Wednesday, April 30, 2008

Total Training - Adobe Fireworks CS3

Get your designs from the rest of the CS3 suite out to the web and ready for the masses with Adobe Fireworks CS3. This program picks up where Adobe's old ImageReady left off and comes packed with new features to set your designs up using html, java, and even CSS. With John Ulliman as your guide, you'll learn how to adjust, crop, and use filters on your digital pictures, scans and stock art. Plus, how to create composite images using layer techniques, adjustments and effects.

Web Services Security

Web Services are appearing and dominate as new application solutions. At the same time they present great challenges for security. This book describes a union of Web Services and information security. Several technologies are presented (i.e. XML Signature, XML Encryption, SAML...), and then related to Web Services so that the reader can get the whole picture. The book consists of five parts and each of them is dedicated to one topic. The first part is, as expected, entitled Introduction. The authors present web services, security, and some new challenges as well as new threats. As an introduction to Web Services Security they define web services as applications that can be described, published, located, and invoked over a network. Here you find an introduction to XML as a quite verbose language.Speaking about security, some building blocks of security are presented: confidentiality, authentication, authorization, integrity, non-repudiation, privacy, and availability.

Download Link:

Password :

Full Metal Jacket

Track List:
01. Full Metal Jacket
02. Hello Vietnam
03. Chapel Of Love
04. Wooley Bully
05. I Like It Like That
06. These Boots are Made for Walking
07. Surfin' Bird
08. The Marines' Hymn
09. Transition
10. Parris Island
11. Ruins
12. Leonard
13. Attack
14. Time Suspended
15. Sniper

Download Link:

Principles of Protocol Design

This book introduces the reader to the principles used in a broad selection of modern data communication protocols and basic algorithms for use in distributed applications, including not only simple point-to-point data transfer protocols but also multi-party protocols and protocols for ensuring data security. The presentation uses CSP notation to give a concise description of the protocols considered and to provide a basis for analysis of their properties. Relating theory to practice, with a strong focus on currently important Internet protocols, the book clearly explains how the principles are exploited in real-life protocol designs.

Download Link:


What does mdash mean?

mdash is a printing/typesetting term, and it refers to a dash the width of the capital letter "M". The shorter dash is similarly referred to as an ndash. There is also the hyphen, which is usually smaller than the ndash . With some modern day fonts, there wouldn't be much difference.

mdash can be represented numerically using &# 150; in HTML, or '\u2014' in Java.
ndash can be represented numerically using &# 150; in HTML, or '\u2013' in Java.

It's All in Your Head: Thinking Your Way to Happiness

Here are the simple truths that motivate people of any age to find and accept lasting happiness, illustrated with the stories of real people, and illuminated with the observations of spiritual leaders and great philosophers.For more than three decades, attorney, financial consultant, and life coach Stephen M. Pollan has been advising clients and readers on the business of living everything from home buying and employment contracts to marriage and parenting. He has taught his clients and readers to Die Broke (use assets rather than build up an estate), to stage Second Acts (reinvent their lives), and, most recently, to Fire Your Boss (take charge of their own work lives).

Download Link:

Tuesday, April 29, 2008

How to Remove Linux from Your PC Safely and Restore your MBR

First of all you need to know where your Linux OS is installed to. That is what drive it is currently living on. Bear in mind that Linux formats the drive as HFS rather than Fat/Fat32 or NTFS. ( These are the file systems used by various Operating Systems).

So HFS Partitions are not seen by windows, so its hidden.

To remove the partitions of Linux in WindowsXP go to your 'Control panel' > Admistrative Tools > Computer Managment.

Open 'Disk Management' and you will see your Linux drives recognised as 'Unknown Partition' plus the status of the drive. Bearing in mind you know what partition and disk you installed to it will be easier to recognise as the drive/partition where you had installed it to.

Once you have identifed the drives, 'right-Click' on the drive/partiton and select 'Delete Logical Drive'

Once you have followed this through, you will now have free space.

This next part is very important. Once you have formatted the drive, re format it as your required file system type. either Fat32 or NTFS. Now the important part is coming up !
Fixing your Master Boot Record[MBR] to make Windows Bootable again.

Have a Windows Boot disk with all the basic DOS Commands loaded on to the disk. A standard Windows 98/Me Boot Disk will work too.

Type in the DOS command :

e.g, from your C:\

fdisk /mbr

Or use your Windows XP run the recovery console, pick which xp install you would like to boot in to (usually you will pick #1)

then type: fixmbr. Answer Y to the dialoge.

