Banner Ad

    A    L    W    A    Y    S           D    E    S    I    R    E           T    O           L    E    A    R    N           S    O    M    E    T    H    I    N    G           U    S    E    F    U    L   

Technology and business

technology and business are becoming inextricably interwoven. I don't think anybody can talk meaningfully about one without the talking about the other

Arthur C. Clarke

Any sufficiently advanced technology is indistinguishable from magic.

Bill Gates is a very rich man today... and do you want to know why? The answer is one word: versions.

Softwares

Defect-free software does not exist.

Technology is like a fish. The longer it stays on the shelf, the less desirable it becomes.

Monday, March 25, 2013

Vehicle Reservation System

2nd year 1st semester programming assignment(Vehicle reservation system)


you must restore mysql database for run this software Click here to download SQL file

If you are having problem with generating ireports this will help you. (download ireport basic tutorial)



Software developed using Netbeans IDE  1.7JDK
For generating reports i used  (iroport)
database  : mySql



following are some of the screen shots of the software












Sunday, March 24, 2013

Ethical Hacking






Files:
01.Introduction / 01.Course Overview.mov 2 MB

02.Ethical Hacking & Penetration Testing / 01.What is Ethical Hacking.mov 2.1 MB
02.Ethical Hacking & Penetration Testing / 02.Types of Ethical Hacking.mov 2.2 MB
02.Ethical Hacking & Penetration Testing / 03.Responsibilities of the Ethical Hacker .mov 1.3 MB
02.Ethical Hacking & Penetration Testing / 04.Customer Expectations.mov 1.7 MB
02.Ethical Hacking & Penetration Testing / 05.Skills of the Hacker.mov 1.8 MB
02.Ethical Hacking & Penetration Testing / 06.Relevant Laws.mov 1.7 MB
02.Ethical Hacking & Penetration Testing / 07.Preparation.mov 1.9 MB
02.Ethical Hacking & Penetration Testing / 08.Types of Attacks.mov 828.9 KB

03.Methodology Overview / 01.Your Goals.mov 1.1 MB
03.Methodology Overview / 02.Formal Methodologies.mov 1.8 MB
03.Methodology Overview / 03.Reconnaissance.mov 1.4 MB
03.Methodology Overview / 04.Scanning.mov 1.2 MB
03.Methodology Overview / 05.Service Enumeration.mov 1.5 MB
03.Methodology Overview / 06.Vulnerability Assessment.mov 1.1 MB
03.Methodology Overview / 07.Vulnerability Exploitation.mov 1.3 MB
03.Methodology Overview / 08.Privilege Escalation & Owning the Box.mov 1.1 MB
03.Methodology Overview / 09.Evading Defenses & Erasing Tracks.mov 1.6 MB
03.Methodology Overview / 10.Maintaining & Expanding Access.mov 1.4 MB

04.Reconnaissance (Footprinting) / 01.Passive Reconnaissance.mov 2.2 MB
04.Reconnaissance (Footprinting) / 02.Using WHOIS & Other Tools.mov 1.3 MB
04.Reconnaissance (Footprinting) / 03.Active Reconnaissance.mov 1.7 MB
04.Reconnaissance (Footprinting) / 04.Active Reconnaissance Tools & Methods.mov 1.9 MB
04.Reconnaissance (Footprinting) / 05.Putting It All Together.mov 1.4 MB
04.Reconnaissance (Footprinting) / 06.Reconnaissance Demo.mov 8.8 MB

05.Scanning / 01.Scanning For Hosts.mov 1.1 MB
05.Scanning / 02.TCP Connection Basics.mov 1.9 MB
05.Scanning / 03.TCP Scan Types.mov 3 MB
05.Scanning / 04.UDP & ICMP Scanning.mov 1.5 MB
05.Scanning / 05.Scanning Demonstration using NMAP.mov 5.7 MB

