Information of news
  • 0

INE | Ethical Hacking: Module 3 :: Scanning Networks | Josue Vargas

Category: Tutorial

INE | Ethical Hacking: Module 3 :: Scanning Networks | Josue Vargas

INE | Ethical Hacking: Module 3 :: Scanning Networks | Josue Vargas
English | Size: 485.86 MB
Category: CBTs

Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. In this course you will become prepared to handle this portion of the CEH exam.

Table of Contents

Introduction
Finding Live Systems
Port Scanning
IPS and Firewall Evasion
Vulnerability Scanning
OS Fingerprinting and Banner Grabbing
Network Discovery and Diagramming
Proxies and Anonimizers
Download Now
Information of news
  • 0

Disney - Illusion of Life

Category: Tutorial

Disney - Illusion of Life

Disney - Illusion of Life
English | Size: 286 MB
Category: Tutorial

Disney Animation: The Illusion of Life (ISBN 0-7868-6070-7), 1981, is an acclaimed book by two of Disney's Nine Old Men, Ollie Johnston and Frank Thomas. It is widely considered to be one of the best books ever published on the topic of character animation, in fact, it tops the list of "best animation books of all time" in a poll at AWN [1].
Download Now
Information of news
  • 0

Alex Kozma - Bagua and Xingyi Workshop

Category: Tutorial

Alex Kozma - Bagua and Xingyi Workshop

Alex Kozma - Bagua and Xingyi Workshop
English | Size: 561.55 MB
Category: Taoism / Daoism

Instructional video set of a workshop hosted by Alex Kozma.
Topics include:

Spectacles Bagua Techniques and Applications Vol. 1 and 2
Xingyi Key Concepts Vol. 1 and 2
Baguazhang Grappling
Neija Inner Keys Vol. 1
Download Now
Information of news
  • 0

Jeff Cavaliere - Athlean Xero

Category: Tutorial

Jeff Cavaliere - Athlean Xero

Jeff Cavaliere - Athlean Xero
English | Size: 1.93 GB
Category: Health / Fitness / Massage

STOP THE INSANITY!
Doing 60 minutes of essentially glorified aerobics and thinking that you will build muscle is the definition of "INSANITY"! If you want to develop serious athletic muscle then you have to create overload and still have a respect for muscle repair and recovery. Enter the ATHLEAN XERO program from ATHLEAN-X.
REQUIRES XERO EQUIPMENT... NOTHING AT ALL!
BUILD MUSCLE AND BURN FAT WITH YOUR OWN BODY!
SHORT INTENSE WORKOUTS ALL UNDER 30 MINUTES!
FEATURES NEVER BEFORE SEEN EXERCISES!
THE "XERO REST" PROTOCOL ADAPTS TO ALL FITNESS LEVELS!
MOBILE DEVICE COMPATIBLE...OR PRINT IT OUT GO!
Download Now
Information of news
  • 0

Jukebox Saturday Night (April 7th 2018)

Category: Tutorial

Jukebox Saturday Night (April 7th 2018)

Jukebox Saturday Night (April 7th 2018)
English | Size: 500.05 MB
Category: Music

The last 2 episodes have been repeats from January 2018.

Host Justin Coombes-Pearce introduces video clips from the 50s, 60s, 70s & 80s
This weeks clips are:-
James Brown - Sex Machine
Cliff Richard And The Shadows - The Young Ones
Leo Sayer - More Than I Can Say
Barry White - My First My Last My Everything
Doobie Brothers - What A Fool Believes
Jackson Five - I Want You Back
Meatloaf - Two Out Three Ain't Bad
Elvis Presley - Burning Love
Ray Charles - I Can't Stop Loving You
Del Shannon - And The Music Plays On
Chaka Khan - I'm Every Woman
Animals - It's My Life
Paul McCartney - Mull Of Kintyre
Neal Hefti - Batman Theme
Stars On 45 - Stars On 45
Ringo Starr - It Don't Come Easy
Download Now
Information of news
  • 0