Your master boot record will now be restored and Windows XP will be bootable once again. Your System will be restored with your original boot loader that you got with Windows XP.

Paypal Hacks: 100 Industrial Strength Tips And Tools

Learn how to make the most of PayPal to get the most out of your online business or transactions. From how to take steps to protect yourself while buying and selling on eBay to using PayPal on your own site to handle subscriptions, affiliations, and donations, PayPal Hacks provides the tools and details necessary to make PayPal more profitable, more flexible, and more convenient.

Download Link:

VTC - Adobe Illustrator CS3

Adobe® Illustrator® CS3 is the premiere illustration and design tool for graphic artists. Its tight integration with Adobe Photoshop, Adobe InDesign and even Adobe After Effects facilitates easier and faster workflows in print, the web and even video and film. This tutorial, by VTC author and Professional Illustrator, Dwayne Ferguson, will introduce users to the tools and operations available in Illustrator CS3. User will then practice what they have learned by creating two exciting projects. Work Files are included.

Network Convergence: Services Applications Transport and Operations Support

The present information age is enabled by telecommunications and information technology and the continued convergence of their services, technologies and business models. Within telecommunications, the historic separations between fixed networks, mobile telephone networks and data communications are diminishing. Similarly, information technology and enterprise communications show convergence with telecommunications. These synergies are captured in the concept of Next Generation Networks that result from evolution to new technologies, enabling new services and applications. Network Convergence creates a framework to aid the understanding of Next Generation Networks, their potential for supporting new and enhanced applications and their relationships with legacy networks. The book identifies and explains the concepts and principles underlying standards for networks, services and applications.

Download Link:


What is Zero Filling?

  • Zero filling is a way to overwrite all data on a hard drive. An analogy would be putting new asphalt over an old highway. This snip is from the Seagate Website: "(Quick) will write over the beginning of the drive which includes the critical partition information, eliminating all partitions and information on the drive including the Master boot record. This is useful if you have a drive that has a corrupted partition or that you wish to erase to reinstalll a fresh operating system and new data. (Full) will write over the entire data area of the drive. This is useful if a drive has bad sectors that cannot be fixed by the operating system. This will also erase all the data on the drive, but it will take several hours."

  • The simplest way to think of zero filling is setting every single byte of a storage device (RAM, HDD, whatever it may be), to null (character code 0). This effectively cleans the device of any data. This full text is online at: ata_llfmt_what. html

  • Zero filling removes the data on a HD 100%. This is especially useful in preventing data being stolen from your HD. After doing a zero filling, (apparently) no tool can retrive data from your HD and everything is permanently deleted.

  • Zero filling is a low level hard disk management technique. As it suggests, it "fills the hard disk with zeros". By that, I mean that it magnetically prepares the disk to be a fresh disk, consisting of only zeros, no ones.

  • There is another common definition for 'Zero filling'. Typically, in software development you will have numeric entry fields where significant digits are important. If those digits are not entered you will 'zero fill' them to ensure the entire value is filled. For example, if you have a field which is six long and enter '123' then you will zero fill to get a value of '000123'.

Linux Complete Command Reference

Compiled by Red Hat Software, Inc., the company that has assembled the most popular x86 installation of Linux, this command reference is massive, authoritative, and as complete as any reference can be.

Download Link:

Password: www.

Monday, April 28, 2008

Microsoft Access 2007 Data Analysis

Data analysis is the process of categorizing data into groups, translating large amounts of data into meaningful information, and performing a wide variety of calculations in a fraction of the time it would normally take by hand. Showing readers how to save time and increase productivity, this unique book explains how to analyze data using the latest version of Micro$oft Access, the world's leading PC database system. Practical, real-world scenarios demonstrate the benefits of using Access for data analysis, show how to avoid common pitfalls of everyday data crunching, and illustrate the differences and similarities between Access and Excel data analysis.

Download Link:

Upgrading and Repairing Microsoft Windows

Fans of Upgrading and Repairing PCs, your call has been answered. Scott Mueller, author of the best-selling Upgrading and Repairing PCs, is now bringing you an equally in-depth guide to Windows troubleshooting. Upgrading and Repairing Microsoft Windows explains how Windows works and how to fix it when things go wrong. This comprehensive resource includes information on; Installation, Managing security, Optimizing performance, Recovering data Configuring settings and the registry, Protecting Windows from viruses and spyware. Scott also includes references to helpful tools and scripting commands for maximum system controls. A DVD is included that provides you with additional resources and unique how-to video that brings Scott right to you. Find out how to make Windows work with you and not against you with Upgrading and Repairing Microsoft Windows.

