0
Posted by Unknown on 15:25 in
Facebook

Download The Mac Hacker's Handbook Mediafire



Download here

Charles Miller, Dino Dai Zovi "The Mac Hacker's Handbook"
Wiley | English | 2009-03-03 | ISBN: 0470395362 | 384 pages | PDF | 6,5 MB
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.


Download :

 

0

The Art of Human Hacking

Posted by Unknown on 15:00 in ,
My Facebook Login Page

Download The Art of Human Hacking Mediafire






The Art of Human Hacking
English | Publisher: Wiley; 1 edition (December 21, 2010) | PDF | 408 Pages | 6.11 Mb


From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.


Download :


0

Hacker Techniques, Tools, and Incident Handling

Posted by Unknown on 14:55 in

Download Hacker Techniques, Tools, and Incident Handling



Hacker Techniques, Tools, and Incident Handling by Sean-Philip Oriyano, Michael Gregg
Jones & Bartlett Learning | 2010 | PDF | ISBN : 0763791830 | English | 59MB


Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.

Download :

 

0

Nintendo Wii 4.3 Hack Tutorial

Posted by Unknown on 14:50 in

Download Nintendo Wii 4.3 Hack Tutorial | 530 MB





Nintendo Wii 4.3 Hack Tutorial | 530 MB
It's a complete software modification for your Nintendo Wii to allow you to play almost all of your in-region backup burnt Wii and GameCube games via the disc channel without opening your console or having to use a loader application. Folow the video tutorial step by step the rest of the files are extra to play with.

Download :


Or


0

Lifehacker: The Guide to Working Smarter, Faster, and Better

Posted by Unknown on 14:47 in

Lifehacker: The Guide to Working Smarter, Faster, and Better



Lifehacker: The Guide to Working Smarter, Faster, and Better
Adam Pash, Gina Trapani | Wiley | English | EPUB + PDF


A new edition, packed with even more clever tricks and methods that make everyday life easier
Lifehackers redefine personal productivity with creative and clever methods for making life easier and more enjoyable. This new edition of a perennial bestseller boasts new and exciting tips, tricks, and methods that strike a perfect balance between current technology and common sense solutions for getting things done. Exploring the many ways technology has changed since the previous edition, this new edition has been updated to reflect the latest and greatest in technological and personal productivity.
The new "hacks" run the gamut of working with the latest Windows and Mac operating systems for both Windows and Apple, getting more done with smartphones and their operating systems, and dealing with the evolution of the web. Even the most tried-and-true hacks have been updated to reflect the contemporary tech world and the tools it provides us.