06.Port & Service Enumeration / 01.Identifying Ports & Services.mov 1.4 MB
06.Port & Service Enumeration / 02.OS Fingerprinting.mov 1.2 MB
06.Port & Service Enumeration / 03.Popular Scanners.mov 844.2 KB
06.Port & Service Enumeration / 04.Demonstration.mov 5.9 MB

07.Data Enumeration / 01.Data Enumeration.mov 2.1 MB
07.Data Enumeration / 02.SNMP Enumeration.mov 6.4 MB
07.Data Enumeration / 03.DNS Zone Transfers.mov 3.3 MB
07.Data Enumeration / 04.Windows Null Sessions.mov 3.3 MB
07.Data Enumeration / 05.NetBIOS Enumeration.mov 4.4 MB
07.Data Enumeration / 06.Active Directory Extraction.mov 1.2 MB

08.Vulnerability Assessment / 01.OS Vulnerabilities.mov 2.4 MB
08.Vulnerability Assessment / 02.Vulnerabilities & Exploits.mov 2.7 MB
08.Vulnerability Assessment / 03.Web Server Vulnerabilities.mov 2.9 MB
08.Vulnerability Assessment / 04.Database Vulnerabilities.mov 2.3 MB
08.Vulnerability Assessment / 05.TCP Stack Vulnerabilities.mov 1.7 MB
08.Vulnerability Assessment / 06.Application Vulnerabilities.mov 1.3 MB
08.Vulnerability Assessment / 07.Vulnerability Assesment.mov 5.1 MB

09.Penetration Access Compromise Pt.1 / 01.Penetrating the System Pt.1.mov 2.2 MB
09.Penetration Access Compromise Pt.1 / 02.Penetrating the System Pt.2.mov 1.2 MB
09.Penetration Access Compromise Pt.1 / 03.Bypassing Access Controls.mov 2.7 MB
09.Penetration Access Compromise Pt.1 / 04.Password Cracking Pt.1.mov 1.9 MB
09.Penetration Access Compromise Pt.1 / 05.Password Cracking Pt.2.mov 3.5 MB
09.Penetration Access Compromise Pt.1 / 06.Social Engineering.mov 2.7 MB

10.Penetration Access Compromise Pt.2 / 01.Session Hijacking Pt.1.mov 2.5 MB
10.Penetration Access Compromise Pt.2 / 02.Session Hijacking Pt.2.mov 6.8 MB
10.Penetration Access Compromise Pt.2 / 03.Privilege Escalation.mov 2.1 MB
10.Penetration Access Compromise Pt.2 / 04.Maintaining & Expanding Access.mov  3.1 MB
10.Penetration Access Compromise Pt.2 / 05.System Compromise.mov 1.9 MB

11.Evading Defenses & Erasing Tracks / 01.Where Your Actions Recorded Pt.1.mov 828.7 KB
11.Evading Defenses & Erasing Tracks / 02.Where Your Actions Recorded Pt.2.mov 2.6 MB
11.Evading Defenses & Erasing Tracks / 03.Deleting Log Files & Other Evidence Pt.1.mov 1.4 MB
11.Evading Defenses & Erasing Tracks / 04.Deleting Log Files & Other Evidence Pt.2.mov 2MB
11.Evading Defenses & Erasing Tracks / 05.Rootkits.mov 2.4 MB
11.Evading Defenses & Erasing Tracks / 06.Steganography.mov 4.6 MB
11.Evading Defenses & Erasing Tracks / 07.Evading IDS & Firewalls.mov 1.9 MB

12.Introduction to Hacking Techniques Pt.1 / 01.Encryption.mov 2.3 MB
12.Introduction to Hacking Techniques Pt.1 / 02.Sniffers.mov 1.8 MB
12.Introduction to Hacking Techniques Pt.1 / 03.Wireless hacking.mov 2.9 MB
12.Introduction to Hacking Techniques Pt.1 / 04.SQL Injection.mov 1.9 MB