Download Link:

Learning Autodesk Maya: Lighting

Learning Autodesk Maya Lighting is your shortcut to understanding your creative options when working with lights in Maya. Discover the principles behind setting lights and learn how you can quickly and easily affect mood with simple techniques. This DVD will help you understand how to apply classic cinematography concepts in 3D and how to get the look you want with simple lighting manipulations.

What are the Different Types of Booting?

The two main types of booting are:

1]. A "cold boot" or a "hard reset," which occurrs when the computer (or micro processor system) is powered-up. The system has no history from the previous time it run, and needs to perform comprehensive initialization.

2]. A "warm boot" or "soft reset," which occurrs when resetting the computer or micro processor system without interrupting its power supply. The continued supply of power allows certain initialization tasks to be skipped in the reboot, compared to the cold boot, and the re-initialization might complete sooner.

As part of every boot process, the computer will typically load and initialize an operating system. Subject to the type of computer and operating system, this system might be sourced from mass-storage media such as hard drives, floppy diskettes or DVDs, from networked media such as a network server, or from build-in memory devices such as read-only memory (ROM). Some operating systems may take advantage of reduced initialization during a warm boot, but this is not typically the case with modern mainstream general-purpose computing operating systems.

Windows Vista Bible, Desktop Edition

Check out the best of Windows Vista in this handy desktop-size resource. This convenient reference is drawn from the very best of bestselling author Alan Simpson's Alan Simpson's Windows Vista Bible. You'll discover how to master the basics of PCs and operating systems, get started on Vista, and move ahead to multimedia, adding security, building a network, and more. You'll even find special tips, workarounds, and advice on how to deal with Vista's quirkier aspects.

Download Link:

Sunday, April 27, 2008

Guitar Man

Track List:
01. Mr Sandman
02. Boo Boo Stick Beat
03. Yakety Axe
04. Jerry's Breakdown
05. Fiddlin' Around
06. The Entertainer
07. Heartbreak Hotel
08. Blackjack
09. One Mint Julep
10. Teensville
11. Hot Toddy
12. Mystery Train
13. Susie-Q
14. Do I Ever Cross Your Mind?
15. I'll See You In My Dreams
16. Tennessee Stud
17. Take Five
18. Trambone
19. It Don't Mean A Thing
20. Sleepwalk

Download Link:

How can make Unlimited Downloads from Megaupload

For Internet Explorer 6 or 7 of windows.

1]. Click on Start Button of Windows

2]. Click on Run Option

3]. Type regedit and press on OK

4]. Goto: HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Internet Settings.0\ User Agent\ Post Platform

5]. Add a new Alphanumeric key (REG_SZ) and type MEGAUPLOAD 1.0

6]. Reboot the Internet Explorer

Hacking the Cable Modem

In the beginning there was dial-up, and it was slow; then came broadband in the form of cable, which redefined how we access the internet, share information, and communicate with each other online. Hacking the Cable Modem goes inside the device that makes Internet via cable possible and, along the way, reveals secrets of many popular cable modems, including products from Motorola, RCA, WebSTAR, D-Link and more.

Download Link:

How to Develop a Super Power Memory

There is no such thing as a poor memory, only a trained or untrained one. There is no limit to the capacity of the memory. Lucius Scipio was able to remember the names of all the people of Rome; Seneca could memorize and repeat two thousand words after hearing them once.Often we use less then a nanometer(1/1000000000 of a meter) of our brain for the daily stuff...most parts of the brain...are unused and become lazy..& when they become lazy..they can't hold much all the impulses (electrial & chemical) decay pretty the nerer cells.Comming to this book..this book is written by the person who has the most phenominal memory in the world..this book TRAINS YOUR MEMORY..So that you will Remember and Never forget...what you wanna Remember...easily.

Download Link:
Rapidshare or Easy-Share - Aperture 2 New Features

Photographers who want to upgrade from iPhoto, or who are simply ready to take control of the digital images accumulating on their hard drives, will find powerful and easy-to-use photo management tools in Apple's Aperture 2. In Aperture 2 New Features, instructor Derrick Story takes an introductory look at photo processing and manipulation, and explores Quick Preview, RAW 2.0, .Mac Web Gallery, and the many new features in Aperture 2. The course follows a professional photographer's workflow, showing viewers how to incorporate his techniques into their everyday practices.

