Saturday, March 14, 2009

Intro to BIOS Hacking

BIOS Hacking 101
Do you ever get tired of having to go into your BIOS Setup and reset your favorite tweaks every time you have to do a "Clear CMOS"?
If you answered YES, then pay attention. You are going to like this one.If you answered NO, pay attention anyway. One day you might want or need to use this.
Disclaimer:Hacking your BIOS file can result in your mobo not booting if you mess up.And if you do mess up, don't come crying to me or ERT.But if you post a Question in the HARDWARE area, we will see what can be done to get you up and running again.You have been Warned!!Now back to living dangerously.
I guess I should start with the WHY
When setting up and tweaking (aka: overclocking) a motherboard, it sometimes becomes ...ummmm.. necessary to Clear the CMOS, because it didn't like what you did and will not boot up.And while this is not a big problem, it can be a pain if you need to do it a lot. Because each time, you have to go and reset a few settings so your hardware will work right.Things like which kind of video card it looks for first, the drive boot order, and power management on/off.
But the reason I got into this, was because the onboard lan (network interface) on my K7S5A rev.3.1 mobo (mentioned in the BIOS flashing-Overclocking Fun article) kept disappearing.I mean, one minute it was there. And the next, it's GONE. Not even listed in the bios anymore.
After tail-chasing for several hours, I finally figured out that when the nic chip warmed up, it just quit working.Yeeee Haw. Trash can parts can be so much fun. : /Luckily the fix is easy. Just Disable the onboard lan, and put in a PCI nic.Unluckily, I was still tweaking the hardware, and having to Clear the CMOS regularly. Which meant the onboard lan was reenabled in the Default setting, and had to be changed (if I could find it) before I could let the floppy/cd rom/hard drive boot to whatever utility I was wanting to run.That got real old, real fast.
Then one night while searching the K7S5A mobo pages, looking for better info on what some of the bios settings did, I saw a link to the AMI BIOS Editor.Just what the doctor ordered!And being a small download, I wasted no time in getting it tucked safely away on my hard drive.
Before diving in...
...a few things it might be nice to know.
for this project, I am using amibcp75.exe - the AMI editor
different bios's call the default option different things. Another name is "Fail-Safe". The same goes for the best-performance setting. So make sure you know what you are changing. Amibcp75 uses "Fail-Safe" and "Optimal".
This bios editor is a DOS program. And while I only had a problem viewing one bios file running DOS under W98, the rest of the ones I looked at worked without problem..
You might want to stay with the old 8 letter limit for naming the files and folders. DOS doesn't like long file names, and if you need to use a DOS Boot Disk, you can find the files easier. And you need to keep the same 3 letter extension the flash file came with.
It seemed to work fine under W2K Pro SP4.
I have not tried it with XP, or with a hard drive formatted with NTFS. DOS is very stupid when it comes to NTFS. I did see one site that had XP on the OS list.
If you run into trouble, you will probably have to use a "clean" W98 boot disk, and run things from the floppy drive or a Fat32 partition on the hard drive.
Fire it up
After dl'ing it, unzip the program to a folder, and double-click the .EXE file.Since this is a stand alone program (no files are installed to Windows), you can put it on almost any kind of drive, as long as the OS can see it.
When the program first runs, it will give you a text box to type in the bios file you want to edit.If you were smart and put the file in the same place as the program, just type the name. Otherwise you will need the complete path to it. Then hit ENTER, and the text box will go away and you will see 11 menu choices.The interface is nice and clean, with a list of all the keystrokes you need to use it, plus a description box, lined up along the bottom.
The Menu choices are:
Load BIOS from disk file
Save BIOS to disk file
Edit BIOS Modules
Edit PCI IRQ Routing Tables
Edit Register Tables
Configure Setup Data
Configure Setup Client Item
Configure BIOS Options
Configure BIOS Features
Generate Reports
Exit Discarding Current Bios
The LOAD and SAVE options
Pretty straight forward.LOADS another bios file if you loaded the wrong one at the start, or want to work on a different one.And SAVES the bios file after you have tinkered with it. Don't forget to give it a different name.
The EDIT menus
The 3 EDIT menus are probably the most dangerous ones in the program. Even a small mistake here can make your bios:- a little flaky.- a lot flaky.- a total vegetable
If you want to look in them, that will be OK. But unless you know E*X*A*C*T*L*Y what you are doing, DON'T PLAY IN THERE!They are full of memory address vectors, device ID numbers, and other assorted things (mostly in Hex) that the bios needs to work.
That's all I am going to say about that.
The CONFIGURE Menus
I am going to describe the 4 CONFIGURE menus in reverse order, because the main one I need to mess with is the 1st one (Configure Setup Data). Depending on when your bios was made and what mobo it is on, it will most likely be somewhat different than mine, but this will give you the general idea..
Configure BIOS Features -- Not a lot in here. The BIOS information, and a way to set the ROM password and the text that shows up during the start of the boot sequence.hmmmmmm... Maybe I will change it from K7S5A PRO Release to something like:
Unauthorized Access! Break-in Alert Sent!
That might give someone a nice little adrenaline rush.
Configure BIOS Options -- Another one with not much in it. Turns on /off some more of the info that the bios shows when starting (like the cpu's speed), and which ERROR messages to show when there is a problem. Nothing in here I want to mess with right now.
Configure Setup Client Item -- Hides and Sets Permissions for different sections of the bios. My options are:BOTH -- SUPERVISOR -- ABSENT.
I think I will stay away from this one, also. At least until I do some more reading. It doesn't look dangerous, per se, but you could lock your self out of the bios. Or parts of it.Besides, all I mostly want to do is get rid of the wanky lan port. And it ain't in here. Next!
Changing the Default settings
Configure Setup Data -- Bingo! The Mother Load! The Holy Grail! Houston...We have landed!
OK. A little over the top, but you get the drift. This is where you make your computer different from everybody else's.
When I open this one, I get a sub-menu with 7 choices:
Standard SETUP. -- This just has the hard drive and floppy drive info. The Anti-Virus ON/OFF and Language settings. And the Memory count.I seem to remember that some bios anti-virus, needs 2 settings Enabled to work, so it might be worth the pain to rig it to run on the Fail-Safe setting and not with the Optimal setting. I need to think about that one some.
Advance CMOS SETUP. -- This has a lot of things to play with. It has 4 columns marked:ACTIVE - seems to be for setting what shows on the bios screens. Options are YES/NO. Might be troublesome if you change a NO to a YES, and the mobo doesn't know what it is suppose to do with it.RIGHTS - if using the bios passwords, Defines who gets to see what when in the bios. Options are Supervisor/Both.OPTIMAL - whether the item is on or off when you use the "Load Optimal Settings" key in the bios. The Options vary, but most are Enable/DisableFAILSAFE - Whether the item is on or off when you Clear CMOS, or use the "Load Failsafe" key in the bios. The Options vary, but most are Enable/Disable
In here, I want to Disable the QUICK BOOT in both FAILSAFE and OPTIMAL. I sometimes have trouble getting to the Enter Setup key fast enough.I also want to change the BOOT ORDER to Floppy - CDROM - IDE 0. At least in FAILSAFE. Since I boot to floppies and cd's a fair amount, I might as well do the same in OPTIMAL. I don't worry about shaving a few seconds off the boot time.
Let's see... what else is in here I want to change? A few things, but mostly the memory settings for OPTIMAL, so I can set up an one key overclock, once I know what the hardware will handle.
Chipset SETUP. -- CPU and Memory settings. 4 columns like above. I will leave FAILSAFE alone, and tweak the OPTIMAL for oc'ing
Power Management SETUP. -- Let's see... 4 columns again. I want to Disable the main power management setting in FS and OPT. And the power button will be set to ON/OFF, not Suspend!I can also tell it what to do if the electricity goes off. Stay off, Reboot, or Last State.
PCI/PnP SETUP. -- Not much in here. The Plug-n-Play Aware OS setting and a couple of Video card tweaks, if you know which card you will be using.Most of the stuff is for making the Slots use certain resources. If you don't need to mess with them, don't.
Peripheral SETUP. -- This one is for the onboard stuff. Serial/Printer/Game/Sound/USB, and there is the Lan setting I am wanting to nuke. WooHoo!Besides the onboard Lan, I think I will disable the modem, game port, and serial B (com 2).The USB I will disable in FS, and enable in OPT.
Hardware Monitor SETUP. -- This only has Voltages, Temperatures, and Fan Speeds. Don't need to do anything in here.
Generate Reports
I think you can figure this one out for yourself. Duh!
Exit Discarding Current Bios
This will EXIT the program and flush anything you have changed. So make sure to use the SAVE option first, if you want to keep all your creative endeavors.
When Good BIOS's Go Bad
If things do happen to go horribly wrong, and assuming you cannot boot from the floppy drive to try a re-flash with a good file, you still have a few options before you try to pass off a RMA, or toss it in the garbage can.
The first is if you have a mobo made in the last couple of years. Most of these now have a "second" bios to let you boot up enough to re-flash the cmos with a good file. You will need to read your manual to find out if your mobo has this function, and what you need to do to get it to work.
The next is to send the CMOS chip to someone that has one of those not-cheap machines, and have them re-flash the chip. Or sell you a new one. Along with the bios maker or the vendor you got the machine from, Mr. BIOS and WimsBIOS are good places to start for info on this method.Or if you can get your hands on a DOA mobo that is the same as yours, you should be able to use the chip off of it. The more exact the match, the better chance this will work.
The next method is known as a Hot Swap Flash. For this you need a working mobo the SAME as yours.First you boot the working system (preferably to DOS), and then Very Carefully take out it's chip, and put yours in. Then run the flash program with a good file.There are several good How-To's out on the web, and Google is your friend.
Parting thought
If you have one of those "Branded" machines where the bios is limited in what you can play with, these editors can give you access to the goodies. But I strongly suggest that you be at a level where you are comfortable with working in the bios, and have a good understanding of what the settings do. Mistakes are easy, and can be expensive.
When changing the Default settings, remember, the idea is to have it so the computer will BOOT UP when you move the jumper or take out the battery. So only change those settings you really need to, to make it work best for the way you do things.
The Optimal setting makes a good "one key tweak" to ramp up your system. But you should play with the bios settings before you flash a tweaked version to it. So you will know what settings, and by how much, your system will handle.
I haven't tried flashing a tweaked older bios version to the mobo, then a newer official one, but I suspect it will undo all the hard work. If you are using an older mobo that hasn't had a new bios release in a year or more, you should be fine. But if it is a new mobo, you might need to edit the updated file to restore it to your way of doing things. Flash the Official version first, so you get a feel for what has changed, and then you can flash the tweaked one.
So, go slow, experiment gently, and enjoy the feeling of POWER you get, knowing that you made the machine fit you, instead of you having to fit the machine.
Whoops! Time to go. I've got to mount a rescue mission for a beer that is trapped in the fridge.

HACKING THE ENTIRE WORLD BEST WINDOWS TRICKS

BEST WINDOWS TRICKS
Set Processes PriorityI.Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.
CTRL-SHIFT-ESC
1.>Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option
2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s
FAST SHUT DOWN TRICK:
Imidiate rapid shut down windowwhile shutting down window. open task manager(Ctr+Alt+Del),Select shut down tab. and press ‘ Ctrl ‘ key while select Turn Off from dis tab.Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.
Speed Up Ur Shut down !!Start Regedit.Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.Click on the “Control” Folder.Select “WaitToKillServiceTimeout”Right click on it and select Modify.Set it a value lower than 2000 (Mine is set to 200).
and !
Like previous versions of windows, it takes long time to restart or shutdown windows xp when the “Exit Windows” sound is enabled. to solve this problem youmust disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on “Exit Windows” sub-menu and highlight it.now from sounds you can select,choose “none” and then click apply and ok. now you can see some improvements when shutting down your system.**new **
Crazy !!Hide ur folders.. never known trick !!!!!!!!!! Disguise them to “Recycle Bin”Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}eg,if u’ve a folder gamespress F2,then type, “games.{645FF040-5081-101B-9F08-00AA002F954E}”Now see the magic….then 2 get to original form,remove the extension using“ren games.{645FF040-5081-101B-9F08-00AA002F954E} games” in dos or as a bat fileand u are done..
~cheers~

System information
system up time only for xp professional editionIt boasts how long it can stay up. Whereas previousversions of Windows were coy about how long they wentbetween boots, XP is positively proud of its stamina.Go to the Command Prompt in the Accessories menu fromthe All Programs start button option, and then type’systeminfo’. The computer will produce a lot ofuseful info, including the uptime. If you want to keepthese, type ’systeminfo > info.txt’. This creates afile called info.txt you can look at later withNotepad. (Professional Edition only).

LOCK YOUR PC JUST BY DOUBLE CLICKING
You can lock your XP workstation with two clicks ofthe mouse.Create a new shortcut on your desktop usinga right mouse click, and enter ‘rundll32.exeuser32.dll,LockWorkStation’ in the location field.Give the shortcut a name you like. That’s it — justdouble click on it and your computer will be locked.And if that’s not easy enough, Windows key + L will dothe same.
SPEED UP UR ACROBAT READER (ALMOST LIKE NOTEPAD)Do u get irritated when acrobat reader takes 5/10 seconds to load when you want to open a pdf document. There is a way to speed up the loading.
1. Go to the installation folder of acrobat reader(C:\program files\adobe\acrobat\reader\.. whatever)
2. Move all the files and folders from the “plugins” directory to the “Optional” directory. (I repeat.. cut and paste the files NOT copy & paste).
Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).
Now your acrobat reader will load very fastand almost as good as notepad..

REMOVE STORED USERNAME AND PASSWORDS
To remove the Stored User Names and Passwords from your system, try this:Click Start, Run and type Control keymgr.dllRemove the entries from the list.The other ways to access this dialog are:Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords-or-From Control Panel, select your User Account, click Manage your network passwords
It Works!


Remove the Username and picture from Windows XP New Start Menu
The User account picture can be removed by turning off the Welcome Screen. Or, by switching to Windows Classic theme. Follow the method described in this article if you want to remove the username and picture from the Start Menu, without disabling the Welcome Screen and Windows XP Theme.
For those who want to remove the user name and user account picture from Start Menu, in order to have a blank blue panel at the top, try this:Start Windows Explorer and go to this folder:
C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures
From that folder, rename the BMP file which corresponds to your user account.( For example, if your username is Robert, rename Robert.bmp to old_Robert.bmp )Next, rename the following folder:
C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\Default Pictures
to something else, say…
C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures\No_Default PicturesTo remove the user name, follow these steps
Start regedit.exe and navigate to the this key:
HKEY_CURRENT_USER \ Software \ Microsoft\ Windows \ CurrentVersion \ Policies \ ExplorerIn the right-pane, set NoUserNameInStartMenu value-data to 1
Close Regedit.exe and restart Windows.
You’ll end up with a blue space at the top of the Start Menu.
To get back the username and the picture, reverse the above procedure.

For the New Start Menu, Windows XP looks for the .bmp file in the folder
C:\Documents and Settings\All Users\Application Data\Microsoft\User Account Pictures
If the file is not found, it takes a picture from the “Default Pictures” sub-folder. By renaming the .bmp and the “Default Pictures” folder, you’re giving no chance for Windows to fetch an image for the Start Menu
~ Cheers ~.Notepad Tricks!Well quite old but here is d complete collection
Step 1: Open NotepadStep 2: Write following line in the notepad.this app can breakStep 3: Save this file as xxx.txtStep 4: Close the notepad.Step 5: Open the file again.
Voilla!!
or
1> Open Notepad2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters3> DON’T hit enter at the end of the line.4> Save the file.5> Close Notepad.6> Reopen Notepad.7> Open the file you just saved.
or
Open a note padtype Bush hid the factssave that file,close itagain open and see…

NOTEPAD “WORLD TRADE CENTER TRICK”.. :DIVYENDRA SINGHDid you know that the flight number of the plane that had hit WTC …on9/11 was Q33N ….Open your Notepad in ur computer and type the flightnumber i.e Q33N… Increase the Font Size to 72, Change the Font toWingdings. U will be amazed by the findings.LOG TRICK! MAKE YOUR NOTEPAD A DIARY: DIVYENDRA SINGH!!
Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it.Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.

WHY DOES THIS HAPPEN?
The reason this happens:
In notepad, any other 4-3-3-5 letter word combo will have the same results.It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a “Byte-Order Mark” (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.
1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your codepage) 16-bit UNICODE characters
~ cheers ~

SPEED UP MENU DISPLAY.!!When using the start menu the you will notice a delay between different tiers of the menu hierarchy. For the fastest computer experience possible I recommend changing this value to zero. This will allow the different tiers to appear instantly.
Start Regedit. If you are unfamiliar with regedit please refer to our FAQ on how to get started.
Navigate to HKEY_CURRENT_USER\Control Panel\DesktopSelect MenuShowDelay from the list on the right.
Right on it and select Modify.Change the value to 0.Reboot your computer.
CLICKING * .AVI FILES ON EXPLORER CAUSING 100% CPU USAGE.!!Well windows seem to have a REALLY big problem when it comes to reading AVI files. It seems that when you click on an AVI file in explorer, it’ll try to read the entire AVI file to determine the width,height, etc. of the AVI file (this is displayed in the Properties window). Now the problem with Windows is that if you have a broken/not fully downloaded AVI file that doesnt contain this info, Windows will scan the entire AVI file trying to figure out all these properties which in the process will probably cause 100% CPU usage and heavy memory usage. To solve this problem all you have to do is the following:1. Open up regedit2. Goto HKEY_CLASSES_ROOT\SystemFileAssociations\.avi\shellex\PropertyHandler3. Delete the “Default” value which should be “{87D62D94-71B3-4b9a-9489-5FE6850DC73E}”Voila! Please not that this will no longer provide you with the windows properties displaying the AVI file information such as width, height, bitrate etc. But its a small price to pay for saving you resources.NOTE: Please use caution when using regedit. Improper usage may cause windows to behave imcorrectly. Also, I cannot be held resposible. Backup your registry first.CD ROM STOPS AUTOPLAYING/AUTORUN.!!And the AutoPlay Tab has disappeared in My Computer, Devices With Removable Storage, Right Click on CDROM, Properties.Solution: The service: “Shell Hardware Detection” has been set to Manual or Disabled. Go to Control Panel, Administrative Tools, Services. Return this service to “Automatic”.How to make your Desktop Icons Transparent
Go to Control Panel > System, > Advanced > Performance area > Settings button Visual Effects tab “Use drop shadows for icon labels on the Desktop”

DISPLAY MESSAGE ON STARTUP.Start regedit, if you are unfamiliar with regedit please see our FAQ.Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonModify the key legalnoticecaption with what you want to name the window.Modify the key legalnoticetext with what you want the window to say. Restart

AUTO DELETE TEMPORARY FOLDER.!!
ll what i prefer is %temp% ” without quotes.. at Start -> Run..this opens ur temp folder n den u cal erase it neatly// still try dis one too..First go into gpedit.mscNext select -> Computer Configuration/Administrative Templates/Windows Components/Terminal Services/Temporary FolderThen right click “Do Not Delete Temp Folder Upon Exit”Go to properties and hit disable. Now next time Windows puts a temp file in that folder it will automatically delete it when its done! Note from Forum Admin: Remember, GPEDIT (Group Policy Editor) is only available in XP Pro.

make ur pdf files to speak
make ur pdf files to speakhere r the shortcuts for hearing pdf files in abobe reader 6.0 or higher
ctrl+shift+b —->to hear the whole topicctrl+shift+v —->to hear the pageBEST OF LUCK TO ALL!
————POSTED BY : HACKERARIEAN—————————

Vista Tips

Searching a Folder
With Vista, when viewing a directory, you can configure it to automatically start searching when you type in text,
Go to the Control Panel
Select Folder Options
Click on the View tab
Scroll to the bottom
Check Automatically type into the Search Box
Now when you are in a folder and simply start typing in text, Vista will start a search
Turning Off Vista's Built-In CD Burning
Since most computers come with 3rd party programs that are easier to use than Vista's CD/DVD burning, you can turn this off with a simple registry edit.
Start Regedit
Go to HKEY_CURRENT_USER\ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
Create a new DWORD key NoCDBurning
Give it a value of 1
Log off and back on again
Download Reg File
Quick Access to the TEMP Directory
If you want to quickly access a user's TEMP directory:
Click on the Start (Search) button
Enter %temp%
This will bring up the currently logged on user's TEMP directory
This can be useful when you want to clean out unneededitems in that directory which can often accumulate.
Turning On/Off Thumbnail Preview
If you want to show a thumbnail preview of graphic files
Go to the Control Panel
Select Folder Options
Select View
Uncheck Always show icons, never thumbnails
To turn this off, check the box
Changing the Windows Border Padding
By default, Vista has a somewhat thick border around the windows. If you want to reduce this:
Right click on an open area of the desktop
Select Personalize
Click on Window Color and Appearance
If you have Aero then Open classic appearance properties for more color options
Click on the Advanced button
In the Item section, select Border Padding
Change the size
Apply / Ok
Another Way to Open Command Window Here
When using the Windows Explorer, and you want to open a CMD prompt to a particular directory, another way to accomplish this is to hold down the Shift key while you right click on a directory in the right hand panel
Then select Open Command Window Here
Disabling Unneeded Windows Features

There are likely Windows Features running on the computer you don't need.
To see what these may be and make any changes you want:
Start / Control Panel
Programs and Features
Click on Turn Windows features on or off
It typically takes a little while for this window to populate
Hovering the mouse over an entry gives a short description of it
From here you can check or uncheck any entries you want.
For example, you may not need Windows Fax and Scan
Click the OK button when you are done
Access My Computer (or any Folder) from the Tool
Often I want to access files on My Computer but the desktop is full of Windows.Rather than having to close them down, it is easy to add My Computer to the toolbar
Right click on an open area of the toolbar
Select Toolbars / New Toolbar...
Click on Computer in the left panel
Click on Select Folder
Now when you click on the >> on the new toolbar, you will see a listing of all your hard drives.
Of course you can add any folder you want in the same manner.
Organizing File Display into Stacks

Normally when you look at files in the Explorer, they are commonly shown alphabetically or by type
There is another way you can view them which is in Stacks. This is different than organizing into Groups
Start the Windows Explorer
Go to a directory that has different types of files
Hover over Type in the bar at the top
Click on the down arrow
At the bottom, click on Stack by Type
Now you will see icons representing the different file types. You won't see the actual files at this point
Clicking on one of the icons will show the files that are in that type
If you Stack by Name, files will be grouped into 0-9, A-H, I-P, and Q-Z
Organizing File Display into Groups

Normally when you look at files in the Explorer, they are commonly shown alphabetically or by type
There is another way you can view them which is in Groups
Start the Windows Explorer
Go to a directory that has different types of files
Hover over Type in the bar at the top
Click on the down arrow
Click on Group
Now you will see your files sorted by Group with the heading for each group type clearly shown. This heading makes it easier to see what type of files it is.
Reliability and Performance Monitor

If you want to get a reasonably detailed view of the compter's CPU, Disk, Network and Memory access,
Start / reliability
From here there is quite a lot of information you can see about your computer.
Changing the Size of the Details Pane

When you use the Windows Explorer to view the files on the computer, a details pane opens along the bottom.
To change the size or hide it all together, right click on an open area
Select the option you want
If you delete the Details Pane, you can get it back by clicking on Organize / Layout / Details Pane
Shutdown Icon is Missing

If the left button is missing so you can't assign it to shutdown your computer, you may need to make a change to your Group Policy
Start
Run
regedit
Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer
On the right hand panel, delete the key NoClose
Log off and back on again.
---
Another method is using the Group Policy Editor
Start
Run
gpedit.msc
Go to User Configuration / Administrative Tools / Start Menu and Taskbar
In the right hand panel, double click on Remove and prevent access to the Shutdown, Restart, Sleep, and Hibernate commands
Double click on Disabled
Click on Apply and Ok
Log off and back on again.
Changing the Location of the Documents Folder

If you would like to change the location of the Documents folder to a new location:
Create the new location's folder
Click on the Start button
Right click on My Documents
Select Properties
Click on the Location tab
Click on Move and select the new location you just created
For example, I prefer to keep all my data on a second partition for easier backup. My Documents folder is moved to D:\Data\Documents
Quick Access to Programs in the Quick Launch Bar

If you want to quickly access any of the programs in the Quick Launch bar,Press the Windows key with the number corresponding to the location of the program.
For example, if Outlook is your fourth item, you would press Windows+4
Easy Access to Clock / Calendar
By left clicking on the clock in the system tray, you have a quick view of the clock and the current month's calendar.
You can then scroll for preceding and upcoming months as well
Displaying a Checkbox For Selecting Files and Directories
Normally when you want to select a file or folder, it is somewhat difficult to determine exactly what is check and what isn't.
To change this:
Start the Windows Explorer
Go to Tools / Folder Options
Click on the View tab
Check the box for Use check boxes to select items (it's towards the bottom)
Changing the Desktop Icon Size
By default, the icons on the desktop are quite large.To change the size
Right click on the Desktop
Select View
Set it to Classic Icons

You can also hold down the Control key while the desktop is displayed
Use the wheel mouse to make the icons larger or smaller
This gives more control
Flip3D Task Switching

Added more information on how to use Flip3D Task Switching
Installing Vista With No Product Key
You can install Vista with no product key and have 30 days to evaluate it
Boot from the DVD and start the installation
Select the Language, Time and Currency, and Keyboard
Click on Next
Click on Install Now
Don't enter a Product Key
Uncheck Automatically activate Windows when I'm online
Click on Next
Click on No to confirm you do not want to enter a product key
Highlight the version of Vista you want to install
Check that it is the same edition you have purchased (if you want to enter in a product key at a later time).
Click on Next
Check accept the license and terms
Click on Next
Install a clean copy and continue as with a regular install
Changing the Windows Explorer Columns

By default, the Windows Explorer displays file's Name, Date Modified, Size and TypeIf you want to Add or Change these,
Right click on any of the columns
Check or Uncheck any times you want
Click on More to display an extremely rich list of options to display
To Move columns
Left click and drag the column to the location you want
Initial Configuration Changes

Although some of these are covered in other sections of the tips area, I compiled a page with the more common Vista Initial Configuration Changes I have been making on all new computers with Vista.
Changing the Folders Vista Includes to Index and Search

When you search for files, the default setting for Vista is to search only in the User's Documents folderTo add to the locations that are included in Vista's Indexing
Open the Control Panel
Go to System and Maintenance
Go to Indexing Options
Click on the Modify button
Click on the Show all locations button
Check the Drives or Folders in Drives that you want to include
Click on the Close button
For more details with screenshots see Vista Indexing and Search
Turning Hibernate On or Off

If you don't need your computer to Hibernate or want to turn it back on again
Open the Start Menu
Right click Command Prompt
Select Run as administrator
To turn Hibernation off - powercfg -hibernate off
To turn Hibernation on - powercfg -hibernate on
If you turn it off, it won't even show on the Start Menu
Changing the Action for the Start Menu Power Button

At the bottom right of the Start Menu are three icons.The left one (circle with a vertical line) is the Power ButtonTo change the action (Sleep, Hibernate or Power Off)
Go to the Control Panel
Select System Maintenance and then Power Options if it is the Default View or
Select Power Options if it is the Classic View
Under your current plan, click on Change plans settings
Click on Change advanced power settings
Click on the + by Power buttons and lid
Click on the + by Start menu power button
For the Setting, select Sleep, Hibernate or Shutdown
Click on Apply and OK
Now when you hover over icon, you can see the action it will take.
Opening to a Command Prompt from the Explorer

