Se afișează postările cu eticheta Descarcari. Afișați toate postările
Se afișează postările cu eticheta Descarcari. Afișați toate postările

program charles hack all games

hi 

program charles hacked all game 

ABOUT CHARLES

Charles is a web proxy (HTTP Proxy / HTTP Monitor) that runs on your own computer. Your web browser (or any other Internet application) is then configured to access the Internet through Charles, and Charles is then able to record and display for you all of the data that is sent and received.

In Web and Internet development you are unable to see what is being sent and received between your web browser / client and the server. Without this visibility it is difficult and time-consuming to determine exactly where the fault is. Charles makes it easy to see what is happening, so you can quickly diagnose and fix problems.

Charles makes debugging quick, reliable and advanced; saving you time and frustration!


this link download

http://www.mediafire.com/?4bon9ndz6o9853k

this link learn hack farm vile 

 http://youtube.com/watch?v=yEcutJCMblA

this link learn hack pool live tour

 http://youtube.com/watch?v=MWZrqfJfqAA


learn after all learn hack game 
thank you all

program gratuit pentru prezentari

Program pentru prezentari.

prezi
Cred ca fiecare dintre voi la un moment dat a trebuit sa faca o prezentare,de obicei in PowerPoint.Astazi va voi prezenta o alternativa:Prezi.
Prezi este o solutie atat online si cat si offline care merge pe  o idee diferita fata de PowerPoint;daca in Power Point fiecare “idee ” este realizata intr-un slide,in prezi toata prezentarea e pe o coala mare pe care facem zoom in sau out deplasandu-ne pe diferite zone.Parerea mea este ca in acest mod prezentarea va fi mult mai atractiva  si va da dovada de mai mult profesionalism.
Mai jos aveti o scurta prezentare a programului pentru a va face o idee.Mai sunt insa cateva idei de precizat:Prezi este gratis dar in cazul prezentarilor care contin si fisiere audio sau imagini te vei lovi de limita de 100mb;pentru a ridica limita la 500 mb va trebui sa platesti.

Bara de navigare in Photoshop

Astazi vom invata cum sa realizam o bara de navigare ( o bara de meniu ) folosindu-ne de Adobe Photoshop. In acest articol vom face o bara de meniu clasica, foarte simpla, vor mai exista tutoriale in care voi face si alte tipuri de meniuri.
Pasul 1: Facem un nou document in Adobe Photoshop (File-New) cu dimensiunile de 600×400 px si fundal alb.
1 - crearea unui nou document
Pasul 2: Folosim Rounded Rectangle Tool (U) si cu brush setat pe culoarea albastra, intr-un nou layer, facem urmatoarul shape.
2 - Rounded rectangle Tool
Pasul 3:  Dupa ce am facut acea forma, dam click dreapta pe layerul proaspat creat si alegem optiuneaBlending Options. Iar pentru Gradient Overlay facem urmatoarele setari:
Gradient Tool - bara de navigare
Pasul 4: Inner Shadow
Inner Shadow - bara de navigare
Pasul 5: Stroke
5
Pasul 6: Asa ar trebui sa fie bara daca ati respectat setarile de mai sus.
6
Pasul 7: Alegem Type Tool si adaugam butoanele peste bara creata. Incercati sa nu folositi fonturi foarte sofisticate pentru ca vor strica aspectul website-ului. Eu am folosit fontul Arial, Regular, 13 PT.
7
Pasul 8: Click dreapta pe layerul cu textul si facem urmatorele setari pentru Drop Shadow
8
Pasul 9: Din bara de unelte, alegem Single Column Marquee Tool si facem o selectie ca in imaginea de mai jos, bineinteles, intr-un Layer nou.
9
Pasul 10: Umpleti selectia cu culoarea alba iar apoi cu Eraser Tool (E) incercati sa-i dati un aspect cat mai “ascutit” la capete.
single column marquee tool
Pasul 11: Duplicati layerul cu separatorul (Ctrl+J) sau mai faceti inca o data aceeasi chestie ca la pasul 10, doar ca folosind culoarea neagra.
11
Pasul 12: Schimbati modul layerelor cu separatoarelor pe Soft Light.
12
Pasul 13: Repetati pasii 9-12 pentru a face si celelalte separatoare.
13
Asa ar trebui sa arate rezultatul, eu am mai facut inca 2 meniuri de culori diferite. Sper ca tutorialul sa va ajute, puteti descarca PSD-ul cu bara de navigare mai jos!
Bara de navigare in Photoshop - Tutorial in romana
Unele imagini sunt neclare, asta datorita functiei acestei teme de a redimensiona imaginile pentru ca site-ul sa nu fie distorsionat, de aceea este necesar sa dati click pe ele pentru a le vedea HD.

