.
Showing posts with label Video Training. Show all posts
Showing posts with label Video Training. Show all posts

Get Rich or Die Trying (BlackHat USA)

Category: , , , By PK


The premise for the “Get Rich or Die Trying” presentation was looking forward at the next 3-5 years considering that we’re probably going to see less fertile ground for XSS/SQLi/CSRF to be taken advantage of – that is if the good guys do their job well. So the bad guys will likely focus more attention on business logic flaws, which QA overlooks, scanners can’t identify, IDS/IPS can’t defend, and more importantly issues potentially generating 4, 5, 6 or even figures a month in illicit revenue.

In many ways though this is sort of like predicting the present since just about every example we gave was grounded with a real-world public reference and backed by statistics. We also wanted this presentation was very different than what most are used to at BlackHat that tend to be deeply technical, hard to follow, and often dry. And while everyone in webappsec is transfixed on JavaScript malware issues, we chose another direction.
 

Learn How to Dispose of Cell Phones



Remember when the McCain campaign had that garage sale a few months back and sold two Blackberries with hundreds of GOP contacts still saved on them? It may have seemed like a silly blunder to those who heard about it at the time, but it turns out that most of us are just as careless with our mobile phones and hand held devices as the McCain staffers were with theirs.

99% of Cell Phone Recyclers Neglect to Erase Data

According to a study by Regenersis, one of the leading electronics recycling firms in the world, 99 percent of recycled cellular phones are handed over with their owners personal information and contact lists completely intact. The company did a random sampling of 2000 devices in the month of December, and found that only a handful of consumers had bothered to delete information like emails, banking data, or addresses.

How to Remove Data Before Handing Over An Old Cell Phone

Very few recyclers offer the service of wiping devices before they pass them along, but even if they did, you'd still be handing over an extensive catalog of personal information to a perfect stranger and trusting them to do the right thing.

To take matters into your own hands:

* Remove the SIM card from your phone. It's a little plastic memory card usually located behind the back cover underneath the battery.
* Call your service provider and ask them to disconnect the phone from your account.

That's it! That wasn't hard, was it?

Unfortunately, if you own an iPhone or BlackBerry, it can be a little more complicated but these videos should help:

Erasing Data in a BlackBerry



How To Wipe Your Blackberry - video powered by Metacafe


Erasing Data in a iPhone



An Important Disclaimer

If you've got national security secrets on your phone or maybe mission briefings and data from U.S. soldiers in Iraq and Afghanistan, it's important to remember that there's no way to completely erase a hand held device. Sophisticated forensic recovery methods are capable of reversing pretty much any data-destroying trick that doesn't involve a hammer or a blowtorch, so for highly sensitive data, you should probably contact a specialist. For the rest of us though, the above methods should do the trick.
 

SQL Injection Activity

Category: , , By PK


This movie represents the activity of a SQL injection host. The host involved was responsible for the infection of thousands of websites in just a number of days. In the first part of the movie, the activity to and from the host is visible. In this particular case the activity is mainly from Japan, China and Taiwan prior to the attack. On the 12th of April 2008 the host started to infect websites around the world with malicious code. The time period between the 12th of April and 23th of April shows an accumulative view of the infected websites.

Source : Team Cymru, Inc.
 

PHP Essential Training

Category: By PK
PHP is a powerful and full-featured programming language used by millions of Web developers around the world. PHP Essential Training is a comprehensive guide to learning and understanding an open-source solution to your Web programming needs. Whether you want to use a little PHP functionality or you want to create a full-blown Web site, this tutorial will start you on the road to mastering PHP. It covers the essential features, syntax, and flow of the language, and provides instruction in creating interactive and dynamic Web pages. Whether you are a designer new to programming or a developer coming from a different language, you will be learning PHP as it was intended to be used. You can easily follow along with real world examples and expert tips and tricks Download:

CD1

Lynda.com_-_PHP_Essential_Training_CD_1.part1.rar
Lynda.com_-_PHP_Essential_Training_CD_1.part2.rar
Lynda.com_-_PHP_Essential_Training_CD_1.part3.rar
Lynda.com_-_PHP_Essential_Training_CD_1.part4.rar

CD2

Lynda.com_-_PHP_Essential_Training_CD_2.part1.rar
Lynda.com_-_PHP_Essential_Training_CD_2.part2.rar
Lynda.com_-_PHP_Essential_Training_CD_2.part3.rar
Lynda.com_-_PHP_Essential_Training_CD_2.part4.rar
Lynda.com_-_PHP_Essential_Training_CD_2.part5.rar
 

MS SQL Server 2005

Category: By PK
The SQL Server 2005 is a comprehensive database software platform providing enterprise-class data management and integrated business intelligence (BI) tools. The SQL Server 2005 database engine provides more secure, reliable storage for a relational database format or XML. By supporting both a relational database format and XML, the SQL Server 2005 database engine provides the flexibility necessary to support the way you work. It also enables you to build and manage highly available, well-performing database software applications that you and your people can use to take your business to the next possible level.

