- Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI ... -
WEP Hacking - The Next Generation
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of "strong" encryption while a 128 bit key has 104. The IV is placed in encrypted frame's header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP crac*ing tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, "It doesn't matter if you use 128 bit WEP keys, you are vulnerable!"
Part1:http://www.megaupload.com/?d=O8UR88GP
Part2:http://www.megaupload.com/?d=CVOVMKVR
Part3:http://www.megaupload.com/?d=8F52U078
Part4:http://www.megaupload.com/?d=R458UL5W
Part5:http://www.megaupload.com/?d=KVW2RIRF
Part6:http://www.megaupload.com/?d=L9TQ0HU1
Part7:http://www.megaupload.com/?d=3OTZP2NO
01. IAO - 0:42
02. Fantastic Dream -
03.
04. Dance With Me -
05. Afternoons In Utopia -
06. Sensations -
07. 20th Century -
08. The Voyager -
09. Carol Masters - 4:321
10. Universal Daddy -
11. Lassie Come Home -
12. Red Rose -
13. Lady Bright - 0:43
http://rapidshare.de/files/17086781/Alphaville_-_01_-_IAO.mp3.html
http://rapidshare.de/files/17088853/Alphaville_-_02_-_Fantastic_Dream.mp3.html
http://rapidshare.de/files/17088999/Alphaville_-_03_-_Jerusalem.mp3.html
http://rapidshare.de/files/17088936/Alphaville_-_04_-_Dance_With_Me.mp3.html
http://rapidshare.de/files/17087875/Alphaville_-_05_-_Afternoons_In_Utopia.mp3.html
http://rapidshare.de/files/17089106/Alphaville_-_06_-_Sensations.mp3.html
http://rapidshare.de/files/17087435/Alphaville_-_07_-_20th_Century.mp3.html
http://rapidshare.de/files/17089171/Alphaville_-_08_-_The_Voyager.mp3.html
http://rapidshare.de/files/17089156/Alphaville_-_09_-_Carol_Masters.mp3.html
http://rapidshare.de/files/17089011/Alphaville_-_10_-_Universal_Daddy.mp3.html
http://rapidshare.de/files/17089710/Alphaville_-_11_-_Lassie_Come_Home.mp3.html
http://rapidshare.de/files/17089841/Alphaville_-_12_-_Red_Rose.mp3.html
http://rapidshare.de/files/17089927/Alphaville_-_13_-_Lady_Bright.mp3.html
NetOp Remote Control 8.00 Build 2006047 - is a family of cross platform PC remote control products. From the luxury of your own PC you can access remote workstations and servers. You can view the screen on the remote PC, control its keyboard and mouse, transfer files in both directions, initiate chat, audio chat, record sessions, and much more. The NetOp family offers high performance and great stability, yet consumes a minimum of system resources. And it's quick to install and easy to use.
Platform support: - Windows Server 2003 (32 bit) enabled Guest, Host, Gateway, Name Server and Security Server. - Apple Macintosh OS X enabled Host. - Windows CE (X86) enabled Guest and Host. - SuSE Linux 8.0, 8.1, 8.2 enabled Guest and Host. - Red Hat Linux 7.x, 8.0, 9.0 enabled Guest and Host. - Sun Solaris 8.0, 9.0 enabled Guest and Host.
Security - In today’s high-risk IT environment it’s more essential than ever that remote access is restricted to authorized users only. NetOp Remote Control is built on the premise that people seeking access are intruders until proven otherwise. Any access request must fulfil numerous criteria, including authentication and authorization against a local or, better still, centralized authentication system such as Windows Domain, a Directory Service or a RSA SecurID server. The authorization roles also dictate what actions a Guest is permitted to perform remotely. It’s possible to centralize all authentication and authorization with the NetOp Security Server. Using multiple servers provides load-balancing and fault-tolerance which results in minimal downtime. NetOp Remote Control protects the traffic between the modules against eavesdropping by using 256-bit
Communications - Maintaining your firewall’s effectiveness while allowing efficient, secure remote access to your
Remote management - Managing your network remotely can be cumbersome in Windows since administrative tools are spread out between applications, each with a different user interface. NetOp Remote Control’s Remote Management facility assembles many of these tools in one powerful, easy-to-use console. The Host user can keep working while the computer is being serviced. And Guest users can even collect detailed hardware and software inventory during a session. Remote management sessions also have the advantage of using less bandwidth than a full remote control session, since only management data, rather than screen data, is transmitted between the modules.
Download:
NetOp_v8.00_b2006047-CSDx-.part1.rar, 9 Mb
NetOp_v8.00_b2006047-CSDx-.part2.rar, 9 Mb
Password: CSDxTeam
Mirror
http://www.badongo.com/file/424830
Password is enjoy
CPU-Z is a diagnostic tool that provides information on your CPU, including: processor name and vendor, core stepping and process, processor package, internal and external clocks, clock multiplier, partial overclock detection, processor features, supported instructions sets, L1 and L2 cache information, location, size, speed, and technology.
http://www.megaupload.com/?d=KPBPMJ5S
Kaspersky Anti-Virus 6.0 is an essentially new approach to data security. The program's main feature is that it unites and noticeably improves the existing features of all the company's products in one protection solution. The program ensures not only anti-virus protection but protection from unknown threats.
You no longer need to install several programs on a computer to give yourself full protection. You can simply install Kaspersky Anti-Virus 6.0. The multifaceted defense covers all channels for data transmission and exchange. The flexible settings for any program component lets users maximally adapt Kaspersky Anti-Virus to their specific needs. Unified configuration for all the protection components is also built-in.
http://rapidshare.de/files/17090499/Kaspersky.Anti-Virus.v6.0.0.299.FINAL.WinAll.rar.html