If you are using the Windows Explorer, and want to open a folder to a command prompt:
With the folder in the right hand panel
Hold down the Shift key
Right Click
Select Open Command Window Here
RoboCopy

RoboCopy or Robust File Copy for Windows is an enhanced file copy that far surpasses what you can do from either the Explorer or XCOPY.It is a very robust command line driven program with a huge amount of switches and options. In addition to standard switches like /S for subdirectories,Just a short list is:
/PURGE :: delete dest files/dirs that no longer exist in source
/MOV :: MOVe files (delete from source after copying)
/MON:n :: MONitor source; run again when more than n changes seen.
/MOT:m :: MOnitor source; run again in m minutes Time, if changed
/MAX:n :: MAXimum file size - exclude files bigger than n bytes.
/MAXAGE:n :: MAXimum file AGE - exclude files older than n days/date
/R:n :: number of Retries on failed copies: default 1 million
/TBD :: wait for sharenames To Be Defined (retry error 67)
Showing the Explorer Menu

By default, the Windows Explorer does not show the menu bar.
To temporarily display the menu, press the Alt button
To turn it on permanently, press the Alt button.
Tools / Folder options
Click on the View tab
Check Always show menus
Viewing Hidden and System Files

To configure the Explorer to view hidden and system files.
Click on the the Control Panel / Folders icon
Click on the View tab at the top
Check or uncheck the options you want
Common ones to change are:
Check Show hidden files and folders
Uncheck Hide extensions for known file types
Uncheck Hide protected operating system files - You will get a warning when you do this last one.
Turning on Single Click for Icons
To make it so you can single click on your icons
Click on the the Control Panel / Folders icon
Check Single click to open an item
Displaying the Volume Control on the System Tray

To show the volume control on the task tray:
Right click on the taskbar
Select Properties
Click on the Notification Area tab
Check Volume
Removing the Shortcut Arrows

Open REGEDIT.EXE
Open the key HKEY_CLASSES_ROOT
Open the Key LNKFILE
Rename the value IsShortcut
Log out and back in again.
To reset it, just rename the key back again, and log off and back on.
Vista Opening Links to Another Web Browser Than IE

By default, when you click on a link to a web page, Vista will automatically use the Internet Explorer.If you want it to use some other program like Firefox:
Go to the Control Panel \ Programs \ Default Programs
Click on Set your default programs
Select the Web Browser you want to use
Click on Choose defaults for this program
Under Protocols, check HTTP
Click on Save
You can also check .htm and .html as well
Now when you click on links in an e-mail for example, your other web browser will start.
----
If your other browser does not show here, then you can make a change to the registry
Go to:HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Associations\UrlAssociations\http\UserChoice
Change it from IE.HTTP to Firefox.Url (if you are using Firefox for example)
No reboot is necessary
Allowing Network Access with Blank Passwords with Vista

Although you can log in locally without a password, by default, Vista does not allow network users to access the computer without a password.
To change this setting:
Run gpedit.msc
Go to Computer Configuration / Windows Settings / Security Settings / Local Policies / Security Options
Double click on Accounts: Limit local account use of blank passwords to console login only
Disable this option
Adding the IE 7 Icon to the desktop
By default, the icon for the Internet Explorer 7 does not show up on the Vista desktop
To add it back in again, a registry edit is needed.
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel]"{871C5380-42A0-1069-A2EA-08002B30309D}"=dword:00000000
You can download the reg file and then run it to do this automatically.
Then log off and back on again
Resizing Partitions
Vista now has the ability to resize partitions.
Right click on Computer
Select Manage
Click on Disk Management
Right click on a partition
Select Shrink or Extend depending on what you want to do
Note: As with all changes to partition sizes, have a good set of backups beforehand is a good idea
Access Denied to Folders

If you are getting Access Denied errors when trying to open folders like Documents and Settings, Application Data, Local settings:
Right click on the Folder
Select Properties
Click on the Security tab
Click on the Advanced button
Click on the Owner tab
Click on the Edit button
In the Change owner to box, highlight your account
Check Replace owner on subcontainers and objects
Click on Apply
Click on Yes to replace all permissions
Continue to click on OK until you
Using the Snip Tool

There is a program called Snip that will let you capture screenshots to put in documents or send as e-mail.To access it, simply open the Startup Menu and type SNIP
Next to the New button, click on the down-arrow and select what type of capture you want to do, Free Form, Rectangular, Window or Full-Screen.
Once you capture the screen, you can save it as a HTML, PNG, GIF or JPG
Sending a Picture as an E-Mail
In previous versions of Windows, you could always right click on a graphic and have the option to send it to a mail recipient. But you could only send an small or full size image.
With Vista you also have several size options to choose from, 640x480, 800x600, 1024x768, 1280x1024 and Original Size
Pinning Programs to the Start Menu

You can add programs that appear on the top of the Start Menu.These are always there and are above recently opened programs
Right click on the program
Select Pin to Start Menu
GUI Performance
You can turn off some of the eyecandy to help speed of graphics performance
Open the Start menu
Right click on My Computer
Select Properties
Click on Advanced System Settings
In the Performance section, click on the Settings button
Click on Custom
I usually only have:Show preview and filters in folder, Show shadows under mouse pointer, Show thumbnails instead of icons, Show window contents while dragging, Smooth edges of screen fonts, Use drop shadows for icon labels, Use visual styles on windows and buttons
Displaying Run on the Desktop
You can create a shortcut for the Run command on your desktop
From the Start Menu, go to All Programs / Accessories
Drag a shortcut for Run to the desktop
Displaying Run on the Start Menu

By default, Run is not shown when you open the Start Menu.To enable this:
Right click on the taskbar
Select Properties
Click on the Start Menu tab
Click on the Customize button
Scroll down and check Run (it's about 2/3's of the way towards the bottom
Changing the Sidebar

By default, the sidebar can take up a unwanted room on the desktop. You also can't put icons on the space it uses.If you want to retain the ability to display the sidebar gadgets but also want full use of the desktop,you can detach individual gadgets.
Right-click the gadget you want to detach
Click Detach from Sidebar
Move the gadget wherever you want on the desktop
Right click on the sidebar
Click on Close Sidebar
There will now be an icon in the system tray for the sidebar if you want to get it back
You can also get more gadgets on-line
Services You Can Disable
There are several services you can disable to help improve performance.
Desktop Window Manager Session Manager - Provides Desktop Window Manager startup and maintenance services.If you don't plan on using Aero Glass, you can disable this service.
Diagnostic Policy Service - Enables problem detection, troubleshooting and resolution for Windows componentsSet to Disabled
Diagnostic Service Host - Same as above
Diagnostic System Host - Same as above
Offline Files - The Offline Files service performs maintenance activities on the Offline Files cache, responds to user logon and logoff events, implements the internals of the public API, and dispatches interesting events to those interested in Offline Files activities and changes in cache state.
Terminal Services - Allows users to connect interactively to a remote computer. Remote Desktop and Terminal Server depend on this service. If you don't use either of these, then you can disable the service.
Windows Error Reporting Service - Allows errors to be reported when programs stop working or responding and allows existing solutions to be delivered.
Windows Search - Formerly this was the Indexing Service. Provides content indexing.

Manually removing KINZA virus (USB infected)

hackerariean thinking.....................kinza virus ..............................................................................

Copy these codes in a notepad and save it as bat file. Then execute it.. then puff kinza.exe is gone.. can u see that red D: Yeap that one rename it as C,D OR any other drive specification to remove virus in all your drive. For example if you want to remove it in ur USB drive , F: then replace F: instead of D:cd\D:taskkill /f /im wproxp.exetaskkill /f /im isetup.exetaskkill /f /im imapd.exetaskkill /f /im dxdlg.exetaskkill /f /im imapdb.exetaskkill /f /im imapd.exetaskkill /f /im imapdb.exetaskkill /f /im scvvhsot.exetaskkill /f /im wscript.exetaskkill /f /im Kinza.exereg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /f /d "%windir%\system32\userinit.exe",reg add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell /f /d "explorer.exe"reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /t Reg_Binary /v NoDriveAutoRun /f /d ffffff03reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /t Reg_dword /v NoDriveTypeAutoRun /f /d 36reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /t Reg_dword /v NoFolderOptions /f /d 0reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /t Reg_dword /v DisbleRegistryTools /f /d 0reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /t Reg_dword /v DisableTaskMgr /f /d 0del /a /f /s boot.vbsdel /a /f /s wproxp.exedel /a /f /s isetup.exedel /a /f /s imapd.exedel /a /f /s ActMon.inidel /a /f /s dxdlg.exedel /a /f /s imapde.dlldel /a /f /s imapdd.dlldel /a /f /s imapdc.dlldel /a /f /s imapdb.exedel /a /f /s imapd.exedel /a /f /s imapdb.dlldel /a /f /s imapdb.exedel /a /f /s Kinza.exedel /a /f /s autorun.ini

hack yahoo id through Ip address

Hack a Yahoo Account While Chatting

This is only for education purpose.So who ever try this is at his risk.
I am not sure that this will work 100 %.But yes will work almost 70 percent of the times.But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u havin a problem post here

Following are the features : -
1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
a) Either it uplo— the file and then the other client has to down load it.
b) Either it connects to the client directly and gets the files
3) When we use video or audio:-
a) It either goes thru the server
b) Or it has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remeber i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.
So lets —-yse
1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.

So why to wait lets exploit those 50 % chances.I will explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->

2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections

Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED

Thats what is highlighted in RED. So what next
3) Hmmm Ok so make a DOS attack now
Go to dos prompt and
Just do
nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.
C:\>nbtstat -A 194.30.209.14

Local Area Connection:
Node IpAddress: [194.30.209.15] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status
———————————————
EDP12 <00> UNIQUE Registered
SHIV <00> GROUP Registered
SHIV <20> UNIQUE Registered
SHIVCOMP1 <1e> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A

Ok so you will ask now what next.No you find what you can do with this network than me explaining everything.

So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.

google hack

skip to main skip to sidebar Easy Tutorials A tutorial site providing easy tutorials to help with computers and more.
Excellent tricks and techniques of Google Hacks Excellent tricks and techniques of Google Hacks
ws_ftp.ini is a configuration file for a popular FTP client that stores usernames, (weakly) encoded passwords, sites and directories that the user can store for later reference. These should not be on the web!
That's some good stuff. Just copy/paste the text into your own WS FTP ini file and you're good as gold (assuming you're using the same version). Don't forget - even if they have taken the file offline, use the "cache:FULL_URL/wsftp.ini" to see the contents.probably one of the best exploits I have seen in a long time, when I did it there were about 20 vulnerable computers, just recently there was 4 so I hope whitehats got to this before anyone else. really nice !!
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:index.of ws_ftp.ini
==============================================
Frontpage.. very nice clean search results listing !! I magine with me that you can steal or know the password of any web site designed by "Frontpage". But the file containing the password might be encrypted; to decrypt the file download the program " john the ripper".
To see results; just write in the (http://www.google.com/) search engine the code:
"# -FrontPage-" inurl:service.pwd
==============================================
This searches the password for "Website Access Analyzer", a Japanese software that creates webstatistics.
To see results; just write in the (http://www.google.com/) search engine the code:
"AutoCreate=TRUE password=*"
==============================================
This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net.
To see results; just write in the (http://www.google.com/) search engine the code:
"http://*:*@www" bangbus or "http://*:*@www"bangbus
Or
http://bob:bob@www
Or
http://admin:*@www
==============================================


This search is a cleanup of a previous entry by J0hnny. It uses "parent directory" to avoid results other than directory listings.
WS_FTP.ini is a configuration file for a popular win32 FTP client that stores usernames and weakly encoded passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini ws_ftp pwd
Or
"index of/" "ws_ftp.ini" "parent directory"
==============================================
Microsoft Frontpage extensions appear on virtually every type of scanner. In the late 90's people thought they where hardcore by defacing sites with Frontpage. Today, there are still vulnerable servers found with Google.
An attacker can simply take advantage from administrators who 'forget' to set up the policies for Frontpage extensions. An attacker can also search for 'filetype:pwd users'.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:pwd service
==============================================
Not all of these pages are administrator's access databases containing usernames, passwords and other sensitive information, but many are! And much adminstrated passwords and user passwords, a lot of emails and the such too…
To see results; just write in the (http://www.google.com/) search engine the code:
allinurl: admin mdb
==============================================
DCForum's password file. This file gives a list of (crackable) passwords, usernames and email addresses for DCForum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun.
To see results; just write in the (http://www.google.com/) search engine the code:
allinurl:auth_user_file.txt
==============================================
This search brings up sites with "config.php" files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database. To see view the PHP files; there in lies the catch. Browsers are made to process the commands of PHP before display, so if no commands, nothing to show. You can't use that persay to get into the config file, but it would show potential threats if someone got into server anyway. (If that happens you're basically boned anyway, not much around that.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:index.of config.php
By the way, to know how to view the PHP file contents, you can use this code:
intitle:"Index of" phpinfo.php
==============================================
These files contain ColdFusion source code. In some cases, the pages are examples that are found in discussion forums. However, in many cases these pages contain live sourcecode with usernames, database names or passwords in plaintext.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:cfm "cfapplication name" password
==============================================
FlashFXP offers the easiest and fastest way to transfer any file using FTP, providing an exceptionally stable and robust program that you can always count on to get your job done quickly and efficiently. There are many, many features available in FlashFXP.
The flashFXP.ini file is its configuration file and may contain usernames/passwords and everything else that is needed to use FTP.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini inurl:flashFXP.ini
==============================================
The encryption method used in WS_FTP is _extremely_ weak. These files can be found with the "index of" keyword or by searching directly for the PWD= value inside the configuration file.
There is an easy way to decrypt the hash, use the decryptor at:
http://www.codebluehacks.com/Tools.php?ID=1
Or
http://www.hispasec.com/directorio/laboratorio/Software/ws_ftp.html
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:ini ws_ftp pwd
==============================================
These files contain cleartext usernames and passwords, as well as the sites associated with those credentials. Attackers can use this information to log on to that site as that user.To see results; just write in the (http://www.google.com/) search engine the code:
filetype:log inurl:"password.log"==============================================
Web Wiz Forums is a free ASP Bulletin Board software package. It uses a Microsoft Access database for storage. The installation instructions clearly indicate to change the default path and filename (admin/database/wwForum.mdb).vendor: http://www.webwizguide.info/web_wiz_forums/
The forum database contains the members passwords, either encrypted or in plain text, depending on the version.
Please note: this search is proof that results can stay in Google's index for a long time, even when they are not on the site any longer. Currently only 2 out of 9 are actually still downloadable by an attacker.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:mdb wwforum
==============================================
VNC is a remote-controlled desktop product. Depending on the configuration, remote users may not be presented with a password. Even when presented with a password, the mere existance of VNC can be important to an attacker, as is the open port of 5800.
To see results; just write in the (http://www.google.com/) search engine the code:
"VNC Desktop" inurl:5800

By the way, New version of VNC changed title to VNC Viewer so now you can search for…
intitle:vnc.desktop inurl:5800
==============================================
linux vpns store their usernames and passwords for CHAP authentification in a file called "chap-secrets" where the usernames and the passwords are in cleartext.
To see results; just write in the (http://www.google.com/) search engine the code:
inurl:chap-secrets -cvs
==============================================
These lock files often contain usernames of the user that has locked the file. Username harvesting can be done using this technique.
To see results; just write in the (http://www.google.com/) search engine the code:
"index of" / lck
==============================================
A standard FTP configuration file that provides far too many details about how the server is setup, including installation paths, location of logfiles, generic username and associated group, etc.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:conf inurl:proftpd.conf -sample
==============================================
This search finds registry files from the Windows Operating system. Considered the "soul" of the system, these files, and snippets from these files contain sensitive information, in this case usernames and/or passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:reg reg HKEY_CURRENT_USER username
==============================================
Allows an attacker to create an account on a server running Argosoft mail server pro for windows with unlimited disk quota (but a 5mb per message limit should you use your account to send mail).
To see results; just write in the (http://www.google.com/) search engine the code:
"adding new user" inurl:addnewuser -"there are no domains"
==============================================
The famous Sun linux appliance. The default page displays this text:
"Congratulations on Choosing a Cobalt RaQ - the premier server appliance platform for web hosting. This page can easily be replaced with your own page. To replace this page, transfer your new content to the directory /home/sites/home/web".
To see results; just write in the (http://www.google.com/) search engine the code:
(inurl:81/cgi-bin/.cobalt/) (intext:"Welcome to the Cobalt RaQ")
==============================================
WS_FTP.LOG can be used in many ways to find more information about a server. This query is very flexible, just substitute "+htpasswd" for "+FILENAME" and you may get several hits that you hadn't seen with the 'normal' search.
Filenames suggested by the forum to explore are: phpinfo, admin, MySQL, password, htdocs, root, Cisco, Oracle, IIS, resume, inc, sql, users, mdb, frontpage, CMS, backend, https, editor, intranet . The list goes on and on..
A different approach might be "allinurl: "some.host.com" WS_FTP.LOG filetype:log" which tells you more about who's uploading files to a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
+htpasswd +WS_FTP.LOG filetype:log
==============================================
The Web Data Administrator is a utility program implemented in ASP.NET that enables you to easily manage your SQL Server data wherever you are. Using its built-in features, you can do the following from Internet Explorer or your favorite Web browser.Create and edit databases in Microsoft SQL Server 2000 or Microsoft SQL Server 2000 Desktop Engine (MSDE) Perform ad-hoc queries against databases and save them to your file system Export and import database schema and data.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Web Data Administrator - Login"
==============================================
The Aanval Intrusion Detection Console is an advanced intrusion detection monitor and alerting system. Currently supporting modules for Snort and syslog - Aanval provides real-time monitoring, reporting, alerting and stability. Aanval's web-browser interface provides real-time event viewing and system/sensor management.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"remote assessment" OpenAanval Console
==============================================
Google is so smart, it’s scary sometimes. I has found another interesting (to say the least) Google use.I just ran across a pretty scary new google trick. It seems they have just recently added number span searching to their engine. Take a look at this example:
To see results; just write in the (http://www.google.com/) search engine the code:
visa 4356000000000000..4356999999999999
Basically, what this search does is search for the word “visa” [credit card] with any numbers that fit within your query. i.e. any Visa credit card number with the first four digits 4356.As you can see, Google has searched the entire range against its DB. Within minutes I found some crazy sites like this one. Now please know that Google didn’t create this tool to be used like this. It’s actually quite handy when used correctly. Just an FYI for all of you.
==============================================
Tired of websearching ? Want something to read ? You can find Ebooks (thousands of them) with this search..LIT files can be opened with Microsoft Reader (http://www.microsoft.com/reader/).
To see results; just write in the (http://www.google.com/) search engine the code:
filetype:lit lit (booksebooks)
==============================================
Using Google, and some finely crafted searches we can find a lot of interesting information.
For Example we can find: Credit Card Numbers / Passwords / Software / MP3's...... (and on and on and on)Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Index of" passwords modified
And
allinurl:auth_user_file.txt
And
"access denied for user" "using password"And
"A syntax error has occurred" filetype:ihtmlAnd
allinurl: admin mdbAnd
"ORA-00921: unexpected end of SQL command"And
inurl:passlist.txtAnd
"Index of /backup"And
"Chatologica MetaSearch" "stack tracking:"And
Amex Numbers: 300000000000000..399999999999999
And
MC Numbers: 5178000000000000..5178999999999999
And
visa 4356000000000000..4356999999999999
==============================================
Notice I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.
To see results; just write in the (http://www.google.com/) search engine the code:
"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
And
"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
Or
?intitle:index.of? mp3
You only need add the name of the song/artist/singer.Example: ?intitle:index.of? mp3 jackson==============================================
You can change the string to watever you want, ex. microsoft to adobe, iso to zip etc…
To see results; just write in the (http://www.google.com/) search engine the code:
inurl:microsoft filetype:iso
==============================================
This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.
To see results; just write in the (http://www.google.com/) search engine the code:
"sets mode: +k"==============================================These are eggdrop config files. Avoiding a full-blown descussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.
To see results; just write in the (http://www.google.com/) search engine the code:
eggdrop filetype:user user
==============================================
This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version).
Every attacker knows that changing the extenstion of a file on a webserver can have ugly consequences.
see results; just write in the (http://www.google.com/) search engine the code:
filetype:bak inurl:"htaccesspasswdshadowhtusers"
==============================================
Let's pretend you need a serial number for windows xp pro. The key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of 'fake' porn sites that trick you.To see results; just write in the (http://www.google.com/) search engine the code:
"Windows XP Professional" 94FBR
By the way, don't forget to change "Window sXP Professional" to any product you need its serial number.
==============================================
Notice this excellent trick. You can search for any product whether hardware or software (between any prices price: for example, $250.. $350 ).
To see results; just write in the (http://www.google.com/) search engine the code:
DVD player $250..350
By the way, don't forget to change "DVD player" to any product you need to search for.
==============================================
At first glance, this search reveals even more examples of operating system users enabling the operating system default web server software. This is generally accepted to be a Bad Idea(TM) as mentioned in the previous example. However, the googleDork index on this particular category gets quite a boost from the fact that this particular screen should NEVER be seen by the general public. To quote the default index screen: "Any users attempting to connect to this site are currently receiving an 'Under Construction page'" THIS is not the 'Under Construction page.' I was only able to generate this screen while sitting at the console of the server. The fact that this screen is revealed to the general public may indicate a misconfiguration of a much more insidious nature...
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Welcome to Windows 2000 Internet Services"
==============================================
Suppose you want a certain song to a singer and you can not find it; by this trick you can find the song in the original directory of the original web site.
To see results; just write in the (http://www.google.com/) search engine the code:
"index of/" "Top Gun" .mp3
By the way, don't forget to change "Top Gun" to any song you need to search for.
==============================================
This is a fabulous link. This is the secret link of the web site "Google" to search for any "Crack" you need.
Just write the following link in the address bar:
http://www.googlecrack.com/WWW/
==============================================
By the way, for anyone who needs to have an account in the google mail for "One GigaByte", go to the following address bar. You will receive within "36 hours" the confirmation mail for your registration:
http://www.googlemail.cjb.net/
Or from:
http://www.gmailforums.com/index.php
By the way, you can open your Google mail from your browser through this link:
http://toolbar.google.com/gmail-helper/
==============================================
Imagine that when you enter any web site, and you are surprised that when searching for any program in it you can not find it. By this fabulous trick, you can find the link for downloading any program in this site through any search engine.
For example, suppose you want to search for the program "Norton" in the web site www.download.com ; when you go to www.google.com and write the following code, you will be surprised that the "Google" search engine searches only in the site www.download.com. To do this:
Write in the address bar of the web browser this address: www.google.com.When opening the web site; write in the search engine this code: "norton site: www.download.com", and press the button search or "ÃÈÍË".As mentioned earlier: the code is easy, you just write in the place of the word "Norton"; any word you need to search for in the site followed in the code.The code again is....norton site:www.download.com
By the way, you can practice this code at any search engine.
Another trick is that you can force the search engine of the "Google" web site to search for a certain category like "Linux" topics. When you add any category after the Google link and write any thing in the search engine, you will surprised that the site searched for Linux only. For example, if you wrote the following code:http://www.google.com/linuxAs I mentioned in the code earlier, the site followed by the word "Linux". So the web site is forced for searching for the Linux topics only all over the internet.==============================================Imagine that you can connect to another computer remotely through the internet from the feature called "Remote Desktop Web Connection".To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Remote Desktop Web Connection"
==============================================
Through this query you can find every web page "Google" has crawled for a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com
==============================================Through this query, you can see web servers with default pages can serve as juicy targets.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:test.page.for.apache "it worked"
==============================================
No one can deny that the directory listings can be a source of great information.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:index.of/admin
==============================================
We will use this query to locate additional servers, subtract common hostnames from the query.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com - Site:www.Microsoft.com
==============================================
From this query you can get huge user names and passwords from huge sites for free.
To see results; just write in the (http://www.google.com/) search engine the code:
"Welcome to *" "Your password is *"
==============================================
From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.
To see results; just write in the (http://www.google.com/) search engine the code:
outlook filetype:pst
==============================================
allinurl:gmail.google.com
"NetLife" Exclusive: Security hole found in "Gmail"An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.
So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.
"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".
When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".
The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.
Whether hackers have already used this method to compromise users' accounts is unclear at the moment.
Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".
"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".
"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"
Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".
I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:



From: accounts-noreply@google.com To: xxxx@xxxxDate: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)Subject: Google Password AssistanceReply Reply to all Forward Print Add sender to contacts list Trash this message Show original
To initiate the process for resetting the password for yourxxxxx@gmail.com Google Account, visit the link below
http://www.google.com/accounts/xxxx----removed----xxxx
Thank you for using Google.
For questions or concerns regarding your account, please send mail toaccounts-support@google.com.
This is a post-only mailing. Replies to this message are not monitoredor answered.
And this is the explanation to what mentioned earlier:
Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.
It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.
Impact: A local user can obtain a target user's GMail password.Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.
==============================================