Hacks include:
Hack 1: Empty Your Inbox (and Keep It Empty).
Hack 2: Decrease Your Response Time.
Hack 3: Craft Effective Messages.
Hack 4: Highlight Messages Sent Directly to You.
Hack 5: Use Disposable Email Addresses.
Hack 6: Master Message Search.
Hack 7: Future-Proof Your Email Address.
Hack 8: Consolidate Multiple Email Addresses with Gmail.
Hack 9: Script and Automate Repetitive Replies.
Hack 10: Filter Low-Priority Messages.
Hack 11: Organize Your Documents Folder.
Hack 12: Instantly Retrieve Files Stored on Your Computer.
Hack 13: Overhaul Your Filing Cabinet.
Hack 14: Instantly Recall Any Number of Different Passwords.
Hack 15: Securely Track Your Passwords.
Hack 16: Tag Your Bookmarks.
Hack 17: Organize Your Digital Photos.
Hack 18: Corral Media Across Folders and Drives.
Hack 19: Create Saved Search Folders.
Hack 20: Create a Password-Protected Disk on Your PC.
Hack 21: Create a Password-Protected Disk on Your Mac.
Hack 22: Encrypt Your Entire Windows Operating System.
Hack 23: Set Up 2-Step Verification for Your Google Account.
Hack 24: Design Your Own Planner.
Hack 25: Make Your To-Do List Doable.
Hack 26: Set Up a Morning Dash.
Hack 27: Map Your Time.
Hack 28: Quick-Log Your Workday.
Hack 29: Dash Through Tasks with a Timer.
Hack 30: Form New Habits with Jerry Seinfeld's Chain.
Hack 31: Control Your Workday.
Hack 32: Turn Tasks into Game Play.
Hack 33: Send Reminders to Your Future Self.
Hack 34: Take Great Notes.
Hack 35: Organize Your Life with Remember the Milk.
Hack 36: Organize Your Life in Text Files.
Hack 37: Set Up a Ubiquitous Note-Taking Inbox Across Devices.
Hack 38: Off-Load Your Online Reading to a Distraction-Free Environment.
Hack 39: Limit Visits to Time-Wasting Websites.
Hack 40: Permanently Block Time-Wasting Websites.
Hack 41: Reduce Email Interruptions.
Hack 42: Split Your Work Among Multiple Desktops.
Hack 43: Build a No-Fly Zone.
Hack 44: Set Up Communication Quiet Hours.
Hack 45: Clear Your Desktop.
Hack 46: Make Your House a Usable Home.
Hack 47: Sentence Stuff to Death Row.
Hack 48: Drown Out Distracting Sounds with Pink Noise.
Hack 49: Search the Web in Three Keystrokes.
Hack 50: Command Your Windows PC from the Keyboard.
Hack 51: Command Your Mac from the Keyboard.
Hack 52: Reduce Repetitive Typing with Texter for Windows.
Hack 53: Reduce Repetitive Typing with TextExpander for Mac.
Hack 54: Automatically Fill in Repetitive Web Forms.
Hack 55: Batch-Resize Photos.
Hack 56: Bypass Free Site Registration with BugMeNot.
Hack 57: Speed Up Web Pages on a Slow Internet Connection.
Hack 58: Securely Save Website Passwords.
Hack 59: Become a Scheduling Black Belt with Google Calendar.
Hack 60: Set Up an Automated, Bulletproof File Back Up Solution.
Hack 61: Automatically Back Up Your Files to an External Hard Drive (Mac).
Hack 62: Automatically Clean Up Your PC.
Hack 63: Automatically Clean Up Your Mac.
Hack 64: Automatically Reboot and Launch Applications.
Hack 65: Make Google Search Results Automatically Come to You.
Hack 66: Automatically Download Music, Movies, and More.
Hack 67: Access Your Most Important Files Anywhere with Dropbox.
Hack 68: Manage Your Documents in a Web-Based Office Suite.
Hack 69: Carry Your Life on a Flash Drive.
Hack 70: Create a Virtual Private Network (VPN) with Hamachi.
Hack 71: Run a Home Web Server.
Hack 72: Run Full-Fledged Webapps from Your Home Computer.
Hack 73: Build Your Personal Wikipedia.
Hack 74: Remotely Control Your Home Computer.
Hack 75: Give Your Home Computer a Web Address.
Hack 76: Optimize Your Laptop.
Hack 77: Speed Up Your Touchscreen Typing.
Hack 78: Break Down the Barrier Between Your Computer and Mobile Phone.
Hack 79: Remote Control Your Computer with Your Phone.
Hack 80: Automate Android Functions with Tasker.
Hack 81: Set Up One Phone Number to Rule Them All.
Hack 82: Augment Reality with Your Phone.
Hack 83: Remember Where You’ve Been Using Location Awareness.
Hack 84: Command Your Phone with Your Voice.
Hack 85: Use Your Camera Phone as a Scanner.
Hack 86: Make Your "Dumbphone" Smarter via Text Message.
Hack 87: Connect Your Computer to the Internet via Mobile Phone by "Tethering".
Hack 88: Develop Your (Digital) Photographic Memory.
Hack 89: Send and Receive Money on Your Mobile Phone with PayPal.
Hack 90: Google Like a Pro.
Hack 91: Subscribe to Websites with RSS.
Hack 92: Quickly Search Within Specific Websites from the Address Bar.
Hack 93: Extend Your Web Browser.
Hack 94: Supercharge Your Firefox Downloads with DownThemAll!
Hack 95: Get 10 Useful Bookmarklets.
Hack 96: Find Reusable Media Online.
Hack 97: Get Your Data on a Map.
Hack 98: Set Multiple Sites as Your Home Page.
Hack 99: Access Unavailable Websites via Google.
Hack 100: Have a Say in What Google Says About You.
Hack 101: Clear Your Web Browsing Tracks.
Hack 102: Rescue Your PC from Malware.
Hack 103: Protect Your PC from Malware.
Hack 104: Clean Up Your Startup.
Hack 105: Undo System Configuration Changes.
Hack 106: Truly Delete Data from Your Hard Drive.
Hack 107: Compare and Merge Files and Folders with WinMerge.
Hack 108: Firewall Your Windows PC.
Hack 109: Firewall Your Mac.
Hack 110: Speed Up Windows with a Thumb Drive.
Hack 111: Free Up Hard-Drive Space.
Hack 112: Resurrect Deleted Files.
Hack 113: Hot Image Your PC for Instant Restoration.
Hack 114: Hot Image Your Mac for Instant Restoration.
Hack 115: Recover Files from an Unbootable PC.
Hack 116: Share Windows Files.
Hack 117: Share Mac Files.
Hack 118: Keep Your Web Browser in Sync Across Computers.
Hack 119: Share a Single Printer Between Computers.
Hack 120: Optimize Your Dual Monitors.
Hack 121: Control Multiple Computers with a Single Keyboard and Mouse.


Download :


Or


1

Download Network Hack Course Tutorial (Full 3 CD Pack)

Posted by Unknown on 14:40 in

Download Network Hack Course Tutorial (Full 3 CD Pack)



This is a 3-CD's Hack Tutorial Pack which covers all Wifi, Network Hacking Procedures and Guides for Hacking tools.