13.Introduction to Hacking Techniques Pt.2 / 01.Buffer Overflows.mov 2.3 MB
13.Introduction to Hacking Techniques Pt.2 / 02.Rootkits.mov 1.6 MB
13.Introduction to Hacking Techniques Pt.2 / 03.Spoofing.mov 1.9 MB
13.Introduction to Hacking Techniques Pt.2 / 04.Denial of Service Attacks.mov 1.7 MB
13.Introduction to Hacking Techniques Pt.2 / 05.Web Hacking.mov 2.8 MB

14.Popular Tools / 01.nmap Pt.1.mov 3.7 MB
14.Popular Tools / 02.nmap Pt.2.mov 1.4 MB
14.Popular Tools / 03.SuperScan.mov 6.3 MB
14.Popular Tools / 04.Nessus.mov 4.5 MB

15.Penetration Test Demo / 01.Penetration Test Demo Pt.1.mov 855 KB
15.Penetration Test Demo / 02.Penetration Test Demo Pt.2.mov 474.9 KB
15.Penetration Test Demo / 03.Penetration Test Demo Pt.3.mov 509.9 KB

16.Credits / 01.About the Authors.mov 674.2 KB

Thursday, March 7, 2013

Microsoft visual studio C# .Net video tutorials




Download Microsoft visual studio C# .Net video tutorials (419MB)
  1. Introduction
  2. The .Net Solution
  3. Jumping Into C#
  4. Data & Value Types
  5. Reference Types & More
  6. Classes & Objects
  7. Enums & Structures
  8. Core Programming
  9. Working With Strings
  10. Delegates & Events
  11. Windows Applications
  12. Core Programming In Use
  13. Object Oriented Techniques
  14. File System I/O & Streams
  15. Namespaces & Assemblies
  16. Data Access (ADO.NET & XML)
  17. Web Applications
  18. Web Services
  19. Graphics Programming





Software Engineering design patterns video tutorials







  1. Introduction to Design Patterns
  2. The Strategy Design Pattern
  3. The Decorator Design Pattern
  4. The Factory Design Pattern
  5. The Observer Design Pattern
  6. The Chain of Responsibility Design Pattern
  7. The Singleton Design Pattern
  8. The Flyweight Design Pattern
  9. The Adapter Design Pattern
  10. The Facade Design Pattern
  11. The Template Design Pattern
  12. The Builder Design Pattern
  13. The Iterator Design Pattern
  14. The Composite Design Pattern
  15. The State Design Pattern
  16. The Proxy Design Pattern
  17. The Command Design Pattern
  18. The Mediator Design Pattern
  19. Additional Patterns


Red Hat Certified System Administrator RHCSA



 


01 Introduction
  01 Welcome.flv 6.29 MB
  02 Practice Requirements.flv 3.51 MB
  03 Basic Installation.flv 7.09 MB
 
02 Kickstart Installations
  04 Kickstart Files.flv 8.54 MB
  05 Installing RHEL with Kickstart.flv 2.82 MB
 
03 Basic Command Line
  06 Accessing a Terminal.flv 5.07 MB
  07 Basic Commands pt- 1.flv 4.32 MB
  08 Basic Commands pt- 2.flv 2.57 MB
  09 Help at the Command Line.flv 4.89 MB
  10 cat and nano.flv 3.34 MB
  11 vim.flv 4.19 MB
  12 File Compression.flv 4.35 MB
  13 Elevating Privileges.flv 4.08 MB
 
04 Advanced Command Line
  14 Input and Output Redirection.flv 3.04 MB
  15 Regular Expressions.flv 5.58 MB
 
05 User Accounts
  16 Adding and Removing Users.flv 5.11 MB
  17 Password Control.flv 3.39 MB
  18 Group Administration.flv 4.93 MB
  19 Account Configuration Files.flv 4.64 MB
  20 User Accounts with LDAP.flv 2.87 MB
 
06 File and Folder Permissions
  21 Basic Permissions pt- 1.flv 4.07 MB
  22 Basic Permissions pt- 2.flv 4.43 MB
  23 Basic Permissions pt- 3.flv 5.24 MB
  24 Group Directories.flv 3.59 MB
 