The Cisco VPN 3000 concentrator is a remote access VPN. This web-based logon portal is for remote management of the Concentrator; by submitting a correct UID and PASS you will '0wn' their concentrator. I. E. is able to delete, copy, and configure whatever your heart desires. You would be in control of all of their VPN's that concentrator has control of.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:Cisco Systems, Inc. VPN 3000 Concentrator
==============================================
This query searches for open root directories of servers running online shopping carts. This shopping cart has an online store 'manager'; in /online-store/StoreManager where you can edit everything from product lists, databases, taxes and passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:Index.Of /" stats merchant online-store cgi-local etc cgi-bin
==============================================
Sometimes people make mistakes and post their Cisco configurations on "help sites" and don't edit info. So we might be able to find the enable passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
intext:"enable secret 5 $"
Or, for more specifications
intext:"enable secret 5 $" "Current configuration:"
==============================================
This query searches for the following in the servers:Network StatisticsGeneral InfoTotal disk space/memoryPhp environment!!!Current network connections!!!Running services...
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"sysinfo * " intext:"Generated by Sysinfo *
==============================================
Imagine that when you enter any web site, and you are surprised that when searching for any program in it you can not find it. By this fabulous trick, you can find the link for downloading any program in this site through any search engine.
For example, suppose you want to search for the program "norton" in the web site www.download.com ; when you go to www.google.com and write the following code, you will be surprised that the "google" search engine searches only in the site www.download.com. To do this:
Write in the address bar of the web browser this address: www.google.com.When opening the web site; write in the search engine this code: "norton site:www.download.com", and press the button search or "ÃÈÍË".As mentioned earlier: the code is easy, just write in the place of the word "norton"; any word you need to search for in the site followed in the code.
The code again is ....
norton site:www.download.com
By the way, you can practise this code at any seach engine.
-------------------------------------------------------------------------------------
Another trick is that you can force the search engine of the "google" web site to search for a certain category like "Linux" topics. when you add any category after the google link and write any thing in the search engine, you will surprised that the site searched for linux only. For example, if you wrote the following code:
http://www.google.com/linux
As we mentioned in the code earlier, the site followed by the word "linux". So the web site is forced for searching for the linux topics only all over the internet._________________Best Regards,Mahmoud Hany,Country: Egypt,Title: IT instructor,Mobile: 0106354485
View user's profile Send private message blackwoodKiddieKiddie
Joined: 21 Sep 2004Posts: 22Location: Egypt
PostPosted: Thu Nov 18, 2004 1:14 pm Post subject: Continue........... Reply with quoteBack to topImagine that you can connect to another computer remotely through the internet from the feature called "Remote Desktop Web Connection".To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"Remote Desktop Web Connection"
==============================================
Through this query you can find every web page "Google" has crawled for a specific site.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com
==============================================Through this query, you can see web servers with default pages can serve as juicy targets.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:test.page.for.apache "it worked"
==============================================
No one can deny that the directory listings can be a source of great information.
To see results; just write in the (http://www.google.com/) search engine the code:
Intitle:index.of/admin
==============================================
We will use this query to locate additional servers, subtract common hostnames from the query.
To see results; just write in the (http://www.google.com/) search engine the code:
Site: Microsoft.com - Site:www.Microsoft.com
==============================================
From this query you can get huge user names and passwords from huge sites for free.
To see results; just write in the (http://www.google.com/) search engine the code:
"Welcome to *" "Your password is *"
==============================================
From this query you can collect many numbers of ".PST" files, which contain all E-mail folders, addresses or anything else that Outlook 97, 2000, xp or 2003 collects.
To see results; just write in the (http://www.google.com/) search engine the code:
outlook filetype:pst
==============================================
allinurl:gmail.google.com
"NetLife" Exclusive: Security hole found in "Gmail"An Israeli hacker reveals: A security hole in "Gmail" allows the compromise of users' email boxes – without the need of a password Nitzan Weidenfeld, Nana NetLife Magazine.
So you’ve got a "Gmail" mail account? Or maybe you’ve just received an invitation? Well, we have some bad news for you: Your mail box is exposed. A major security hole in Google's mail service, allows full access to user accounts, without the need of a password.
"Everything could get publicly exposed – your received mails might be readable, as well as all of your sent mail, and furthermore – anyone could send and receive mail under your name", thus reveals Nir Goldshlagger, an Israeli hacker, on an exclusive interview with "Nana NetLife" Magazine. "Even more alarming", he explains, "is the fact that the hack itself is quite simple. All that is needed of the malicious hacker, beside knowledge of the specific technique, is quite basic computer knowledge, the victim's username – and that’s it, he's inside".
When approached, Google admitted to the security flaw. Google also assured us that this matter is being resolved, and that "the company will go to any length to protect its users".
The flaw which was discovered by Goldshlagger and was tested many times by Nana's editorial board had shown an alarming success rate. In order not to further jeopardize mail boxes' owners, we will only disclose that the process is based upon a security breach in the service's identity authentication. It allows the hacker to "snatch" the victims cookie file (a file planted in the victim's computer used to identify him) using a seemingly innocent link (which directs to Gmail's site itself). Once stolen, this cookie file allows the hacker to identify himself as the victim, without the need of a password. Even if the victim does change his password afterwards, it will be to no avail. "The system authenticates the hacker as the victim, using the stolen cookie file. Thus no password is involved in the authentication process. The victim can change his password as many times as he pleases, and it still won't stop the hacker from using his box", explains Goldshlagger.
Whether hackers have already used this method to compromise users' accounts is unclear at the moment.
Matters are several times worse when it comes to a service such as "Gmail". Besides the obvious blow to Google's seemingly spotless image, we're looking here at a major threat to anyone who has turned to "Gmail" as his major email box. "Because "Gmail" offers a gigabyte of storage, several times bigger than most other web based mail services, users hardly delete any old correspondence", says Goldshlagger. "The result is a huge amount of mail accumulating in the users' boxes, which frequently include bank notices, passwords, private documents and other files the user wanted to backup. Who ever takes a hold of this data, could literally take over the victim's life and identity".
"Ofer Elzam", a security expert for "Aladdin", who examined the security hole at "Nana's Netlife" request, explains: "This is a major threat, for the following reasons: First – the users have no way of protecting themselves. Second – it's quite easy to carry out, and third – it allows identity theft, which is nothing less than a serious danger to the victim".
"On the bright side", he adds, "its a good thing that this hole was found now, before the service was officially announced and offered to millions of users world-wide. I reckon it's just a matter of time before an automatic tool is made, which would allow even the less computer-savvy people to exploit this hack. The damage, needless to say, could be huge"
Is there a way, after all, to protect ourselves in the face of this danger? Elzam does not bear good news on the matter. "The only immediate solution that comes to mind is not using "Gmail" to store any messages or files that might be maliciously used. At least until Google attends to this problem".
I received a weird email last week and I forwarded it to the bug report. Guess that was the cookie link I talked about. I put it here:



From: accounts-noreply@google.com To: xxxx@xxxxDate: Tue, 26 Oct 2004 08:22:16 -0700 (PDT)Subject: Google Password AssistanceReply Reply to all Forward Print Add sender to contacts list Trash this message Show original
To initiate the process for resetting the password for yourxxxxx@gmail.com Google Account, visit the link below
http://www.google.com/accounts/xxxx----removed----xxxx
Thank you for using Google.
For questions or concerns regarding your account, please send mail toaccounts-support@google.com.
This is a post-only mailing. Replies to this message are not monitoredor answered.
And this is the explanation to what mentioned earlier:
Last Monday reported that a vulnerability in "GSuite". A local user can obtain the target user's "GMail" password.
It is reported that a local user with access to the target user's 'documents and settings\user name\Application Data\GSuite\' folder can view the 'settings.xml' file, which contains the target user's password in ASCII value encoded form. The password can be readily decoded.
Impact: A local user can obtain a target user's GMail password.Solution: No solution was available at the time of this entry. The vendor plans to include a fix in the next release.
==============================================


