Tuesday, April 22, 2014

Download Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research


  • Paperback: 290 pages
  • Publisher: Syngress Media,U.S. (30 October 2007)



  • Language: English



  • ISBN-10: 1597490741



  • ISBN-13: 978-1-59749-074-0



  • Product Dimensions: 23.3 x 19.3 x 1.9 cm 



Monday, November 25, 2013

Download Red Hat Enterprise Linux 5 Administration Unleashed - Direct Link



Title : Red Hat Enterprise Linux 5 Administration Unleashed
ISBN-10 : 0-672-32892-5
ISBN-13 : 978-0-6723-2892-3
First Print : april 2007
Pages : 618
Format : PDF


Direct Link - Mirror 1
Google Drive - Mirror 2


Sunday, June 30, 2013

Cryptography and Network Security Principles and Practices, 5th Ed - William Stallings - Free Download

Cryotigraphy and Network Security Principles and Practice 5th Edition - William Stallings

Wednesday, April 3, 2013

GTU B.E. 7th Sem (Dec 2012) Result is out...

Today, about 6:00 p.m. GTU put the B.E. 7th sem. Dec 2012 result on Gtu's main site.

but, due to heavy traffic GTU's weak servers are not able to handle such a huge traffic. 

Click here for B.E. 7th Sem. Dec 2012 Regular Result link

Click here for B.E. 7th Sem. Dec 2012 Remedial Result link

If you are on low speed connection and not able to view result page than I recommand to use fastest proxy so that their servers can provide you result page. 

However, it will be slow than directly accessing site, but atleast you will not show "the service is unavailable."

Use this proxyies,  
http://www.anonproxy.eu
http://afastproxy.com


-------------
NOTE : 
I don't know why GTU people are not paying much for more powerful servers, or if they are not able to pay highly payment for high traffic than why don't they try cheap services like "Google Apps" or "Google App Engine"or "Cloud Flare" to host our results.

Saturday, December 10, 2011

Download XSS Attacks: Cross site scripting exploits and defense - Direct Links



Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers. 

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Hosting