07 Network Setup and Troubleshooting
  25 Network Devices.flv 4.12 MB
  26 NetworkManager.flv 4.96 MB
  27 system-config-network.flv 2.71 MB
  28 Network Commands.flv 5 MB
  29 Network Scripts.flv 3 MB
  30 system-config-firewall.flv 4.89 MB
  31 iptables pt- 1.flv 4.94 MB
  32 iptables pt- 2.flv 4.63 MB
 
08 Software Management
  33 RPM Files.flv 3.05 MB
  34 Yum Command.flv 5.2 MB
  35 Yum Repository.flv 2.81 MB
  36 RPM Command.flv 3.59 MB
  37 PackageKit.flv 6.33 MB
  38 Updating the Kernel.flv 3.13 MB
 
09 Basic Filesystems
  39 Creating Partitions.flv 5.81 MB
  40 Creating Filesystems.flv 2.7 MB
  41 Mounting Filesystems.flv 5.25 MB
  42 Swap Partitions.flv 3.99 MB
  43 Quota Management pt- 1.flv 5.93 MB
  44 Quota Management pt- 2.flv 3.76 MB
  45 Hard and Soft Links.flv 3.43 MB
  46 File and Folder ACL Management.flv 4.89 MB
 
10 LVM
  47 LVM Overview.flv 3.89 MB
  48 Creating a Logical Volume pt- 1.flv 3.6 MB
  49 Creating a Logical Volume pt- 2.flv 5.8 MB
  50 LVM Snapshots.flv 3.52 MB
  51 GUI LVM Management.flv 8.24 MB
 
11 Service Management
  52 Service Commands.flv 5.08 MB
  53 Using system-config-services.flv 5.26 MB
 
12 SELinux
  54 SELinux Overview.flv 4.52 MB
  55 SELinux Tools.flv 5.62 MB
  56 Setting SELinux Contexts pt- 1.flv 5.14 MB
  57 Setting SELinux Contexts pt- 2.flv 9.77 MB
  58 SELinux - mv Versus cp.flv 3.28 MB
  59 SELinux Booleans.flv 3.72 MB
 
13 Encrypted Filesystems
  60 Encrypted Filesystems.flv 4.64 MB
 
14 Network Services
  61 NFS.flv 2.87 MB
  62 FTP pt- 1.flv 5.92 MB
  63 FTP pt- 2.flv 5.28 MB
  64 CIFS (Samba) Client.flv 5.94 MB
  65 Autofs.flv 5.54 MB
  66 HTTP Server pt- 1.flv 7.13 MB
  67 HTTP Server pt- 2.flv 8.84 MB
  68 NTP Server.flv 4.18 MB
  69 Secure Shell (SSH) Commands.flv 3.75 MB
  70 VNC.flv 6.85 MB
 
15 Working with Processes
  71 View Running Processes.flv 4.46 MB
  72 Changing Process Priorities.flv 2.68 MB
  73 Stopping Processes.flv 3.49 MB
  74 Scheduling a Job with cron.flv 3.66 MB
  75 Scheduling a Job with at.flv 2.85 MB
 
16 System Logs
  76 System Logs Overview.flv 4.62 MB
  77 Reading Logfiles.flv 4.23 MB
  78 syslog.flv 5.34 MB
 
17 The Kernel
  79 Linux Kernel Overview.flv 4.34 MB
  80 Hardware and the Kernel.flv 3.9 MB
  81 Kernel Modules.flv 3.5 MB
  82 Working with proc and sysctl-conf.flv 4.96 MB
 
18 The Boot Process
  83 The Boot Process.flv 3.4 MB
  84 GRUB.flv 6.25 MB
  85 Upstart.flv 5.05 MB
  86 Runlevels pt- 1.flv 4.68 MB
  87 Runlevels pt- 2.flv 7.3 MB
  88 Powering Down the System.flv 3.33 MB
 