Descarca PSD-ul cu bara de navigare 

program gratuit pentru marirea ram-ului

Ai probleme cu memoria RAM a pc-ului/laptop-ui tau? Ai vrea sa-ti cumperi inca o placuta dar nu-ti permiti? Atunci este timpul sa folosesti SuperRam. Ce este acest program?
SuperRam este o aplicatie pentru Windows (XP/2003/Vista/Server 2008/7) ce mareste puterea de functionare a placutelor RAM. Acest program, pe langa faptul ca “stoarce” placutele ram pentru a le mari eficacitatea, mai si scade din memoria alocata proceselor care nu le folosesti pe moment, sau care nu au o importanta asa de mare si o concetreaza pe jocul/programul/filmul ce-l rulezi.
A fost testat de cei de la CNET pe un sistem cu 8GB RAM, programul facandu-si foarte bine treaba marind eficienta placutelor pana la aproximativ 10 GB de memorie. Daca facem niste calcule, creste puterea de functionare cu aproximativ 25%, destul de bine, zic eu pentru un simplu program.

AVANTAJE ALE PROGRAMULUI 
  • Poti alege momentele in care programul sa intervina si cat la suta din RAM sa elibereze pentru a marii performantele PC-ului tau.
Setari superram

  •  Cu ajutorul programului poti face un speed test care-ti va arata capacitatea calculatorului/laptop-ului tau iar in functie de asta sa-ti faci setarile despre care vorbeam mai sus.
  • Totodata puteti vedea in timp real statistici ale pc-ului tau.
Statistici live super ram
Programul il puteti testa gratis pe o perioada de 30 de zile dupa care hotarati daca merita sau nu sa platiti licenta. Aveti link mai jos catre pagina de descarcare a programului.

Descarca Super Ram

Program de descarcat muzica gratis romaneasca manele populara

Program de descarcat muzica gratis

Prin folosirea unui program de descarcat muzica vei scapa cu siguranta de o gramada de nervi . Spun asta din propie experienta . Nu de putine ori mi s-a intamplat sa am nevoie de un anumit fisier multimedia. Si cum cel mai simplu mod pe care il stiam era sa fac o cautare pe Google cu numele fierului de care aveam nevoie , exact asta faceam! Si asa incepea “distractia” : Cauta pe site-uri butonul de download – care bineinteles e bine ascuns in spatete zecilor de reclame cu care esti bombardat , sari de pe un site pe altul – poate poate reusesti sa gasesti afurisitul ala de buton , si , cand intr-un final il gasesti surpriza: ori trebuie sa astepti un anumit timp pana a incepe download-ul , ori trebui sa ” introduceti codul din imagine” (care apropo, de multe ori e inteligibil), ori download-ul pur si simplu nu vrea sa porneasca .   Toate acestea m-au determinat sa caut alternative.  Asa am reusit sa gasesc cateva programe foarte bune  de descracat muzica !
Astazi vom vorbi despre un astfel de program. Programul se numeste music2pc iar cu ajutorul lui veti descarca foarte usor muzica de pe internet !    Link-ul de download in gasiti, ca de obicei , la sfarsitul acestui articol. Pe pagina oficiala a programului veti avea posibilitatea sa descarcati instaler-ul cat si versiunea portabila a acestuia . (Eu am optat pentru versiunea portabila a acestuia – e mai comoda !!! )
music2pc-descarca-gratuit-muzica

Dupa cum vedeti si in imaginea de mai sus(click pe poza pentru a fi incarcata la calitatea originala ), interfata programului este minimalista, si foarte usor de utilizat. In casuta de cautare scrieti numele melodiei pe care o cautati si faceti click pe butonul Search . Se va incarca lista cu melodiile gasite , iar in partea dreapta a fiecarui element veti gasi si un buton de download. Cand doriti sa descarcati o anumita melodie pur si simplu  faceti click pe butonulaferent si acesta va fi descarcata in locatia specificata in subsolul programului. 
Asa cum vedeti totul se desfasoara foarte simplu, fara reclame, fara timp pierdut si fara alte minunatii care sa intarzie  mai mult decat este necesar!

De ce sa alegi acest program ? Simplu :

  • descărca peste 100 de milioane de melodii MP3 cu viteză incomparabilă, la cea mai bună calitate, în condiții de siguranță.
  • multi-thread, descărca mai multe melodii, în același timp
  • gasitrea cu usurintă a melodiilor, doar introduceti titlul melodiei, numele artistului, sau al albumului
  • interfață simplă și intuitivă.
  • poti gasi mai multe versiuni ale aceleiasi melodii (remixate, interpretate la pian, chitara etc.)

Legile privind utilizarea programelor prezentate pentru descărcarea materialelor cu drepturi de autor pot varia în funcție de țara în care vă aflați. Nu încurajez sau aprob utilizarea acestor programe pentru a descărca materiale ilegale.