===========
CD1 Contents
===========


1. Introduction to Information Security & Ethical Hacking
2. Basics of Networking (Tutorial for beginners)
3. Introduction
4. Hacker Vs Cracker
5. Ethical Hacking
6. Precautions
7. Current Cyber Threats
8. Desktop and Server Security
9. Windows Security
10. Hacking into Windows XP, NT
11. SAM (Security Accounts Manager)
12. Registries
13. Counter Measures
14. Linux Security
15. Hacking into Linux
16. Keyloggers - Hardware & Software
17. Anti Keyloggers
18. Trojans or Remote Administration Tools
19. Spywares
20. Viruses and Worms Introduction
21. Classification of Viruses and Worms
22. Examples of Viruses and Worms
23. Countermeasures
24. Anti Virus
25. LAN Security
26. Threats to LAN
27. Countermeasures
28. Network and File Sharing
29. Firewalls
30. Anti Virus
31. Anti Spywares
32. Network Scanners
33. Introduction to Firewalls
34. Working of a Firewall
35. Types of Firewalls
36. Packet Filters
37. Proxy Gateways
38. Network Address Translation
39. Intrusion Detection
40. Logging
41. Network Tools and Commands (Tutorial)
42. TCP/IP Commands
43. ARP Command
44. Trace route Command
45. Netstat Command
46. Finger Command
47. Ping Command
48. Nbtstat Command
49. Ipconfig Command
50. Telnet Command

===========
CD 2 Contents:
===========


1. Internet Security
2. IP Addresses
3. Finding an IP Address
4. Through Instant Messaging Software
5. Through Internet Relay Chat
6. Through Website
7. Through Email Headers
8. Through Message Board Postings
9. Proxies Servers
10. Transparent Proxies
11. Anonymous Proxies
12. Distorting Proxies
13. Elite Proxies
14. Free Proxy Servers
15. Analysis of Email Headers
16. Yahoo Email
17. Google Email
18. SSL (Secure Sockets Layer)
19. IP Spoofing
20. Information Gathering for a Remote System
21. Daemon Grabbing
22. Port Scanning
23. ICMP Messages
24. Banner Grabbing
25. Sockets
26. Detection of TCP Port Scan TCP SYN Scanning
27. Detection of SYN Scans
28. SYN/ACK Scanning
29. Detection of SYN/ACK Port Scan
30. TCP FIN Scanning
31. TCP XMAS tree scanning
32. ACK Scanning
33. UDP Ports
34. Utility
35. Fingerprinting
36. OS Fingerprinting
37. Remote OS Fingerprinting
38. Attacking the System
39. Nontechnical Attacks
40. Network Infrastructure Attacks
41. Operating System Attacks
42. Technical Attacks
43. Denial of Services attacks (DOS Attacks)
44. Threat from Sniffing and Key Logging
45. Trojan Attacks
46. HTTP Request Smuggling g
47. IP Spoofing
48. Cross site scripting (XSS)
49. Buffer Overflows
50. Format Bugs
51. SQL Injection s
52. Input Validation
53. Viruses & Worms
54. Spy Ware Software
55. Password Cracking
56. All other types of Attacks
57. Password Cracking
58. Password Guessing
59. Dictionary Based Attacks
60. Brute-Force Attacks
61. Default Passwords
62. Attacks on LOG files
63. Sniffer Attacks
64. Wireless & Bluetooth Security (Tutorial only) (Introduction Only*)
65. Penetration Testing
66. Definition
67. Methodology
68. Basic Approaches
69. Google Hacking
70. Terminologies
71. Basic Search Techniques
72. Basic Keyword searching
73. Phrase search
74. + Operator search
75. - Operator search
76. Range search
77. Advanced Search Techniques Site
78. Intitle, allintitle
79. Inurl, allinurl
80. Link .
81. Phonebook
82. Rphonebook
83. Bphonebook
84. Daterange
85. Cache
86. Filetype .
87. Robots.txt

============
CD 3 Contents:
============


1. Encryption & Cryptography (Introduction Only*)
2. Introduction to Cryptography
3. Private Key Encryption
4. Public Key Encryption
5. DES Algorithm
6. RSA Algorithm
7. Hash Functions
8. MD5 HASH algorithm
9. Digital Signatures
10. Encyptorsetup
11. Computer Forensics (Introduction Only*)
12. Introduction to Forensics
13. Digital Evidence
14. Requirements for Forensics
15. Steps taken in Forensics investigation
16. Acquisition
17. Identification
18. Evaluation
19. Presentation
20. Forensic Toolkit
21. Steganography and Data Hiding
22. Introduction
23. Digital Watermarking
24. Types of Steganography
25. In band Data Insertion
26. Data Algorithmic
27. Overt based grammar
28. Out-band Data Insertion
29. Overwriting Data Insertion
30. Steganography Tools & Applications
31. Catching Criminals
32. Cyber Terrorism
33. Forms of Cyber Terrorism
34. Factors & Reasons
35. Countermeasures
36. Challenges
37. Honey Pots
38. Definition
39. Research Honey Pots
40. Production Honey Pots
41. Low Involved Honey Pots
42. High Involved Honey Pots
43. Pros & Cons
44. Famous Honey Pots
45. Cyber Laws & IT Act India (Introduction Only*)
46. IT Act 2000
47. Domain Name Disputes
48. Definitions and Laws
49. Cyber Crimes & penalties
50. Security Auditing (Introduction Only*)
51. Audit Objectives
52. Risk Analysis
53. Auditing Steps
54. Previous Check
55. Planning & Organisation
56. Network Control - Policies / Stds
57. Network Control - Hardware / Software
58. Network Data Standards and Data Access
59. Hardware and Software Backup and Recovery
60. Software Communications
61. Access to Network Operating Systems Software and Facilities
62. Data Encryption and Filtering
63. Internet Applications
64. Password Protection

Download :



1

Download Hackforums Tool Kit V1 Mediafire

Posted by Unknown on 14:38 in

Download Hackforums Tool Kit V1 Mediafire













Download :


0

DeadLine's File Binder

Posted by Unknown on 14:34 in

DeadLine's File Binder




[Image: ScreenShotr50a7b261a7e033.39779089.png]


[Image: ScreenShotr50a7b2820270e7.94502773.png]




Download :



0

Multi Locker 3 Cracked - Builder + Panel

Posted by Unknown on 14:34 in


Multi Locker 3 Cracked - Builder + Panel




Panel :


Binary Has been modded :

- Two calls to decryption routine have been nopped


Panel :

- Took off 2 Links calling exe.php (get your build) and dns.php (missing files still both useless) ...
- Tranlated Some Russian Shit here and there ...


