Free download software » Search
Search Results For:
qeep id hacker
#1 Certified White Hat Hacker Level 1 (Advanced)
Udemy - Certified White Hat Hacker Level 1(Advanced)
Duration: 3h | Video: AVC (.MP4) 1280x720 30fps | Audio: AAC 44.1KHz 2ch | 342MB
Genre: eLearning | Language: English
#2 Portable Hacker Evolution 1.0.0.0087
Portable Hacker Evolution 1.0.0.0087
PC | Windows | English | Developer/Publisher: exosyphen studios | 75.44 MB
#3 Hacker Conference The Next Hope 2010 - Video
Hacker Conference The Next Hope 2010 - Video
English | M4V | 480x384 | AVC 520kbps | AAC 128kbps | 7.85 GB
This year, the talks were especially interesting, provocative, engaging, and enlightening. This is a great way to comfort yourself if you didn’t make it to this historic conference and a means of seeing even more talks if you did happen to make it this time. Please help us spread the word so that more people have the HOPE experience!
#4 Exosyphen Studios Hacker Evolution v1.00.0096
Exosyphen Studios Hacker Evolution v1.00.0096 WinAll Retail GAME CRD
PC Game ENGLISH Exosyphen Studios | 104 MB
#5 Resource Hacker v4.2.5 Final (+ Portable)
Resource Hacker v4.2.5 Final (+ Portable) | 5.43 Mb
Resource Hacker has been designed to be the complete resource editing tool: compiling, viewing, decompiling and recompiling resources for both 32bit and 64bit Windows executables. Resource Hacker can open any type of Windows executable (*.exe; *.dll; *.scr; *.mui etc) so that individual resources can be added modified or deleted within these files. Resource Hacker can create and compile resource script files (*.rc), and edit resource files (*.res) too.
Viewing Resources: Cursor, Icon, Bitmap, GIF, AVI, and JPG resource images can be viewed. WAV and MIDI audio resources can be played. Menus, Dialogs, MessageTables, StringTables, Accelerators, Delphi Forms, and VersionInfo resources can be viewed as decompiled resource scripts. Menus and Dialogs can also be viewed as they would appear in a running application. Saving Resources: Resources can be saved as image files (*.ico, *.bmp etc), as script files (*.rc), as binary resource files (*.res), or as untyped binary files (*.bin).
#6 Things Hackers Should Know
#7 Video Training | Certified Ethical Hacker Certification - EP6,7,8,9
Video Training | Certified Ethical Hacker Certification EP6,7,8,9 | 688MB
Certified Ethical Hacker Certification from Specialized Solutions enables the system administrator with critical information to identify, counter and stop or defend hackers from penetrating the corporate network. With this certification, you will begin to understand how a hacker thinks and what tactics they use to penetrate corporate networks. This allows system administrators to deploy proactive countermeasures and stay ahead of information security developments and exploited vulnerabilities.The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains.
#8 Career Academy Certified Ethical Hacker V6
Career Academy Certified Ethical Hacker V6
Publisher: Career Academy | 2010 | PDF+TXT | ISBN: N/A | Pages: 470 | 497 MB
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.
#9 UnHackMe 5.9.9 Build 370 T-T
UnHackMe 5.9.9 Build 370 T-T
UnHackMe 5.9.9 Build 370 | 10 MB
#10 UnHackMe v184.108.40.2067
UnHackMe v220.127.116.117 | 9.87 MB
UnHackMe allows you to detect and remove a new generation of Trojan programs – invisible Trojans. UnHackMe is a very useful security utility for your operating system. They are called “rootkit” A rootkit is a collection of programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network. The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer.
#11 Hacker Books
#12 Best Hacking Tools 85 in 1 2010
Best Hacking Tools 85 in 1 (Updated 10/2010) | 62MB
#13 UnHackMe 18.104.22.1688 Portable
UnHackMe 22.214.171.1248 Portable | 15.24 MB
UnHackMe - First BootWatch AntiRootkit! Now it is the must have tool for you! UnHackMe is specially designed to detect and remove Rootkits (a new generation of Trojan programs - invisible Trojans). A rootkit is a program that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network. The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. It hides their files, registry keys, and process names, and network connections from your eyes. Your antivirus could not detect such programs because they use compression and encryption of its files. The sample software is Hacker Defender rootkit. UnHackMe allows you to detect and remove Rootkits.
#14 Hackers 2 Operation Takedown 2000.DVDRip-KhDv
Hackers 2 Operation Takedown 2000.DVDRip-KhDv
English | 94 mins | 640 x 400 | 25fps | Xvid | MP3 - 131kbs | 674 MB
Genre: Crime | Drama | Thriller
Cast: Skeet Ulrich,Russell Wong
This film is based on the story of the capture of computer hacker "Kevin Mitnick".Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cybertrophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
#15 CEH Certification Training Video: CEH Introduction - Full 4 Eps - KL
CEH Certification Training Video: CEH Introduction - Full 4 Eps - KL
Certified Ethical Hacker Certification Training Video
#17 UnHackMe 5.99 Build 370
UnHackMe 5.99 Build 370
UnHackMe 5.99 Build 370 | 10.0 MB
#18 SANS Security 504 Hacker Techniques, Exploits and Incident Handling
SANS Security 504 Hacker Techniques, Exploits and Incident Handling
English | Pdf | Mp3 | ISO | 90kbps | 48000Hz | 3.56 GB
If your organization has an Internet connection or one or two disgruntled employees (and whose doesn't!), your computer systems will get attacked. From the five, ten, or even one hundred daily probes against your Internet infrastructure to the malicious insider slowly creeping through your most vital information assets, attackers are targeting your systems with increasing viciousness and stealth.