Ardamax 4.01 FULL - Tested&Working

Cred ca toti stim ce este Ardamax Keylogger nu?

Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

This invisible spy application is designed for 2000, XP, 2003, Vista, 7 and Windows 8.

SUrsa : http://www.ardamax.com/keylogger/
Pentru ca nam incredere in toate kkturile de pe net, am cautam o metoda sa inregistrez ultima versiune 4.01 safe&clean.

Asa ca :

Pasul 1 : Downloadam Kit-ul direct de la sursa :
 Ardamax Keylogger - invisible keylogger with remote installation feature
Pasul 2: Inregistram Programul cu 00-67NK4K-BRUCE-07E
Pasul 3: La nume (ID) punem ce vrem....Random....

L-am testat in seara asta, remote si primesc logurile pe email!

Curand o sa fac si un tutorial despre cum putem sa facem "spread" in mod eficient!

Numai Bine!

unix-privesc-check

unix-privesc-check

Unix-privesc-checker is a script that runs on Unix systems (tested on Solaris 9, HPUX 11, Various Linuxes, FreeBSD 6.2). It tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (e.g. databases).
It is written as a single shell script so it can be easily uploaded and run (as opposed to un-tarred, compiled and installed). It can run either as a normal user or as root (obviously it does a better job when running as root because it can read more files).

Download

unix-privesc-check v1.4 can be downloaded here. (Version 1.1 is here if you still need it).
Update: The google code SVN is more up to date.
Usage

The download is gzip’d, so gunzip it. Upload it to the server you’re auditing / pentesting then just run it:

Code:
$ ./unix-privesc-check > output.txt
The output’s a bit messy (it’s hard to be neat with shell scripts), so you’re probably best to save the output and search it for the word ‘WARNING’. If you don’t see the word ‘WARNING’ then the script didn’t find anything. Example:

Code:
$ ./unix-privesc-check
Code:
Starting unix-privesc-check v1.0 ( http://pentestmonkey.net/tools/unix-privesc-check )

This script checks file permissions and other settings that could allow
local users to escalate privileges.

Use of this script is only permitted on systems which you have been granted
legal permission to perform a security assessment of.  Apart from this
condition the GPL v2 applies.

Search the output below for the word 'WARNING'.  If you don't see it then
this script didn't find any problems.

Assuming the OS is: linux

############################################
Checking if external authentication is allowed in /etc/passwd
############################################
No +:... line found in /etc/passwd

############################################
Checking nsswitch.conf for addition authentication methods
############################################
Neither LDAP nor NIS are used for authentication

What’s the Intended usage of user-privesc-checker?

It’s intended to be run by security auditors and pentetration testers against systems they have been engaged to assess, and also by system admnisitrators who want to check for “obvious” misconfigurations. It can even be run as a cron job so you can check regularly for misconfigurations that might be introduced.
I wanted to write something that was at least partially useful to pentetration testers when they gained access to a low-privilege account and wanted to escalate privileges. There are lots of things that pentesters will check in this situation and one of the most tedious to check is weak file permissions – this of often one of the most fruitful, though, so there’s no avoiding it.
Disclaimer: Running this script alone isn’t a substitute for proper audit (e.g. following one of the NSA’s excellent configuration guides). There are lots of possibilities for escalation that are just too hard to audit using a script. This script is intended to be a shortcut, not a replacement for a proper audit. See the “Limitations” section below for lots of examples of areas not covered by this script.
So this is a Unix Audit Script?

Not in the traditional sense. “Unix Audit” means different things to different people. I understand it to mean checking a whole array of configuration settings including:

  • Security patches (i.e. that they’ve been applied)
  • Cracking passwords to check for weak ones
  • IP Stack configuration (no unnecessary IPv6, no IP Forwarding, etc.)
  • Weak file permissions (reading sensitive data, modifiying sensitive files)
  • Configuration of local applications (reviewing sshd_config, httpd.conf)
  • Other best-practise stuff (remote logging, no insecure protocols, paranoid mount options)
So, no it’s not an audit script in this sense. It doesn’t set out to do all these things. It checks for a subset of these which relate directly to privilege escalation. It focusses mainly on generic techniques: common misconfigurations and weak file permissions. It doesn’t check for missing patches, however this is difficult to check “on-box” using a single shell script. Checkout exploit-suggester if you’re interested in doing this “off-box”..
Why Another Auditing Script?

