Jumat, 15 April 2011

Google Apps Hacks

Google Apps Hacks
Can Google applications really become an alternative to the venerable Microsoft Office suite? Conventional wisdom may say no, but practical wisdom says otherwise. Right now, 100,000 small businesses are currently running trials of Google office applications. So are large corporations such as General Electric and Proctor & Gamble. Google Apps Hacks gets you in on the action with several ingenious ways to push Google's web, mobile, and desktop apps to the limit.

The scores of clever hacks and workarounds in this book help you get more than the obvious out of a whole host of Google's web-based applications for word processing, spreadsheets, PowerPoint-style presentations, email, calendar, and more by giving you ways to exploit the suite's unique network functionality.

Download

Enjoy ..

Selasa, 05 April 2011

Auto Hide IP 5.0.6.8

Auto Hide IP 5.0.6.8 | 5.82 Mb
Browsing on the Internet is becoming more and more dangerous in today's world. Hackers and identity thieves are trying to use your IP address to get any information out of you: home address, credit card information, social security information, your bank accounts and other personal information.

Auto Hide IP is privacy-protection software which enables you to conceal your real IP address, surf anonymously, and automatically change your IP address every few minutes.

With it, you can select a fake IP address from different countries via "Choose IP Country" option and can Check IP directly. It allows you to conceal your identity online by showing a fake IP address, blocking hackers and prying eyes from monitoring you. You can also choose "Launch on Startup" and then it will run and load a fake IP address automatically when you log on to Windows. Besides, you can easily switch between fake IP and real IP, all with the click of a button.

Auto Hide IP works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks and any other kind of Internet.

Key Features :

- Anonymous Web Surfing
Assign you fake IP addresses and guard against hackers who will be tricked by your fake IP instead of your real one.

- Protect Your Identity
Hide your real IP when surfing the web to prevent hackers or identity thieves from monitoring your web activity or stealing your personal information such as your financial information.

- Choose IP Country
You decide to use fake IP from different countries via "Choose IP Country" option and you can check the current IP directly.

- Send Anonymous Emails

Hide your real IP address in email headers. Be protected in email-sending from Yahoo!, Hot-mail, GMail, etc.

- Un-ban Yourself from Forums and Message Boards
Use Auto Hide IP to change your IP which allows you to access any forums or restricted websites that have banned you.

- Platform
Windows 2000/XP/Vista/7

Install Notes :
1). Install Auto Hide IP v5.1.3.6, and do not run.
2). Copy the crack "AutoHideIP.exe" to prog dir, i.e."C:\Program Files\AutoHideIP\", and overwrites the original.
3). DONE!

Download Here:
(Click Skip Ad)

enjoy..

Cara Membobol Password Hotspot Dengan K-MAC

Cara Membobol Password Hotspot Dengan K-MAC

Cara Membobol Password HotSpot Seperti kita ketahui, HotSPOT atau tempat akses internet Wireless dengan standard 802.11b/g sudah bukan barang asing lagi ditelinga kita, dan bila kita berpergian di tempat publik seperti Mall, Cafe, hotel dan kantor, dengan mudahnya kita menemukan fasilitas tersebut.

Namun sangat disayangkan tidak semua penyedia layanan menawarkan fasilitas Internet Wireless dengan gratis, atau kalaupun gratis, sangatlah terbatas. Salah satu proteksi yang digunakan penyedia layanan wireless adalah dengan membatasi akses internet berdasarkan MAC Address.

Apa itu MAC Adress ? In computer networking a Media Access Control address (MAC address) or Ethernet Hardware Address (EHA) or hardware address or adapter address is a quasi-unique identifier attached to most network adapters (NICs). Oke jadi kesimpulannya MAC Address adalah nomer unik yang membedakan setiap perangkat jaringan yang terpasang dikomputer kita. Contoh kasus adalah HotSPOT di Food Court Plasa Semanggi. Pada HotSPOT FoodCourt Plasa Semanggi , sang penyedia layanan Internet Wireless, membatasi penggunaan Internet gratis hanya selama 3 Jam, setelah itu anda tidak dapat mengakses internet lagi, dan baru akan dapat mengakses lagi di hari esok.

Jenis proteksi yang digunakan adalah MAC Address Filtering. Bagaimana menjebol Proteksi dengan MAC Address ? Ada sebuah tools yang sangat bermanfaat untuk anda.

Tools itu bernama K-MAC anda dapat mendownloadnya dibawah ini...

Selanjutnya akan di jelaskan mengenai cara mengganti MAC address menggunakan k-mac Pertama jalankan program k-mac jika belum punya silahkan di download. Selanjutnya Ubah MAC menjadi apa dan berapa??? (Kode yang digunakan “1-0″ & “A-F”) hexadesimal 1.

Dengan tools ini anda akan dapat mengubah MAC-Address anda secara instant dan apa artinya ? Anda dapat menjebol Proteksi MAC Address ! Setiap jatah akses internet anda habis dalam waktu 3 jam, yang anda perlu lakukan hanyalah mengubah MAC Address anda, dan lakukan koneksi kembali Lalu bagaimana bila akses Wireless dibuat dengan proteksi yang lain ? Seperti WEP Keys dan WPA/WPA2 Keys ? Itu akan saya bahas lain kali Happy Free Surfing !

Download Here:
(Click Skip Ad)

Enjoy ..

Internet Download Manager 6.05 Build 10

Internet Download Manager 6.05 Build 10 | 5.18 Mb

Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.

nternet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

Version 6.05 adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

Instructions :
1). Install idman605.exe
2). Close IDM and make sure its not running in the background
3). Apply crack and register with reg file


Download
(Click Skip Ad)

Enjoy ..

Sabtu, 02 April 2011

Microsoft's Attack Surface Analyzer (ASA)Tool

 
Microsoft's Attack Surface Analyzer (ASA)Tool 

Attack Surface Analyzer tool is announced by the microsoft regarding the issues of the security changes.It detects all the changes have been done in the security by analyzing the registry entries,ActiveX controls & the added files in the windows system.


The aim of the microsoft developer is very clean that any 3rd party software is installed on the system then this tool is checking that weather the installed tool increased the attack surface on the windows platform or not.To generate a report, the tool needs to scan a system before and after the program in question is installed.



Overview

Attack Surface Analyzer is developed by the Security Engineering group, building on the work of our Security Science team. It is the same tool used by Microsoft's internal product groups to catalogue changes made to operating system attack surface by the installation of new software.

Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface.

This allows:

- Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform
- IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications
- IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews
- IT Security Incident Responders to gain a better understanding of the state of a systems security during investigations (if a baseline scan was taken of the system during the deployment phase)

Download :- Attack Surface AnalyzerX64

- Attack Surface AnalyzerX83

Enjoy.......
Postingan Lebih Baru Postingan Lama Beranda

 

Followers

 

Templates by Nano Yulianto | CSS3 by David Walsh | Powered by {N}Code & Blogger