הורדתי פאטץ שמאפשר לזייף תכתובת של הMAC הוא לא מזהה אותי לפי זה
הנה NFO של כמה איבוקים תגיד לי מה מהם אתה רוצה:
קוד:
Release Name..........: Cable.Modem.Hacking.Ebook.Pack.iNT.ST.EXCLUSIVE
Release Date..........: 9/17/2007
Format................: PDF
Genre.................: Ebook
Contains:
- Hacking The Cable Modem By DerEngel
- Haynes Cable Modem Guide
קוד:
Hacking Ubuntu: Serious Hacks Mods and Customizations (c) by Wiley
The type of the release is: eBook
In the CHM format with ISBN: 047010872X and Pub Date: April 23, 2007
The size of the release is: 04 disks x 2.88mb
And released on: 06/28/2007
·-───────────────────────────────────────────────────────────────────────--·
- Ubuntu, an African word meaning "humanity to others," is the hottest
thing in Linux today and is fast becoming the choice for Linux users
- This down-and-dirty book shows readers how they can blow away the
default system settings to get Ubuntu to behave however they want
- Readers will take total control of their Ubuntu system by optimizing
its appearance, speed, usability, and security
- Includes hundreds of hacks such as running Ubuntu from a USB drive,
installing it on a Mac, enabling multiple CPUs, and putting scripts in
menus and panels
- Readers are encouraged to roll up their sleeves and devise hacks for
wireless adapters, cameras, drawing pads, TV cards, and more
INSTALL NOTES
Unzip, unrar and enjoy
·-───────────────────────────────────────────────────────────────────────--·
- TRADITION OF QUALITY SINCE 2005 -
קוד:
+-----------------------------------------------------------------------------+ | Hacking Firefox | +-----------------------------------------------------------------------------+Product DetailsPaperback: 430 pages Publisher: Wiley (August 5, 2005) Language: English ISBN-10: 0764596500 ISBN-13: 978-0764596506 Product Dimensions: 9.1 x 7.4 x 1 inches Book DescriptionThey dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control.Step-by-step instructions for these hacks and dozens more - Settings, content, and extension hacks - Hacking the interface and themes - Performance boosters - Anti-phishing and security hacks - Toolbar and status bar tweaks - Navigation, download, and search hacks - Hacks for common plugins - Extension and theme creation They dreamed of a better browser . . . and before you could say ""explore no more,"" Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control. Step-by-step instructions for these hacks and dozens more Settings, content, and extension hacks Hacking the interface and themes Performance boosters Anti-phishing and security hacks Toolbar and status bar tweaks Navigation, download, and search hacks Hacks for common plugins Extension and theme creation
קוד:
The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts Covers turning
Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even
a blog.
קוד:
Hacking Windows XP
Adobe Reader Price: $24.99
Pages: 79
Format: PDF
Size: 10MB
* Get ready for some down-and-dirty hackin'! Over 200 serious hacks readers can use to force Windows XP to do it their way, written in the ExtremeTech no-holds-barred style
* Sinchak doesn't waste time tweaking Movie Maker or Instant Messenger-these hacks are heavy-duty, detailed instructions for squeezing every drop of power from Windows XP and maximizing speed, appearance, and security
* Not for the faint of heart! This book is written for users who aren't afraid to roll up their sleeves, risk voiding their warranties, take total control of the task bar, uninstall programs that are supposedly permanent, and beef up boot speed
* Mines gems like unlocking hidden settings, customizing boot screens, supercharging online and program launch speed, maximizing the file system and RAM, and dumping hated features for good
* Written by the creator of TweakXP.com, a site considered Mecca for Windows hackers and trusted by more than ten million Windows XP users worldwide
* Includes a hacker's dream CD-ROM with a set of ready-to-install hacks, theme creation tools, custom boot screens, ''undo'' files that help the reader tinker with Windows XP's registry, and a whole lot more
קוד:
This one-of-a-kind resource contains 400 pages of jaw-dropping hacks, mods, and customizations. These include creating mashups with data from other sources such as Flickr, building a space station tracker, hacking Maps with Firefox PiggyBank, and building a complete community site with Maps and Earth. Now you can map out locations, get driving directions, zoom into any point on the globe, display real time traffic, and much more.
קוד:
"If I had this book 10 years ago, the FBI would never have found me!"--Kevin D. Mitnick
This book has something for everyone--from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty!
Some of the hardware hacks in this book include:
* Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help."
* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case.
* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players.
* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development.
* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC.
* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point.
* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader.
* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB.
...Many more hacks and modifications inside!
קוד:
Hacking for Dummies - Access to Other Peoples Systems Made Simple
The majority of successful attacks on computer systems via the Internet can be traced to exploitation of security flaws in software and operating systems. These few software vulnerabilities account for the majority of successful attacks, simply because attackers are opportunistic – taking the easiest and most convenient route. They exploit the best-known flaws with the most effective and widely available attack tools. Most software, including operating systems and applications, comes with installation scripts or installation programs. The goal of these installation programs is to get the systems installed as quickly as possible, with the most useful functions enabled, with the least amount of work being performed by the administrator. To accomplish this goal, the scripts typically install more components than most users need. The vendor philosophy is that it is better to enable functions that are not needed, than to make the user install additional functions when they are needed. This approach, although convenient for the user, creates many of the most dangerous security vulnerabilities because users do not actively maintain and patch software components they don’t use. Furthermore, many users fail to realize what is actually installed, leaving dangerous samples on a system simply because users do not know they are there. Those unpatched services provide paths for attackers to take over computers.