There are lots of scripts out there that will perform a local security audit for you (Tiger and LSATare good examples). Some hoover data so you can analyse it offline, others will analyse it too and present you a nice report. These have their place and I’ll continue to use them. However…
I haven’t found one that gives me a quick list of obvious attack vectors which is written as a single shell script (I hate shell scripts too, but it I wanted a script that would run on virtually any Unix system).
I therefore decided to write unix-privesc-audit to focus on finding misconfigurations that can actually be exploited as opposed to finding all the usual best-practise stuff.
Some Vulnerabilities Introduced Through Weak File Permissions

Below is a list of the checks performed by the script. Note that whenever it checks file permissions, it also checks the permissions on the parent directories. When it finds a group-writable file or directory it only flags an issue if that group has more than one non-root member.
Writable Home Directories

If you can write to someone’s home directory, you could add a .rhosts file or .ssh/authorized_keys file and log in right away; or alter one of the login scripts (e.g. .bash_profile) and have them create an SUID shell when they log in. There are lots of problems if home directories are writable.
The script flags a warning if any home directories are writable by anyone other than the owner or root.
Readable /etc/shadow

Not so common these days, but could allow you to read password hashes, crack them then log in as other users.
This script checks if the shadow file is readable by non-root users. If it can read the shadow file, it also performs some other checks (see below).
Weak Permissions On Cron Jobs

Cron jobs are normally listed in /etc/crontab and /var/spool/cron/crontabs/. Cron jobs can be run by any user. This script check if cron jobs run programs that can be modified by users other than root and the user the job runs as.
Writable Configuration Files

Programs that are run as root are listed in lots of files (/etc/init.d/*, /etc/inetd.conf, /etc/xinetd.d/*, etc.) If any of these files are writable by non-root users, this script will flag a warning.
Writable Device Files

This script checks that device files corresponding to currently mounted file systems (e.g. /dev/sda1) aren’t writable. I doubt this happens very often to be honest, but it doesn’t hurt to check.
Readable Files In Home Directories

There can be lots of interesting things in home directories, but this script checks for files that contain passwords (.netrc, .my.cnf) and ACLs (.rhosts, .ssh/*). If readable these can provide a way access local applications or other local user accounts.
Running Processes Correspond To Writable Programs

This script does a “ps” listing, attempts to determine the full path of each program running and check if it can be modified by anyone other than the user it’s running as and root.
Other Stuff Not Related With File Permissions

The script also performs a couple of other checks related to privilege escalation, but not related to file permissions:
Sudo Configuration

Sudo is one of the most obvious ways to escalate privileges if it’s enabled. Sometimes only certain commands can be run, sometimes any command can be run.
If /etc/sudoers is readable, this script checks if it’s being used, lists which users can use sudo and which ones can use it without a password.
Accounts with no Password

If /etc/shadow is readable, the script lists any accounts without passwords.
How useful is unix-privesc-check in practise?

It depends largely on the base OS and the amount of configuration an administrator has done (more configuration = more chance of mistakes). If you run it against a fairly modern OS (e.g. Linux, Solaris 9/10) that hasn’t had much configuration done, then you’re not going to find much. These OSs have faily secure file permissions by default. However, if you run it against Solaris 8 or against a system that has been running for a couple of years and had a lot of configuration done or 3rd party apps installed, then you’ll probably find quite a bit.
I’m ashamed to say that I found a couple of serious misconfigurations in my own Linux box when I ran this script!
Limitations

Currently only the stuff above is checked. None of the other “traditional audit” stuff is checked. There are also some obvious privilege escalation tactics regarding file permissions which are too hard to script up (for me at least). This list acts as a list of limitations / inspiration for manual testing / working TODO list:

  • Actually reading shell scripts, finding that they call then checking the file permissions on called programs (e.g. seeing /etc/init.d scripts call anything in an insecure way, checking shell scripts that are run a login time)
  • Checking the PATHs for users then looking for insecure programs within those directories
  • Polling “ps” to identify processes that don’t run very often and checking that the program being run has secure file permissions.
  • Checking for non-standard programs with the SUID bit set
  • Checking arguments of currently running processes (e.g. if a process runs as root and had “/dir/somefile.conf” as an argument it would be worth checking the perms on that file).
  • It doesn’t parse shell script names, perl script names or any other kind of script name from the process listing. It just checks /bin/sh and /usr/bin/perl normally. This is a pretty big limitation actually at the moment. It a process is called “/bin/sh /tmp/dodgy-n-writable.sh” it’s probably worth investigating).
  • It doesn’t check the permissions of shared object files for each running process. This info is availalable in /proc/pid/maps, /proc/pid/smaps on Linux at least, so this feature may follow shorty.
  • It doesn’t check the permissions on open files. Again this info is available on Linux at least in /proc/pid/fd/, so this feature may follow shortly.
  • Doesn’t report /etc/hosts.equiv trust relationships.
  • No checks for NFS mounts / exports. These are a common source of insecurity.
  • Doesn’t check stuff run from inittab.
Yeah, lots and lots of limitations, so make sure you do a manual audit too.  I hope this script saves you some time, though.

Sursa: unix-privesc-check | pentestmonkey