19 System Recovery
  89 Basic Troubleshooting.flv 6.89 MB
  90 Network Troubleshooting.flv 8.56 MB
  91 The Rescue Environment.flv 5.08 MB
  92 User Account Troubleshooting.flv 4.22 MB
 
20 Virtual Machines
  93 Introduction to Virtualization.flv 6.03 MB
  94 virsh.flv 4 MB
  95 virt-manager pt- 1.flv 3.34 MB
  96 virt-manager pt- 2.flv 6.44 MB
 
21 Conclusion
  97 Course Wrap Up.flv 4.72 MB
  98 Getting Help.flv 4.32 MB
 
22 Credits
  99 About the Author.flv 1.25 MB
  Red Hat Certified System Administrator RHCSA.pdf

Monday, March 4, 2013

C++ fundamentals video tutorial





C++ Fundamentals DVD (Size: 123.1 MB)
 
01. C++ Fundamentals
  04. Testing MS Visual C++ 2005 Express Edition.mov 4.99 MB
  03. C++ on Windows.mov 4.15 MB
  02. Short History of C++.mov 3.45 MB
  05. More MS Visual C++ 2005 Express Edition.mov 3.28 MB
  01. Introduction.mov 1.37 MB
 
02. Classes
  09. Member Functions.mov 4.02 MB
  10. Nested Types.mov 3.55 MB
  06. Classes Objects.mov 2.87 MB
  07. Class Types.mov 2.82 MB
  08. Data Members.mov 2.63 MB
 
03. Basic Structure
  12. Linkage Of Names.mov 3.54 MB
  11. Fundamental Types.mov 2.91 MB
  14. Scope Of Names.mov 2.18 MB
  13. One Definition Rule.mov 1.42 MB
 
04. Constructors
  15. Constructors.mov 3.15 MB
  19. User Defined Conversions.mov 2.99 MB
  16. Copy Constructors.mov 2.81 MB
  17. Destructors.mov 2.53 MB
  18. Order of Initialization.mov 1.92 MB
 
05. Enums
  21. Labeled Statement.mov 3.19 MB
  30. Namespaces.mov 2.65 MB
  20. Enumeration Typess.mov 2.56 MB
  25. Iteration Statements.mov 1.78 MB
  24. Selection Statements.mov 1.57 MB
  22. Expression Statement.mov 1.42 MB
  23. Compound Satement.mov 1.4 MB
  28. try-catch & throw Statements.mov 1.22 MB
  26. Jump Statements.mov 1.15 MB
  29. Inline Functions.mov 1.09 MB
 
 
06. Class Member Access
  34. Base Classes.mov 2.91 MB
  37. Dynamic Cast Operators.mov 2.78 MB
  36. Static Cast Operators.mov 1.89 MB
  33. Friends.mov 1.77 MB
  35. Constant Expressions.mov 1.7 MB
  32. Class Member Access.mov 1.7 MB
  38. C Style Cast Operators.mov 854.36 KB
 
07. Templates
  41. Containers.mov 4.53 MB
  39. Function Templates.mov 3.24 MB
  40. Class Templates.mov 2.64 MB
  43. IO Streams.mov 2.36 MB
  46. Virtual Functions & Their Overloading.mov 2.17 MB
  45. Operator Overloading.mov 1.36 MB
  44. Iterators.mov 1.31 MB
  42. Function Overloading.mov 1.01 MB
 
08. Types & Arguments
  50. Reference Types.mov 1.59 MB
  47. Array Types .mov 1.21 MB
  49. Pointer Types.mov 1007.86 KB
  48. Default Function Arguments.mov 972.97 KB
 
09. Exception Handling
  53. Stack Unwinding.mov 3.82 MB
  51. Exception Handling.mov 3.78 MB
  52. Exception Specifications.mov 987.15 KB
 
10. Review
  54. Wrap-up.mov 837.41 KB
 
11. Credits
  55. About This Author.mov



Related Posts Plugin for WordPress, Blogger...

your comments