Successfully tested on : WinXP SP3 / IE8


Download :


Or


0

HTML Paragraphs

Posted by Unknown on 14:10 in
HTML Paragraphs

HTML documents are divided into paragraphs.



HTML Paragraphs


Paragraphs are defined with the <p> tag.

Example

<p>This is a paragraph</p>
<p>This is another paragraph</p>

Try it yourself »

Note: Browsers automatically add an empty line before and after a paragraph.



Don't Forget the End Tag


Most browsers will display HTML correctly even if you forget the end tag:

Example

<p>This is a paragraph
<p>This is another paragraph

Try it yourself »

The example above will work in most browsers, but don't rely on it. Forgetting the end tag can produce unexpected results or errors.

Note: Future version of HTML will not allow you to skip end tags.



HTML Line Breaks


Use the <br> tag if you want a line break (a new line) without starting a new paragraph:

Example

<p>This is<br>a para<br>graph with line breaks</p>

Try it yourself »

The <br> element is an empty HTML element. It has no end tag.



HTML Output - Useful Tips


You cannot be sure how HTML will be displayed. Large or small screens, and resized windows will create different results.

With HTML, you cannot change the output by adding extra spaces or extra lines in your HTML code.

The browser will remove extra spaces and extra lines when the page is displayed. Any number of lines count as one line, and any number of spaces count as one space.

Try it yourself

(The example demonstrates some HTML formatting problems)



Examples

Examples from this page


HTML paragraphs
How HTML paragraphs are displayed in a browser.

Line breaks
The use of line breaks in an HTML document.

Poem problems
Some problems with HTML formatting.

More Examples


More paragraphs
The default behaviors of paragraphs.



HTML Tag Reference


W3Schools' tag reference contains additional information about HTML elements and their attributes.

Tag Description
<p> Defines a paragraph
<br> Inserts a single line break


0

HTML Headings

Posted by Unknown on 14:05 in
Headings are important in HTML documents.



HTML Headings


Headings are defined with the <h1> to <h6> tags.

<h1> defines the most important heading. <h6> defines the least important heading.

Example

<h1>This is a heading</h1>
<h2>This is a heading</h2>
<h3>This is a heading</h3>

Try it yourself »

Note: Browsers automatically add some empty space (a margin) before and after each heading.



Headings Are Important


Use HTML headings for headings only. Don't use headings to make text BIG or bold.

Search engines use your headings to index the structure and content of your web pages.

Since users may skim your pages by its headings, it is important to use headings to show the document structure.

H1 headings should be used as main headings, followed by H2 headings, then the less important H3 headings, and so on.



HTML Lines


The <hr>tag creates a horizontal line in an HTML page.

The hr element can be used to separate content:

Example

<p>This is a paragraph</p>
<hr><p>This is a paragraph</p>
<hr><p>This is a paragraph</p>

Try it yourself »




HTML Comments


Comments can be inserted into the HTML code to make it more readable and understandable. Comments are ignored by the browser and are not displayed.

Comments are written like this:

Example

<!-- This is a comment -->

Try it yourself »

Note: There is an exclamation point after the opening bracket, but not before the closing bracket.



HTML Tip - How to View HTML Source


Have you ever seen a Web page and wondered "Hey! How did they do that?"

To find out, right-click in the page and select "View Source" (IE) or "View Page Source" (Firefox), or similar for other browsers. This will open a window containing the HTML code of the page.



Examples

Examples From This Page


Headings
How to display headings in an HTML document.

Hidden comments
How to insert comments in the HTML source code.

Horizontal lines
How to insert a horizontal line.



HTML Tag Reference


W3Schools' tag reference contains additional information about these tags and their attributes.

You will learn more about HTML tags and attributes in the next chapters of this tutorial.

Tag Description
<html> Defines an HTML document
<body> Defines the document's body
<h1> to <h6> Defines HTML headings
<hr> Defines a horizontal line
<!--> Defines a comment



0

HTML Attributes

Posted by Unknown on 14:01 in
Attributes provide additional information about HTML elements.



HTML Attributes


  • HTML elements can have attributes
  • Attributes provide additional information about an element
  • Attributes are always specified in the start tag
  • Attributes come in name/value pairs like: name="value"



Attribute Example


HTML links are defined with the <a> tag. The link address is specified in the href attribute:

Example

<a href="http://www.w3schools.com">This is a link</a>

Try it yourself »




Always Quote Attribute Values


Attribute values should always be enclosed in quotes.

Double style quotes are the most common, but single style quotes are also allowed.

RemarkTip: In some rare situations, when the attribute value itself contains quotes, it is necessary to use single quotes: name='John "ShotGun" Nelson'



HTML Tip: Use Lowercase Attributes


Attribute names and attribute values are case-insensitive.