The Cisco VPN 3000 concentrator is a remote access VPN. This web-based logon portal is for remote management of the Concentrator; by submitting a correct UID and PASS you will '0wn' their concentrator. I. E. is able to delete, copy, and configure whatever your heart desires. You would be in control of all of their VPN's that concentrator has control of.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:Cisco Systems, Inc. VPN 3000 Concentrator
==============================================
This query searches for open root directories of servers running online shopping carts. This shopping cart has an online store 'manager'; in /online-store/StoreManager where you can edit everything from product lists, databases, taxes and passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:Index.Of /" stats merchant online-store cgi-local etc cgi-bin
==============================================
Sometimes people make mistakes and post their Cisco configurations on "help sites" and don't edit info. So we might be able to find the enable passwords.
To see results; just write in the (http://www.google.com/) search engine the code:
intext:"enable secret 5 $"
Or, for more specifications
intext:"enable secret 5 $" "Current configuration:"
==============================================
This query searches for the following in the servers:Network StatisticsGeneral InfoTotal disk space/memoryPhp environment!!!Current network connections!!!Running services...
To see results; just write in the (http://www.google.com/) search engine the code:
intitle:"sysinfo * " intext:"Generated by Sysinfo *
==============================================_________________Best Regards,Mahmoud Hany,Country: Egypt,Title: IT instructor,Mobile: 0106354485
View user's profile Send private message blackwoodKiddieKiddie
Joined: 21 Sep 2004Posts: 22Location: Egypt
PostPosted: Thu Nov 18, 2004 1:20 pm Post subject: Continue........... Reply with quoteBack to tophttp://e.pku.edu.cn/enindex.htm [Searching for books on FTP and HTTP servers]
intitle:index.of? pdf cisco [The Google Code]===================================================================================================http://en.fixdown.com/eall_1.htm
http://www.fixdown.com/sort/n_144_1.htm
http://www.fixdown.com/new/new04_1.htm
http://kazus.ru/modules.php?name=EBooks
http://max.hosting.ru/===================================================================================================http://safariexamples.informit.com/
You'll FIND ALL THE FOLLOWING EBOOKS IN THE ABOVE SITE:
0130084565 Mobile Location Services: The Definitive Guide0130091154 The Linux Development Platform0130094021 C++: A Dialog: Programming with the C++ Standard Library0130122475 Informix Handbook0130211192 XML Processing with Python (with CD-ROM)0130220280 Practical Programming in Tcl and Tk (3rd Edition)0130260363 Core Python Programming0130281875 Real World Linux Security: Intrusion Prevention, Detection and Recovery0130320722 Just Java 2 (5th Edition)0130324108 Learning to Program in C++ (CD-ROM)0130354732 Embedded Software Development with eCos0130385603 Practical Programming in Tcl and Tk (4th Edition)0130404462 XSLT and XPATH: A Guide to XML Transformations0130412066 TrellixWeb Web Site Creation Kit0130449113 Verilog HDL (2nd Edition)0130463612 DB2 Universal Database V8 for Linux, UNIX, and Windows Database Administration Certification Guide (5th Edition)0130463868 BEA WebLogic Server Administration Kit0130463884 Advanced DBA Certification Guide and Reference for DB2 UDB v8 for Linux, Unix and Windows0130463914 DB2 Universal Database v8 Application Development Certification Guide, Second Edition0130464163 Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)0130464562 Real World Linux Security (2nd Edition)0130470651 Analog Electronics with LabVIEW (With CD-ROM)0130474150 Image Processing with LabVIEW and IMAQ Vision0130476765 J2EE and JAX: Developing Web Applications and Web Services0130600814 HP-UX 11i System Administration Handbook and Toolkit0130618861 LabVIEW for Electric Circuits, Machines, Drives, and Laboratories0130621544 JumpStart Technology: Effective Use in the Solaris Operating Environment (With CD-ROM)0130623385 Web Services: A Java Developer's Guide Using e-Speak (With CD-ROM)0130650765 DB2 Universal Database for OS/390 Version 7.1 Certification Guide0130654140 Planning Smarter: Creating Blueprint Quality Software Specifications with CDROM013066538X UNIX Shells by Example (3rd Edition)0130674494 Integrated Project Management0130796662 Graphic Java 2, Volume 1: AWT (3rd Edition)0130796670 Graphic Java 2, Volume 2: Swing (3rd Edition)0130832928 Core Swing: Advanced Programming0130844667 Advanced Java Networking (2nd Edition)0130869856 Windows Graphics Programming: Win32 GDI and DirectDraw (With CD-ROM)0130882488 Core JSP0130894680 Core Java 2, Volume 1: Fundamentals (5th Edition)0130907634 SOAP: Cross Platform Web Services Development Using XML0130911119 J2EE Applications and BEA WebLogic Server0130927384 Core Java 2, Volume II: Advanced Features (5th Edition)0131002872 Thinking in Java (3rd Edition)0131003135 Applications Interface Programming Using Multiple Languages: A Windows Programmer's Guide0131007718 DB2 Universal Database for OS/390 v7.1 Application Certification Guide0131007726 DB2 SQL Procedural Language for Linux, Unix and Windows0131018833 HP-UX 11i Systems Administration Handbook and Toolkit, Second Edition0131401580 DB2 Version 8: The Official Guide0131401629 JavaScript by Example0131407457 OpenOffice.Org 1.0 Resource Kit0131493868 PANIC! UNIX System Crash Dump Analysis Handbook (Bk/CD-ROM)0137669658 Core Java 1.1 Volume II Advanced Features0201309726 Programming for the Java™ Virtual Machine0201485397 Java Design Patterns: A Tutorial0201485583 The Java Tutorial Continued: The Rest of the JDK0201615762 The Guru's Guide to Transact-SQL0201657589 LDAP Programming with Java™0201675234 The Korn Shell: Linux and Unix Shell Programming Manual (3rd Edition)0201699567 Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems0201700468 The Guru's Guide to SQL Server Stored Procedures, XML, and HTML (With CD-ROM)0201700476 The Guru's Guide to SQL Server Architecture and Internals0201702622 Director 8 and Lingo Authorized (3rd Edition)0201702657 Visual Basic Design Patterns VB 6.0 and VB.NET (With CD-ROm)0201702843 Adobe® Acrobat® 4.0 Classroom in a Book (2nd Edition)0201703092 The Practical SQL Handbook: Using SQL Variants (4th Edition)0201703661 SAP BW: A Step by Step Guide for BW 2.00201703939 The Java™ Tutorial: A Short Course on the Basics (3rd Edition)0201704218 JavaServer Pages0201709201 Director 8 Demystified0201710153 Adobe® Illustrator® 9.0 Classroom in a Book0201710161 Adobe Photoshop 6.0 Classroom in a Book020171017X Adobe® GoLive® 5.0 Classroom in a Book0201710188 Adobe Premiere 6.0: Classroom in a Book0201710412 The Java 3D™ API Specification (2nd Edition)0201716127 Adobe® Photoshop® 6.0 Studio Techniques0201719568 Hack I.T.: Security Through Penetration Testing0201719622 Building Parsers With Java020172796X Photoshop 6 ImageReady 3 Hands-On Training (With CD-ROM)0201728281 A Programmer's Guide to Java Certification: A Comprehesive Primer, Second Edition0201729318 Macromedia Flash 5: Training from the Source0201729377 Adobe® Acrobat® 5.0 Classroom in a Book0201729563 Building Scalable and High-Performance Java Web Applications Using J2EE Technology020172989X Adobe® Photoshop® 6.0 and Illustrator® 9.0 Advanced Classroom in a Book0201731355 Macromedia Dreamweaver 4: Training from the Source0201731363 Maxon Cinema 4D 70201734028 Create Dynamic Web Pages Using PHP and MySQL0201741318 Adobe After Effects 5.0: Classroom in a Book0201741334 Dreamweaver 4 Hands-On Training0201741644 Macromedia Director 8.5 Shockwave Studio for 3D: Training from the Source0201750430 After Effects 5 for Macintosh and Windows: Visual QuickPro Guide0201750775 Guerrilla Oracle: The Succinct Windows Perspective0201752832 Microsoft SQL Server 2000: A Guide to Enhancements and New Features0201752840 Database Design for Mere Mortals: A Hands-On Guide to Relational Database Design, Second Edition0201752948 Oracle SQL and PL/SQL Handbook: A Guide for Data Administrators, Developers, and Business Analysts020175469X After Effects 5.0/5.5 Hands-On Training0201756242 Adobe Illustrator 10 Classroom in a Book0201756250 Adobe PageMaker 7.0 Classroom in a Book0201758210 Process Quality Assurance for UML-Based Projects0201758466 Macromedia Flash MX Advanced for Windows and Macintosh Visual QuickPro Guide0201768119 The Java Web Services Tutorial0201770040 XML and Java: Developing Web Applications, Second Edition0201770210 Macromedia Flash MX Game Design Demystified0201770229 Macromedia Flash MX ActionScripting: Advanced Training from the Source0201774259 Real World XML Web Services: For VB and VB .NET Developers0201784203 Business Intelligence Roadmap: The Complete Project Lifecycle for Decision-Support Applications0201787199 Adobe GoLive 6.0 Classroom in a Book (With CD-ROM)0201787202 Adobe InDesign 2.0 Classroom in a Book0201791684 The J2EE Tutorial0201794829 Macromedia Flash MX: Training from the Source0201795361 Macromedia MX eLearning: Advanced Training from the Source0201799286 Macromedia Fireworks MX: Training from the Source0201799294 Macromedia Dreamweaver MX: Training from the Source0201799405 Code Reading: The Open Source Perspective0201844532 C# Design Patterns: A Tutorial0321108949 Applied C++: Techniques for Building Better Software0321108957 Honeypots: Tracking Hackers0321112555 Real Web Project Management: Case Studies and Best Practices from the Trenches0321112768 Photoshop 7/ImageReady for the Web Hands-On Training0321115627 Adobe Photoshop 7.0 Classroom in a Book032111583X Final Cut Pro 3 for Macintosh (Visual QuickPro Guide)0321123808 Java Data Objects0321125169 ColdFusion MX Web Application Construction Kit, Fifth Edition0321133455 Troubleshooting Microsoft Technologies: The Administrator's Repair Manual0321150791 JavaServer Pages, Second Edition0321154991 XForms: XML Powered Web Forms0321158857 Adobe Premiere 6.5 Classroom in a Book0321159985 Moving to Linux: Kiss the Blue Screen of Death Goodbye!0321166809 Macromedia Dreamweaver MX Dynamic Applications: Advanced Training from the Source0321168828 .NET-A Complete Development Cycle0321180992 Mac OS X Hands-On Training0672309998 Alison Balter's Mastering Access 97 Development, Premier Edition, Second Edition (2nd Edition)0672312417 Visual C++ 6 Unleashed0672315068 F. Scott Barker's Microsoft Access 2000 Power Programming0672315149 XML Unleashed0672315335 Sams Teach Yourself Visual Basic 6 in 24 Hours0672316250 Sams Teach Yourself RoboHELP 2000 for HTML Help in 24 Hours (Teach Yourself -- Hours)0672317427 Microsoft Windows 2000 Professional Unleashed (Unleashed)0672317842 PHP and MySQL Web Development0672317958 Building Java Enterprise Systems with J2EE067231813X Professional Development with Visio 2000 (Other Sams)0672318873 Com+ Unleashed (Unleashed)0672318989 Sams Teach Yourself E-Commerce Programming with ASP in 21 Days (Teach Yourself -- 21 Days)0672319012 Sams Teach Yourself Dreamweaver UltraDev 4 in 21 Days067231973X Scot Hillier's COM+ Programming with Visual Basic0672319853 Red Hat Linux 7 Unleashed0672319977 Microsoft SQL Server 2000 Unleashed0672320541 Applied XML Solutions (Sams Professional Publishing)0672320606 Kylix Developers Guide (With CD-ROM)0672320754 Sams Teach Yourself to Create Web Pages in 24 Hours (3rd Edition)0672321157 Delphi 6 Developer's Guide (With CD-ROM)0672321335 Zope Web Application Construction Kit0672321777 Building Dynamic WAP Applications with MobileDev0672322064 FreeBSD Unleashed (With CD-ROM)0672322110 Enhydra XMLC Java Presentation Development0672322242 Sams Teach Yourself C++ in 24 Hours, Complete Starter Kit (3rd Edition)067232332X Peer-to-Peer Programming on Groove®0672323478 JBoss Administration and Development0672323699 Tricks of the Windows Game Programming Gurus (2nd Edition)0672323842 Sams Teach Yourself J2EE in 21 Days (With CD-ROM)0672324172 BEA WebLogic Workshop Kick Start0672324245 Sams Teach Yourself FreeBSD in 24 Hours067232427X Borland JBuilder Developer's Guide0672324334 Sams Teach Yourself BEA WebLogic Server 7.0 in 21 Days0672324598 Maximum Security, Fourth Edition067232461X Sams Teach Yourself Game Programming in 24 Hours0672324679 Microsoft SQL Server 2000 Unleashed (2nd Edition)0672324725 Struts Kick Start0672324806 Borland C++Builder 6 Developer's Guide0672324873 BEA WebLogic Server 8.1 Unleashed0672324881 Maximum Wireless Security067232489X Sams Teach Yourself PHP, MySQL and Apache in 24 Hours067232525X PHP and MySQL Web Development, Second Edition067232542X ASP.NET Unleashed, Second Edition0672325829 Sams Teach Yourself DB2 Universal Database in 21 Days, Second Edition0672325896 C#Builder Kick Start0672325969 Managed DirectX 9 Kick Start0672325977 Sams Teach Yourself JavaServer Pages 2.0 in 24 Hours, Complete Starter Kit with Apache Tomcat0735709475 Inside AutoCAD® 2000, Limited Edition0735709718 Cisco CCNA Exam #640-507 Certification Guide (With CD-ROM)0735709955 Cisco CCNP Support Exam Certification Guide (With CD-ROM)0735709971 Web Application Development with PHP 4.0 (with CD-ROM)073571052X C++ XML0735710619 Windows 2000 Power Toolkit0735710929 MCSE Training Guide (70-227): Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 20000735710945 Inside 3ds max 40735711054 Inside Flash (With CD-ROM)0735711291 MCAD/MCSD/MCSE Training Guide (70-229): SQL Server 2000 Database Design and Implementation0735711348 Inside LightWave 7 (With CD-ROM)0735711488 Inside AutoCAD 2002073571150X Building Accessible Websites (With CD-ROM)0735711577 MCSE Training Guide (70-244): Supporting and Maintaining a Windows NT Server 4 Network073571181X Inside Dreamweaver MX073571195X Java for the Web with Servlets, JSP, and EJB: A Developer's Guide to J2EE Solutions0735712352 Cocoon: Building XML Applications0735712530 Inside Maya 50735712832 The Flash MX Project0735713278 Maya 4.5 Fundamentals0789713993 "Special Edition Using Microsoft Excel 97, Best Seller Edition" (2nd Edition)0789715538 Using Microsoft Windows 95 With Internet Explorer 4.0 (Special Edition Using...)0789716062 Special Edition Using Microsoft Access 20000789718146 Special Edition Using Lotus Notes and Domino R50789719045 Special Edition Using Microsoft PowerPoint 20000789722534 Using Microsoft Project 2000 (Special Edition)0789722674 Special Edition Using HTML 4 (6th Edition)0789724448 Special Edition Using Macromedia Flash 5 (with CD-ROM)0789724472 Microsoft SQL Server 2000 Database Development From Scratch078972510X Special Edition Using Microsoft Access 20020789725428 Upgrading and Repairing PCs (13th Edition)0789725576 Upgrading and Repairing Networks (3rd Edition)0789725673 Special Edition Using Enterprise JavaBeans (EJB) 2.00789726270 Special Edition Using Microsoft® Windows XP, Home Edition0789726289 Special Edition Using Windows XP Professional078972667X Special Edition Using Macromedia Director 8.5 (With CD-ROM)0789726769 C++ by Example0789727277 Special Edition Using Adobe GoLive 60789727609 Special Edition Using Adobe Photoshop 70789727625 Special Edition Using Macromedia Flash MX0789727633 Special Edition Using Microsoft Commerce Server 20020789727730 MCSE Training Guide (70 270): Windows XP Professional (With CD-ROM)0789727900 Platinum Edition Using Microsoft Windows XP0789728001 Upgrading and Repairing Laptop Computers078972801X CISSP Training Guide0789728192 MCAD/MCSD Training Guide (70-306): Developing and Implementing Windows-Based Applications with Visual Basic.NET and Visual Studio.NET0789728206 MCAD/MCSD Training Guide (70-310): Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework0789728214 Sun Certification Training Guide (310-080): Java 2 Enterprise Edition (J2EE) Web Component Developer0789728249 MCAD/MCSD Training Guide (70-320): Developing XML Web Services and Server Components with Visual C# .NET and the .NET Framework0789728303 Network+ Training Guide0789728362 Security+ Training Guide0789728613 Java 2 Programmer Exam Cram (310-035)0789728621 Java 2 Enterprise Edition (J2EE) Web Component Developer Exam Cram 2 (Exam Cram 310-080)078972863X MCSE Windows 2000 Network Infrastructure Exam Cram 2 (Exam Cram 70-216)0789728648 MCSE Windows 2000 Active Directory Services Design Exam Cram 2 (Exam Cram 70-219)0789728656 Network+ Exam Cram 2 (Exam Cram N10-002)0789728664 MCSA Managing a Windows 2000 Network Environment Exam Cram 2 (Exam Cram 70-218)0789728672 A+ Exam Cram 2 (Exam Cram 220-221, Exam Cram 220-222)0789728680 Solaris 8 System Administrator Exam Cram 2 (Exam CX-310-011 and CX-310-012)0789728699 Solaris 9 System Administrator Exam Cram 2 (Exam Cram 310-014, Exam Cram 310-015)0789728702 Solaris 9 Network Administration Exam Cram 2 (Exam Cram CX-310-044)0789728710 MCSE Windows 2000 Active Directory Services Infrastructure Exam Cram 2 (Exam 70-217)0789728729 MCSE Windows 2000 Professional Exam Cram 2 (Exam Cram 70-210)0789728737 MCSE Windows 2000 Server Exam Cram 2 (Exam Cram 70-215)0789728745 MCSE Windows XP Professional Exam Cram 2 (Exam Cram 70-270)0789728788 MCSE/MCSA Training Guide (70-216): Windows 2000 Network Infrastructure, Second Edition0789728818 MCSE/MCSA Training Guide, Second Edition (70-215): Windows 2000 Server0789728826 Special Edition Using Microsoft CRM0789728974 MCAD Developing XML Web Services and Server Components with Visual C# .NET and the .NET Framework Exam Cram 2 (Exam Cram 70-320)0789728982 MCAD Developing and Implementing Web Applications with Microsoft Visual Basic .NET and Microsoft Visual Studio .NET Exam Cram 2 (Exam Cram 70-305)0789728990 MCAD Developing and Implementing Windows-based Applications with Microsoft Visual Basic .NET and Microsoft Visual Studio .NET Exam Cram 2 (Exam Cram 70-306)0789729008 MCAD Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework Exam Cram 2 (Exam Cram 70-310)0789729016 MCAD Developing and Implementing Web Applications with Microsoft Visual C# .NET and Microsoft Visual Studio .NET Exam Cram 2 (Exam Cram 70-315)0789729105 Security+ Exam Cram 2 (Exam Cram SYO-101)0789729466 MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment Exam Cram 2 (Exam Cram 70-290)0789729482 MCSA/MCSE 70-291 Training Guide: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure0789729504 MCSE Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure Exam Cram 2 (Exam Cram 70-294)0789729512 MCSA/MCSE Implementing and Administering Security in a Windows 2000 Network Exam Cram 2 (Exam Cram 70-214)0789729520 Special Edition Using Microsoft Office Access 20030789729539 Special Edition Using Microsoft Office Excel 20030789729547 Special Edition Using Office Microsoft FrontPage 20030789729555 Special Edition Using Microsoft Office 20030789729563 Special Edition Using Microsoft Office Outlook 2003078972958X Special Edition Using Microsoft Word 110789729725 Easy CDs & DVDs0789729741 Upgrading and Repairing PCs, 15th Edition0789729792 Novell's CNE Update to NetWare 6 Study Guide0789729911 CCNP BCMSN Exam Cram 2 (642-811), Second Edition078972992X Java 2 Developer Exam Cram 2 (Exam Cram CX-310-252A and CX-310-027)0789729970 MCDBA, MCSE, MCSD, MCAD Training Guide (70-229): SQL Server 2000 Database Design and Implementation0789730111 MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment Exam Cram 2 (Exam Cram 70-292)078973012X MCSE Planning and Maintaining a Windows Server 2003 Network Infrastructure Exam Cram 2 (Exam Cram 70-293)0789730170 Cisco BSCI Exam Cram 2 (Exam Cram 642-801)0789730200 CCNP BCRAN Exam Cram 20789730219 CCNP CIT Exam Cram 2 (642-831)0789730235 CCSP CSPFA Exam Cram 2 (Exam Cram 642-521)0789730243 CCSP CSI Exam Cram 2 (9E0-131)0789730251 CCSP SECUR Exam Cram 2 (642-501)078973026X CCSP CSVPN Exam Cram 2 (Exam Cram 642-511)0789730367 Easy Microsoft Windows XP Home Edition, Second Edition0789730375 PMP Exam Cram 2156830370X Adobe® PageMaker® 6.5 Classroom in a Book1568304676 Adobe Premiere 5.0 Classroom in a Book157870085X Solaris 2.6 Administrator Certification Training Guide, Part 11578702496 Solaris 7 Administrator Certification Training Guide: Part I and Part II1578702615 Solaris 8 Network Administrator Training Guide (With CD-ROM)1587050609 Developing Cisco IP Phone Services: A Cisco AVVID Solution1587130173 High Availability Network Fundamentals (With CD-ROM)1587200333 Cisco CID Exam Certification Guide1587200538 CCIE Routing and Switching Exam Certification Guide1587200554 Cisco CCNA Exam #640-607 Certification Guide (3rd Edition)1587200767 CCDA Exam Certification Guide (CCDA Self-Study, 640-861), Second Edition1587200775 CCNP BCMSN Exam Certification Guide (CCNP Self-Study, 642-811), Second Edition1587200783 CCNP BSCI Exam Certification Guide (CCNP Self-Study), Second Edition158720083X CCNA ICND Exam Certification Guide (CCNA Self-Study, 640-811, 640-801), Fourth Edition0735711291 MCAD/MCSD/MCSE Training Guide (70-229): SQL Server 2000 Database Design and Implementation0735711534 Fireworks MX Fundamentals===================================================================================================ftp://ftp.netz.ru/Books/
ftp://130.133.1.100/doc/
ftp://ftp2.trainingtools.com/
ftp://195.161.102.62/pub/books/
ftp://213.131.9.205/ftp/Polosko/
ftp://202.96.64.158/pub/
ftp://195.135.232.80/Books/===================================================================================================http://dlc.pconline.com.cn/list.jsp?dltypeid=6&kindid=1001 [MCSE exams]===================================================================================================http://www.vbforums.com/
http://www.excelforum.com/===================================================================================================http://www.winxpfix.com/page15.htm
http://www.tweakxp.com/
http://www.tipsdr.com/
http://www.greenhorntutor.com/
http://www.blackviper.com/WinXP/service411.htm
http://www.theexceladdict.com/
http://www.exceltip.com/===================================================================================================http://219.139.240.53/itebook/OReilly%20-%20-Dinamic%20HTML%20-%20The%20Definitive%20Reference.2ed.chm
http://219.139.240.53/itebook/OReilly%20-%20ActionScript%20Cookbook%20-%202003.chm
http://219.139.240.53/itebook/OReilly%20-%20Building%20Embedded%20Linux%20Systems.chm