Also, The SQL Server 2005 data engine lies at the core of this enterprise data management solution. In addition to providing support for relational databases or XML, SQL Server 2005 combines the best in analysis, reporting, integration, and notification. This enables your team to build and deploy cost-effective BI solutions with which they can drive data into every corner of your business through scorecards, dashboards, Web services, and mobile devices.

Does not matter if you are a developer, database administrator, information worker, or decision maker, SQL Server 2005 provides innovative solutions that help you gain more value from your data—whether stored in a relational database or XML data format.

Download Links

http://rapidshare.com/files/24983389/VTC_SQL_2005.part01.rar
http://rapidshare.com/files/24985577/VTC_SQL_2005.part02.rar
http://rapidshare.com/files/24987576/VTC_SQL_2005.part03.rar
http://rapidshare.com/files/24989714/VTC_SQL_2005.part04.rar
http://rapidshare.com/files/24991684/VTC_SQL_2005.part05.rar
http://rapidshare.com/files/24994063/VTC_SQL_2005.part06.rar
http://rapidshare.com/files/24995105/VTC_SQL_2005.part07.rar
http://rapidshare.com/files/24995423/VTC_SQL_2005.part08.rar
 

Career Academy Hacking, Penetration Testing and Counter Measures Training, E-Learning

Category: By PK
-Company - careeracademy.
-Type - E-Learning.
-Language - English.
-3250 mb unpacked - 1950 mb packed - 17 cd's - (17 Iso's)
-You can mount the iso's.
-You can burn the iso's to cd's and play from cd.
-You can burn the iso's to a dvd as iso image and mount from the dvd.
-you can download everything (17 cd's) - or the cd that you interest !
-The 17 Modules (cd's) be individual uploaded.
-protection - NO

HOME :
CODE
http://www.careeracademy.com/index.asp?PageAction=VIEWPROD&ProdID=95

Career Academy Hacking Penetration Testing and Countermeasures Training:

Our training videos will show you how to scan, test, hack and secure your own systems. The intensive demonstrations give each student in-depth knowledge and practical experience with the current security systems. You will begin by understanding how perimeter defenses work and then be lead into scanning and
attacking your own networks. You will then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Penetration Testing and Countermeasures, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Includes :
Featuring live instructor-led classroom sessions with full audio, video and demonstration components Printable course ware 300+ Penetration Testing Review Questions eWorkbook - 725 pages Student eWorkbook developed by Shon Harris

Course Features:

Main Menu
Move through hours of in-depth content - quickly and easily due to the efficient and organized structure.

PowerPoint:
Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts,definitions, graphs, and more...


Exclusive Learning Zone


Train around the clock, around the world. Our certified online instructors are located at global support centers in the U.S., U.K., Australia, and Singapore to provide real-time answers to technology- and soft-skill-related questions 24x7. This means access to a live subject matter expert no matter where you are - day or night. This level of student/instructor interaction provides real-time training
specific support and extends training beyond content and instructor-led solutions by providing flexibility to accommodate individual needs and schedules.

Controls
Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.

Full Motion Video
All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.

Study Guides
Printable study guides for the entire course are available. This allows all material to be viewed, reviewed,and printed for viewing at a later date.

Review Exercises
Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.

Resume
All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.

Live Demonstrations
Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them. In this format it gives the user the power to see things done by a professional in the intended environment as many times as they would like.

Ethical Hacking and Penetration Testing eWorkbook - 725 pages Ethical Hacking and Penetration Testing Student eWorkbook developed by Shon Harris This workbook' content is rich with expertly created slides, professionally developed graphics, and extensive text explaining all of the Hacking, Penetration Test and Countermeasure concepts. It contains the very same tools that Shon Harris has used over the past four years to effectively teach thousands of individuals all over the world with fantastic results. You can watch the vital video lectures and explore all of the topics and concepts that are critical for Penetration Testing and Countermeasures.
The Ethical Hacking and Penetration Testing Workbook contains complete explanations, real-world examples,and scenarios that are not available in any other resource.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

-DOWNLOAD INFO: training a=cd1 – training b=cd2 – training c=cd3 – training d=cd4 ...

DOWNLOAD LINKS :
CODE
-Training Module 1 Ethical Hacking and Penetration Testing - cd 1 - 250 mb

http://rapidshare.com/files/6870957/traininga.part1.rar.html
http://rapidshare.com/files/6875509/traininga.part2.rar.html
http://rapidshare.com/files/6880184/traininga.part3.rar.html
http://rapidshare.com/files/6884786/traininga.part4.rar.html
http://rapidshare.com/files/6889797/traininga.part5.rar.html
http://rapidshare.com/files/6890170/traininga.part6.rar.html
------------------------------------------------------------
-Training Module 2 Footprinting and Reconnaissance - cd 2 - 210 mb

http://rapidshare.com/files/6920123/trainingb.part1.rar.html
http://rapidshare.com/files/6925380/trainingb.part2.rar.html
http://rapidshare.com/files/6930474/trainingb.part3.rar.html
http://rapidshare.com/files/6935598/trainingb.part4.rar.html
http://rapidshare.com/files/6937268/trainingb.part5.rar.html
------------------------------------------------------------
-Training Module 3 TCP IP Basics and Scanning - cd 3 - 153 mb