However, the World Wide Web Consortium (W3C) recommends lowercase attributes/attribute values in their HTML 4 recommendation.

Newer versions of (X)HTML will demand lowercase attributes.



HTML Attributes Reference


A complete list of legal attributes for each HTML element is listed in our: HTML Tag Reference.

Below is a list of some attributes that can be used on any HTML element:

Attribute Description
class Specifies one or more classnames for an element (refers to a class in a style sheet)
id Specifies a unique id for an element
style Specifies an inline CSS style for an element
title Specifies extra information about an element (displayed as a tool tip)

0

HTML Elements

Posted by Unknown on 13:59 in
HTML Elements

HTML documents are defined by HTML elements.



HTML Elements


An HTML element is everything from the start tag to the end tag:

Start tag * Element content End tag *
<p> This is a paragraph </p>
<a href="default.htm"> This is a link </a>
<br>

* The start tag is often called the opening tag. The end tag is often called the closing tag.



HTML Element Syntax


  • An HTML element starts with a start tag / opening tag
  • An HTML element ends with an end tag / closing tag
  • The element content is everything between the start and the end tag
  • Some HTML elements have empty content
  • Empty elements are closed in the start tag
  • Most HTML elements can have attributes

Tip: You will learn about attributes in the next chapter of this tutorial.



Nested HTML Elements


Most HTML elements can be nested (can contain other HTML elements).

HTML documents consist of nested HTML elements.



HTML Document Example


<!DOCTYPE html>
<html>

<body>
<p>This is my first paragraph.</p>
</body>

</html>

The example above contains 3 HTML elements.



HTML Example Explained


The <p> element:

<p>This is my first paragraph.</p>

The <p> element defines a paragraph in the HTML document.
The element has a start tag <p> and an end tag </p>.
The element content is: This is my first paragraph.

The <body> element:

<body>
<p>This is my first paragraph.</p>
</body
>

The <body> element defines the body of the HTML document.
The element has a start tag <body> and an end tag </body>.
The element content is another HTML element (a p element).

The <html> element:

<html>

<body>
<p>This is my first paragraph.</p>
</body>


</html>

The <html> element defines the whole HTML document.
The element has a start tag <html> and an end tag </html>.
The element content is another HTML element (the body element).



Don't Forget the End Tag


Some HTML elements might display correctly even if you forget the end tag:

<p>This is a paragraph
<p>This is a paragraph

The example above works in most browsers, because the closing tag is considered optional.

Never rely on this. Many HTML elements will produce unexpected results and/or errors if you forget the end tag .



Empty HTML Elements


HTML elements with no content are called empty elements.

<br> is an empty element without a closing tag (the <br> tag defines a line break).

Tip: In XHTML, all elements must be closed. Adding a slash inside the start tag, like <br />, is the proper way of closing empty elements in XHTML (and XML).



HTML Tip: Use Lowercase Tags


HTML tags are not case sensitive: <P> means the same as <p>. Many web sites use uppercase HTML tags.

W3Schools use lowercase tags because the World Wide Web Consortium (W3C) recommends lowercase in HTML 4, and demands lowercase tags in XHTML.

0

HTML Basic - 4

Posted by Unknown on 13:56 in

HTML Headings


HTML headings are defined with the <h1> to <h6> tags.

Example

<h1>This is a heading</h1>
<h2>This is a heading</h2>
<h3>This is a heading</h3>

Try it yourself »




HTML Paragraphs


HTML paragraphs are defined with the <p> tag.

Example

<p>This is a paragraph.</p>
<p>This is another paragraph.</p>

Try it yourself »




HTML Links


HTML links are defined with the <a> tag.

Example

<a href="http://www.w3schools.com">This is a link</a>

Try it yourself »

Note: The link address is specified in the href attribute.

(You will learn about attributes in a later chapter of this tutorial).



HTML Images


HTML images are defined with the <img> tag.

Example

<img src="w3schools.jpg" width="104" height="142">

Try it yourself »

Note: The filename and the size of the image are provided as attributes.

0
Posted by Unknown on 13:07 in


Hi friends , Are you want to learn HTML program ..just follow my step.
The source code of a web page is made up of HTML tags. Some tags are mandatory (all web pages must use them), but most tags are optional. The actual tags that you use will depend on the content you want to appear.

Take a look at the following code:

Code



Here's another example. This time, let's add some content:

Code


If you were to open the above HTML file in your browser, it should look something like this:
Screenshot of example web page
 

How do I use this Code?

So far I've showed you the code used to create a basic web page. I've also showed you what that web page looks like in a browser. Now I'm going to show you how to do this yourself.
To create a web page like the above example, do the following:
  1. Open up a text editor (such as Notepad or Simpletext)
  2. Open a new (blank) page (i.e. "File > New...")
  3. Copy the code from "Example 2" and paste it into your blank text file (or re-type it if you prefer)
  4. Save the file as "index.html" (take note of where you saved it)
Congratulations! You just created your first web page!