http://219.139.240.53/itebook/OReilly%20-%20building%20secure%20servers%20with%20linux.chm
http://219.139.240.53/itebook/OReilly%20-%20C%20Sharp%20Language%20Pocket%20Reference.chm
http://219.139.240.53/itebook/OReilly%20-%20Cisco%20Cookbook.chm
http://219.139.240.53/itebook/OReilly%20-%20Dreamweaver%20MX%202004.The%20Missing%20Manual.chm
http://219.139.240.53/itebook/OReilly%20-%20Java%20Enterprise%20Best%20Practices.chm
http://219.139.240.53/itebook/OReilly%20-%20Java%20Servlet%20Programming%202nd.chm
http://219.139.240.53/itebook/OReilly%20-%20Kerberos%20-%20The%20Definitive%20Guide%20-%202003.chm
http://219.139.240.53/itebook/OReilly%20-%20Learning%20XML%202ed.chm
http://219.139.240.53/itebook/OReilly%20-%20Learning.Java.2ndEd.chm
http://219.139.240.53/itebook/OReilly%20-%20linux%20security%20cookbook.chm
http://219.139.240.53/itebook/OReilly%20-%20Linux%20Server%20Hacks,%202003.chm
http://219.139.240.53/itebook/OReilly%20-%20Linux%20Unwired.chm
http://219.139.240.53/itebook/OReilly%20-%20MySQL%20Pocket%20Reference.chm
http://219.139.240.53/itebook/OReilly%20-%20Perl%20CD%20Bookshelf,%20Version%204.0%20(2004)%20[0596006225].chm
http://219.139.240.53/itebook/OReilly%20-%20PHP%20Pocket%20Reference%20-%202nd%20Edition.chm
http://219.139.240.53/itebook/OReilly%20-%20practical%20unix%20&%20internet%20security,%203rd%20edition.chm
http://219.139.240.53/itebook/OReilly%20-%20Programming%20Embedded%20Systems%20in%20C%20and%20C++.chm
http://219.139.240.53/itebook/OReilly%20-%20Python%20Cookbook.chm
http://219.139.240.53/itebook/OReilly%20-%20Python%20Programming%20on%20Win32.chm
http://219.139.240.53/itebook/OReilly%20-%20Python%20Standard%20Library.chm
http://219.139.240.53/itebook/OReilly%20-%20Secure%20Coding.%20Principles%20and%20Practices.chm
http://219.139.240.53/itebook/OReilly%20-%20Sendmail.3rd.Edition.chm
http://219.139.240.53/itebook/OReilly%20-%20VBScript%20In%20Nutshell%20(CHM).chm
http://219.139.240.53/itebook/OReilly%20-%20Visual%20Basic%20Shell%20Programming.chm
http://219.139.240.53/itebook/OReilly%20-%20XML%20in%20a%20Nutshell%20(2nd%20Edition%20-%202002).chm
http://219.139.240.53/itebook/OReilly%20BLAST.chm
http://219.139.240.53/itebook/OReilly%20C%20Pocket%20Reference.chm
http://219.139.240.53/itebook/OReilly%20Learning%20the%20KORN%20Shell.chm
http://219.139.240.53/itebook/OReilly%20Mastering%20Oracle%20SQL.chm
http://219.139.240.53/itebook/OReilly%20Practical%20UNIX%20and%20Internet%20Security.chm
http://219.139.240.53/itebook/OReilly%20Tomcat%20-%20The%20Definitive%20Guide%20(2003)%20LiB.chm
http://219.139.240.53/itebook/OReilly-Malicious%20Mobile%20Code%20Virus%20Protection%20for%20Windows.chm
http://219.139.240.53/itebook/OReilly-Transact.Sql.Cookbook.chm
http://219.139.240.53/itebook/OReilly-Using%20Samba(0-56592-449-5).chm
http://219.139.240.53/itebook/OReilly.Access.Cookbook.Second.Edition.chm
http://219.139.240.53/itebook/OReilly.ADO.Dot.NET.Cookbook.chm
http://219.139.240.53/itebook/OReilly.ADO.Dot.Net.In.A.Nutshell.chm
http://219.139.240.53/itebook/OReilly.Amazon.Hacks.chm
http://219.139.240.53/itebook/OReilly.Apache.Cookbook.chm
http://219.139.240.53/itebook/OReilly.AppleScript.The.Definitive.Guide.chm
http://219.139.240.53/itebook/OReilly.ASP.Dot.NET.In.A.Nutshell.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.Cascading.Style.Sheets.The.Definitive.Guide.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.Cpp.In.A.Nutshell.chm
http://219.139.240.53/itebook/OReilly.CSharp.Cookbook.chm
http://219.139.240.53/itebook/OReilly.DNS.On.Windows.Server.2003.chm
http://219.139.240.53/itebook/OReilly.Dot.NET.Framework.Essentials.3rd.Edition.chm
http://219.139.240.53/itebook/OReilly.Dot.NET.Windows.Forms.In.A.Nutshell.chm
http://219.139.240.53/itebook/OReilly.eBay.Hacks.chm
http://219.139.240.53/itebook/OReilly.Eclipse.A.Java.Developers.Guide.chm
http://219.139.240.53/itebook/OReilly.ESSENTIAL.CVS.chm
http://219.139.240.53/itebook/OReilly.Excel.Hacks.chm
http://219.139.240.53/itebook/OReilly.Hardcore.Java.chm
http://219.139.240.53/itebook/OReilly.HTML.And.XHTML.The.Definitive.Guide.5th.Edition.chm
http://219.139.240.53/itebook/OReilly.J2EE.Design.Patterns.chm
http://219.139.240.53/itebook/OReilly.Java.Data.Objects.chm
http://219.139.240.53/itebook/OReilly.Java.Database.Best.Practices.chm
http://219.139.240.53/itebook/OReilly.Java.Examples.In.A.Nutshell.3rd.EditioneBook.chm
http://219.139.240.53/itebook/OReilly.Java.Extreme.Programming.Cookbook.chm
http://219.139.240.53/itebook/OReilly.Java.Performance.Tuning.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.Java.Server.Pages.3rd.Edition.chm
http://219.139.240.53/itebook/OReilly.Java.Servlet.And.JSP.Cookbook.chm
http://219.139.240.53/itebook/OReilly.JavaScript.Pocket.Reference.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.JavaServer.Faces.chm
http://219.139.240.53/itebook/OReilly.Learning.Perl.Objects.References.And.Modules.chm
http://219.139.240.53/itebook/OReilly.Learning.Python.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.Learning.UML.chm
http://219.139.240.53/itebook/OReilly.Learning.Unix.For.Mac.OS.X.Panther.chm
http://219.139.240.53/itebook/OReilly.Learning.Visual.Basic.Dot.Net.chm
http://219.139.240.53/itebook/OReilly.Learning.XML.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.Learning.XSLT.chm
http://219.139.240.53/itebook/OReilly.Linux.Security.Cookbook.chm
http://219.139.240.53/itebook/OReilly.Linux.Server.Hacks.chm
http://219.139.240.53/itebook/OReilly.Mac.OS.X.In.A.Nutshell.chm
http://219.139.240.53/itebook/OReilly.Mac.OS.X.The.Missing.Manual.Panther.Edition.chm
http://219.139.240.53/itebook/OReilly.Mac.OS.X.Unwired.chm
http://219.139.240.53/itebook/OReilly.Managing.The.Windows.2000.Registry.chm
http://219.139.240.53/itebook/OReilly.Mastering.Oracle.SQL.chm
http://219.139.240.53/itebook/OReilly.Mastering.Perl.For.Bioinformatics.chm
http://219.139.240.53/itebook/OReilly.Mastering.Regular.Expressions.2nd.Edition.eBook-FOS.chm
http://219.139.240.53/itebook/OReilly.Mastering.Visual.Studio.Dot.NET.chm
http://219.139.240.53/itebook/OReilly.Network.Security.Assessment.chm
http://219.139.240.53/itebook/OReilly.Network.Security.Hacks.chm
http://219.139.240.53/itebook/OReilly.Oracle.Essentials.Oracle.Database.10g.3rd.Edition.chm
http://219.139.240.53/itebook/OReilly.Oracle.PL.SQL.Language.Pocket.Reference.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.Oracle.Regular.Expressions.Pocket.Reference.chm
http://219.139.240.53/itebook/OReilly.PC.Hardware.In.A.Nutshell.3rd.Edition.chm
http://219.139.240.53/itebook/OReilly.Perl.6.Essentials.chm
http://219.139.240.53/itebook/OReilly.Perl.Cookbook.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.Perl.Template.Toolkit.chm
http://219.139.240.53/itebook/OReilly.Postfix.The.Definitive.Guide.chm
http://219.139.240.53/itebook/OReilly.Practical.Mod.Perl.chm
http://219.139.240.53/itebook/OReilly.Practical.RDF.chm
http://219.139.240.53/itebook/OReilly.Programming.ASP.Dot.NET.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.Programming.Dot.NET.Security.chm
http://219.139.240.53/itebook/OReilly.Programming.Dot.NET.Windows.Applications.chm
http://219.139.240.53/itebook/OReilly.PROGRAMMING.VISUAL.BASIC.DOT.NET.2ND.EDITION.chm
http://219.139.240.53/itebook/OReilly.ProgrammingColdFusionMX.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.Python.In.A.Nutshell.2003-CHM.chm
http://219.139.240.53/itebook/OReilly.RADIUS.chm
http://219.139.240.53/itebook/OReilly.Regular.Expression.Pocket.Reference.chm
http://219.139.240.53/itebook/OReilly.RELAX.NG.chm
http://219.139.240.53/itebook/OReilly.Secure.Programming.Cookbook.For.C.And.Cpp.chm
http://219.139.240.53/itebook/OReilly.Security.Warrior.chm
http://219.139.240.53/itebook/OReilly.Sendmail.Cookbook.chm
http://219.139.240.53/itebook/OReilly.Spidering.Hacks.chm
http://219.139.240.53/itebook/OReilly.SQL.Tuning.chm
http://219.139.240.53/itebook/OReilly.Squid.The.Definitive.Guide.chm
http://219.139.240.53/itebook/OReilly.Transact.Sql.Cookbook.chm
http://219.139.240.53/itebook/OReilly.VBScript.In.A.Nutshell.2nd.Edition.chm
http://219.139.240.53/itebook/OReilly.WebLogic.The.Definitive.Guide.chm
http://219.139.240.53/itebook/OReilly.Windows.Server.2003.In.A.Nutshell.chm
http://219.139.240.53/itebook/OReilly.Windows.Server.Hacks.chm
http://219.139.240.53/itebook/OReilly.Windows.XP.Hacks.chm
http://219.139.240.53/itebook/OReilly.Windows.XP.Pro.The.Missing.Manual.chm
http://219.139.240.53/itebook/OReilly.Windows.XP.Unwired.chm
http://219.139.240.53/itebook/OReilly.Wireless.Hacks.chm
http://219.139.240.53/itebook/OReilly_Mastering%20Visual%20Studio%20.NE.chm===================================================================================================http://www.almaktba.com/index.php?cid=139
http://list4test.com/members_tako/tech/lughat_alC.zip [Arabic Book]
http://list4test.com/tako/tec/pro/cpp.zip [Arabic Book]
http://list4test.com/tako/tec/pro/pro_assemply_part2_arabic.zip [Arabic Book]
http://list4test.com/tako/tec/pro/PROG_barmajah_gharaziah.zip [Arabic Book]
http://list4test.com/tako/tec/pro/PROG_win32api.zip [Arabic Book]
http://list4test.com/tako/tec/pro/PROGE_JavaScriptCourse_E.zip [Arabic Book]
http://list4test.com/tako/tec/pro/PROGE_Visual_E.zip [Arabic Book]
http://list4test.com/tako/tec/pro/pro_abo_program.zip [Arabic Book]
http://list4test.com/tako/tec/pro/pro_directx7_albdayahwalnhaya.zip [Arabic Book]
http://list4test.com/tako/tec/pro/PROG_learnphp_easy.zip [Arabic Book]
http://list4test.com/tako/tec/pro/PROGE_Java_E.zip [Arabic Book]
http://list4test.com/tako/tec/pro/PROGE_laern_perl_E.zip [Arabic Book]
http://list4test.com/members_tako/tech/tech_vb_liljami.zip [Arabic Book]
http://list4test.com/tako/tec/pro/pro_membersarea.zip [Arabic Book]
http://list4test.com/tako/tec/com/tjzeat_alkors_alsalb.zip [Arabic Book]
http://list4test.com/tako/tec/com/com_mashakel_badaltashghil.zip [Arabic Book]
http://list4test.com/tako/tec/com/COM_ASBAB_BOTALJEHAZ.zip [Arabic Book]
http://list4test.com/tako/tec/com/COME_harddisk2_E.zip [Arabic Book]
http://list4test.com/members_tako/tech/tech_tajmiwasyna_alhasebalali.zip [Arabic Book]
http://list4test.com/tako/tec/com/com_cp_coomands.zip [Arabic Book]
http://list4test.com/tako/tec/com/com_talam_al_cp.zip [Arabic Book]
http://list4test.com/members_tako/tech/Dos_arabic.zip [Arabic Book]
http://list4test.com/tako/tec/com/com_ekhtsarat_keyboard.zip [Arabic Book]
http://list4test.com/tako/tec/com/com_aarabic_linuxguide.zip [Arabic Book]
http://list4test.com/tako/tec/com/COME_dos_E.zip [Arabic Book]
http://list4test.com/members_tako/tech/tech_winxparabic.zip [Arabic Book]
http://list4test.com/tako/tec/com/com_hyallawhatul.zip [Arabic Book]
http://list4test.com/tako/tec/ent/ent_ftpprotocol.zip [Arabic Book]
http://list4test.com/tako/tec/ent/ENT_learn_navogator.zip [Arabic Book]
http://list4test.com/tako/tec/ent/ent_html.zip [Arabic Book]
http://list4test.com/tako/tec/mix/harakt.zip [Arabic Book]
http://list4test.com/tako/tec/mix/MIX_altejarah_alelktronyah_mata.zip [Arabic Book]
http://list4test.com/members_tako/tech/tech_SQL.zip [Arabic Book]
http://list4test.com/tako/tec/mix/nokat_tahawl_fitarikh.zip [Arabic Book]
http://list4test.com/tako/tec/mix/MIX_Hack_n_secur_AR.zip [Arabic Book]
http://list4test.com/tako/tec/mix/MIXE_330javatips_E.zip [Arabic Book]
http://list4test.com/tako/tec/mix/MIXE_MAIL_HIST_E.zip [Arabic Book]
http://list4test.com/members_tako/tech/tech_AffMasters.zip [Arabic Book]
http://list4test.com/members_tako/tech/actionSCRIPT.zip [Arabic Book]
http://list4test.com/tako/tec/mix/MIX_alaselah_alaksar_shoyuan_linux.zip [Arabic Book]
http://list4test.com/tako/tec/mix/MIX_muzakerat_alshabkat.zip [Arabic Book]
http://list4test.com/tako/tec/mix/MIXE_hack_reges_E.zip [Arabic Book]
http://list4test.com/tako/tec/mix/mix_albramejakhabisah.zip [Arabic Book]
http://list4test.com/tako/tec/pro/PROGE_VBNET4ASPNET_E.zip [Arabic Book]
http://lazurus.shacknet.nu:8000/O%27Reilly%20Refrence%20Library/index.htm
http://download.xdrive.com/s/370921074aDfMe4tSJVCHKSZxjd1&partner=plus
http://lazurus.shacknet.nu:8000/motbible.txt
http://lazurus.shacknet.nu:8000/utt/index.htm
http://lazurus.shacknet.nu:8000/itb/index.htm
http://lazurus.shacknet.nu:8000/docs.rinet.ru/index.html
http://www.ccxx.net/books/Cisco%20Press%20CCNA%20ICND%202004+.pdf
http://lazurus.shacknet.nu:8000/HUGECELL_TXT.htm
http://lazurus.shacknet.nu:8000/SIDs.txt
http://rahmat.zikri.com/books.html
http://bxteam.org/knjige.php
http://www.adobeevangelists.com/
http://kyberia.sk/kbase/
http://www.net130.com/ccna/
www.dhruvaraj.com
http://www.yaxoo.com/Books/
http://books.pdox.net/
http://www.msfirewall.org/
http://tinyurl.com/352gd
http://files3.webfile.ru/get/2099591332/John.Wiley.and.Sons.AutoCAD.2005.rar
http://www.we-r-here.com/cad/
http://www.geocities.com/wwwwarezbborg/E-Books/
http://books.pdox.net/Computers/
http://www.ebookcn.net/
http://www.click-now.net/ebooks.htm
http://www.free-ebooks.net/
http://www.nerd-star.com/books/
http://books.malonus.com/ebooks/computer_science/Apache/
http://books.malonus.com/ebooks/computer_science/OpenBSD/
http://books.malonus.com/ebooks/computer_science/Programing/
http://books.malonus.com/ebooks/computer_science/cisco/
http://books.malonus.com/ebooks/computer_science/crypthography/
http://books.malonus.com/ebooks/computer_science/dvd/
http://books.malonus.com/ebooks/computer_science/hacking_cracking/
http://books.malonus.com/ebooks/computer_science/linux/
http://books.malonus.com/ebooks/computer_science/networking/
http://books.malonus.com/ebooks/computer_science/security/
http://books.malonus.com/ebooks/computer_science/xml/
http://www.lubsecurity.org/
http://hellnet.perverz.hu/ebookz/
http://www.ex0dus.org/downloads/EBooks/
http://s87305863.onlinehome.us/download.html
http://202.41.85.117/~praveen/downloads/
http://hellnet.perverz.hu/ebookz/Adobe/
http://bookshelf.sleepnet.net/files/
http://argos.observatorio.unal.edu.co/virtual/books/
http://www.nr.cc.va.us/eaton/new-horizons/pages/guidedtour.htm
http://www.itcertifer.com/
http://www.itcertifer.com/download/default.asp
http://web.1asphost.com/justdreamsite/books.html
http://www.mcu.cz/atm/index.php
http://books.dimka.ee/
http://www.qodbc.com.au/downloads.htm
http://voodoo.mcomm.ru/Archive/Books/
http://hongphuc.homeip.net/home/upload/index.php?direction=0&order=&directory=Ebook
http://market.renderosity.com/index.ez?Form.sess_id=19272991&Form.sess_key=1095526980
http://www.planet-source-code.com/
http://dragon.rulez.cz/e-buk/
http://www.learnvisualstudio.net/
http://www.ya-q8.com/download.php?action=list&cat_id=11&s=
http://sudhirmangla.i6networks.com/dotnet/books.htm
http://www.narada.nl/
http://lazurus.shacknet.nu:8000/itb/index.htm
http://lazurus.shacknet.nu:8000/utt/index.htm
http://lazurus.shacknet.nu:8000/O%27Reilly%20Refrence%20Library/index.htm
http://lazurus.shacknet.nu:8000/docs.rinet.ru/index.html
http://babis.homeip.net/computers/
http://www.gylka.com.ua/books/John%20Wiley%20&%20Sons%20-%20Adobe%20Premiere%20Pro%20Bible.rar
http://www.shteker.com/sasa/World_Atlas.pdf
http://www.davehilla.com/ebooks/
http://66.194.238.238/~avaxhome/download/5/New.Riders.3ds.MAX.6.Fundamentals.eBook-LiB.chm
http://jztele.com/~coldice/book/net/
http://www.et.utt.ro/public/Docs/
http://cisco.cumt.edu.cn/ciscodown/en_CCNA1_v31.zip
http://cisco.cumt.edu.cn/ciscodown/en_CCNA2_v31.zip
http://cisco.cumt.edu.cn/ciscodown/en_CCNA3_v31.zip
http://cisco.cumt.edu.cn/ciscodown/en_CCNA4_v31.zip
http://s6.yousendit.com/d.aspx?id=C6244ED072216A978C0322776D4311DC
http://www.adobe.com/education/pdf/cib/encore/encore_cib_gs.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_01.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_02.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_03.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_04.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_05.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_06.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_07.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_08.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_09.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_10.pdfhttp://www.adobe.com/education/pdf/cib/encore/encore_cib_11.pdf
http://www.adobe.com/education/pdf/cib/ae6/ae6_cib_gs.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_01.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_02.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_03.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_04.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_05.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_06.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_07.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_08.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_09.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_10.pdfhttp://www.adobe.com/education/pdf/cib/ae6/ae6_cib_11.pdf
http://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_gs.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_tour.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_01.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_02.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_03.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_04.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_05.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_06.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_07.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_08.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_09.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_10.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_11.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_12.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_13.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_14.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_15.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_16.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_17.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_18.pdfhttp://www.adobe.com/education/pdf/cib/ill_cs/ill_cs_cib_19.pdf
http://www.adobe.com/education/pdf/cib/prempro/prempro_cib_gs.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_dv.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_tour.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_01.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_02.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_03.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_04.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_05.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_06.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_07.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_08.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_09.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_10.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_11.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_12.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_13.pdfhttp://www.adobe.com/education/pdf/cib/prempro/prempro_cib_14.pdf
http://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_gs.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_tour.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_01.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_02.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_03.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_04.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_05.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_06.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_07.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_08.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_09.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_10.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_11.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_12.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_13.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_14.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_15.pdfhttp://www.adobe.com/education/pdf/cib/idcs/id_cs_cib_vc.pdf
http://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_gs.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_01.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_02.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_03.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_04.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_05.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_06.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_07.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_08.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_09.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_10.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_11.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_12.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_13.pdfhttp://www.adobe.com/education/pdf/cib/glcs/gl_cs_cib_vc.pdf
http://www.adobe.com/education/pdf/cib/acro6/acro6_cib_gs.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_01.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_02.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_03w.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_03m.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_04.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_05.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_06.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_07.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_08.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_09.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_10.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_11.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_12.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_13.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_14.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_15.pdfhttp://www.adobe.com/education/pdf/cib/acro6/acro6_cib_16.pdf