http://rapidshare.com/files/6950222/trainingc.part1.rar.html
http://rapidshare.com/files/6954540/trainingc.part2.rar.html
http://rapidshare.com/files/6958405/trainingc.part3.rar.html
http://rapidshare.com/files/6958651/trainingc.part4.rar.html
------------------------------------------------------------
-Training Module 4 Enumeration and Verification - cd 4 - 200 mb

http://rapidshare.com/files/6995889/trainingd.part1.rar.html
http://rapidshare.com/files/6999123/trainingd.part2.rar.html
http://rapidshare.com/files/7002551/trainingd.part3.rar.html
http://rapidshare.com/files/7005909/trainingd.part4.rar.html
http://rapidshare.com/files/7006074/trainingd.part5.rar.html

------------------------------------------------------------
-Training Module 5 Hacking Defending Wireless Modems - cd 5 - 94 mb

http://rapidshare.com/files/7017480/traininge.part1.rar.html
http://rapidshare.com/files/7021255/traininge.part2.rar.html
------------------------------------------------------------
-Training Module 6 Hacking Defending Web Servers - cd 6 - 150 mb

http://rapidshare.com/files/7029199/trainingf.part1.rar.html
http://rapidshare.com/files/7034545/trainingf.part2.rar.html
http://rapidshare.com/files/7039580/trainingf.part3.rar.html
http://rapidshare.com/files/7040200/trainingf.part4.rar.html
------------------------------------------------------------
-Training Module 7 Hacking Defending Web Applications - cd 7 - 110 mb

http://rapidshare.com/files/7049302/trainingg.part1.rar.html
http://rapidshare.com/files/7054559/trainingg.part2.rar.html
http://rapidshare.com/files/7056051/trainingg.part3.rar.html
------------------------------------------------------------
-Training Module 8 Sniffers and Session Hijacking - cd 8 - 115 mb

http://rapidshare.com/files/7069844/trainingh.part1.rar.html
http://rapidshare.com/files/7076146/trainingh.part2.rar.html
http://rapidshare.com/files/7084439/trainingh.part3.rar.html
------------------------------------------------------------
-Training Module 9 Hacking Defending Windows Systems - cd 9 - 120 mb

http://rapidshare.com/files/7090868/trainingi.part1.rar.html
http://rapidshare.com/files/7095821/trainingi.part2.rar.html
http://rapidshare.com/files/7097885/trainingi.part3.rar.html
------------------------------------------------------------
-Training Module 10 Hacking Defending Unix Systems - cd 10 - 150 mb

http://rapidshare.com/files/7136591/trainingJ.part1.rar.html
http://rapidshare.com/files/7139658/trainingJ.part2.rar.html
http://rapidshare.com/files/7142501/trainingJ.part3.rar.html
------------------------------------------------------------
-Training Module 11 Rootkits Backdoors Trojans Tunnels - cd 11 - 115 mb

http://rapidshare.com/files/7147118/trainingk.part1.rar.html
http://rapidshare.com/files/7159091/trainingk.part2.rar.html
http://rapidshare.com/files/7160611/trainingk.part3.rar.html
------------------------------------------------------------
-Training Module 12 Denial of Service and Botnets - cd 12 - 100 mb

http://rapidshare.com/files/7182977/trainingL.part1.rar.html
http://rapidshare.com/files/7187533/trainingL.part2.rar.html
------------------------------------------------------------
-Training Module 13 Automated Pen Testing Tools - cd 13 - 102 mb

http://rapidshare.com/files/7202752/trainingm.part1.rar.html
http://rapidshare.com/files/7208149/trainingm.part2.rar.html
http://rapidshare.com/files/7208549/trainingm.part3.rar.html
------------------------------------------------------------
-Training Module 14 Intrusion Detection Systems - cd 14 - 140 mb

http://rapidshare.com/files/7224433/trainingn.part1.rar.html
http://rapidshare.com/files/7230417/trainingn.part2.rar.html
http://rapidshare.com/files/7234950/trainingn.part3.rar.html
------------------------------------------------------------
-Training Module 15 Firewalls - cd 15 - 160 mb

http://rapidshare.com/files/7252545/trainingo.part1.rar.html
http://rapidshare.com/files/7255895/trainingo.part2.rar.html
http://rapidshare.com/files/7258850/trainingo.part3.rar.html
http://rapidshare.com/files/7259491/trainingo.part4.rar.html
------------------------------------------------------------
-Training Module 16 Honeypots and Honeynets - cd 16 - 120 mb

http://rapidshare.com/files/7262593/trainingp.part1.rar.html
http://rapidshare.com/files/7265259/trainingp.part2.rar.html
http://rapidshare.com/files/7266075/trainingp.part3.rar.html
------------------------------------------------------------
-Training Module 17 Ethics and Legal Issues - cd 17 - 90 mb

http://rapidshare.com/files/7268140/trainingq.part1.rar.html
http://rapidshare.com/files/7269823/trainingq.part2.rar.html
------------------------------------------------------------

pasw = jL4XyiI7MxX3afM0 for al cd's