1st day..........exclusive by Saiful islam Saif

0

Frequently Asked Questions

Posted by Unknown on 17:21 in

Frequently Asked Questions


Q: How do I tell if I am already a hacker?
Q: Will you teach me how to hack?
Q: How can I get started, then?
Q: When do you have to start? Is it too late for me to learn?
Q: How long will it take me to learn to hack?
Q: Is Visual Basic a good language to start with?
Q: Would you help me to crack a system, or teach me how to crack?
Q: How can I get the password for someone else's account?
Q: How can I break into/read/monitor someone else's email?
Q: How can I steal channel op privileges on IRC?
Q: I've been cracked. Will you help me fend off further attacks?
Q: I'm having problems with my Windows software. Will you help me?
Q: Where can I find some real hackers to talk with?
Q: Can you recommend useful books about hacking-related subjects?
Q: Do I need to be good at math to become a hacker?
Q: What language should I learn first?
Q: What kind of hardware do I need?
Q: I want to contribute. Can you help me pick a problem to work on?
Q: Do I need to hate and bash Microsoft?
Q: But won't open-source software leave programmers unable to make a living?
Q: Where can I get a free Unix?
Q: How do I tell if I am already a hacker?
A: Ask yourself the following three questions:
  • Do you speak code, fluently?
  • Do you identify with the goals and values of the hacker community?
  • Has a well-established member of the hacker community ever called you a hacker?
If you can answer yes to all three of these questions, you are already a hacker. No two alone are sufficient.
The first test is about skills. You probably pass it if you have the minimum technical skills described earlier in this document. You blow right through it if you have had a substantial amount of code accepted by an open-source development project.
The second test is about attitude. If the five principles of the hacker mindset seemed obvious to you, more like a description of the way you already live than anything novel, you are already halfway to passing it. That's the inward half; the other, outward half is the degree to which you identify with the hacker community's long-term projects.
Here is an incomplete but indicative list of some of those projects: Does it matter to you that Linux improve and spread? Are you passionate about software freedom? Hostile to monopolies? Do you act on the belief that computers can be instruments of empowerment that make the world a richer and more humane place?
But a note of caution is in order here. The hacker community has some specific, primarily defensive political interests — two of them are defending free-speech rights and fending off "intellectual-property" power grabs that would make open source illegal. Some of those long-term projects are civil-liberties organizations like the Electronic Frontier Foundation, and the outward attitude properly includes support of them. But beyond that, most hackers view attempts to systematize the hacker attitude into an explicit political program with suspicion; we've learned, the hard way, that these attempts are divisive and distracting. If someone tries to recruit you to march on your capitol in the name of the hacker attitude, they've missed the point. The right response is probably Shut up and show them the code.
The third test has a tricky element of recursiveness about it. I observed in the section called “What Is a Hacker?” that being a hacker is partly a matter of belonging to a particular subculture or social network with a shared history, an inside and an outside. In the far past, hackers were a much less cohesive and self-aware group than they are today. But the importance of the social-network aspect has increased over the last thirty years as the Internet has made connections with the core of the hacker subculture easier to develop and maintain. One easy behavioral index of the change is that, in this century, we have our own T-shirts.
Sociologists, who study networks like those of the hacker culture under the general rubric of "invisible colleges", have noted that one characteristic of such networks is that they have gatekeepers — core members with the social authority to endorse new members into the network. Because the "invisible college" that is hacker culture is a loose and informal one, the role of gatekeeper is informal too. But one thing that all hackers understand in their bones is that not every hacker is a gatekeeper. Gatekeepers have to have a certain degree of seniority and accomplishment before they can bestow the title. How much is hard to quantify, but every hacker knows it when they see it.
Q: Will you teach me how to hack?
A: Since first publishing this page, I've gotten several requests a week (often several a day) from people to "teach me all about hacking". Unfortunately, I don't have the time or energy to do this; my own hacking projects, and working as an open-source advocate, take up 110% of my time.
Even if I did, hacking is an attitude and skill you basically have to teach yourself. You'll find that while real hackers want to help you, they won't respect you if you beg to be spoon-fed everything they know.
Learn a few things first. Show that you're trying, that you're capable of learning on your own. Then go to the hackers you meet with specific questions.
If you do email a hacker asking for advice, here are two things to know up front. First, we've found that people who are lazy or careless in their writing are usually too lazy and careless in their thinking to make good hackers — so take care to spell correctly, and use good grammar and punctuation, otherwise you'll probably be ignored. Secondly, don't dare ask for a reply to an ISP account that's different from the account you're sending from; we find people who do that are usually thieves using stolen accounts, and we have no interest in rewarding or assisting thievery.
Q: How can I get started, then?
A: The best way for you to get started would probably be to go to a LUG (Linux user group) meeting. You can find such groups on the LDP General Linux Information Page; there is probably one near you, possibly associated with a college or university. LUG members will probably give you a Linux if you ask, and will certainly help you install one and get started.
Q: When do you have to start? Is it too late for me to learn?
A: Any age at which you are motivated to start is a good age. Most people seem to get interested between ages 15 and 20, but I know of exceptions in both directions.
Q: How long will it take me to learn to hack?
A: That depends on how talented you are and how hard you work at it. Most people who try can acquire a respectable skill set in eighteen months to two years, if they concentrate. Don't think it ends there, though; in hacking (as in many other fields) it takes about ten years to achieve mastery. And if you are a real hacker, you will spend the rest of your life learning and perfecting your craft.
Q: Is Visual Basic a good language to start with?
A: If you're asking this question, it almost certainly means you're thinking about trying to hack under Microsoft Windows. This is a bad idea in itself. When I compared trying to learn to hack under Windows to trying to learn to dance while wearing a body cast, I wasn't kidding. Don't go there. It's ugly, and it never stops being ugly.