http://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cibgs.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib_tour.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib01.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib02.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib03.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib04.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib05.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib06.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib07.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib08.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib09.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib10.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib11.pdfhttp://www.adobe.com/education/pdf/cib/pre65_cib/pre65_cib12.pdf
http://download.adobe.com/pub/adobe/magic/audition/win/2.02/audition_user_guide.pdf===================================================================================================Total Training for Photoshop 7.0 - (9 CDs)1- Download "BitTorrent" from (http://bitconjurer.org/BitTorrent/download.html).Install CD 310.4 Mbhttp://66.90.75.92/suprnova//torrents/1733/Total%20Training%20for%20Photoshop%207%20-%20Install%20CD(6).torrentCD1 667.7 Mbhttp://66.90.75.92/suprnova//torrents/1750/Total%20Training%20for%20Photoshop%207%20-%20CD%201%20of%208(2).torrentCD2 673.2 Mbhttp://66.90.75.92/suprnova//torrents/1750/Total%20Training%20for%20Photoshop%207%20-%20CD%202%20of%208(3).torrentCD3 725.7 Mbhttp://66.90.75.92/suprnova//torrents/1739/Total%20Training%20for%20Photoshop%207%20-%20CD%203%20of%208(2).torrentCD4 686.4 Mbhttp://66.90.75.92/suprnova//torrents/1706/Total%20Training%20for%20Photoshop%207%20-%20CD%204%20of%208(2).torrentCD5 295.1 Mbhttp://66.90.75.92/suprnova//torrents/1703/Total%20Training%20for%20Photoshop%207%20-%20CD%205%20of%208(3).torrentCD6 711.1 Mbhttp://66.90.75.92/suprnova//torrents/1697/Total%20Training%20for%20Photoshop%207%20-%20CD%206%20of%208(2).torrentCD7 706.2 Mbhttp://66.90.75.92/suprnova//torrents/1697/Total%20Training%20For%20Photoshop%207%20-%20CD%207%20of%208(3).torrentCD8 319.5 Mbhttp://66.90.75.92/suprnova//torrents/1697/Total%20Training%20for%20Photoshop%207%20-%20CD%208%20of%208(2).torrent
===================================================================================================
New Updates:------------------
http://www.ebook.singcat.com/Ebook/
http://rtfm.rdslink.ro/Books/
http://books.baubas.net/
ftp://195.222.134.71/Bookz/Other/
http://bad.zazone.net/flash%20tutors/
http://harry.studentenweb.org/hackerinfo/
http://61.129.70.16/~shengjun/
http://alexander.pmf.ukim.edu.mk/predmeti/is/chitanje/
http://www.srdc.metu.edu.tr/~yavuz/Ceng490/resources/
http://examen.tazmanonline.nl/mcse/
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/ [all about Cisco]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/CCIE/ [CCIE books]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/CCIP/ [CCIP books]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/CCSP/ [CCSP books]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/CISCO%20IP%20TELEPHONY/ [CISCO IP telephony]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/MPLS/ [MPLS books]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/QOS/ [QOS books]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/Simulation/ [many simulations]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/TELEPHONY%20SPECIALIZATION/ [telephony specializations books]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/bccran/ [BCCRAN books]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/ccnpdoc/ [CCNP books]
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/password_recovery/ [password recovery books]
http://ftp.cdut.edu.cn/pub3/uncate_doc/Network/
http://www.viacom.com.br/~silici0/
http://ftp.cdut.edu.cn/pub3/uncate_doc/ [alllllllllllllllllllllllllllllllllll Oreilly books]
http://ftp.cdut.edu.cn/pub3/uncate_doc/Programming/ [programming books]
http://ftp.cdut.edu.cn/pub3/uncate_doc/Misc/The_Code-Linux/ [The code Linux]
http://ftp.cdut.edu.cn/ [download many operating systems]
http://jztele.com/~coldice/book/
http://www.hackemate.com.ar/textos/Nsa/
http://newsroom.cisco.com/dlls/tln/exec_team/powell/pdf/
http://www.uni-konstanz.de/RZ/wlan/ipsec/software/
https://rsvj.ath.cx/documentation/Networking/Cisco/
https://rsvj.ath.cx/documentation/Networking/courses/Animated/
https://rsvj.ath.cx/documentation/
http://www.hackemate.com.ar/textos/Nsa/
http://hysteria.sk/redtime/books/
http://ftp.ux0.de/pub/network/Cisco/multicast/tutorial/
http://mankmok.sdf-eu.org/dotNet/
http://ftp3.cdut.edu.cn/
http://sparcs.kaist.ac.kr/~force/archive/Books/
http://www.davehilla.com/ebooks/
http://0xf47a.afraid.org/docs-n-ebooks/
http://people.arcada.fi/~sinnc/
http://www.u-n-f.com/books/archive/
http://www.greenandwhite.net/~kkip/Coursework%20Project/
http://docs.cafe-philo.net/
http://www.csie.ntu.edu.tw/~piaip/docs/
http://www.blacksheepnetworks.com/security [Hacking and Security]
http://www.blacksheepnetworks.com/security/hack/ [Hacking and Security]
http://marathon.csee.usf.edu/~kwb/nsf-ufe/ [Hacking and Security]
http://www.net.ohio-state.edu/security/talks/199x/199x_state-of-the-hack/ [Hacking and Security]
http://www.linux-france.org/prj/inetdoc/telechargement/ [Hacking and Security]
http://www.telematik.informatik.uni-karlsruhe.de/lehre/seminare/LinuxSem/downloads/netfilter/?C=S;O=A [Hacking and Security]
http://www.microalcarria.com/descargas/documentos/Wireless/ [Hacking and Security]
http://www.ifi.uio.no/doc/ [Hacking and Security]
http://www.anakata.hack.se/files/ [Hacking and Security]
http://www.planetpdf.com/mainpage.asp?webpageid=2365 [Hacking and Security]
http://opensees.berkeley.edu/OpenSees/?C=M;O=A [Hacking and Security]
http://linux.ucla.edu/~dap24/libdbi/ [Hacking and Security]
http://www.moreilly.com/CISSP/ [Hacking and Security]
http://www.networkcommand.com/docs/ [Hacking and Security]
http://fringe.davesource.com/Fringe/Hacking/ [Hacking and Security]
http://adsl.cutw.net/ [Hacking and Security]
http://bokeoa.com/~core/files/ [Hacking and Security]
http://jztele.com/~coldice/ [Hacking and Security]
http://jinshi.homelinux.net/Docs/computer/ [Hacking and Security]
http://www.c-lab.de/java/ [Java Books]
http://books.pdox.net/Computers/ [Java Books]
http://xarch.tu-graz.ac.at/autocad/stdlib/ [Java Books]
http://haje.kaist.ac.kr/~oedalpha/tips/ [Java Books]
http://hspf.com/pub/java/ [Java Books]
http://acm2.ustc.edu.cn/~roger/files/ [Java Books]
http://mediamaniac.dyndns.org/Downloads/BUECHER/ [Java Books]
http://www.cs.wustl.edu/~schmidt/PDF/ [Java Books]
http://www.mirrors.wiretapped.net/security/cryptography/apps/ssh/Java/sshtools/ [Java Books]
http://www.arts-festival.com/ [Java Books]
http://www.ibiblio.org/pub/Linux/docs/HOWTO/translations/it/pdf/ [Java Books]
http://books.malonus.com/ebooks/computer_science/security/
http://ftp.interlegis.gov.br/pub/interlegis/SIT/cisco/DOCUMENTS_BGP_SECURITY_SWICTHCONF_IOS_REFERENCE_DESIGN/
http://lorien.s2s.msu.ru/pub/docs/
http://www.elo.utfsm.cl/~respaldo/
http://www.thelawlers.com/essays.html
http://www.wz2k.co.uk/pages/downloads/downloads-index.php?uploadCat=Photoshop%20Video#top [Photoshop Videos]
http://www.psdland.com:8080/zwaed/kotb/index.php [excellent arabic tutorial site]
http://www.sudanixpro.net/bookz/Super.XP.Tweaking.Guide.rar
http://www.eit.ihk-edu.dk/0803/Aoopi/MS%20press%20-%20Microsoft.NET%20Remoting.pdf
http://www.mansoorbinsaeed.com/docs/how%20to/=============================================================================
Magazines:--------------
PC Magazine - Nov-02-04http://imgs.zinio.com/magazines/200062/64746857.zno
Popular Science - Oct-04;http://imgs.zinio.com/magazines/330042/62028585.zno
Electronic Gaming Monthly - Dec-04; http://imgs.zinio.com/magazines/6505574/66699811.zno
Personal Computer World - Nov-04; http://imgs.zinio.com/magazines/52054981/63547757.zno
Computer Gaming World - Nov-04; http://imgs.zinio.com/magazines/6502696/62416507.zno
Better Software - Oct-04; http://images.zinio.com/magazines/11151027/63927244.zno
Internet Works - Nov-04; http://imgs.zinio.com/magazines/35712781/63770444.zno
CIO Insight - Oct-04;http://images.zinio.com/magazines/6949638/64255793.zno
Digital Camera World - Nov-04; http://imgs.zinio.com/magazines/6459963/66764346.zno
Talk Middle East - Oct-04; http://imgs.zinio.com/magazines/36182943/63971469.zno
Laptop Magazine - Sep-04; http://imgs.zinio.com/magazines/35710241/59722114.zno
Microsoft Windows XP - Dec-04; http://imgs.zinio.com/magazines/2110680/64681181.zno
PC Answers - Nov-04;http://imgs.zinio.com/magazines/6459960/64627777.zno
CosmoGIRL - Oct-04;http://imgs.zinio.com/magazines/48965789/61844047.zno
Seventeen - Nov-04;http://imgs.zinio.com/magazines/6391719/63936877.zno
Mobile PC - Nov-04;http://imgs.zinio.com/magazines/45243363/66706030.zno
PC Magazine (UK) - Sep-04; http://imgs.zinio.com/magazines/1828690/63600271.zno
Dynamic Graphics - Oct-Nov-04; http://images.zinio.com/magazines/17164010/63016953.zno
http://images.zinio.com/download/1.6.0.815b-EN/ZinioReader_2202894149.exe [Zinio Reader]=============================================================================
The Broken Videos:-------------------------
Code:http://www.thebroken.org
Video Release 0003: return of thebrokenWe kick it off with Windows password hash extraction and cracking. Also learn the basics of modding the Xbox, PS2 and GameCube. Plus, Ramzi’s back with a mission: impossible self-destructing laptop. And we sit down with Kevin Mitnick to find out what life is like for a hacker in prison.Encoded: DivX Runtime: 31:33 Size: 152MBDownload Mirrors:Code:http://homepage.mac.com/kevinrose/thebroken3.avihttp://www.thebroken.org/episodes/03/thebroken_3.avi
Video Release 0002: Hacking with Ramzi "door buster"If you've ever watched an episode of "Cops", then you've probably seen a door battering ram in use. Now Ramzi shows you how to build a door buster for your own home use. For only $20 in parts from your local Home Depot, the door's history.Encoded: DivX Runtime: 05:39 Size: 27.3MBDownload Mirrors:Code:http://homepage.mac.com/kevinrose/thebroken2.avihttp://www.thebroken.org/episodes/01.5/thebroken_15.avi
Video Release 0001: Enter thebrokenOur first episode jumps right into wardriving and wap hacking. Also learn the basics of social engineering with "free pizza 4 life". And of course, a hacker tip with Ramzi.Encoded: DivX Runtime: 17:00 Size: 82.1MBDownload Mirrors:Code:http://homepage.mac.com/kevinrose/thebroken1.avihttp://www.thebroken.org/episodes/01/thebroken_1.avi=============================================================================
Free trick for downloading the famous [Syngress Books] more than "80" books:---------------------------------------------------------------------------------------------
1- Go to the web site [www.syngress.com].2- Click on [create an account] at upper right hand side of screen to register for free.3- Enter any garbage information in all fields in the registration.4- Once you are registered, enter the following URL: [http://www.syngress.com/solutions/XXXX/download.cfm], and replace the "XXXX" with the code of the book. For example, to download "70-290 Study Guide", use the URL: "http://www.syngress.com/solutions/274_MCSE_70290/download.cfm".
5- Codes of books:
CODE BOOK NAME175_Net_mobile_web - .NET Mobile Web Developer's Guide230_lgo_ris2 - 10 Cool Lego Mindstorm Robotics Invention System 2 Projects229_lgo_ubp - 10 Cool LEGO Mindstorm Ultimate Builder Projects227_lgo_dsdk - 10 Cool Lego Mindstorms Dark Side Robots24670214 - 70-214 Study Guide274_MCSE_70290 - 70-290 Study Guide254_MCSE_70291 - 70-291 Study Guide271_MCSE_70292 - 70-292 Study Guide255_MCSE_70293 - 70-293 Study Guide272_MCSE_70296 - 70-296 Study Guide110_Avd_App - Administering Cisco QoS in IP Networks130_mig_asp - ASP Configuration Handbook166_asp_dev - ASP.NET Web Developers Guide253_BD_Cisco_Intrntwkg - Best Damn Cisco Internetworking Book Period252_BD_Firewall - Best Damn Firewall Book Period145_biztalk - BizTalk Server 2000160_bluetooth - Bluetooth Application Developer's Guide169_cisco_wlan - Building a Cisco Wireless LAN71_Conf_CNSAD_Win2000 - Building Cisco Networks for Windows 200093_sbcran - Building Cisco Remote Access Networks250_DMZs - Building DMZs for Enterprise Networks174_lego_robo - Building Robots with Lego Mindstorms140_san_broc - Building SANs with Brocade Fabric Switches223_C_Java - C# for Java Programmers167_C# - C#.NET Web Developer's Guideccna_superpack - CCNA Super Pack192_chk_pt - Check Point Next Generation Security Administration259_chkpt - Check Point NG VPN-1/FireWall-1109_ciscoip - Cisco AVVID & IP Telephony Design and Implementation267_cssp_ids - Cisco Security Professional's Guide to Secure Intrusion Detection Systems235_pix - Cisco Security Specialist's Guide to PIX Firewalls189_xp - Configuring and Troubleshooting Windows XP Professional94_avvid - Configuring Cisco Avvid70_voip - Configuring Cisco Voice Over IP228_VOIP2E - Configuring Cisco Voice Over IP, Second Edition111_ctrx - Configuring Citrix Metaframe for Windows 2000 Terminal Services220_CitrixXP - Configuring Citrix MetaFrame XP for Windows Including Feature Release 1128_mc_em - Configuring Exchange 2000 Server208_ipv6 - Configuring IPv6 for Cisco IOS132_isa - Configuring ISA Server 2000245_symntc - Configuring Symantec AntiVirus Enterprise Edition68_Win2000_Sec - Configuring Windows 2000 Server Security147_w2K_noad - Configuring Windows 2000 Without Active Directory165_cell - Consumer's Guide to Cell Phones & Wireless Service Plans73_odba - DBA's Guide to Databases on Linux92_Win2000_Deploy - Deploying Windows 2000 with Support Tools152_wan_luc - Designing a Wireless Network114_SQL_Dna - Designing SQL Server 2000 Databases for .net Enterprise Servers206_XML_Web - Developing .NET Web Services with XML210_Java_APIs_dev - Developing Web Services with Java APIs for XML Using WSDP226_InfoWar - Dr. Tom Shinder's ISA Server and Beyond119_email - E-mail Virus Protection Handbook193_hck_cf5 - Hack Proofing ColdFusion138_hack_lnx - Hack Proofing Linux158_hack_sun - Hack Proofing Sun Solaris 8181_hackproofW2K - Hack Proofing Windows 2000 Server224_hack_xml - Hack Proofing XML134_hack_ecomm - Hack Proofing Your E-commerce Site221_hck_identity - Hack Proofing Your Identity in the Information Age194_Hck_net2e - Hack Proofing Your Network, Second Edition95_hack - Hack Proofing Your Network: Internet Tradecraft137_hack_app - Hack Proofing Your Web Applications182_Hack_wireless - Hack Proofing Your Wireless Network287_HRD_HCK - Hardware Hacking69_ipad - IP Addressing and Subnetting: Including IPv6190_Journey_Internet - Journey to the Center of the Internet243_lgo_mstr - LEGO Mindstorms Masterpieces240_lgo_tools - Lego Software Power Tools76_Mng_ActDir_Win2000_Ser - Managing Active Directory for Windows 2000 Server112_ipsec - Managing Cisco Network Security218_CiscoSec2e - Managing Cisco Network Security Second Edition75_Mng_Win2000_NetServs - Managing Windows 2000 Network Services115_mc_sec - Mission Critical! Internet Security113_MC2k - Mission Critical! Windows 2000 Server Administration234_nokia - Nokia Network Security Solutions Handbook139_palm_dev - Palm OS Web Application Developers Guide177_lego_JAVA - Programming Lego Mindstorms with Java183_Ruby - Ruby Developer's Guide225_Cybercrime - Scene of The Cybercrime: Computer Forensics Handbook286_NSA_IAM - Security Assessment Case Studies for Implementing the NSA IAM236_secplus - Security+ Study Guide219_sniffer - Sniffer Pro Network Optimization & Troubleshooting Handbook244_snort - Snort 2.0 Intrusion Detection232_SpecialOps - SPECIAL OPS: Host and Network Security241_sscp - SSCP Study Guide249_STL_NTW - Stealing the Network: How to Own the Box91_Win2000_TCPIP - Troubleshooting Windows 2000 TCP/IP153_vb_net - VB.NET Developer's Guide159_wg_wi - Webmaster's Guide to the Wireless Internet180_AD_2e - Windows 2000 Active Directory Second Edition77_Win2000_Conf_Wiz - Windows 2000 Configuration Wizards74_Sysad - Windows 2000 Server System Administration Handbook155_xml_NET - XML .NET Developer's Guide
6- For quick downloading, use my account and password:User Name: [mhany@virgitech.com]Password: [poiuytrewq]
=============================================================================
Huge excellent arabic links for books and tutorials:-------------------------------------------------------------
** ÇáÈÑãÌå **
ÇÓã ÇáßÊÇÈ : ÇáÈÑãÌå ÇáßÇÆäíåáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/gen/oop.htm_________________Best Regards,Mahmoud Hany,Country: Egypt,Title: IT instructor,Mobile: 0106354485
View user's profile Send private message blackwoodKiddieKiddie
Joined: 21 Sep 2004Posts: 22Location: Egypt
PostPosted: Thu Nov 18, 2004 1:21 pm Post subject: Continue........... Reply with quoteBack to topHuge excellent arabic links for books and tutorials:-------------------------------------------------------------
** ÇáÈÑãÌå **
ÇÓã ÇáßÊÇÈ : ÇáÈÑãÌå ÇáßÇÆäíåáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/gen/oop.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ ÈÑãÌÉ ÇáÓíáÛÉ ÇáÈÑãÌå: C /ÇáÓíÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/c/c1.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÓí - ÏÑæÓáÛÉ ÇáÈÑãÌå: C /ÇáÓíÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/c/c2lessons.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÃÓãÈáíáÛÉ ÇáÈÑãÌå: ÇáÃÓãÈáí/ AssembleyÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/assm/assm1.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÃÓãÈáíáÛÉ ÇáÈÑãÌå: ÇáÃÓãÈáí/ AssembleyÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programmin...assmlessons.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ãæÓæÚÉ ÇáÈÑãÌÉ ÈÇá ++CáÛÉ ÇáÈÑãÌå: ÇáÓí ÈáÓ ÈáÓ/ ++CÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/cplus/cplus.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ØÑíÞ ÇáÈÑãÌÉ Ýí ++CáÛÉ ÇáÈÑãÌå: ÇáÓí ÈáÓ ÈáÓ/ ++CÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/cplus/cplus1.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÚáã ÇáÈÑãÌÉ ÈæÇÓØÉ MFCáÛÉ ÇáÈÑãÌå: MFC æÇá++CÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/cplus/mfc.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÝÌæÇá ÈíÓß ÏæÊ äÊáÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß . äÊ VB.NETÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vbnet/vbnet.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÅÍÊÑÇÝ ÇáÝÌæÇá ÈíÓß ÏæÊ äÊáÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß . äÊ VB.NETÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vbnet/masvbnet.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : æÇÌåÉ ÈÑãÌÉ ÇáÊØÈíÞÇÊ(API)áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VBÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/api.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáæÓÇÆØ ÇáãÊÚÏÏÉ ÈÅÓÊÎÏÇã DirectXáÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VBÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/dx.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÝÌæÇá ÈíÓß ááÌãíÚáÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VBÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/oop.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÊÚÇãá ãÚ ãÓÌá ÇáäÙÇãáÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VBÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/reg.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ ÑÇÆÚ ááÝÌæÇá ÈíÓßáÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VBÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/good.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÚáã ÇáÝÌæÇá ÈíÓß 6 ááãÈÊÏÆäáÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VBÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/beg.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÞæÇÚÏ ÇáÈíÇäÇÊ Ýí ÇáÝÌæÇá ÈíÓß 6áÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VBÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/vbdatabase.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÊÚÇãá ãÚ æÓÇÆØ ÇáÊÎÒíäáÛÉ ÇáÈÑãÌå: ÇáÝÌæÇá ÈíÓß 6 VBÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programming/vb6/save.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÊÚÇãá ãÚ ÞæÇÚÏ ÇáÈíÇäÇÊáÛÉ ÇáÈÑãÌå: SQLÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programming/database/sql.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÃÓÇÓíÇÊ Ýí ÇáÊÚÇãá ãÚ ÞæÇÚÏ ÇáÈíÇäÇÊáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programmin...se/database.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ãÇíßÑæÓæÝæÊ ÂßÓíÓáÛÉ ÇáÈÑãÌå: Microsoft AccessÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/programmin...base/Access.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÚáíã ÂßÓíÓ 1áÛÉ ÇáÈÑãÌå: Microsoft AccessÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programmin...ase/Access1.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÚáíã ÂßÓíÓ 2áÛÉ ÇáÈÑãÌå: Microsoft AccessÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/programmin...ase/Access2.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
** ÈÑãÌÉ ÇáãæÇÞÚ **
ÇÓã ÇáßÊÇÈ : ÏæÑÉ Ýí ÇáÅÊÔ Êí Åã ÅááÛÉ ÇáÈÑãÌå: HTMLÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/netpro/html/html.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáãÑÌÚ ÇáßÇãá Ýí Çá HTMLáÛÉ ÇáÈÑãÌå: HTMLÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/netpro/html/htmlfull.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÚáã Çá PHP ÈÓåæáÉáÛÉ ÇáÈÑãÌå: PHPÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/netpro/php/easyphp.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÚáã Çá PHPáÛÉ ÇáÈÑãÌå: PHPÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/netpro/php/learnphp.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÚÑÝ Úáì Çá PHP æÇá MYSQLáÛÉ ÇáÈÑãÌå: PHP - MYSQLÇáÜÜÊÊÜÜÍãíÜá: http://www.cb4a.com/book/netpro/php/learnphp&mysql.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÜ ASPáÛÉ ÇáÈÑãÌå: ASPÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/netpro/asp/asp.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáãæÇÞÚ ÈÇáÝáÇÔáÛÉ ÇáÈÑãÌå: FLASH Action ScriptÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/netpro/Act...tion_Script.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ãÞÏãå äÍæ ÌÇÝÇ ÓßÑÈÊáÛÉ ÇáÈÑãÌå: Java ScriptÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/netpro/jav...ojavascript.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ ãÊãíÒ Ýí ÊÚáíã ÇáÌÇÝÇ ÓßÑÈÊáÛÉ ÇáÈÑãÌå: Java ScriptÇáÜÜÜÜÊÍãíÜá: http://www.cb4a.com/book/netpro/jav.../javascript.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÅÓÊÇíááÛÉ ÇáÈÑãÌå: CSSÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/netpro/CSS/css.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ ãÊãíÒ Ýí ÊÚáíã ÇáÌÇÝÇ ÓßÑÈÊáÛÉ ÇáÈÑãÌå: Java ScriptÇáÜÜÜÜÊÍãíÜá: http://www.cb4a.com/book/netpro/jav.../javascript.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÈÑãÌÉ ÇáÅÓÊÇíááÛÉ ÇáÈÑãÌå: CSSÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/netpro/CSS/css.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
