these

b. One

c. Two

d. it depends on the amount of memory on the computer

e. It depends on the speed of the computer’s processor

16. A collection of program that controls how your computer system runs and processes information is called

a. Operating System

b. Computer

c. Office

d. Compiler

e. Interpreter

17. Computer connected to a LAN (Local Area Network) can

a. run faster

b. go on line

c. share information and /or share peripheral equipment

d. E-mail

e. None of these

18. Information travels between components on the mother board through

a. Flash memory

b. CMOS

c. Bays

d. Buses

e. Peripherals

19. How are data organized in a spreadsheet?

a. Lines & spaces

b. Layers & Planes

c. Height & Width

d. Rows & Columns

e. None

20. The blinking symbol on the computer screen is called the

a. mouse

b. logo

c. hand

d. palm

e. cursor

21. A fault in a computer program which prevents it from working correctly is known as

a. Boot

b. Bug

c. Biff

d. Strap

e. None of these

22. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________

a. Bug

b. Vice

c. Lice

d. Worm

e. None of these

23. A _______ is a bi-stable electronic circuit that has two stable states.

a. Multivibrator

b. Flip-flop

c. Logic gates

d. laten

e. None of these

24. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as

a. Spam

b. Trash

c. Calibri

d. Courier

e. None of these

25.DOS stands for

a. Disk Operating System

b. Disk operating session

c. Digital Operating System

d. Digital Open system

e. None of these

26. Who is the chief of Miocrosoft

a. Babbage

b. Bill Gates

c. Bill Clinton

d. Bush

e. None of these

27. Which of the following are input devices.

a. Keyboard

b. Mouse

c. Card reader

d. Scanner

e. All of these

28. Examples of output devices are

a. Screen

b. Printer

c. Speaker

d. All of these

e. None of these

29. Which of the following is also known as brain of computer

a. Control unit

b. Central Processing unit

c. Arithmatic and language unit

d. Monitor

e. None of these

30. IBM stands for

a. Internal Business Management

b. International Business Management

c. International Business Machines

d. Internal Business Machines

e. None of these

31.___________ translates and executes program at run time line by line

a. Compiler

b. Interpreter

c. Linker

d. Loader

e. None of these

32. ___________ is an OOP principle

a. Structured programming

b. Procedural programming

c. Inheritance

d. Linking

e. None of these

33. COBOL is widely used in _________ applications

a. Commercial

b. Scientific

c. Space

d. Mathematical

e. None of these

34. RAM stands for

a. Random origin money

b. Random only memory

c. Read only memory

d. Random access memory

e. None of these

35. 1 Byte = ?

a. 8 bits

b. 4 bits

c. 2 bits

d. 9 bits

e. None of these

36. SMPS stands for

a. Switched mode Power Suply

b. Start mode power supply

c. Store mode power supply

d. Single mode power supply

e. None of these

37. The device used to carry digital data on analog lines is called as

a. Modem

b. Multiplexer

c. Modulator

d. Demodulator

e. None of these

38. VDU is also called

a. Screen

b. Monitor

c. Both 1 & 2

d. printer

e. None of these

39. BIOS stands for

a. Basic Input Output system

b. Binary Input output system

c. Basic Input Off system

d. all the above

e. None of these

40. Father of ‘C’ programming languagea. Dennis Ritchie

b. Prof Jhon Kemeny

c. Thomas Kurtz

d. Bill Gates

e. None of these

ANSWERS

1. (d) 2. (a) 3. (b) 4. (a) 5. (a)

6. (c) 7. (c) 8. (d) 9. (b) 10. (a)

11. (c) 12. (c) 13. (a) 14. (e) 15. (c)

16. (a) 17. (c) 18. (c) 19. (d) 20. (e)

21. (b) 22. (d) 23. (b) 24. (a) 25. (a)

26. (b) 27. (e) 28. (d) 29. (b) 30. (c)

31. (b) 32. (c) 33. (a) 34. (d) 35. (a)

36. (a) 37. (a) 38. (c) 39. (a) 40. (a)