There is a specific problem with Visual Basic; mainly that it's not portable. Though there is a prototype open-source implementations of Visual Basic, the applicable ECMA standards don't cover more than a small set of its programming interfaces. On Windows most of its library support is proprietary to a single vendor (Microsoft); if you aren't extremely careful about which features you use — more careful than any newbie is really capable of being — you'll end up locked into only those platforms Microsoft chooses to support. If you're starting on a Unix, much better languages with better libraries are available. Python, for example.
Also, like other Basics, Visual Basic is a poorly-designed language that will teach you bad programming habits. No, don't ask me to describe them in detail; that explanation would fill a book. Learn a well-designed language instead.
One of those bad habits is becoming dependent on a single vendor's libraries, widgets, and development tools. In general, any language that isn't fully supported under at least Linux or one of the BSDs, and/or at least three different vendors' operating systems, is a poor one to learn to hack in.
Q: Would you help me to crack a system, or teach me how to crack?
A: No. Anyone who can still ask such a question after reading this FAQ is too stupid to be educable even if I had the time for tutoring. Any emailed requests of this kind that I get will be ignored or answered with extreme rudeness.
Q: How can I get the password for someone else's account?
A: This is cracking. Go away, idiot.
Q: How can I break into/read/monitor someone else's email?
A: This is cracking. Get lost, moron.
Q: How can I steal channel op privileges on IRC?
A: This is cracking. Begone, cretin.
Q: I've been cracked. Will you help me fend off further attacks?
A: No. Every time I've been asked this question so far, it's been from some poor sap running Microsoft Windows. It is not possible to effectively secure Windows systems against crack attacks; the code and architecture simply have too many flaws, which makes securing Windows like trying to bail out a boat with a sieve. The only reliable prevention starts with switching to Linux or some other operating system that is designed to at least be capable of security.
Q: I'm having problems with my Windows software. Will you help me?
A: Yes. Go to a DOS prompt and type "format c:". Any problems you are experiencing will cease within a few minutes.
Q: Where can I find some real hackers to talk with?
A: The best way is to find a Unix or Linux user's group local to you and go to their meetings (you can find links to several lists of user groups on the LDP site at ibiblio).
(I used to say here that you wouldn't find any real hackers on IRC, but I'm given to understand this is changing. Apparently some real hacker communities, attached to things like GIMP and Perl, have IRC channels now.)
Q: Can you recommend useful books about hacking-related subjects?
A: I maintain a Linux Reading List HOWTO that you may find helpful. The Loginataka may also be interesting.
For an introduction to Python, see the tutorial on the Python site.
Q: Do I need to be good at math to become a hacker?
A: No. Hacking uses very little formal mathematics or arithmetic. In particular, you won't usually need trigonometry, calculus or analysis (there are exceptions to this in a handful of specific application areas like 3-D computer graphics). Knowing some formal logic and Boolean algebra is good. Some grounding in finite mathematics (including finite-set theory, combinatorics, and graph theory) can be helpful.
Much more importantly: you need to be able to think logically and follow chains of exact reasoning, the way mathematicians do. While the content of most mathematics won't help you, you will need the discipline and intelligence to handle mathematics. If you lack the intelligence, there is little hope for you as a hacker; if you lack the discipline, you'd better grow it.
I think a good way to find out if you have what it takes is to pick up a copy of Raymond Smullyan's book What Is The Name Of This Book?. Smullyan's playful logical conundrums are very much in the hacker spirit. Being able to solve them is a good sign; enjoying solving them is an even better one.
Q: What language should I learn first?
A: XHTML (the latest dialect of HTML) if you don't already know it. There are a lot of glossy, hype-intensive bad HTML books out there, and distressingly few good ones. The one I like best is HTML: The Definitive Guide.
But HTML is not a full programming language. When you're ready to start programming, I would recommend starting with Python. You will hear a lot of people recommending Perl, but it's harder to learn and (in my opinion) less well designed.
C is really important, but it's also much more difficult than either Python or Perl. Don't try to learn it first.
Windows users, do not settle for Visual Basic. It will teach you bad habits, and it's not portable off Windows. Avoid.
Q: What kind of hardware do I need?
A: It used to be that personal computers were rather underpowered and memory-poor, enough so that they placed artificial limits on a hacker's learning process. This stopped being true in the mid-1990s; any machine from an Intel 486DX50 up is more than powerful enough for development work, X, and Internet communications, and the smallest disks you can buy today are plenty big enough.
The important thing in choosing a machine on which to learn is whether its hardware is Linux-compatible (or BSD-compatible, should you choose to go that route). Again, this will be true for almost all modern machines. The only really sticky areas are modems and wireless cards; some machines have Windows-specific hardware that won't work with Linux.
There's a FAQ on hardware compatibility; the latest version is here.
Q: I want to contribute. Can you help me pick a problem to work on?
A: No, because I don't know your talents or interests. You have to be self-motivated or you won't stick, which is why having other people choose your direction almost never works.
Try this. Watch the project announcements scroll by on Freshmeat for a few days. When you see one that makes you think "Cool! I'd like to work on that!", join it.
Q: Do I need to hate and bash Microsoft?
A: No, you don't. Not that Microsoft isn't loathsome, but there was a hacker culture long before Microsoft and there will still be one long after Microsoft is history. Any energy you spend hating Microsoft would be better spent on loving your craft. Write good code — that will bash Microsoft quite sufficiently without polluting your karma.
Q: But won't open-source software leave programmers unable to make a living?
A: This seems unlikely — so far, the open-source software industry seems to be creating jobs rather than taking them away. If having a program written is a net economic gain over not having it written, a programmer will get paid whether or not the program is going to be open-source after it's done. And, no matter how much "free" software gets written, there always seems to be more demand for new and customized applications. I've written more about this at the Open Source pages.
Q: Where can I get a free Unix?
A: If you don't have a Unix installed on your machine yet, elsewhere on this page I include pointers to where to get the most commonly used free Unix. To be a hacker you need motivation and initiative and the ability to educate yourself. Start now...