** ÇáÌÑÇÝíßÓ æÇáÊÕãíã **
ÇÓã ÇáßÊÇÈ : ÇáÝæÊæÔæÈ ááãÍÊÑÝíä 1áÛÉ ÇáÈÑãÌå: PhotoShopÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/photoshop/photo1.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÝæÊæÔæÈ ááãÍÊÑÝíä 2áÛÉ ÇáÈÑãÌå: PhotoShopÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/photoshop/photo2.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÝæÊæÔæÈ ááãÈÊÏÇíäáÛÉ ÇáÈÑãÌå: PhotoShopÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/des/photos...nphotoshope.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ ÑÇÆÚ Ýí ÇáÝÑæäÊ ÈíÌáÛÉ ÇáÈÑãÌå: FrontPageÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/des/frontpage/frontpage.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÝÑæäÊ ÈíÌáÛÉ ÇáÈÑãÌå: FrontPageÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/des/frontp...ntpagesmall.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : vBulletin ÊÑßíÈ ãäÊÏìáÛÉ ÇáÈÑãÌå: vBulletinÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/vb/vb1.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : PHPÊÑßíÈ ãäÊÏì æÊÑßíÝ ÓíÑÝÑ áááÛÉ ÇáÈÑãÌå: vBulletin & PHPÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/vb/vbphp.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÝáÇÔ Åã ÅßÓ MXáÛÉ ÇáÈÑãÌå: Flash MXÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/flashmx/flashmx.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÔÇãá Ýí ÝáÇÔáÛÉ ÇáÈÑãÌå: Flash MXÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/flash/flashmx.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÇæÊæßÇÏáÛÉ ÇáÈÑãÌå: AutoCad 2000ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/des/autocad/autocad.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÇáÓí ÈäááÛÉ ÇáÈÑãÌå: CpanelÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/des/cpanel/cpanel.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßíÝ íßæä ãæÞÚß äÇÌÍÇáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/des/gen/howto.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÕãíã ÇáÃáÚÇÈ ÈÈÑäÇãÌ game makeráÛÉ ÇáÈÑãÌå: GamesÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/des/games/gamemaker.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
** ÃäÙãÉ ÇáÊÔÛíá **
ÇÓã ÇáßÊÇÈ : äÙÇã ÇáÊÔÛííá DosáÛÉ ÇáÈÑãÌå: MS - DOSÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/os/dos/dos.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÚáíã äÙÇã ÇáÊÔÛííá DosáÛÉ ÇáÈÑãÌå: MS - DOSÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/os/dos/learndos.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ãæÓæÚÉ æíäÏæÒ 2000áÛÉ ÇáÈÑãÌå: Windows 2000ÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/os/windows2000/windows2000.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ãÑÔÏß ÇáÃãíä áÅßÊÔÇÝ ÇáæíäÏæÒ XPáÛÉ ÇáÈÑãÌå: Windows XPÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/os/winxp/winxp.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ãÔÇßá ÈÏÆ ÇáÊÔÛííá æßíÝíÉ ÊÎØíåÇáÛÉ ÇáÈÑãÌå: WindowsÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/os/problems/problems.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ Úãá ÝæÑãÇÊ æÊäÕíÈ XPáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/os/gen/format.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : Ïáíá äÙÇã ÇáÊÔÛííá áíäßÓáÛÉ ÇáÈÑãÌå: LinuxÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/os/linux/liunx.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÃÓÆáÉ ÇáãÊßÑÑÉ Ýí áíäßÓáÛÉ ÇáÈÑãÌå: LinuxÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/os/linux/faq.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÑÏåÇÊ áíäßÓ 9áÛÉ ÇáÈÑãÌå: LinuxÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/os/linux/redhat.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
** ÇáåÇÑÏæíÑ æÚÊÇÏ ÇáßãÈíæÊÑ **
ÇÓã ÇáßÊÇÈ : ßÊÇÈ ãÊãíÒ Ýí ÚÊÇÏ ÇáÍÇÓÈáÛÉ ÇáÈÑãÌå: ÚÊÇÏ ÇáÍÇÓÈÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/hardware/hardwaregood.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÚáã ÈÏæä ÊÚÞíÏ ÊÌãíÚ æÕíÇäÉ ÇáÍÇÓæÈáÛÉ ÇáÈÑãÌå: ÚÊÇÏ ÇáÍÇÓÈÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/hardware/learneasy.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ßÇãá ááÞÑÕ ÇáÕáÈáÛÉ ÇáÈÑãÌå: ÚÊÇÏ ÇáÍÇÓÈÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/hardware/harddisk.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ááÚÊÇÏ æÇáãÚÇáÌÇÊ Úáì Ôßá HTMLáÛÉ ÇáÈÑãÌå: ÚÊÇÏ ÇáÍÇÓÈÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/hardware/waha.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
** ÇáÔÈßÇÊ **
ÇÓã ÇáßÊÇÈ : ãÓÇÑ ÇáÔÈßÇÊáÛÉ ÇáÈÑãÌå: CISCOÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/networks/cisco.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÔÈßÇÊáÛÉ ÇáÈÑãÌå: MCSEÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/networks/mcse.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ãÐßÑå Ýí ÇáÔÈßÇÊáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/networks/note.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÈæÑÈæíäÊ ÌÏíÏáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/powerpoint.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÅÚÏÇÏ ÇáÈíæÓáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/gen/bios.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÇäÊÑäÊáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/internet.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÅÎÊÕÇÑÇÊ áæÍÉ ÇáãÝÇÊíÍáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÜÊÍãíÜá: http://www.cb4a.com/book/gen/keyboard.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ãÑÔÏß ÇáÃãíä ááÊÚÑÝ Úáì ÇáÐÇßÑÉáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/gen/memory.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÍãÇíÉ Ýí ÚÇáã ÇáÅäÊÑäÊáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/gen/secinternet.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ãÕØáÍÇÊ ÇáÍÇÓÈ ÇáÃáíáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/mos.htm_________________Best Regards,Mahmoud Hany,Country: Egypt,Title: IT instructor,Mobile: 0106354485
View user's profile Send private message blackwoodKiddieKiddie
Joined: 21 Sep 2004Posts: 22Location: Egypt
PostPosted: Thu Nov 18, 2004 1:23 pm Post subject: Continue........... Reply with quoteBack to topÇÓã ÇáßÊÇÈ : ßÊÇÈ áÔÑÍ ÈÑäÇãÌ ÇáäíÑæáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://www.cb4a.com/book/gen/nero.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÊÕÇÑÍ Ýí (nix.*)áÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/permission.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáãæÓæÚÉ ÇáÍÇÓæÈíåáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/mosoa.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáãæÓæÚÉ ÇáÍÇÓæÈíå 2áÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/mosoa2.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÈÑæÊæßæáÇÊ ÇáÜÜFTPáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/ftp.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ ÇáææÑÏáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/word.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ ÇáÅßÓááÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/gen/excel.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÊÍáíá ÇáÈíÇäÇÊ ÇáÅÍÕÇÆíÉ ÈÇáÅßÓááÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/gen/excel_2.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÊÌÇÑÉ ÇáÅáßÊÑæäíÉ( ÌÏíÏ)áÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://www.cb4a.com/book/gen/Ecommerce.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ ãÖÇÏ ÇáÝÇíÑæÓ äæÑÊæäáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.cb4a.com/book/gen/norton.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈÉ ãæÓæÚÉ ÇáãäÊÏíÇÊ áÊÚáã ßíÝíÉ ÊÑßíÈ ãäÊÏíáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.alsayra.com/download/paf...ion=file&id=290
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ Black IceáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://members.lycos.co.uk/absbateam14/blackice.html
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ 3D-EffectáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://members.lycos.co.uk/geosemsem07/effect_3d.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ eBook Workshop áÕäÚ ßÊÈ ÇáßÊÑæäíÉáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://www.alsayra.com/download/paf...ion=file&id=293
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍÇ áÈÑäÇãÌ ÇáÊÍãíá Mass Downloader 2.5áÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.alsayra.com/download/paf...ion=file&id=294
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ MPEG EitoráÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://members.lycos.co.uk/geosemsem07/mpeg.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ Safe HouseáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://members.fortunecity.com/geosemsem/index.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ ReGet Deluxe áÊÓÑíÚ ÇáÊÍãíá æÇáÈÍË Úä ÇáÈÑÇãÌ+ÊÍæíá ÔÇÔÉ ÈÏÁ xp Åáì 2000 ÑæÚÉ+ ÈÑäÇãÌ íÎÈÑß ÈÇáÈÑäÇãÌ ÇáãäÇÓÈ áÃãÊÏÇÏ ãÚíä.áÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://www.powow.com/flashnet/
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ãÔÇßá ÇáßãÈíæÊÑ æÍáæáåÇ+áãäÚ ÇáãæÇÞÚ Çá***íÉ anti-porn ÔÑÍ ÈÇáÕæÑ+ßíÝ ÊæÕá åÇÑÏíä ÈÌåÇÒß ÔÑÍ ÈÇáÕæÑ+ÔÑÍ ÈÇáÕæÑ áÚãáÇÞ ÇáÖÛØ_Wainrar+ÔÑÍ áÝÍÕ ÊæÇÝÞ directx ãÚ ßÑÊ ÇáÔÇÔÉáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.powow.com/nasoriiii5/ÇáÊÍãíá ÇíÖÇ: http://www.geocities.com/nasoriiii5/
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßíÝíÉ Úãá ÕíÇäÉ áÌåÇÒß ãä ÇáæíäÏæÒ+ÔÑÍ áæÍÉ ÇáÊÍßã ÇáÎÇÕÉ ÈæíäÏæÒáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.geocities.com/nasoriiii/ÇáÊÍãíá ÇíÖÇ: http://www.powow.com/nasoriiii4
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ áÔÑÍ ÇáÊÓÌíá ÈáÇíßæÓ + ÊÑßíÈ ãäÊÏíÇÊ iBáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://www.powow.com/nasoriiii/index.htmlÇáÊÍãíá ÇíÖÇ: http://www.geocities.com/nasoriiii4/
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ áÔÑÍ ÈÑäÇãÌSystem Mechanic v4áÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://www.members.lycos.co.uk/absba4ever/Index.html
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÔÑÍ ÈÇáÕæÑ áÈÑäÇãÌ ÇáÊÚÑíÈ ýResHacker+ÔÑÍ ÈÑäÇãÌ EO Video áÊÍæíá ÕíÛ ÇáÃÝáÇã æäÓÎåáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.geocities.com/nasoriiii6/
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ Throttle áÊÓÑíÚ ÌãíÚ ÇäæÇÚ ÇáÇÊÕÇá+- ÔÑÍ ßÇãá áÈÑäÇãÌ ÇáÍãÇíå Norton AntiVirus 2003áÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÍãíÜá: http://www.geocities.com/nasoriiii6/
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇáÔÑÍ ÇáßÇãá áÈÑäÇãÌ ÇáäíÑæ( ÇáÇÕÏÇÑ ÇáÎÇãÓ)+ÔÑÍ ÈÑäÇãÌ win fax+ÔÑÍ Total Recorder ÇáÑÇÆÚ áÊÓÌíá ÇáÃÕæÇÊáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://www.geocities.com/nasoriiii8/ÇáÊÍãíá ÇíÖÇ: http://www.powow.com/nasoriiii8
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ Çáßáß æßíÝíÉ ÇáÊÚÇãá ãÚå+ßíÝ ÊäÓÎ Úáì ÃÞÑÇÕ 800 - 900 ãíÛÇ --¿¿¿áÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.geocities.com/nasoriiii10/ÇáÊÌãíá ÇíÖÇ: http://www.powow.com/nasoriiii9/
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ØÑíÞÉ äÓÎ ÞÑÕ ãÍãí ÈæÇÓØÉ ËáÇË ÈÑÇãÌ+ÔÑÍ ãÈÓØ áÜ ZoneAlarmPro4 ÂÎÑ ÇÕÏÇÑáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.geocities.com/nasoriiii11/ÇáÊÍãíá ÇíÖÇ: http://www.powow.com/nasoriiii11
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ Easy GIF Animator 2_11 ÈÇáÊÝÕíá+ÔÑÍ æÊÚÑíÈ GifArt's Button Maker 1_1áÕäÚ ÓãÇÊáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://members.lycos.co.uk/mon99/Çæ http://members.lycos.co.uk/aly999/index.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ The 911 CD Builder v2_0 ÇáÑÇÆÚ+ÔÑÍ ÈÇáÕæÑ ááÈÑäÇãÌ ÇáÔåíÑ Ýì ÇáÈÍË copernicáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://members.lycos.co.uk/mon99/Çæ http://members.lycos.co.uk/aly999/index.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ãÝÕá ßíÝ ÊÍãá Çí ÈÑäÇãÌ ãä ãßÊÈÉ ÇáãÔÇÛÈ ÈGetRight+ÔÑÍ ÈÑäÇãÌ webexe áÚãá ßÊÈ ÅáßÊÑæäíÉ ÑÇÆÚÉáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://members.lycos.co.uk/mon99/Çæ http://members.lycos.co.uk/aly999/index.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÔÑÍ ÈÑäÇãÌ leap ftp 2_7_2 áäÞá ÇáãáÝÇÊ ÈÇáÕæÑáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://members.lycos.co.uk/mon99/Çæ http://members.lycos.co.uk/aly999/index.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÇÓÇÓíÇÊ ÇáåÇÑÏæíÑáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://members.lycos.co.uk/mon99/Çæ http://members.lycos.co.uk/aly999/index.htm
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ íÍÊæí Úáí ÇáÔÑÍ ÈÑäÇãÌ AntiPorn áãäÚ ÇáãæÇÞÚ Çá***íÉáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.shohra.com/members/abosalma/antiporn.rarÇæ http://www.shohra.com/members/abosalma1/antiporn.rar
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ íÍÊæí Úáí ÇáÔÑÍ ÈÑäÇãÌ Get Data Back áÇÓÊÚÇÏÉ ÇáãáÝÇÊáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÜÊÜÍãíÜá: http://www.shohra.com/members/abosalma/getdata.rarÇæ http://www.shohra.com/members/abosalma1/getdata.rar
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ íÍÊæí Úáí ÇáÔÑÍ ÈÑäÇãÌ Xing MPEG Encoder áÖÛØ ãáÝÇÊ ÇáÝíÏíæáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÊÜÜÜÍãíÜá: http://www.shohra.com/members/abosalma/xingencod.rarÇæ http://www.shohra.com/members/abosalma1/xingencod.rar
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ßÊÇÈ íÍÊæí Úáí ÇáÔÑÍ ÈÑäÇãÌ Golden Eye áãÑÇÞÈÉ ÇáÌåÇÒ ÇËäÇÁ ÛíÇÈßáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.shohra.com/members/abosalma1/goldeneye.rarÇæ http://www.shohra.com/members/abosalma2/goldeneye.rar
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÈÑäÇãÌ ÕÇäÚ ÑãæÒ ãäÊÏíÇÊ ÇáãÔÇÛÈáÛÉ ÇáÈÑãÌå: ÚÇãÇáÜÜÊÜÜÍãíÜá: http://www.shohra.com/members/abosalma1/absbacode.rarÇæ http://www.shohra.com/members/abosalma2/absbacode.rar
ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ ÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ
ÇÓã ÇáßÊÇÈ : ÍæÇáí 13 ßÊÇÈ áÊÚáíã ÇáÝæÊæÔæÈ æÏÑæÓ ÚäåáÛÉ ÇáÈÑãÌå: ÝæÊæÔæÈÇáÜÊÜÜÜÍãíÜá: http://www.psdland.com:8080/zwaed/kotb/index.php======================================================
Huge Rare Programs:--------------------------
ÈÑÇãÌ ÇáÓÇÈ ÓÝäÇáÔÑÍ æÇáÊÍãíáhttp://www.geocities.com/ala_kifk/p...rogrem_sub7.htm
ÈÑäÇãÌ sub seven GOLDÊÍãíá ÇáÈÑäÇãÌhttp://portwolf.hack3r.com/zips/sub72.1gold.zipÊÚÑíÈ ÇáÈÑäÇãÌhttp://mypage.ayna.com/leza/21.s7mÔÑÍ ÇáÈÑäÇãÌhttp://geocities.com/samysw/nowsub7.htm
ÈÑäÇãÌ sub seven BONUSÊÍãíáÇáÈÑãhttp://portwolf.hack3r.com/zips/sub7bonus.zipÊÚÑíÈ ÇáÈÑäÇãÌhttp://mypage.ayna.com/leza/21.s7mÔÑÍ ÇáÈÑäÇãÌhttp://geocities.com/samysw/nowsub7.htm
ÈÑÇãÌ ÇáäÊ ÈíæÓhttp://aljar7.4t.com/hpc.htmÔÑÍ ÇáäÊ ÈíæÓhttp://aljar7.4t.com/nb.htm
ÈÑÇãÌ áÃÎÊÑÇÞ ÇáÃÌåÒÉ ÊÌÏåÇ åäÇhttp://jehad.itgo.com/com.htm
ÃÎÊÑÇÞ ÇáÈÑíÏÇÊ
ÈÑäÇãÌ wwwhackÇáÊÍãíáhttp://faisalm.50megs.com/download/hack/wwwhack.zipÇáÔÑÍhttp://www.ahliz.net/vb/showthread....mp;pagenumber=1
æÈÑÇãÌ ÇÎÑì áÃÎÊÑÇÞ ÇáÈÑíÏ ÊÌÏåÇ åäÇhttp://aljar7.4t.com/hemail.htm
ÕÝÍÉ ÇÎÊÑÇÞ ÇáÈÑíÏ ÇáÇáßÊÑæäíhttp://jehad.itgo.com/email.htm
ÇÎÊÑÇÞ ÇáãæÇÞÚ
ÈÑäÇãÌ wwwhackÇáÊÍãíáhttp://faisalm.50megs.com/download/hack/wwwhack.zipÇáÔÑÍ1http://aljar7.4t.com/whack1.htmÇáÔÑÍ2http://aljar7.4t.com/whack2.htm
ÈÑäÇãÌ WebCracker4.0ÇáÊÍãíáhttp://www.haqerz.com/files/anti-le...ebCrack40.crack
ÇáÔÑÍhttp://www.geocities.com/arabhacker2000/webcracker.htm
ÈÑäÇãÌ BrutusÇáÊÍãíáhttp://geocities.com/kaser01/brutus.jpgÇáÔÑÍhttp://www.ahliz.net/vb/showthread....mp;pagenumber=1
ÈÑäÇãÌ Unsecure2.1ÇáÊÍãíáhttp://packetstorm.securify.com/Cra...NT/uns12exe.zip
ÇáÔÑÍhttp://aljar7.4t.com/uns.htmÈÑÇãÌ ÎÇÕÉ ÈÇáãæÇÞÚ ÊÌÏåÇ åäÇhttp://jehad.itgo.com/web.htm
ÖÑÈ ÇáÇíãíá
ØÑÞ ÊÏãíÑ ÇáÈÑíÏ ÊÌÏåÇ åäÇhttp://www.geocities.com/eljehad/hackmail.htm
ØÑÞ ÊÏãíÑ ÇáÈÑíÏ ãÚ ÇáÈÑäÇãÌ æÈÇáÚÑÈíhttp://www.geocities.com/ala_kifk/drq_mail.htm
ÈÑäÇãÌ Kaboomhttp://mypage.ayna.com/devil2k/kaboom30.zip
ÈÑäÇãÌ Euthanhttp://mypage.ayna.com/devil2k/euthan15.zip
ÈÑäÇãÌ aenimahttp://www.arabshacker.com/aenima.zip
ÈÑäÇãÌ upyours4beta3http://******s.nbci.com/hacknowledge/upyours4beta3.zip
ÈÑäÇãÌ sneaky Mailhttp://******s.nbci.com/hacknowledge/sneaky.zip
ÖÑÈ ÇáãæÇÞÚ
ßíÝ ÊÏãÑ ÓíÑÝÑÇÊ ÇáãæÇÞÚ ÇáíåæÏíÉ¿¿ åäÇ ÇáÌæÇÈhttp://www.home4arab.com/******s//i...ews_servers.htm
ÈÑäÇãÌ ÇáÏÑÉ ÇáÍÑÈí ááåÌæã Úáì ÇáãæÇÞÚ ÇáÅÓÑÇÆíáíÉ ¡¡ÊÌÏå åäÇ ãÚ ÇáÔÑÍhttp://www.yaroun.8m.com/dorrah.htm
ØÑíÞÉ ãä ØÑÞ ÊÏãíÑ ÇáãæÇÞÚ
ÇÝÊÍ ÇáÏæÓ æãä Ëã ÇßÊÈ åÐÇ ÇáÇãÑ Úáì ÓÈíá ÇáãËÇá
ping http://******x/
ÈÏá ÇáÃ**ÇÊ ÇßÊÈ ÇÓã ÇáãæÞÚ
ÊÏãíÑ ÇáãæÇÞÚ ÈÏæä ÈÑÇãÌ ááÊÏãíÑ ¡¡ åäÇ ØÑíÞÉ ÇáÔÑÍhttp://www.geocities.com/ala_kifk/drq_battle.htm
ÓÑÞÉ ÇáÇÑÞÇã ÇáÓÑíÉ - ÇáÈÇÓæÑÏ
BiosHackíÎÊÑÞ ÚÏÉ ÇäæÇÚ ãä ÇáÈíæÓhttp://paragon.revoluti0n.org/Bios/bioshack.zip
ARJ á**Ñ ÇáÜhttp://www.hackpalace.com/cracking/...swords/arj1.zip
FTP ááÈÍË Ýì ÇáÔÈßÉ Úähttp://hackersclub.com/km/files/hfi...check-0_31.perl
áÇÙåÇÑ ãÇ ÊÍÊ ÇáäÌæãhttp://paragon.revoluti0n.org/PassCrack/passthief*****
ÞæÇÆã ÚÏ - ææÑÏ áÓÊ
ÊÓÊÚãá Ýì ÈÚÖ ÇáãæÇÞÚhttp://paragon.revoluti0n.org/PassCrack/adult2lst.zip
ÇÓãÇÁ ÐßæÑhttp://paragon.revoluti0n.org/PassCrack/male-names.zip
ÇÓãÇÁ ÇäÇËhttp://paragon.revoluti0n.org/PassC...emale-names.zip
áÕäÇÚÉ ÞÇÆãÉhttp://hackersclub.com/km/files/pas...ts/dictmake.zip
áÇÑÞÇã ÇáÏíÌíÊÇáhttp://paragon.revoluti0n.org/PassCrack/4digits.zip
ÇáÝíÑæÓÇÊ
¡¡¡ ÃÏæÇÊ ÊÕäíÚ ÇáÝíÑæÓÇÊ ¡¡¡ÅÎØÑ ÇáÝíÑæÓÇÊ æÇáßËíÑÇáßËíÑ ÊÌÏåÇ åäÇ // ÇÎæÇäí ÇÎæÇÊí ÇÑÌæ ÇÎÐ ÇáÍÐÑ ÚäÏÊäÒíáåÇ áÇäåÇ ÞÏ ÊÚØÈ ÇáãÇÐÑ ÈæÑÏ///
http://jehad.itgo.com/vairuses.htm
ãáÝ íÍÊæí Úáì 130 ÝíÑæÓhttp://www.vbzor.4t.com/w6/130vs.zip
ÈÑäÇãÌ áÕäÇÚÉ ÝíÑæÓÇÊ (ÇáÏíÏÇä) ãÚ ÔÑÍ áåÇáÊÍãíáhttp://www.virtue.nu/kaser/vbswg2.zipÇáÔÑÍhttp://ahliz.net/vb/showthread.php3?threadid=5941
ãßÊÈÉ ÊÍÊæì Úáì ßÊÈ ááÊÚáíã æÇáÔÑÍhttp://e-jehad.8m.com/Library/index.htmlÊÍÊæí åÐå ÇáãßÊÈÉ Úáì ÓáÓáÉ ãä ÇáÏÑæÓ æ ÇáßÊÈ ÇáãÊÚáÞÉÈÊÚáíã ÇÎÊÑÇÞ ÇáãæÇÞÚ æ ÇáÈÑíÏ ÇáÅáßÊÑäí æ ÇáÃÌåÒÉ ..ÇáÞÓã ÞíÏ ÇáÊØæíÑ æ ÇáÊÍÏíË .. äÊãäì áßã ÍÓä ÇáÞÑÇÁÉ æÇáÊÚáã .. ßãÇ äÓÃáßã ÇáÏÚÇÁ áßÊÇÈ æ äÇÔÑí ÇáÏÑæÓ .. æÇááå ÇáãæÝÞ .
ãáÇÍÙÉ :- íÝÖá ÊäÒíá ÇáßÊÈ æ ÇáÏÑæÓ ÈÏæä ÈÑÇãÌ ÇáÊäÒíá¡ áÃäåÇ ÞÏ áÇ ÊÚãá .
æåäÇ ÚÔÑÇÊ ÇáÏÑæÓ æÈÇáÚÑÈíÉ ¡¡ ÑÇÆÚÉhttp://www.geocities.com/ala_kifk/dros.htm
ÏÑæÓ ÈÇáÚÑÈíÉ áÃÎÊÑÇÞ ÇáãæÇÞÚ ÊÌÏåÇ åäÇhttp://www.geocities.com/eljehad1/learn.htm
ÏÑæÓ ÈÇáÚÑÈíÉ áÃÎÊÑÇÞ ÇáÃÌåÒÉ ÊÌÏåÇ åäÇhttp://www.geocities.com/eljehad1/learn.htm
ÏÑæÓ ÈÇáÚÑÈíÉ áÊÏãíÑ ÇáãæÇÞÚ ÊÌÏåÇ åäÇhttp://www.geocities.com/eljehad1/learn.htm
æåäÇ ãÌãæÚÉ ÏÑæÓ ÈÇááÛÉ ÇáÃäÌáíÒíÉhttp://www.geocities.com/eljehad1/learn.htm
ÇäæÇÚ ÇáåÇßÑÒhttp://aljar7.4t.com/hinfo.htm
ÈÚÖ ÇáÊæÖíÍÇÊ æÇáÏÑæÓ
ãÇÇáÐí ÊÓÊØíÚ ÝÚáå áßí ÊÌÇåÏ ÇáßÊÑæäíÇ ¿http://e-jehad.8m.com/Tips/e-jehad_HowTo.htm
ÇáÇÎÊÑÇÞ ÈÏæä ÓíÑÝÑ - ÈÇÊÔhttp://www.ahliz.net/vb/showthread....mp;pagenumber=1
ÇÒÇáÉ ÊÑæÌÇä ÈÑÇãÌ ÇáåßÑÒhttp://www.ahliz.net/vb/showthread.php3?threadid=1196_________________Best Regards,Mahmoud Hany,Country: Egypt,Title: IT instructor,Mobile: 0106354485
View user's profile Send private message blackwoodKiddieKiddie
Joined: 21 Sep 2004Posts: 22Location: Egypt
PostPosted: Thu Nov 18, 2004 1:25 pm Post subject: Continue........... Reply with quoteBack to topNuke - äíæßhttp://www.ahliz.net/vb/showthread....mp;pagenumber=1
ÈÑÇãÌ ãäæÚÉ
" ÈÑÇãÌ åÇßíäÌ ÚÑÈíÉ " ÈÇáÇÖÇÝÉ Åáì ÈÑäÇãÌ ÇáãÌÇåÏ ÇáÃáßÊÑæäí ÊÌÏåÇ åäÇhttp://e-jehad.8m.com/Hack/ArProgz/index.html
ÕäÚ ÃÑÞÇã ÇáÝíÒÇhttp://www.geocities.com/ala_kifk/p...ogrem_visia.htm
ÈÑäÇãÌ ãÌÇåÏíä ÇáäÊ ¡ ÈÑäÇãÌ ÚÑÈí ¡¡ æÕáÇÊ ÇáÊÍãíá Ýí ÇáÃÓÝá
http://mypage.ayna.com/drmmm/mojahdin.zip
http://mypage.ayna.com/drmmm/mojahdin*****
íÑÇãÌ ÇáÃÊÕÇá æÇáãÍÇÏËÉ
mIRC (32-bit) v5.91tftp://ftp.dal.net/dalnet/clients/mirc/mirc591t.exeName: Dhafer Al-holaisis/n: 15448-1432890ÈÑäÇãÌ ÇáÔÇÊ ÇáÔåíÑ
Gooey 2.1http://a648.g.akamaitech.net/f/648/.../gooey21eng.exeäÓÎÉ ÃÍÏË ááÊÍÏË ãÚ ÒÇÆÑí ÇáãæÞÚ ÇáÐí ÊÊÕÝÍå
PalTalk v3.5 build 344http://216.74.151.142/download/0.x/pal_install.exeÈÑäÇãÌ ÃäíÞ ááãÍÇÏËÉ ÈÇáÕæÊ æÇáßáÇã ÚÈÑ ÇáÅäÊÑäÊ
Microsoft Chat v2.9http://www.bdr130.com/soft/MicrosoftChatarb.exeÈÑäÇãÌ ÏÑÏÔÉ ãä ãíßÑæÓæÝÊ ãÚÑÈ
ÈÑÇãÌ ÎÏãíÉ ááÌåÇÒ æÇáÃäÊÑäÊ
WinZip8 Finalftp://ftp.download.com/pub/ppd/winzip80.exeName: Dhafer Al-holaisis/n: 85143383ÇáÈÑäÇãÌ ÇáÔåíÑ áÝß ÇáãáÝÇÊ ÇáãÖÛæØÉ
WinRAR v2.80http://209.235.4.116/rar/wrar280tc.exeÈÑäÇãÌ ÂÎÑ ÃÞá ÔåÑå ãä Win zip áÝß ÇáãáÝÇÊ ÇáãÖÛæØÉ
Shut Down Timerhttp://aloud.virtualave.net/software/ShutdownTimer.zipÈÑäÇãÌ íØÝÆ ÌåÇÒ ÇáßãÈíæÊÑ Ýì ÇáÓÇÚÉ Çáäì ÊÍÏÏåÇ áå
WebFerret v3.02ftp://zdftp.zdnet.com/pub/private/s...sers/wferet.exeäÓÎÉ ßÇãáÉ ááÈÍË ÇáÓÑíÚ Úä Ãí ãÚáæãÉ ÏÇÎá ÇáÅäÊÑäÊ
Pal 1.6ahttp://www.kburra.com/downloads/cp1setup.exeáÍãÇíÉ ÌåÇÒß ãä ÇáßæßíÒ ÇáÛíÑ ãÑÛæÈ Ýí ÒÑÚåName: Dhafer Al-holaisis/n: 3335201
Advanced dialer v2.4ftp://zdftp.zdnet.com/pub/private/s...ools/advdlr.zipíÞæã ÈÍÓÇÈ ÇáæÞÊ æÇáÊÇÑíÎ ÇáÐí ÃÊÕáÊ Ýíå ÈÇáÇäÊÑäÊ ÎáÇá ÇáÔåÑ
CD-R Win v4.0aftp://ftp.cdarchive.com/pub/goldenh...ad/cdr40a-e.exeName: Dhafer Al-holaisisCompanyE-mail: abuturkyulockkey: CB59A206-7F8D8D1A-A38BFFCA-FB7B879Echeckkey:30222598-B4D42F1C-DC0672D0-58F07854ÈÑäÇãÌ ãÔåæÑ æÑÏíÝ ááßáæä áäÓÎ ÇáÓíÏí æÇáÓíÏí ÇáãÍãí
Part it 2.034Windows 9x/NT/MEhttp://www.skylarkutilities.com/download/part-it.zipName: dhafers/n: PRT-F1B9A337-65C06874-6Úãáå ÊÌÒÆÉ ÇáãáÝÇÊ ÇáßÈíÑÉ áäÓÎåÇ Úáì ÃÞÑÇÕ ÝáæÈí æÓåæáÉ ÅÓÊÚÇÏÊåÇ
PortFlash v2.0http://www.webroot.com/pfinstall.exeíãÓÍ ÎØæÇÊß Ýì ÇáÃäÊÑäÊ
WinFax Pro v10 fullhttp://212.252.113.91/yardimci/wnfaxpro.exeftp://63.124.222.11/.tmpD/.%20thede...%20Pro%2010.zip: http://65.108.63.78/abuturky/winfaxpro10.zip
Mail Alerthttp://www.conducent.com/affiliate/...ilAlertInst.exeáÅÎÈÇÑß ÈæÌæÏ ÑÓÇÆá ÈÑíÏíÉ áÅÓÊÞÈÇáåÇ
ÈÑÇãÌ ÇáÊÕÝÍ æÊÕãíã ÇáãæÇÞÚ
FrontPage98 , Size (25M)http://64.41.78.229/uaesawah/microsoft_frontpage_98.zips/n: 11121111111
WebStyle v2.0http://www.xara.com/downloads/software/wstyle2dl.exeÈÑäÇãÌ ÑÓæãí áÊÕãíã ÇáÚäÇæíä æÇáÃÒÑÇÑ áÕÝÍÇÊ ÇáÅäÊÑäÊunlock code: 1234567ÇáßÑÇß: http://65.108.63.78/abuturky/xarawebstyle2crk.zip