LinkedIn - PHP Object-Oriented Programming with Databases

Category: Tutorial

LinkedIn - PHP Object-Oriented Programming with Databases

LinkedIn - PHP Object-Oriented Programming with Databases
English | Size: 713.58 MB
Category: Tutorial

Learn how to interact with databases using object-oriented PHP code. In this intermediate course, Kevin Skoglund teaches powerful PHP techniques that streamline interactions with MySQL databases. PHP developers will benefit from the efficient, well-organized, reusable, and easy-to-understand code that object-oriented programming (OOP) offers. Kevin shows how OOP techniques can optimize database queries, help manage sessions, and simplify user logins. He provides practical examples and tips to create objects that interact seamlessly with database rows, to build a content management system with HTML forms, to authenticate users, and to break up long lists of database data into smaller pages.
Download Now
Information of news
  • 0

INE | Ethical Hacking: Module 4 :: Enumeration | Josue Vargas

Category: Tutorial

INE | Ethical Hacking: Module 4 :: Enumeration | Josue Vargas

INE | Ethical Hacking: Module 4 :: Enumeration | Josue Vargas
English | Size: 344.78 MB
Category: CBTs

In the enumeration module you will learn how to use the discovered services and protocols running in your target network to gather more details and difficult to obtain intelligence prior to the actual System Hacking phase. This module is the last of the preliminary investigative phases in the hacking cycle and with it ends the information gathering which will now empower us to narrow down our targets and start planning our attacks against specific technologies and choose the appropriate hacking tools we will learn about in the remainder of this course.

Table of Contents

Introduction to Enumeration
NetBIOS Enumeration
LDAP Enumeration
DNS Enumeration
SNMP Enumeration
NTP Enumeration
SMTP Enumeration
Download Now
Information of news
  • 0

Skillshare: Illustration with Draplin: Iterating with Shape, Style, and Color

Category: Tutorial

Skillshare: Illustration with Draplin: Iterating with Shape, Style, and Color

Skillshare: Illustration with Draplin: Iterating with Shape, Style, and Color
English | Size: 2.4GB
Category: Tutorial

Minor tweaks add up to big breakthroughs in this in-depth class all about the subtle skill of iteration. Join Aaron as he dives into his personal illustration process, using shape, style, and color to push his creativity to new heights with every project. You'll illustrate a person, place, and thing to create an ode to your hometown, evolving each individual piece along the way.
Download Now
Information of news
  • 0

INE | Ethical Hacking: Module 2 :: Footprinting and Reconnaissance | Josue Vargas

Category: Tutorial

INE | Ethical Hacking: Module 2 :: Footprinting and Reconnaissance | Josue Vargas

INE | Ethical Hacking: Module 2 :: Footprinting and Reconnaissance | Josue Vargas
English | Size: 588.47 MB
Category: Tutorial

Course Description
In this course you will become aware of the investigative tasks that a hacker needs to perform to accurately profile his targets and the different tools and public information sources which can provide valuable information (many times, information that should have never been made public).

Table of Contents

Course Introduction
Search Engines :: Part 1
Search Engines :: Part 2
Google Hacking
Websites
Email
Networking
Social Engineering
Download Now
Information of news
  • Views: 0
  • Author: voska89
  • Date: Yesterday, 05:30
  • 0

Caleb O'Dowd - Market Domination Strategies 2017

Category: Tutorial


Caleb O'Dowd - Market Domination Strategies 2017
Caleb O'Dowd - Market Domination Strategies 2017
English | MP4 | 900 MB
Genre: Net Business / Marketing / Traffic
Market Domination Strategies: 10 Tactics Gary Halbert Used To Crush The Competition And Steal The Lions Share Of Profits In Any Market!" is fully backed by a 30 day money back guarantee if you are anything less than blown away by the content and the impact it has on your business.

Download Now