0

Other Resources

Posted by Unknown on 17:19 in

Other Resources


Paul Graham has written an essay called Great Hackers, and another on Undergraduation, in which he speaks much wisdom.

There is a document called How To Be A Programmer that is an excellent complement to this one. It has valuable advice not just about coding and skillsets, but about how to function on a programming team.

I have also written A Brief History Of Hackerdom.

I have written a paper, The Cathedral and the Bazaar, which explains a lot about how the Linux and open-source cultures work. I have addressed this topic even more directly in its sequel Homesteading the Noosphere.

Rick Moen has written an excellent document on how to run a Linux user group.

Rick Moen and I have collaborated on another document on How To Ask Smart Questions. This will help you seek assistance in a way that makes it more likely that you will actually get it.

If you need instruction in the basics of how personal computers, Unix, and the Internet work, see The Unix and Internet Fundamentals HOWTO.

When you release software or write patches for software, try to follow the guidelines in the Software Release Practice HOWTO.

If you enjoyed the Zen poem, you might also like Rootless Root: The Unix Koans of Master Foo.

0

Points For Style

Posted by Unknown on 17:18 in

Points For Style

Again, to be a hacker, you have to enter the hacker mindset. There are some things you can do when you're not at a computer that seem to help. They're not substitutes for hacking (nothing is) but many hackers do them, and feel that they connect in some basic way with the essence of hacking.
  • Learn to write your native language well. Though it's a common stereotype that programmers can't write, a surprising number of hackers (including all the most accomplished ones I know of) are very able writers.
  • Read science fiction. Go to science fiction conventions (a good way to meet hackers and proto-hackers).
  • Train in a martial-arts form. The kind of mental discipline required for martial arts seems to be similar in important ways to what hackers do. The most popular forms among hackers are definitely Asian empty-hand arts such as Tae Kwon Do, various forms of Karate, Kung Fu, Aikido, or Ju Jitsu. Western fencing and Asian sword arts also have visible followings. In places where it's legal, pistol shooting has been rising in popularity since the late 1990s. The most hackerly martial arts are those which emphasize mental discipline, relaxed awareness, and control, rather than raw strength, athleticism, or physical toughness.
  • Study an actual meditation discipline. The perennial favorite among hackers is Zen (importantly, it is possible to benefit from Zen without acquiring a religion or discarding one you already have). Other styles may work as well, but be careful to choose one that doesn't require you to believe crazy things.
  • Develop an analytical ear for music. Learn to appreciate peculiar kinds of music. Learn to play some musical instrument well, or how to sing.
  • Develop your appreciation of puns and wordplay.
The more of these things you already do, the more likely it is that you are natural hacker material. Why these things in particular is not completely clear, but they're connected with a mix of left- and right-brain skills that seems to be important; hackers need to be able to both reason logically and step outside the apparent logic of a problem at a moment's notice.
Work as intensely as you play and play as intensely as you work. For true hackers, the boundaries between "play", "work", "science" and "art" all tend to disappear, or to merge into a high-level creative playfulness. Also, don't be content with a narrow range of skills. Though most hackers self-describe as programmers, they are very likely to be more than competent in several related skills — system administration, web design, and PC hardware troubleshooting are common ones. A hacker who's a system administrator, on the other hand, is likely to be quite skilled at script programming and web design. Hackers don't do things by halves; if they invest in a skill at all, they tend to get very good at it.
Finally, a few things not to do.
  • Don't use a silly, grandiose user ID or screen name.
  • Don't get in flame wars on Usenet (or anywhere else).
  • Don't call yourself a ‘cyberpunk’, and don't waste your time on anybody who does.
  • Don't post or email writing that's full of spelling errors and bad grammar.
The only reputation you'll make doing any of these things is as a twit. Hackers have long memories — it could take you years to live your early blunders down enough to be accepted.
The problem with screen names or handles deserves some amplification. Concealing your identity behind a handle is a juvenile and silly behavior characteristic of crackers, warez d00dz, and other lower life forms. Hackers don't do this; they're proud of what they do and want it associated with their real names. So if you have a handle, drop it. In the hacker culture it will only mark you as a loser.
 

Copyright © 2009 SaifExclusive........... All rights reserved. Theme by Laptop Geek. | Bloggerized by FalconHive.