Smart Explorer v4.8http://65.108.63.78/abuturky/smarte48.zipäÓÎÉ ßÇãáÉ ãÊÕÝÍ ÕÛíÑ æÐßí Èå ßá ÇáÎíÇÑÇÊ ÇáÖÑæÑíÉName: craig stroups/n: 1023105344ÇáÃÍÏËSmart Explorer v4.9http://65.108.63.78/abuturky/sesetupfull.exeäÓÎÉ ßÇãáÉ ãÊÕÝÍ ÕÛíÑ æÐßí Èå ßá ÇáÎíÇÑÇÊName: Abuturky_Dhafer Al-holaisis/n: 965277253ÃæUser: Steven Kern s/n: 736191262
DreamWaver4http://a23.g.akamai.net/7/23/2740/0...weaver4TBYB.exeÈÑäÇãÌ Þæí æãÊßÇãá áÊÍÑíÑ ÕÝÍÇÊ ÇáÅäÊÑäÊ ãÚ ÏÚãå ááÚÑÈíÉ áÇÊÓÌáå æÇäÊãÊÕá ÈÇáÅäÊÑäÊs/n: DWW400-03771-57289-73501
HomeSite v4.52http://www.l0tek.com/downloads/fo-h452.zipäÓÎÉ ßÇãáÉ ãÍÑÑ ÕÝÍÇÊ ÇäÊÑäÊ ÓÑíÚ æÞæí äÙÇã æíÒæíÌ æíÏÚã ÇáÚÑÈíÉName : Anythings/n: HS45EE-5030480010
äÝÓ ÇáÈÑäÇãÌ ÇáÓÇÈÞ ãÚ ÇáßËíÑ ãä ÇáãíÒÇÊ ÇáÃÎÑìDirectory Snoop 3.14ftp://zdftp.zdnet.com/pub/private/s...ties/dirsnp.zip
æíÚãá ãÚ ÇáãáÝÇÊ ÇáÚÑÈíÉFormat áÅÓÊÚÇÏÉ ÇáãáÝ ãä ÇáÃãÇßä ÇáãÚØæÈÉ ÈÓÈÈ ÝíÑæÓ ãÇ Ãæ ÊåíÆÉFinal Data v1.0http://65.108.63.78/abuturky/finaldata10.zipßÑÇß:http://65.108.63.78/abuturky/finaldata1crk.zip
æåÐÇ ÇáÈÑäÇãÌ áÍÐÝ ÇáãáÝÇÊ æáä íãßä ÅÓÚÇÏÊåÇ ÝíãÇ ÈÚÏ ÈÇáØÑÞ ÇáÓÇÈÞÉEraser v4.11ftp://zdftp.zdnet.com/pub/private/s...es/eraserfl.zip
ÈÑäÇãÌ áÅÓÊÑÌÇÚ ÇáÈíÇäÇÊ ÈÚÏ ãÓÍ ÇáÌåÇÒNorton Ghost2002http://65.108.63.78/abuturky/ghost.zip
ÈÑäÇãÌ áÅÏÇÑÉ ÇáÈíÇäÇÊ æÇáÞíÇã ÈÇáÚãáíÇÊ Úáì ÇáãáÝÇÊNorton_Utilities2001ftp://ftp.download.com/pub/win95/ut...200_5.0_618.exes/n: 07-31-90069-NL
åÐÇ ÇáÈÑäÇãÌ áÝß ÖÛØ ÇáãáÝÇÊ ÇáãÖÛæØÉ æåæ íÝß ãÇ íáízip, cab, rar, lha, uue, xxeCoolZIPv 1.01http://www.innersky.com/cgi-bin/dnload.cgi?coolzip.exeßÑÇß:http://202.103.100.253/hambo/othergroup2/dsicz101.zip
ÈÑäÇãÌ ÕÛíÑ áÝß ÇáÖÛØwinrar v2.8http://dl1.51soft.com:8080/soft/126/winrar280.zipßÑÇß:http://abuturky,eksa.net/winrar280bkrk.zip
ÈÑäÇãÌ áÖÛØ æÝß ÖÛØ ÇáãáÝÇÊ æíÏÚã ÌãíÚ ÇááæÇÍÞ ÇáãÚÑæÝÉZipAllhttp://tucows.qualitynet.net/files2/ZA433.EXE
ÈÑäÇãÌ íÖÛØ áãáÝÇÊEasy Zip 2000 v 4.6http://www.alhosoon.com/ezip46.exe
íÔÝÑ ÇáãáÝÇÊ ÈßáãÇÊ ÓÑ áÇ ÊÝÊÍ ÈÏæäåÇSecretftp://ftp.symantec.com/misc/nss.exe
ÈÑäÇãÌ áÊÔÝíÑ ÇáãáÝÇÊ æÇáãÌáÏÇÊ æåæ ÇáÃÞæì Èíä ÇáÑÈÇãÌddCrypt v. 1.4http://dd-soft.tripod.com/ddcrypt.exe
ÍãÇíÉ ÇáãáÝÇÊ ÈßáãÇÊ ÓÑíÉ ÊÎÊÇÑåÇ ÃäÊ áÇ ÊÝÊÍ ÈÏæäåÇNorton Secret Stuff v1.0http://members.tripod.com/progrmz/NSecret.zip
åÐÇ ÇáÈÑäÇãÌ íÓÊÚíÏ ÇáãáÝÇÊ ÇáÎÇÕÉ ÈÈÑäÇãÌ ÇáææÑÏ ÍÕÑÇð ÇáÊÇáÝÉWord Recovery v1.0.1ftp://zdftp.zdnet.com/pub/private/s...ng/wordrecv.zip
ÈÑÇãÌ ÕíÇäÉãÓÑÚ ááÃáÚÇÈ ÏÇÎá ÇáßãÈíæÊÑ æåæ ÈÑäÇãÌ Úãáí ÌÏÇðSciTech Display Doctorftp://ftp.scitechsoft.com/sdd/sdd653.exeName: CoKeBoTtLe99 R/ 20000-529D848E-00000
åÐÇ ÇáÈÑäÇãÌ íÚØí ÊÞÑíÑÇð ãÝÕáÇð Úä ÞØÚ ÇáßãÈíæÊÑ æÃÏÇÄåÇ áãÚÑÝÉ Ãíä ÇáÚØá ÈÇáÊÍÏíÏSiSoft Sandra 2001se Prohttp://213.93.58.90/kekforce/downloadz/fo-s01se.zip
åÐÇ ÇáÈÑäÇãÌ íÝÍÕ äæÚ ßãÈíæÊÑß æíÚØíß ÓÑÚÊå ÇáÍÞíÞíÉShowMHZhttp://65.108.63.78/abuturky/showmhz.exe
ÇäÓÎ ãáÝÇÊ äÙÇã ÇáæíäÏæÒ ááÞÑÕ æÃÖÝ Åáíå åÐå ÇáãáÝÇÊ ÈÚÏ Ýß ÖÛØåÇ æÅÊÑß ÇáÈÇÞí Úáíå ÅÐ íÚÑÝ ÇáÓíÏí æãä Ëã íÞæã ÈÅäÒÇá ÇáæíäÏæÒ ãÈÇÔÑÉ æÈÏæä æÞÝÉStarterhttp://65.108.63.78/abuturky/starter.zip
åÐÇ ÇáÈÑäÇãÌ áÊÕÝÍ ÇáÑíÌíÓÊÑíStartEd 3.80ftp://ftp.uni-hamburg.de/pub/os/win...til/started.zip
åÐÇ ÇáÈÑäÇãÌ áÕíÇäÉ ÇáÑíÌíÓÊÑíRegCleaner v3.4http://www.vtoy.fi/jv16/RegCleaner.exe
ßËíÑÇð ãÇ íÊáÝ ÓíÏí ãåã ÈÓÈÈ Ãæ ÈÂÎÑ æíßæä Úáíå ãáÝÇÊ ãåãÉ åÐÇ ÇáÈÑäÇãÌ áÅäÞÇÐ ÇáãáÝÇÊCDR-Diagnostic 1.6.4http://www.cdrom-prod.com/pub/cdrdiag.exe
äÝÓ ÇáÈÑäÇãÌ ÇáÓÇÈÞ áßí íäÞÐ ÇáãáÝÇÊ ãä ÇáÓíÏí ÇáÊÇáÝBadCopy 99 v2.0http://www.jufsoft.com/download/bcopy99v2.exeName: Dhafer Al-holaisi s/n: 405419
ÈÑäÇãÌ áÕíÇäÉ ßÇÝÉ ÃÌÒÇÁ ÇáßãÈíæÊÑ æíÌÚá ÇáÈÑÇãÌ ÊÚãá ÈÔßá ÃÓÑÚ áÇ ÊÓÊåÇä ÈÞæÉ åÐÇ ÇáÈÑäÇãÌSystem Mechanic v3.6eftp://ftp1.iolohost.com/system_mechanic.exeName: Abuturky s/n: 83866-ST954-0776755445
ÈÑäÇãÌ áÊÓÑíÚ ÃÏÇÁ ÇáæíäÏæÒ ÈÔßá ÚÇã æÊÓÑíÚ Úãá ÇáãáÍÞÇÊPower Tools v2.85http://www.dmisoftware.com/drptools.exes/n: b87d789wnfijwefh87eyf87h
íÚÑÖ áß ÃäæÇÚ ÇáÞØÚ ÇáãæÌæÏÉ Ýí ÌåÇÒß ÈÇáÅÖÇÝÉ Åáì ÏÑÌÉ ÍÑÇÑÉ ÇáãÚÇáÌ æÇáÐÇßÑÉ ÇáãÄÞÊåCPUCooL v6.2.2http://65.108.63.78/abuturky/CPUcool622.zips/n: 10983040
ÊÓÑíÚ ÌåÇÒ ÇáßãÈíæÊÑ ÈãÚÇáÌÉ æÊÑÊíÈ ÐÇßÑÉ ÇáßÇÔ Åäå ÈÑäÇãÌ Úãáí æãÝíÏCacheman 5.0http://65.108.63.78/abuturky/cachem50.exes/n: 322_11_222_9
íäÙÝ åÐÇ ÇáÈÑäÇãÌ ÇáåÇÑÏ ãä ÇáãáÝÇÊ ÇáãåãáÉ æíÞæã ÈÅÒÇáÉ ÇáÈÑÇãÌ ÇáÚÇáÞÉ ÇáÊí áíÓ ÈåÇ ÎÇÕíÉ UnInstall ÇáÍÐÝ Ãí ÇáÊí áíÓ ãÚåÇ ÈÑäÇãÌNorton CleanSweephttp://soft.hardware.ru/files/ncs2001.zip
åÐÇ ÇáÈÑäÇãÌ íäÙã Úãá ÇáÐÇßÑÉ æíÏíÑåÇ æíÈíä ßã ÅÓÊÎÏãÊ ãäåÇ æåæ ãÝíÏRAM Idle SE v2.6http://www.simtel.net/pub/simtelnet...il/ramidl26.zip
íÞæã åÐÇ ÇáÈÑäÇãÌ ÈÇáÊÎÝíÝ Úä ÇáÐÇßÑÉ ÈÇáÊÞáíá ãä ÍãæáÊåÇ ßãÇ ÊÓÊØíÚ Úãá Ðáß ÈäÝÓß Ãæ ÊÊÑßå ááÈÑäÇãÌ áíÞæã ÈåÐÇ ÇáÚãá ããÇ íÄÏí Åáì ÃÏÇÁ ããÊÇÒ ááÌåÇÒFreeMem Professionalftp://zdftp.zdnet.com/pub/private/s...es/fremem32.zips/n: 235612617935
ÊäÙíã Úãá ÇáÐÇßÑÉ æÅäÞÇÐåÇ ÞÈá Ãä ÊãÊáÆ ÊãÇãÇð æÊÄÏí Åáì ÚãáíÇÊ ããäæÚÉMemWatcher v3.0.2http://65.108.63.78/abuturky/mw302.zip
Ýí ßËíÑ ãä ÇáÃÍíÇä æÚäÏ ÅÛáÇÞ ÈÑäÇãÌ ãÇ ÝÅäå íÈÞì ÚÇáÞÇð Ýí ÇáÐÇßÑÉ ããÇ íÄÏí Åáì ÊÒÇÍã æÅÈØÇÁ ÃÏÇÁ æÚãá ÇáÌåÇÒ æÇáÍá åæ åÐÇ ÇáÈÑäÇãÌ ääÕÍ Èå ÈÔÏÉMemory Cleaner v2.4.02http://65.108.63.78/abuturky/memclnr.zip
åÐÇ ÇáÈÑäÇãÌ íÚØíß ÊÞÑíÑÇð ßÇãáÇð æãÝÕáÇð Úä ßá ÔÆ Ýí ÇáßãÈíæÊÑSys checkhttp://65.108.63.78/abuturky/syscheck.exe
åÐÇ ÇáÈÑäÇãÌ íÞæã ÈÝÍÕ ÇáãáÝÇÊ ÇáãæÌæÏÉ Ýí ãÌáÏ ÇáäÙÇã áÏíß æíÞæã ÈÝÑÒ ÇáãáÝÇÊ ÇáÊí áã íÚÏ áåÇ Úãá äåÇÆíÇð æãä Ëã íÞæã ÈÍÐÝåÇ æáßä ÈÚÏ ÓÄÇáß æÃÎÐ ÅÐäß ØÈÚÇðClean System Directoryhttp://www.ozemail.com.au/~kevsol/clnsysdr.zip
ÈÑäÇãÌ áÊÞÓíã ÇáåÇÑÏ æÊÌÒÆÊå ãä ÔÑßæ æíÓÊÑä ÏíÌíÊÇá æåæ ÇáäÓÎÉ ÇáÍÏíËÉ ãäå ÊÚãá ãÚ æíäÏæÒ ãåãÇ ßÇäÊ äÓÎÊåEZ-drivehttp://65.108.63.78/abuturky/EZ9.zip
ÈÑäÇãÌ áÊÍÑíÑ ÇáÕÝÍÇÊ æÈå ÞæÇáÈ ÌÇåÒÉ íÏÚã ÇáÌÇÝÇPageBuilder v 3.0chttp://www.tafweb.force9.co.uk/download/pbldr_30.zipßÑÇß:http://65.108.63.78/abuturky/cr-pb30c.zip
íÏÚã ÇááÛÉ ÇáÚÑÈíÉ æÇáÌÇÝÇæÃäÕÍ Èå ÈÔÏÉAceexpert v3.02iftp://zdftp.zdnet.com/pub/private/s...ls/acexpert.exeName: C0Ke2000 s/n: E8VN-2Z3Q-PWZC-LHN1
æåæ ÈÑäÇãÌ ááÊÕãíã ÇáÓÑíÚ æíÏÚã ÇáÌÇÝÇ ßãÇ Ãäå íÍæí Úáì ãÊÕÝÍ ÏÇÎáíAlex's HTML Editor v1.1ftp://zdftp.zdnet.com/pub/private/s...ls/alexhtml.zip
ÃíÖÇ ãÍÑÑ ÕÝÍÇÊ ÓÑíÚ æÚãáí æíÏÚã ÇááÛÉ ÇáÚÑÈíÉHomeSite v4.52http://www.l0tek.com/downloads/fo-h452.zips/n: HS45EE-5030480010
ãÍÑÑ áßÊÇÈÉ ãáÝÇÊ ÇáÓí Ìí Ãí ÇáÊí íãßä Ãä ÊÞæã ãä ÎáÇáåÇ ÈÈÑãÌÉ ÇáÚÏíÏ ãä ÇáÃãæÑ ÇáãÈåãÉ ãËá ÏÝÊÑ ÇáÒæÇÑ æÇáãäÊÏíÇÊ ÇáÍæÇÑíÉPerl Code Editorhttp://aloud.virtualave.net/software/PerlCodeEditor.zip
ÊÓÊØíÚ ÈæÇÓØÉ åÐÇ ÇáÈÑäÇãÌ ÅäÔÇÁ ãÇ íÓãì ÇáãÓÇÚÏÉ áÈÑäÇãÌ ãÇ Úä ØÑíÞ ÕÝÍÇÊ ÇáæÈMicrosoft HTML Helphttp://msdn.microsoft.com/library/t...hp/htmlhelp.EXE
ÈÑäÇãÌ ÊÑíÑ ÕÝÍÇÊ ÇáÅäÊÑäÊ ÈÇáÅÖÇÝÉ Åáì æÌæÏ ÞæÇáÈ ÌÇÝÇ ÌÇåÒÉ ÝÞØ ÑßÈWebford v2.1http://65.108.63.78/abuturky/webford.zip
áÊÕãíã ÇáÃÒÑÇÑ ÈáÛÉ ÇáÌÇÝÇ ãÚ ÅÚØÇÆåÇ ÌãíÚ ÃäæÇÚ ÇáÊÃËíÑÇÊJavaScript Buttonshttp://www.lonewolf.gr/apps/jsbp.zip
áÊÕãíã ÇáÞæÇÆã ÈáÛÉ ÇáÌÇÝÇJavaScript Menuhttp://www.lonewolf.gr/apps/jmenu.zip
ÊÕãíã ÃÒÑÇÑ ÇáÌÇÝÇ ÇáÐåÈíÉApplet Button Factory v5.0ftp://ftp.blackdomino.com/pub/applet50.exeßÑÇß:http://krack.tzo.com/crack/abf50.zipName: 12aew s/n: 9j8f5
ÊÕãíã ÃÒÑÇÑ æÚäÇæíä áÕÝÍÇÊ ÇáæíÈWebStyle1.2ftp://onyx.xara.net/pub/xaraltd/style110.exeßÑÇß:http://65.108.63.78/abuturky/webstyle12.zip
HTML Java Visual basic ãÍÑÑ ÕÝÍÇÊScribbler 2000 v1.9.1http://www.creamsoft.com/download/scribbler.zipName: DSCeNe 2000 Code: 0dE98202555f2454
ÈÑÇãÌ ãÍÇÏËÉÅäå ÈÑäÇãÌ ãÍÇÏËÉ Ìãíá ÌÏÇð íÊãíÒ ÈæÌæÏ ÕæÑ ãÚÈÑÉ Úä ßá ÌãáÉ ãä ÇáÌãáMicrosoft Chat 2.5Ahttp://www.anti-leech.com/antileech...:microsoft_chat
ÈÑäÇãÌ ãÍÇÏËÉ Ðßí íÌÈ Ãä ÊÌÑÈå áßí ÊÑì ÈÃäå áíÓ ÖÑæÑí Ãä Êßä ãÔÊÑßÇð áÊÊÍÏËAOL Messengerhttp://www.anti-leech.com/antileech...0:aol_messenger
ÊÓÊØíÚ Ãä ÊÊÍÇæÑ ãä ÒæÇÑ ÇáæÞÚ ÇáÐí ÃäÊ Ýíå ÇáÂä Ãí ÇáÐíä íÔáÑßæäß ÈÊÕÝÍ ãæÞÚ ãÇ æáßä ãÔßáÊå ÈÃäå íÌÈ Ãä íßæä åÐÇ ÇáÈÑäÇãÌ ãæÌæÏ áÏì ÌãíÚ ÇáãÊÍÏËíäGooey 2http://www.anti-leech.com/antileech.cgi?sali90:gooey_2
ÈÑäÇãÌ áÊÈÇÏá ÇáãáÝÇÊ æÇáãÍÇæÑÉ ÈÇáßÊÇÈæ æÇáÕæÊ æÇáÕæÑÉMessengerftp://ftp.uni-stuttgart.de/pub/syst...t/messenger.zip
æåæ ÈÑäÇãÌ ÑÇÆÚ ááãÍÇÏËÉ æíÚÊãÏ Úáì ÍÓÇÈ ÇáåæÊãíáMSN Messenger v3.5http://65.108.63.78/abuturky/mmssetup.exe
ÈÑäÇãÌ ááÏÑÏÔÉ ÈÇááÛÉ ÇáÚÑÈíÉOdigo Messenger v2.5http://www.odigo.com/download/odigo25b_smart.exe
äÝÓ ÇáÈÑäÇãÌ ÇáÓÇÈÞ æáßä åÐå ÇáäÓÎÉ ÇáÅäßáíÒíÉ ÝÞØOdigo Messenger v3.0http://www.odigo.com/30/odigo3b_537eng.exe
åÇÊÝ ÃäíÞ ááÅÊÕÇá ÚÈÑ ÇáÅäÊÑäÊ æáßä áíÓ ãÚ åÇÊÝ ÅäãÇ ãÚ ØÑÝ ÂÎÑ ÚäÏå äÝÓ ÇáÈÑäÇãÌMediaRing Talkhttp://a160.g.akamaitech.net/7/160/...RTALK-SETUP.EXE
ÈÑäÇãÌ ÌíÏ ááãÍÇÏËÉ íÌÈ Ãä ÊÝÊÍ ÍÓÇÈ ÚäÏåã ÃíÖÇGet Firtalkhttp://multitude-svca.www.conxion.c...etalk_setup.exe/
ááãÍÇÏËÉ ÈÇáÕæÊ æÇáßáÇãPalTalk v3.5http://216.74.151.142/download/0.x/pal_install.exe
ÈÑäÇãÌ ÏÑÏÔÉ Úãáí æÕÛíÑ æÈÓíØ ÌÏÇðFun Chat v2.0http://www.softseek.com/cgi-bin/dow...ck/pkd-fc2i.zip
ÈÑäÇãÌ ßÇãá ÇáæÙÇÆÝ ááãÍÇÏËÉ æÇáÏÑÏÔÉCheetaChat v6.3.22ftp://ftp.zdnet.com/pub/private/sWl...rc/cchatful.exe
ãÍÇÏËÉ ÕæÊ æÕæÑÉ æßÇãíÑÇ æíÈIris Phone v3.0http://irisphone.com/demo/iris_30.exeßÑÇß:http://www.wtcracks.com/dl/i/irisphon.zipsn/ #93763176421934759356482953
ááÊÍÏË ãÚ ÃßËÑ ãä æÇÍÏ Ãæ ãÚ ÌãÇÚÉHearMe VoiceContact v2.0http://download.hearme.com/HearMeVC2Setup.exe
ÈÑÇãÌ ÎÏãÉ ãáÝÇÊáÊÌÒÆÉ ÇáãáÝ Åáì ãáÝÇÊ ÕÛíÑÉ ÈÅãßÇäß æÖÚåÇ Úáì ÇáÞÑÕ ÇáãÑä æåæ ãÝíÏ ÌÏÇð Ýí ÍÇá Åäß ÊÚãá ãÚ ÇáãáÝÇÊ ÇáßÈíÑÉ ÇáÍÌã æáÇ ÊÓÊØíÚ æÖÚåÇ Úáì ÞÑÕ ãÑäPart it 2.03http://www.skylarkutilities.com/download/part-it.zipßÑÇß:http://202.103.100.253/hambo/others3/cr-pa203.zipname :dhafer s/n: PRT-F1B9A337-65C06874-6
ÃíÖÇð ÈÑäÇãÌ áÊÞØíÚ ÇáãáÝÇÊ æáßäå íÊãíÒ Úä ÓÇÈÞå ÈÃäå áÇ íÑíÏ ÇáÈÑäÇãÌ äÝÓå áÊÌãíÚ åÐå ÇáãáÝÇÊ æÅäãÇ íßÝí äÙÇã ÇáæíäÏæÒ áÊÑßíÈåã1ToX File Spliter v2.57http://j.piquemal.free.fr/1tox.zipName: dusko FirstName: nadia s/n:3684123256
ÈÑäÇãÌ ãÊÎÕÕ æßÇãá ãåãÊå ÊÌÒÆÉ ÇáãáÝÇÊ ÇáßÈíÑÉ æíÞÓãåÇ Åáì ÃÞÓÇã ÊÊäÇÓÈ ãÚ ÇáãßÇä ÇáÊí ÓæÝ ÊæÖÚ Ýíå ãËáÇð ÞÑÕ ãÑä Ãæ ÈÑíÏ ÅáßÊÑæäíKW_Split'Em v1.5http://www.knowware-soft.com/freeware/kw_splitem.exe
íÞÓã ÇáãáÝÇÊ ÇáßÈíÑÉ Åáì ÕÛíÑÉ æíÔßá ãáÝ ÊØÈíÞí áßí íÌãÚåã Ýí ãßÇä ÂÎÑFile Split PRO V4.6http://65.108.63.78/abuturky/fspro46.zips/n: F863-1300-2390-EXJW-017-FY
áÊÓåíá ÇáÊÚÇãá ãÚ ÇáãáÝÇÊ ÈÔßá ÚÇãshellgem v 1.36ftp://zdftp.zdnet.com/pub/private/s...es/shellgem.zip
ßËíÑÇð ãä ÇáÃÍíÇä ãÇ äÞæã ÈÍÐÝ ãáÝÇÊ Åáì ÇáÓáÉ æäÝÑÛ ÇáÓáÉ æÝíãÇ ÈÚÏ äßÊÔÝ ÈÃä åÐå ÇáãáÝÇÊ ãåãÉ ÌÏÇð æáÇ äÓÊØíÚ ÅÑÌÇÚåã ÅáÇ ÈæÇÓØÉ åÐÇ ÇáÈÑäÇãÌR4A v1.04http://65.108.63.78/abuturky/r4a104.zipName: Mr_GReeN [WkT!] s/n: MW3XPC85TE3J
ÈÑäÇãÌ íÊíÍ áß ÇáÇÊÕÇá åÇÊÝíÇ Èãä ÊÔÇÁ Úä ØÑíÞ ÇáÅäÊÑäÊFree World Dialuphttp://www.pulver.com/fwd/
ÇÊÕÇá ÈÇáåÇÊÝ Úä ØÑíÞ ÇáÅäÊÑäÊWinPhonehttp://www.prog.arch.unige.it/~aodd...hone/Wphone.htm
ÇÊÕÇá ÈÇáåÇÊÝ Úä ØÑíÞ ÇáÅäÊÑäÊReally Easy Voiceftp://download.really-easy.com/pub/revsetup.exe
áÅÙåÇÑ ÑÞã åÇÊÝ ÇáÐí ÇÊÕá Èß ÅÐÇ ßäÊ ãÔÊÑß ÈåÐå ÇáãíÒÉ æåæ ÝÚÇá ÌÏÇðCall Display v1.0http://members.tripod.com/get2him/calldisp.exe
ÊÓÊØíÚ Ãä ÊÊÕá ÈÃí åÇÊÝ Ãæ ßãÈíæÊÑ Ýí ÇáÚÇáã Úä ØÑíÞ ÇáÅäÊÑäÊ æáÇ ÊÍÊÇÌ ÅáÇ áßÑÊ ÇáÝÇßÓ æÇáãÇíßÑæÝæä æáÇ ÊÍÓÈ áß Óæì ÏÞÇÆÞ ÅäÊÑäÊPhoneFree v6.0http://phonefree.interactive.net/Ph...etup_6_2_22.exe
ÃíÖÇð ãËá ÓÇÈÞå ãÌÇäÇð æááÅÊÕÇá ÈÃí ÏæáÉ Ýí ÇáÚÇáãHATF Telephone Softwarehttp://www.hatf.com/Download/HATFTelephone.exe
ááÊÍË ãÚ ÇáÚÇáã ÇáÎÇÑÌí ÚÈÑ ÇáÅäÊÑäÊInternet phonehttp://www.pt.lu/comnet/files/comms/iphone5.exesn/ V1Q7-SC97-NNNN-1X-0000-3BFF/A2BE
ÃíÖÇð ÈÄäÇãÌ ááÅÊÕÇá ãä ÌåÇÒ ÇáßãÈíæÊÑ Åáì Ãí åÇÊÝ ÚÈÑ ÇáÅäÊÑäÊ æåæ ãÌÇäí ÃíÖÇðPC-to-Phone v2.1ftp://194.165.206.9/pub/PC-to-Phone.exe
ÈÑäÇãÌ ãÊßÇãá áÅÏÇÑÉ ÇáÝÇßÓ æåæ ÈÑäÇãÌ ÊÎÕÕí æÔÇãá áßá ÇáæÙÇÆÝWinFax Pro v10.0http://212.252.113.91/yardimci/wnfaxpro.exesn/231-6736-472-2928ßÑÇß:http://65.108.63.78/abuturky/winfaxpro10.zip
ÈÑäÇãÌ áÅÑÓÇá æÇÓÊÞÈÇá ÇáÝÇßÓÇÊJust The Fax v2.9yhttp://ourworld.cs.com/rkssoft1/jtf32.exeName: Dhafer s/n: RKS-2600724
ÈÑäÇãÌ ÔÈíå áÓÇÈÞÉ æåæ áÅÑÓÇá æÇÓÊÞÈÇá ÇáÝÇßÓMightyFax v2.9yhttp://ourworld.cs.com/rkssoft1/mf32.exeName: TEAM DiSTiNCT s/n: RKS-5525013
æåÐÇ ÇáÈÑäÇãÌ áæÕá ÌåÇÒíä ãÚ ÈÚÖåã áÊÈÇÏá ÇáãáÝÇÊ ÝíãÇ ÈíäåãZow v3.1http://65.108.63.78/abuturky/zow310.exe
ÈÑÇãÌ ÇáÕæÊ æÇáÕæÑÉÈÑäÇãÌ ãÔåæÑ ÌÏÇð áÞÑÇÁÉ ÇáãáÝÇÊ ÇáÕæÊíÉ ãä ÇáÅäÊÑäÊ æåæ ãåã ÌÏÇð æÛäí Úä ÇáÊÚÑíÝRealPlayer Plus8http://www.anti-leech.com/antileech...90:real_player8sn/ 1016-10-1160
ÈÑäÇãÌ ÌíÏ ÌÏÇð ÅÐ íÏÚã ÇáßËíÑ ãä ÇááæÇÍÞ ÍÊì ÇáÊí íÏÚãåÇ ÓÇÈÞå æÐæ æÇÌåÉ ÌãíáÉ ßãÇ íÊãíÒ æíÚØíåÇ ÑæäÞÇð ÎÇÕÇð ãÚ ÊÍßã æÇÓÚ ÈãæÌÇÊ ÇáÕæÊ æíÔÛá ÝíÏíæ ÃíÖÇðMp3 ÈÞÑÇÁÉ ãáÝÇÊJetAudio 4.8http://www.anti-leech.com/antileech...i90:jetaudio4.8
ÈÑäÇãÌ ÊÔÛíá ÇáÝíÏíæ ÇáããÊÇÒ æÈÇáäÓÈÉ áäÇ åæ ÃÝÖá ÈÑäÇãÌ ÊÔÛíá ÝíÏíæ Úáì ÇáÅØáÇÞ ßãÇ Ãäå íÏÚã áæÇÍÞ ÕæÊíÉ ÃíÖÇð ÈÇáÅÖÇÝÉ Åáì ãíÒÊå ÇáãÔåæÑÉ ÈÃÎÐ áÞØÉ ãä ÇáÝáã Åáì ÕæÑÉXing Player3.30http://www.anti-leech.com/antileech...90:xing_player3
RealProducer Plus G2http://www.anti-leech.com/antileech...:real_producer8sn/ 212-08806-1648
Real Player íÞæã ÈÇáÊÍæíá ãä ßÇÝÉ ÇááæÇÍÞ ÇáÕæÊíÉ æÇáÕæÑíÉ Åáì ãáÝÇÊ ÇáReal Juke Box V2http://www.anti-leech.com/antileech...0:real_jukebox8sn/ 352-88760-1716
ÈÑäÇãÌ Ìãíá ÌÏÇð æåæ ÃíÖÇð Ûäí Úä ÇáÊÚÑíÝ íÊãíÒ ÈÓåæáÊå æÈÏÚãå ááßËíÑ ãä áæÇÍÞ ÇáãáÝÇÊ ÇáÕæÊíÉ ÇáßËíÑÉWinAmp Full v 2.75http://download.nullsoft.com/winamp...amp275_full.exe
Mp3 áÊÍæíá ÇáãáÝÇÊ ÇáÕæÊíÉ ãåãÇ ßÇäÊ ÈãÇ Ýí Ðáß ãáÝÇ ÇáÓíÏí Åáì ááÇÍÞÉMpegDJ Encoder v1.98bhttp://www.anti-leech.com/antileech..._encoder_v1.98bßÑÇß:http://www.anti-leech.com/antileech...encoder_v1.98bc
æåæ ãÝíÏ áÊÍæíá ÇáãáÝÇÊ Åáì äÛãÇÊ ãæÈÇíá Midi Åáì ãáÝÇÊ Wav åÐÇ ÇáÈÑäÇãÌ íÍæá ÇáãáÝÇÊAmidi 1.6http://www.anti-leech.com/antileech.cgi?sali90:amidi16ßÑÇß:http://www.anti-leech.com/antileech.cgi?sali90:amidi16c
æåæ ÈÑäÇãÌ ÖÎã ÌÏÇð æÞæí æãåãÊå ÑÄíÉ ÇáÃÝáÇã æÇáãáÝÇÊ æÇáÊáÝÒíæä ÇáãæÌæÏ Úáì ÇáÅäÊÑäÊ æåæ ãä ÔÑßÉ ÃÈá ãÇßíäÊæÔ æíãÊÇÒ Úä ÛíÑå ÈÓÑÚÊå ÇáÑåíÈÉ ÈÇáÊÍãíá ãä ÇáÅäÊÑäÊQuick Time5http://www.anti-leech.com/antileech...li90:quicktime5Name: microke Company: wamadhatS/N : PMME-GGQM-EMRU-UPE3-5678
ãäå æÅáíå Real Player åæ ÈÑäÇãÌ ÊÍæíá æíÊãíÒ Úä ÛíÑå ÈÅãßÇäíÊå ÈäÍæíá ãáÝÇÊStreambox Ripper2009http://www.anti-leech.com/antileech...0:streambox2009ßÑÇß:http://www.anti-leech.com/antileech...ali90:sbox2009c
ÈÑÇãÌ áäÞá ãáÝÇÊ
áÊÚÏíá æÍÝÙ ÇáãáÝÇÊ ÈÔßá ÓÑíÚ æÈÏæä ÍÇÌÉ ááÈÑãÌÉSiteEZ v1.9http://ftp.hyperpres.com/ftp/SiteEZ/setup.exe
áÊÍãíá æÍÝÙ ÇáãáÝÇÊ æäÞáåã Åáì ÇáÓíÑÝÑ æíãßäå ÇáãÊÇÈÚÉ ÈÇáÚãáíÉ ÅÐÇ ÅäÞØÚ ÇáÅÊÕÇá ÅÐÇ ßÇä ÇáÓíÑÝÑ íÏÚã åÐå ÇáãíÒÉ ÃáÇ æåí ãÊÇÈÚÉ ÇáÌáÓÉ ÈÚÏ ÇáÅäÞØÇÚFTP Voyager v8.0.0.2http://davesworld.tucows.com/files/ftpvsetup.exeßÑÇß:http://65.108.63.78/abuturky/d-fv8001.zip
ÈÑäÇãÌ áäÞá ÇáãáÝÇÊ ãä æÅáì ÇáÓíÑÝÑLeapFTP v2.7.1ftp://ftp1.enet.com.cn/pub/game/too...ork/lftp271.exeName: Dhafer Al-holaisi s/n: 214065-49410835290
ÇáÌãíÚ íÚãáæä ãÚ åÐÇ ÇáÈÑäÇãÌ áÈÓÇØÊåAceFTP V 1.31ftp://visicom.superb.net/aftp131.exeName: CZY s/n: 673JLA-VPAM85-FT74N7-L5643E
ÇáÈÑäÇãÌ ÇáÃÝÖá áÃäå íÍæí ÌãíÚ ÇáãíÒÇÊ ÇáߨáæÈÉ æåæ íÝíÏ ÇáÎÈÑÇÁ ääÕÍ Èå ÈÔÏÉWS_FTP Pro v7http://65.108.63.78/abuturky/fo-wftp7.zip
áäÞá ÇáãáÝÇÊ Åáì ÇáÓíÑÝÑ Úáì ÇáÔÈßÉ ÈããíÒÇÊ åÇÆáÉ3D-FTP 3.0 beta1ftp://ftp.3dftp.com/pub/3dftp3b1.zips/n: 3D-A563E9-NL2Q72
ÈÑÇãÌ áÊÕãíã ÇáãæÇÞÚ
íÍÊæí Úáì ãæËÑÇÊ ÌÇÝÇ ÌÇåÒÉApplet FX Freeware v1.1ftp://ftp.unina.it/pub/Pcibm/winsit...til/afxfe11.exe
ãÍÑÑ ÕÝÍÇÊ ÇáÅäÊÑäÊ ÇáãÔåæÑ æåæ ÇáÃÝÖá ÏÇÆãÇ ãä ÔÑßÉ ãÇíßÑæÓæÝÊFrontPage2000ftp://gatekeeper.dec.com/pub/micro/...1stpage2000.exesn/ GC6J3-GTQ62-FP876-94FBR-D3DX8
ÈÑäÇãÌ áÊÍÑíÑ ÇáÕÝÍÇÊ æåæ ãÊßÇãá æáíÓ Èå Ãí ÚíÈ ßãÇ Åäå íÏÚã ÇáÚÑÈíÉDreamWaver4http://a23.g.akamai.net/7/23/2740/0...weaver4TBYB.exeßÑÇß:http://202.103.100.253/newtrends/200012/tmgmdw40.zips/n: DWW400-03771-57289-73501
ÂáÉ ÍÇÓÈÉ ÚáãíÉ ãÊÎÕÕÉCalc98 v4.52http://www.fdgroup.co.uk/neo/fsi/c9845w.exe
ÈÑäÇãÌ áßÔÝ ßáãÇÊ ÇáÓÑ ÇáÊí åí ÚÈÇÑÉ Úä äÌæãAlhajisstarshttp://65.108.63.78/abuturky/alhajisstars.exe
ÈÑäÇãÌ áäØÞ ÇáßáãÇÊ ÇáÊí ÊßÊÈåÇ ÈÚÏÉ ÃÕæÇÊ ÊÎÊÇÑåÇ æåæ ÈÑäÇãÌ ÑÇÆÚ ÌÏÇðTalkhttp://65.108.63.78/abuturky/talk.zip
áãÚÑÝÉ ÇáÊæÞíÊ ÇáÚÇáãí Ýí Ãí ãßÇäActiveEarthhttp://www.cadi.com/AppZ/ActiveEarth.zip
æåæ áÅÖÇÝæ æÙÇÆÝ Úáì ÇáÃÒÑÇÑ Ýí áæÍÉ ÇáãÝÇÊíÍHotkeysftp://zdftp.zdnet.com/pub/private/s...es/hotkey95.zip
åÐÇ ÇáÈÑäÇãÌ íÚØíß ÚÏÓÉ ÊÞæã ÈÊßÈíÑ ÌÒÁ ãä ÃÌÒÇÁ ÓØÍ ÇáãßÊÈ Åáì ãÖÇÚÝÇÊ ßËíÑÉ æÈÏÞÉ ÚÇáíÉLens v1.31ftp://zdftp.zdnet.com/pub/private/sWlIB/utilities/desktop_accessories/lensmagn.exe
åÐÇ ÇáÈÑäÇãÌ íÞæã ÈÊÑÌãÉ ÇáÞæÇÆã ááÈÑÇãÌ ÇáÃÌäÈíÉ Åáì ÞæÇÆã ÚÑÈíÉ áßí íÓåá ÇáÚãá ãÚåÇRC-WinTrans v6.0http://www.schaudin.com/data/rct60lit.exe
ãáÝÇÊ ãåãÉ áÊäÝíÐ ÈÑÇãÌ ÝíÌæÇá ÈíÓíß Úáì Ãí ÌåÇÒ áÇ íÍæí ÇáÝíÌæÇá ÈíÓíß ÝíåVB6 Runtime Fileshttp://msvaus.www.conxion.com/downl.../vbrun60sp4.exe
ÃÝÖá ÈÑÇãÌ ÊÕãíã ÇáÎØæØScanFont v313ftp://zdftp.zdnet.com/pub/private/s...ools/scnfnt.zipßÑÇß:http://65.108.63.78/abuturky/scanfont313crk.zip
ãÔÛá ÃáÚÇÈ ÇáÓæäí ÈáÇí ÓÊÇíÔä ÇáÌÏíÏ æíÚãá Úáì ÇáÅäÊáBleem15bhttp://www.anti-leech.com/antileech...90:bleem15intelIntel
AMD ãÔÛá ÃáÚÇÈ ÇáÓæäí ÈáÇí ÓÊÇíÔä ÇáÌÏíÏ æíÚãá ÚáìBleem15bhttp://www.anti-leech.com/antileech...li90:bleem15amd
ÈÑäÇãÌ ÕÇäÚ ÇáÔÚÇÑÇÊLogoMakerhttp://www.shahid.org.uk/Logos.zip
íãßäß ÒíÇÏÉ ÇáÕæÑ æÇáäÛãÇÊ ááÎáíæí Úä ØÑíÞ åÐÇ ÇáÈÑäÇãÌ æãä ããíÒÇÊå Ãäå íãßäß ãä ÓãÇÚ ÇáäÛãÉ ÞÈá ÊÍãíáåÇ æíÏÚã ÇáäÛãÇÊ ÇáØæíáÉ ÌÏÇðLogoManager 1.2.3http://mypage.ayna.com/alwahed2000/lm123.EXEßÑÇß:http://arabsgate.net/vb/attachment....p;postid=303718
áãä áã íÚÌÈå ÇáÈÑÇãÌ ÇáÓÇÈÞÉ Ýí ÊÔÛíá ÇáÓæäí ÈáÇí ÓÊÇíÔäps2http://www.nease.net/~jack/ps/cvgs141.zip
áÊÚÑíÈ ÇáÈÑÇãÌ ÇáÛíÑ ãÚÑÈÉResHackhttp://www.arabsgate.com/cgi-bin/so..._________________Best Regards,Mahmoud Hany,Country: Egypt,Title: IT instructor,Mobile: 0106354485
View user's profile Send private message blackwoodKiddieKiddie
Joined: 21 Sep 2004Posts: 22Location: Egypt
PostPosted: Thu Nov 18, 2004 1:26 pm Post subject: Continue........... Reply with quoteBack to topáÊÚÑíÈ ÇáÈÑÇãÌ ÇáÛíÑ ãÚÑÈÉResHackhttp://www.arabsgate.com/cgi-bin/so...jump.cgi?ID=333ãáÝ ÇáÊÚÑíÈ:http://www.tietovayla.fi/dsp/ftp/tools/ResHack.zip
ÞÇÚÏÉ ÈíÇäÇÊ ÖÎãÉ ÊÍæí ÇáÂáÇÝ ãä ÇáÃÑÞÇã ÇáÊÓáÓáíÉ ááÈÑÇãÌ ÇáÚÏíÏÉ ÇáãæÌæÏÉ ääÕÍ Èå ÈÔÏÉ ÝÅÐÇ áã ÊÌÏ ÑÞã ÈÑäÇãÌ ãÇ ÝÅäß ÓæÝ ÊÌÏå åäÇ ÈÇáÅÖÇÝÉ Åáì Ãä Èå ãÍÑß ÈÍË Úä ÇáÃÑÞÇã ÇáÊÓáÓáíÉ æÇáÔæÇÑÎ Ýí ÇáÅäÊÑäÊ ßáåÇ ÅÐÇ áã ÊÌÏ ØáÈß Ýíå ÝæÑÇðserial crackerhttp://trustme.fateback.com/Sc380win.zip
ÈÑÇãÌ ÇÊÕÇáÇÊÈÑäÇãÌ ÕÛíÑ áÅÑÓÇá æÅÓÊÞÈÇá ÇáÝÇßÓÇÊ ßãÇ Ãäå íÏÚã ÇááÛÉ ÇáÚÑÈíÉ ÊãÇãÇð æíæÌÏ Èå ãíÒÉ ÃÎÑì ÈÃäå íÓÊØíÚ ÅÑÓÇá ÝÇßÓÇÊ Åáì ÇáÈÑíÏ ÇáÅáßÊÑæäíFax2000http://www.anti-leech.com/antileech.cgi?sali90:fax2000sn/ J1018200381
ÈÑäÇãÌ ÑÇÆÚ ÌÏÇð æåæ íãßä ÇáãÓÊÎÏã ãä æÕá ÌåÇÒå ãÚ ÌåÇÒ ÂÎÑ Úáì Ãä íÊæÇÌÏ äÝÓ ÇáÈÑäÇãÌ ããÇ íãßä ãä ÌáÈ ÓØÍ ãßÊÈ ÇáßãÈíæÊÑ ÇáãÖíÝ Åáì ÌåÇÒß áÊÑì ÃÏÞ ÇáÊÝÇÕíá Çáããßäå Ýí ÇáÌåÇÒ ÇáãÖíÝ ßãÇ Ãäß ÊÓÊØíÚ ÇáæáæÌ Åáì ÔÈßÉ ÇáÅäÊÑäÊ ÅÐÇ ßÇä åÐÇ ÇáßãÈíæÊÑ ÇáãÖíÝ ÏÇÎá Åáì ÇááÅäÊÑäÊ ßãÇ ÈÅãßÇäß äÓÎ ÇáãáÝÇÊ æÅÚØÇÄå ãáÝÇÊ ÃÎÑì ÃËäÇÁ ÝÊÍ ÌáÓÉ Úãá ßãÇ ÈÅãßÇäß ÅäÔÇÁ ãÓÊÎÏãíä Ýí ÇáßãÈíæÊÑ ÇáãÖíÝ æÅÚØÇÆåã ÕáÇÍíÇÊ ßãÇ áæ Ãäß Ýí äÙÇã ÊãÇãÇð ÓÊÝÇÌà ÈÃäß ÚäÏ ÊÍÑíß ÇáãÇæÓ ãä ÌåÇÒß ÓæÝ ÊÊÍÑß äÝÓ ÇáÍÑßÉ Ýí ÇáßãÈíæÊÑ ÇáãÖíÝ NT æíäÏæÒLapLink2000http://www.anti-leech.com/antileech...i90:laplink2000sn/ L95-SSSS-994001-75B
æåæ ÈÑäÇãÌ Úãáí æÝÚÇá áÂáå ÇáÑÏ ÇáÊáÞÇÆí Úáì ÇáåÇÊÝ ßãÇ Ãäå íãßä Ãä íãíÒ ÕæÊ ÇáÝÇßÓ ÚäÏ ÝÊÍ ÇáÝÇßÓ ãä ÌåÉ ÇáÅÊÕÇá áßí íÍæá ÇáØáÈ Åáì ãÓÊáã ÇáÝÇßÓ Ãæ Ãí ÈÑäÇãÌ ÂÎÑAdvanced Call Centerhttp://www.anti-leech.com/antileech...ced_call_centerßÑÇß:http://www.anti-leech.com/antileech...ed_call_centerc
ÈÑäÇãÌ Úãáí áÅÑÓÇá æÅÓÊÞÈÇá ÇáÝÇßÓÇÊ íãßä Ãä íÊÔÇÑß ãÚ ÈÑÇãÌ ÃÎÑì ßÇáææÑÏMightyFax2.9Win98http://www.anti-leech.com/antileech...ghtyfax_29win98Name : wamadhat visitor Serial : RKS-7996413
ÈÑäÇãÌ íÓÇÚÏ Úáí ÇáßÊÇÈÉ ÈÇáÚÑÈíÉ Ýí ÇáÈÑÇãÌ ÇáÊí áÇíãßä ÇáßÊÇÈÉ ÈÇáÍÑæÝ ÇáÚÑÈíÉ ÈåÇ ãËá ÇáÝáÇÔ æÛíÑå æááÊÚÑÝ ÇßËÑ Úáì ããíÒÇÊ åÐÇ ÇáÈÑäÇãÌ æáãÒíÏ ãä ÇáÔÑÍhttp://www.geocities.com/cppnow/alwaseet.htm
Swish v1.51ÈÑäÇãÌ ÑÓã ÌÏíÏ íäÇÝÓ ÈÑäÇãÌ ÇáÝáÇÔ æÊÓÊØíÚ ÇáÇØáÇÚ ÇßËÑ Úáì ããíÒÇÊ åÐÇ ÇáÈÑäÇãÌ æáãÒíÏ ãä ÇáÔÑÍhttp://www.noorah.com/surprise_may.html
RealPlayer 7 PlusÑíá ÈáíÑ ÇáÕÏÇÑ ÇáÓÇÈÚ ãä ÇÔåÑ ÇáÈÑÇãÌ ÇáãÓÊÎÏãÉ ÇáÊí ÊÊíÍ áß ãÔÇåÏÉ ÇáÕæÑ ÇáÊáÝÒíæäíÉ æßÐáß ÓãÇÚ ÇáÕæÊ ãä ÎáÇá ÇáÇäÊÑäÊ ÑÞã ÇáÊÓÌíá ÓæÝ ÊÌÏå ãÚ ÇáãáÝ æáãÒíÏ ãä ÇáÔÑÍhttp://www.muslm.net/vb/showthread.php3?threadid=4716
RealPlayer 8 PlusäÓÎÉ ÌÏíÏÉ ãä åÐÇ ÇáÈÑäÇãÌ æåæ ãä ÇÔåÑ ÇáÈÑÇãÌ ÇáãÓÊÎÏãÉ ÇáÊí ÊÊíÍ áß ãÔÇåÏÉ ÇáÕæÑ ÇáÊáÝÒíæäíÉ æßÐáß ÓãÇÚ ÇáÕæÊ ãä ÎáÇá ÇáÇäÊÑäÊ æáãÒíÏ ãä ÇáÔÑÍhttp://www.ashya.net/learn/softlearn-realp.html
GoldWave 32-bit v4.21ÈÑäÇãÌ ÌæáÏ æÇíÝ æåæ ÈÑäÇãÌ íÞæã ÈÚãá ÊÓÌíáÇÊ ÕæÊíå æÈÏÞÉ ããÊÇÒÉ æáãÚÑÝÉ ÇáãÒíÏ Úä åÐÇ ÇáÈÑäÇãÌ æáãÒíÏ ãä ÇáÔÑÍhttp://abomaged.virtualave.net/ubb/...TML/000005.html
Ulead MediaStudio Pro 6.0ÊÍÑíÑ ÇáÝíÏíæÇáãÊÞÏã ÃÏÇÉ ÓåáÉ æÛíÑ ãÚÞÏÉ Êãßäß ãä Úãá ÚÑæÖ ÝíÏíæ ÕæÊ æÕæÑÉ Ýí ãäÊåì ÇáÞæÉ æÇáÌæÏÉ æáãÒíÏ ãä ÇáÔÑÍhttp://www.abobadr.net/3dsmax/bonus/mstudio6-1.htm
RealProducer Plus G2åÐÇ ÇáÈÑäÇãÌ íÓÊÎÏã áÊÍæíá äÓÞ ÇáãáÝÇÊ ÇáÊÇáíÉ : AVI, MOV, QT, WAV, AU, MPG Åáì ãáÝÇÊ RealPlayer ÇáÕæÊíå Ãæ ÇáÝíÏíæíå¡ ßÐáß íãßä ÈæÇÓØÉ åÐÇ ÇáÈÑäÇãÌ Úãá ÕÝÍÇÊ æíÈ ÕæÊíÉ æÝíÏíæíÉ Èßá ÓåæáÉ æáãÒíÏ ãä ÇáÔÑÍhttp://www.geocities.com/sultan33a/prod.htm
SoundForge 4.5hÊÓÊØíÚ ÈæÇÓØÉ åÐÇ ÇáÈÑäÇãÌ ãä äÞá ÇáÕæÊ ãä ÇáßÇÓíÊ Çáì ÇáßãÈíæÊÑ æãä Ëã Çáì ÇáÇäÊÑäÊ æáãÒíÏ ãä ÇáÔÑÍhttp://www.al-atheer.com/vb/showthr...p?threadid=5170
Macromedia Dreamweaver 3ãÕãã ÕÝÍÇÊ ããíÒ æÞæí æáãÒíÏ ãä ÇáÔÑÍhttp://www.saudint.com/dream/index.htm
Windows Media On-Demand Producer V4.0.0.85ÈÑäÇãÌ áÊÍæíá ÕíÛ WAV æ AVI Åáì ÕíÛÉ ÃÎÑì áäÔÑåÇ Úáì ÇáæíÈ ÈÓÑÚÉ æÓåæáÉ æáãÒíÏ ãä ÇáÔÑÍhttp://www.masaher.org/vb/showthread.php?threadid=4230
Edit Plus 2.01bÈÑäÇãÌ ããÊÇÒ áÊÍÑíÑ ÇáäÕæÕ æÕÝÍÇÊ ÇáÇäÊÑäÊ æáãÒíÏ ãä ÇáÔÑÍhttp://www.masaher.org/vb/showthread.php?threadid=2569
FrontPage XpressãÍÑÑ ÕÝÍÇÊ æíÈ íÏÚã ÇááÛÉ ÇáÚÑÈíÉ æáãÒíÏ ãä ÇáÔÑÍhttp://www.saqr.f2s.com/fpe.htm
Nero Burner 5.0.3.1ÊÓÊØíÚ ÈåÐÇ ÇáÈÑäÇãÌ ÊÍæíá ãáÝÇÊ (MP3) Çáì ãáÝÇÊ (CDA) Ãí Çáì ÇÓØæÇäÇÊ ÓãÚíÉ íãßä ÊÔÛíáåÇ ÈãÔÛá ÇáÓí Ïí ÇáãæÌæÏ ÈÇáÓíÇÑÉ æáãÒíÏ ãä ÇáÔÑÍhttp://www.moltaqa.com/forums/showt...3?threadid=3673
Photo-Brush V1.3cÈÑäÇãÌ ÑÓæãí ããÊÇÒ æÑÇÆÚ íÓÇÚÏß Úáì æÖÚ áãÓÇÊ ÌãÇáíÉ Úáì ÇáÕæÑÉ æíÌÚáß ÊÊÍßã ÈåÇ ãä ÎáÇá ÇáÇÏæÇÊ ÇáãÊæÝÑÉ ãÚ ÇáÈÑäÇãÌ æíÊÚÇãá ãÚ ÇáäÕ ÇáÚÑÈí æáãÒíÏ ãä ÇáÔÑÍhttp://www.mediachance.com/pbrush/
PicaView v1.32ÈÑäÇãÌ áÇÓÊÚÑÇÖ ÇáÕæÑ ÈÇáÖÛØ ÈÒ ÇáãÇæÓ ÇáÇíãä æáãÒíÏ ãä ÇáÔÑÍhttp://www.moltaqa.com/forums/showt...3?threadid=8195
ßíÝ ÊåíÁ ÌåÇÒß ááÇäÊÑäÊßíÝ ÊÊÕÝÍ ÇáÇäÊÑäÊhttp://209.237.157.69/alshamlani/droos.htm
ÔÑÍ ßíÝíÉ ÃÚÏÇÏ ÈÑíÏ HOTMAIL Úáì ÈÑäÇãÌ ÇáÃæÊ áæßhttp://www.omania.net/vip/ubb/Forum...27.html?3526757
ÔÑÍ ßíÝíÉ ÃÖÇÝÉ ÇáÚäÇæíä Çáì ÈÑíÏßhttp://www.omania.net/vip/ubb/Forum...89.html?3421787
ÔÑÍ ØÑíÞÉ ÊÑßíÈ Çáubbhttp://www.omania.net/vip/ubb/Forum4/HTML/001400.html
ßíÝíÉ ÇÓÊÎÏÇã ÇáãÇÓÍÉhttp://www.omania.net/vip/ubb/Forum...14.html?7387383
ßíÝíÉ ÃÑÓÇá ÑÓÇáÉ ÈåÇ ÕæÑÉ íÔÇåÏåÇ ÇáãÓÊÞÈá ÚäÏ ÝÊÍ ÇáÑÓÇáÉhttp://www.omania.net/vip/ubb/Forum...87.html?6613568
ÔÑÍ ßíÝ ÊÝÍÕ ÌåÇÒß ãä ÇáÝíÑæÓÇÊ Úä ØÑíÞ ÇáÃäÊÑäÊhttp://www.omania.net/vip/ubb/Forum...70.html?2718322
ÔÑÍ ßíÝíÉ ÇáÃÊÕÇá ãä ãæÞÚ hottelephonehttp://www.omania.net/vip/ubb/Forum4/HTML/001691.html
ßíÝíÉ ÅÑÓÇá æÅÓÊÞÈÇá ÇáÝÇßÓ Úä ØÑíÞ ