Java in 60 Minutes Day Ebook
Java is a programming language and computing platform first released by Sun Micro systems in 1995. There are lots of applications and websites that will not work unless you have Java installed, and more are created every day. Java is fast, secure, and reliable. From laptops to data centers, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere! Author: Rich Raposa Features: A revolutionary virtual classroom Book Name: Java in 60 minutes a day
Introduction:
Chapter 1: Getting Started with Java.
Chapter 2: Java Fundamentals.
Chapter 3: Control Structures.
Chapter 4: Classes and Objects.
Chapter 5: Methods.
Chapter 6: Understanding Inheritance.
Chapter 7: Advanced Java Language Concepts.
Chapter 8: Polymorphism and Abstraction.
Chapter 9: Collections. Chapter 10: Interfaces.
Chapter 11: Exception Handling.
Chapter 12: An Introduction to GUI Programming.
Chapter 13: GUI Components and Event Handling.
Chapter 14: Applets.
Chapter 15: Threads.
Chapter 16: Input and Output.
Chapter 17: Network Programming.
Chapter 18: Database Programming.
Chapter 19: JavaBeans.
Appendix: About the 60 Minutes Web Site.
Download
Friday, October 18, 2013
Wednesday, October 16, 2013
Using Google.com to Find Usernames + Passwords
ဒီနည္းေလး ေတြက Google Dorks ေတြ သံုး တဲ. နညး္လမး္ေလး ေတြပါ
အေျခ ခံ နညး္နည္း ၇ွိတဲ. သူေတြ နားလည္ မွာပါ
Prerequisites:
1. A modern webbrowser and a internet.
2. Time Method
1: Facebook We will be using a google dork to find usernames and passwords of many accounts including Facebook!
The Dork: intext:charset_ test= email= default_persist ent=
Enter that into Google, and you will be presented with several sites that have username and passwords lists!
Method 2: WordPress! This will look for WordPress backup files Which do contain the passwords, and all data for the site!
The Dork: filetype:sql inurl:wp-conten t/backup-*
Method 3: WWWBoard! This will look for the user and passwords of WWWBoard users The Dork: inurl:/ wwwboard/ passwd.txt
Method 4: FrontPage! This will find all users and passwords, similar to above.
The Dork: ext:pwd inurl:(service | authors | administrators | users)"# -FrontPage-"
Method 5: Symfony This finds database information and logins
The Dork: inurl:config/ databases.yml -trac -trunk -"Google Code"-source -repository
Method 6: TeamSpeak This will search for the server.dbs file (A Sqlite database file With the SuperAdmin username and password)
The Dork: server-dbs"intitle:index of"
Method 7: TeamSpeak 2 This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for"superadmin account info:"
The Dork: "inurl:Teamspea k2_RC2/ server.log"
Method 8: Get Admin pass Simple dork which looks for all types of admin info
The Dork: "admin account info"filetype:log
Method 9: Private keys This will find any .pem files which contain private keys.
The Dork: filetype:pem pem intext:private And the Ultimate one, the regular directory full of passwords.
Method 10: The Dir of Passwords! Simple one!
The Dork: intitle:"Index of..etc"passwd
Refer to:
http://www.backtrack-pages.com
အေျခ ခံ နညး္နည္း ၇ွိတဲ. သူေတြ နားလည္ မွာပါ
Prerequisites:
1. A modern webbrowser and a internet.
2. Time Method
1: Facebook We will be using a google dork to find usernames and passwords of many accounts including Facebook!
The Dork: intext:charset_ test= email= default_persist ent=
Enter that into Google, and you will be presented with several sites that have username and passwords lists!
Method 2: WordPress! This will look for WordPress backup files Which do contain the passwords, and all data for the site!
The Dork: filetype:sql inurl:wp-conten t/backup-*
Method 3: WWWBoard! This will look for the user and passwords of WWWBoard users The Dork: inurl:/ wwwboard/ passwd.txt
Method 4: FrontPage! This will find all users and passwords, similar to above.
The Dork: ext:pwd inurl:(service | authors | administrators | users)"# -FrontPage-"
Method 5: Symfony This finds database information and logins
The Dork: inurl:config/ databases.yml -trac -trunk -"Google Code"-source -repository
Method 6: TeamSpeak This will search for the server.dbs file (A Sqlite database file With the SuperAdmin username and password)
The Dork: server-dbs"intitle:index of"
Method 7: TeamSpeak 2 This will find the log file which has the Super Admin user and pass in the Top 100 lines. Look for"superadmin account info:"
The Dork: "inurl:Teamspea k2_RC2/ server.log"
Method 8: Get Admin pass Simple dork which looks for all types of admin info
The Dork: "admin account info"filetype:log
Method 9: Private keys This will find any .pem files which contain private keys.
The Dork: filetype:pem pem intext:private And the Ultimate one, the regular directory full of passwords.
Method 10: The Dir of Passwords! Simple one!
The Dork: intitle:"Index of..etc"passwd
Refer to:
http://www.backtrack-pages.com
Thursday, October 3, 2013
ninja-hacking-unconventional
Ninja Hacking Unconventional Penetration Testing Tactics and Techniques
About book Ninja Hacking, the new book by Thomas Wilhelm and Jason Andress, is not a typical book about hacking andpenetration testing. Experienced penetration testers who want to learn cutting-edge penetration techniques will find few references to little-known penetration tools or techniques presented in bland technical format. The book doesn’t rely on pun-filled humor, either. Ninja Hacking is targeted at individuals who have an interest in the warriors of feudal Japan and want a serious philosophical exploration on how those warrior’s techniques map into modern cyber-warfare. For penetration testers who want to know how to be Ninjas, Ninja Hacking creates a framework for becoming a feudal Japanesewarrior in cyberspace. Each chapter discusses a new piece of the puzzle, and, while you won’t achieve mastery from this book alone, the building blocks are laid that should allow an inspired reader to know what additional areas need to be researched.
Download
About book Ninja Hacking, the new book by Thomas Wilhelm and Jason Andress, is not a typical book about hacking andpenetration testing. Experienced penetration testers who want to learn cutting-edge penetration techniques will find few references to little-known penetration tools or techniques presented in bland technical format. The book doesn’t rely on pun-filled humor, either. Ninja Hacking is targeted at individuals who have an interest in the warriors of feudal Japan and want a serious philosophical exploration on how those warrior’s techniques map into modern cyber-warfare. For penetration testers who want to know how to be Ninjas, Ninja Hacking creates a framework for becoming a feudal Japanesewarrior in cyberspace. Each chapter discusses a new piece of the puzzle, and, while you won’t achieve mastery from this book alone, the building blocks are laid that should allow an inspired reader to know what additional areas need to be researched.
Download
Subscribe to:
Posts (Atom)