Security for Wireless AD HOC Networks

The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems. This will hopefully spur much more activity in this area in the upcoming years. This book provides a broad and comprehensive overview of the research that has been done to date on the security of wireless ad hoc networks and discusses the advantages and disadvantages of the various schemes that have been proposed in the literature. This book will be of interest to a wide variety of people. A beginner in the field will benefit from a simple description of the various problems and solutions. Such a person will also gain by having a ready compendium of important results in this area thereby saving such a person from the problem of information overload. Thus, this book can be used as a textbook in the first class focusing on security in ad hoc networks.

Download Link:


What is the Best Operating System and Why?

The best operating system to use depends on what its intended use will be and who will be using it. There is no specific operating system which can be called "the best" overall, and since most current operating systems share most common and advanced features there is much debate on the topic. A few of the most popular operating system, their pros and cons, and some of their best uses are described below.

Microsoft Windows

  • The largest library of programs and applications.
  • Some commercial games work only with Windows and DirectX.
  • Almost all hardware has drivers which are compatible with Windows.
  • Most widely used.


  • Prone to viruses, spyware, and adware if proper steps not taken such as installation of internet security software, which reduces performance speed.
  • Requires regular maintenance to avoid system errors and reduced performance.
  • Even with maintenance, issues can slowly accumulate requiring a re-installation of Windows to restore performance and fix software issues.
  • Expensive.
  • Windows Vista has high system requirements.
  • The Windows market share has seen some decrease in recent years and months.
  • Does not support multiple desktop workspaces unlike Mac OS X and Linux.


  • Windows Vista, the most recent consumer version of Windows, has relatively high system requirements compared to its Windows XP and other operating systems. There are also other issues, such as some software and hardware incompatibilities or frequent security confirmations, which are causing many individuals and businesses to continue using the older Windows XP.
  • The two most common versions of Windows are Windows XP and Windows Vista. Vista, although it has some issues, does have some new features such as search-as-you-type search and a 3D-accelerated desktop, features up until now only found in Mac OS X and some versions of Linux.
  • With the introduction of Virtual-machine software, Windows has become a popular add-on for Mac and Linux in order allow those computers to support Windows-only software or hardware when needed.

Best uses:

  • Gamers
  • People who must use Windows-only software for work or school.
  • People or businesses looking for an inexpensive computer yet do not have the ability to use Linux.

Mac OS X

  • Relatively simple and intuitive interface with many advanced features.
  • Not virus or malware prone: there are no Mac OS X viruses in the wild, and with its UNIX base, it is fairly resilient. There are a small number of trojans (malicious software) which have been known to take effect through applications running in Mac OS X, though they are almost always found on illegal-content-based websites and are not of significant concern.
  • Second-largest selection of software, with many high-quality Mac-only programs in existence, such as those found in iLife. Although at one point software for certain tasks were not mac-compatible, all software is now either Mac-compatible or has an equivalent that is. Most advanced games have also recently became compatible with Mac OS X.
  • Reliable and high performance.


  • Limited to Apple-manufactured hardware.
  • Some hardware does not have Mac-compatible drivers, though the number of this hardware has recently become small and negligible.
  • It can be difficult to do certain cross-platform network hardware sharing for a Mac OS X based computer in a Windows network or visa-versa. For example, a printer's Mac driver may not support cross-platform printing to a Windows-connected printer, and replacement drivers may or may not exist.


  • There are some security holes in Mac OS X just like in other operating systems, and, like in other operating systems, they are fixed with occasional updates upon their discovery. However, Mac OS X includes a built-in firewall, and hacks aimed at Mac are less common than hacks aimed at Windows, so this is not generally a major concern.
  • Macs are usually more expensive than PCs made by companies such as Dell and HP. However, the following factors can cause the total price of owning a Mac to be less than that of a PC: Mac OS X and Apple iWork are relatively inexpensive compared to copies of Microsoft Windows or Microsoft Office. PCs experience hardware or software failures more frequently than Macs, increasing service and replacement costs.
  • With a relatively low market share compared to Windows, there are still individual programs which are only Windows compatible. However, virtual machine software with a Windows installation or compatibility layer software can allow those programs to run even on a Mac.
  • The Mac has seen significant market share increases in recent years and months, something which has also increased the amount of Mac-compatible software.

Best uses:

  • Students who are not required to use Windows-specific software (though Windows can easily be installed to use Windows software). A recent study indicated that the number of students intending to purchase Macs has neared that of Windows-based PCs.
  • Home users looking for an easy and reliable computing experience who are willing to pay more than typical PC prices.
  • Graphic designers and photographers.
  • Scientists.

Linux and other UNIX-based


  • Low number of virsues and spyware, similar to Mac OS X
  • Usually free
  • Large number of types of Linux to choose from.
  • Has a large amount of free and open source software equivalents to commercial Windows and Mac software
  • More easily customizable
  • Can run many Windows programs with the use of a compatibility layer such as Wine. (Programs such as Cedega can be used to run many Windows games)
  • Reliable with good performance and low requirements.


  • Advanced use and installation of some software may require more advanced knowledge than is required for use of Windows and Mac.
  • Many commercial programs do not support Linux
  • Small commercial game library


  • Through customization and software like Beryl, Linux can be made to have advanced desktop effects similar to Aero on Windows Vista or Aqua on Mac OS X.
  • "Dependency hell" can make installation of certain programs difficult even for advanced users.

Best uses:

  • Experienced computer users looking for a good, free operating system.
  • Businesses looking for reliable and affordable computing, so long as they do not need Windows-only software and have a competent IT manager.

Bottom Line

Though there is no one clear best operating system, each does have its advantages and disadvantages, and different people will be best using different ones. Microsoft Windows is the most common operating system and is a reasonable choice for most people. Mac OS X is second-most popular (and gaining market share) and is an excellent operating system for those who can purchase a Mac. Linux is very good and advanced operating system available for free and is recommended for experienced users.

Saturday, April 26, 2008

How to Convert File System, FAT/FAT32 to NTFS

Follow the following steps:

Open a dos prompt and give the command

The type "convert d: /fs:ntfs"

This command would convert your d: drive to NTFS.

If the system cannot lock the drive, you will be prompted to convert it during next reboot.

Normally you should select yes.

Conversion from FAT/FAT32 to NTFS is non-destructive, your data on the drive will NOT be lost.

Be aware that converting to ntfs will make that partition of yourdrive unreadable under dos unless you have NTFS utilites to do so.

Power Up Your Mind: Learn Faster, Work Smarter

From one of the leading international experts on life-long learning, Power Up Your Mind will revolutionize our understanding of how our brains are pre-wired to learn and the practical steps we can take to prepare ourselves (emotionally and physically) to participate fully in the process. Diagnostic tools, activities, and stories demonstrate the power of esteem, confidence, and motivation on effective learning, describe the role creativity, aging, and emotional readiness play in the learning process, and help readers create a personal action plan for life-long learning.

Download Link:

The Giant Black Book of Computer Viruses

This definitive work on computer viruses discusses the techniques modern viruses use to propagate, evade anti-virus software, cause damage, & compromise system security. Unlike most works on the subject, "The Giant Black Book" doesn't stop short of giving the reader what he needs to fully understand the subject. It is a technical work which contains complete, fully-functional commented code & explanations of more than 37 computer viruses & 3 anti-virus programs, alone with detailed discussions of stealth technology, polymorphism, evolutionary viruses & good viruses. The book discusses viruses for DOS, Windows, OS/2, Unix systems, & more.

Download Link:


Software Cinema - Adobe Photoshop Advanced Masking Techniques

Photoshop CS - Learn how to think like Photoshop to create photorealistic composites that maintain detail, hair and translucency. Take advantage of hidden Masks using features like Alpha Channels, Black and White, contrast and differences. Make multiple Masks, separate fine details, Replace Backdrops and enhance the sky. Learn to combine images based on tone using "Blend If".

Solar House: A Guide for the Solar Designer

Covering the full life span of the project, from siting issues through specific design features to maintenance of the property and equipment, this is a comprehensive guide to designing, planning and building a solar house.The author uses his experience of living in a solar house to inform the reader of the technology and practices needed for the design, operation and maintenance of the solar home. Each of the technologies of the house, such as space heating and cooling, domestic hot water and electric power technologies, are critiqued from the point of view of the owner/resident, with the author using his thirty years experience of living in a solar home. This provides home owners who are thinking of going solar with first hand evidence of best practice, and provides the architect and designer with the knowledge of how to best satisfy their clients needs.

Download Link:

Why Does a Computer Suddenly Slow Down?

You are running many programs at the same time.

  • Your computer is infected with a virus.
  • Your hard-disk is fragmented.
  • Your do not have sufficient RAM memory.
  • Your windows registry contains many invalid entries.
  • Your comp is infected with a spyware.
  • Your system files may have become corrupt.
  • You are running a lot of programs.
  • Running Games and other programs simultaneously.
  • Running cad based graphics program with other programs.
  • Your hard disk isnt formmated properly.
  • Your hard disk may contain bad sector.
  • Detection of newly pluged devices.
  • Using operating system with high UI on low end system.
  • Using programs which are not recommended for your system.
  • Type of partion that you use as ur windows partition (Ntfs or Fat32).

Microsoft Expression Web 2 on Demand

Create Web sites using drag and drop controls. Employ Cascading Style Sheets formatting and management. Create Cascading Style Sheet layouts. Create a page design using layout tables. Create page transition effects and background sounds. Add interactive buttons and create hyperlinks. Create dynamic Web templates to reuse. Create forms to gather online information. Write, edit, and optimize code and scripts. Use IntelliSense to help reduce coding errors. Retrieve and present data from live RSS feeds. Integrate data from databases or XML data. Create dynamic Web content using ASP.NET technology

Download Link:

Thursday, April 24, 2008

Secrets of a Super Hacker

Once more, Loompanics publishes something other houses wouldn't: a guide to violating computer security. Covering hacking scenarios ranging from the merely mischievous to the criminal, the super hacker known as the Knightmare gives step-by-step instructions in meaningful hacking from a personal computer. Fortunately, he also includes a section on state and federal computer laws, allowing potential hackers to be cognizant of the sanctions they risk with any particular project. Appendixes offer an array of technical explanations and tips for understanding database and system structures; tips cover password divination and searching strategies; and a glossary, besides explaining terms likely to be encountered in any particular documentation being hacked, enhances the hacker's ability to share experiences and tips. As science outstrips society's control of information, systems of secretkeeping proliferate maddeningly.

Download Link:


Wednesday, April 23, 2008

Total Training - Microsoft ASP.NET AJAX

Build rich, dynamic, and interactive web applications with the Microsoft AJAX Library. This video series, presented by Asli Bilgin, explores not only the slick user interface controls, but goes deeper into the backbone of a web application. You'll also learn how to work with security, data access, and services orientation so that you can build a robust end-to-end application using Microsoft ASP.NET AJAX and the ASP.NET AJAX Control Toolkit.

Game Design, Second Edition

"Game Design, Second Edition" offers a behind-the-scenes look at how a game gets designed and developed - from the day the idea is born to the day the box hits the shelves. This new edition offers information on the latest techniques and development models, interviews with 12 top game designers, document templates that can be used during product development, and numerous industry resources. It is a practical guide that covers everything from the fundamentals of game design, to the trade-offs in the development process, to the deals a publisher makes to get a game on the shelves. No matter what your role in the industry, understanding this entire process will help you do your job better. And if you're looking to break in, you'll find knowledge here that is usually only attained after years in the trenches.

Download Link:
Rapidshare - ActionScript 3.0: Working with XML

The use of RSS feeds is a growing trend, and they can be found within many new websites. In ActionScript 3.0: Working with XML, instructor Todd Perkins places strong emphasis on using RSS data for blogs, podcasts, and images. He also demonstrates how to perform common tasks with XML, such as using E4X syntax, loading external data from local and remote locations, saving data, and integrating with popular services like Flickr. Exercise files accompany the course.


Hackers Black Book

The book gives a very good overview of what kind of attacks users are subject when connected to the net. Allot of the people i see on here haven't been able to even get the book to begin with. However I recived the book, and I was dissappointed, greatly. After months of trying to learn about the subject to see if i wanted to progress beyond just programming, and this book gave me very little to work with as far as learning anything, so in short, go get a real book about network hacking to see what they do.

Download Link:

How to Change the Location of the IE7 Toolbar

In previous versions of Internet Explorer, the main toolbar (File, Edit, View, Favorites, Tools, Help) was located at the very top of browser window, above the address box into which you type URLs. With IE 7, Microsoft moved the address bar to the top and put the toolbar under it. Although it's not a huge change, some people don't like it. If you're one of them, you'll be happy to know that there's a way to put things back the way you're used to, with a registry tweak. Here's how:

1]. Open your favorite registry editor.

2]. Navigate to the following key: HKEY_CURRENT_USER \ Software \ Microsoft \ Internet Explorer \ Toolbar \ WebBrowser

3]. Right click an empty space in the right pane and then click New DWORD Value.

4]. Name the new value ITBAR7Position.

5]. Double click the new value and set the Data Value to 1.

6]. Click OK and close the registry editor.

7]. Close and reopen IE7.This switches the toolbar position for the currently logged on user. If you want to change it back, you can do so by following these same steps and setting the DataValue to 0.

English Vocabulary in Use

Vocabulary in Use Pre-intermediate and Intermediate is a vocabulary book for intermediate learners of English, primarily designed as a self-study reference and practice book, but which can also be used for classroom work. In its style and format it is similar to its upper intermediate and advanced equivalent, English Vocabulary in Use. - 100 easy-to-use units: over 2,500 vocabulary items in a wide range of topic areas are presented, contextualise and explained and explained on left-hand pages with a variety of follow-up activities on right-hand pages. - Helps to build on and expand existing vocabulary. - Suggests tips and techniques for good learning habits. - Designed to be flexible: can be used both for self-study and in class. - Provides a comprehensive key with not only answers to the exercises but also more comments on how the language is used. Includes a detailed index with phonetic transcriptions.

Download Link:

The Extreme Searcher’s Internet Handbook

A phenomenal resource for both extreme and not-so-extreme researchers. Great tips, clear explanations, and years of expertise distilled into 250 pages of clear, engaging text. This book should be on every searcher's desk. Mary Ellen Bates, coauthor, Researching Online for Dummies. Hock has established an enviable reputation for his series of books about search engines and online searching. They are always detailed, insightful, and up to date. This book continues that tradition of excellence. Online Information Review clear and useful guide will help anyone interested in going beyond Google, explaining when, why, and how best to use various search tools and other Web resources.

Download Link:

Tuesday, April 22, 2008 - Secrets to Selling and Publishing Photography

Scott Bourne, a professional photographer with over 30 years experience, identifies his tried and true methods for starting and maintaining a successful career as a photographer. In Secrets to Selling and Publishing Photography, Scott explains how to make a profitable living in this demanding field by developing a professional identity, setting realistic goals, getting publicity, finding customers, getting published, and working with agents.

How to Prepare for any Disaster

This booklet will help you understand the importance of making preparations before anything happens, and help you know what to do and how to act before, during and after a disaster.

Astronomy with a Home Computer

Here is a one-volume guide to just about everything computer-related for amateur astronomers!Today's amateur astronomy is inextricably linked to personal computers. Computer-controlled "go-to" telescopes are inexpensive. CCD and webcam imaging make intensive use of the technology for capturing and processing images. Planetarium software provides information and an easy interface for telescopes. The Internet offers links to other astronomers, information, and software. The list goes on and on. Find out here how to choose the best planetarium program: are commercial versions really better than freeware? Learn how to optimise a go-to telescope, or connect it to a lap-top. Discover how to choose the best webcam and use it with your telescope. Create a mosaic of the Moon, or high-resolution images of the planets...

Download Link:

Video2Brain - Real Life Photoshop Workflows

Award-winning photographers and digital artists show professional workflows with Adobe Photoshop and Wacom Intuos3 Pen TabletProfessional workflows impressive resultsFive internationally successful photographers and digital artists present their work for clients like Carlsberg, Harley-Davidson, DHL or Volkswagen and demonstrate their creative process from the initial image to final digital result. The experts explain their individual configuration of the Wacom pen tablet and show how working with the Wacom Intuos3 pen tablet accelerates retouching and image manipulation in Adobe Photoshop.

Wireless Communications The Future

Predicting the future is an essential element for almost everyone involved in the wireless industry. Manufacturers predict the future when they decide on product lines to develop or research to undertake, operators when they buy licences and deploy networks, and academics when they set PhD topics. Wireless Communications: The Future provides a solid, clear and well-argued basis on which to make these predictions. Starting with a description of the current situation and a look at how previous predictions made in 2000 have fared, the book then provides the contributions of six eminent experts from across the wireless industry. Based on their input and a critical analysis of the current situation, it derives detailed forecasts for 2011 through to 2026. This leads to implications across all of the different stakeholders in the wireless industry and views on key developments.

Download Link:

Password:knowfree. net

How to Customise Your Start Button

First you need a tool called "Resource Hacker". This free program allows you to change resources in any .exe file such as "Explorer.exe", which includes the [Start] button's Label. You can visit and search there for "Resource Hacker". After you download it, follow the guide here:

Step 1:

1] Run "Resource Hacker" and open the file "%windir%\Explorer.exe".
2] You see a Tree of all Resources in this file, expand the "String Table"
3] Find the "start" and replace it with your own text. then press the [Compile Script] button.
4] Save "Explorer.exe" as "MyStart.exe" DONT save it as Explorer.exe, do "save as.." and give it a new name.
5] Quit "Resource Hacker".

Step 2:

1] Click on the [Start] button and choose the "Run..." item from the start menu. (Or use the shortcut key WinKey+R)
2] Type "RegEdit" in the Run "Dialog Box". And then press the [Ok] buton to run the "Registry Editor" program.
3] Go to:
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon" and find the "Shell" property.D - Replace value of the "Shell" property to "MyStart.exe".
4] Quit "Registry Editor".
5] Restart your system.

Note about Registry Editor:if you did not find the key
"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon", you can search the Registry for the "Explorer.exe", to do this use the Edit Menu Find Next (Ctrl+F).

Monday, April 21, 2008

Understanding Windows CardSpace

Windows CardSpace empowers organizations to prevent identity theft and systematically address a broad spectrum of security and privacy challenges. Understanding Windows CardSpaceis the first insider's guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors' unparalleled experience earned by working with the CardSpace product team and by implementing state-of-the-art CardSpace-based systems at leading enterprises, it offers unprecedented insight into the realities of identity management: from planning and design through deployment.

Download Link:

Better Than Bullet Points

This book focuses exclusively on the application of PowerPoint to the creation of online training programs. Better than Bullet Points, Creating Engaging e-Learning with PowerPoint fills that gap. By providing in-depth guidance, specific instructions, and helpful exercises, the book will enable training practitioners to create impactful learning interactions in PowerPoint. The author steps readers through the powerful features of this popular desktop application, covering everything from text to art, animation to interactivity. Provided that the reader owns a copy of PowerPoint, this book will immediately put free real-world tools into the hands of those who need it. The information is practical rather than theoretical and immediately applicable. Most importantly, this book will help make e-learning accessible to those who have previously been excluded from taking advantage of the opportunities e-learning can provide. Jane Bozarth is the e-learning coordinator for the North Carolina Office of State Personnel's Human Resource Development Group and has been a training practitioner since 1989.

Download Link:

VTC - Maya Fundamentals

If you need a high-end 3D graphics software package for 3D effects, animation, cinematics, or game graphics, check out Maya! Maya is widely used by visual effects and animation studios, and is growing increasingly popular with game developers. This Virtual Training Company tutorial introduces you to Maya's groundbreaking tools and features. Co-authors Chuck Grieb and Roger Dickes begin showing you the tool sets and helping you to understand the structure and organization of Maya. They will introduce you to the modeling, lighting, animation, and dynamic tools available in Maya. You will learn exciting features such as adding texture, digital sculpture, and much more.

Download Link:

Sunday, April 20, 2008

Ultimativen Disco Hits

Track List:
01. Dr. Alban - It's My Life
02. Dan Hartman - Relight My Fire
03. The Weather Girls - It's Raining Men
04. Earth, Wind & Fire - September
05. Alcazar - Crying at the Discoteque
06. Tom Novy Feat. Lima - Now or Never
07. Eiffel 65 - Blue (Da Da Bee)
08. A Touch of Glass - Around the World (La La La)
09. Culture Beat - Mr. Vain
10. Prezioso Feat. Marvin - Tell Me Why
11. Wolfgang Petry - Die Laengste Single Der Welt
12. Modern Talking - You're My Heart, You're My Soul
13. Las Ketchup - the Ketchup Song (Aserej)
14. Lou Bega - Mambo No. 5 (A Little Bit of..)
15. Roland Kaiser - Hit-Mix
16. Dr. Alban - Sing Hallelujah !

Download Link:

How to copy Songs from your iPod to your PC

A reader points out a straightforward way for Windows users to transfer music from an iPod to your hard drive, without extra software:

1]. Connect the iPod to your PC. If iTunes starts syncing (ie erasing) your music automatically, hit the X in the upper right hand corner of iTunes display, to the left of the search box, to stop it.

2]. In Control Panel, Portable Media Devices, double-click your iPod.

3]. Navigate to the Music folder.

4]. Select all the music folders, and drag and drop them into a folder on your hard drive, or directly into iTunes.

And you're done! The iPod music folder structure is strange and inexplicable, but once you move your files into iTunes you can set it to automatically organize your folder by artist and album to clean that up. (To do this, in iTunes Edit menu, choose Preferences and in the Advanced tab, check "Keep iTunes Music Folder organized.")

If you give this a go, lemme know how it goes. I'll ammend the instructions with any additional info for other versions of Windows and iPods.
Just for the record, I did not write this article, but I would have known how to do this. But one thing I ahve noticed is that you do not need to go into the control panel. Instead just make explorer.exe show hidden folders. Then, navigate into the iPod directory, go into iPod_control, and follow step four of the article.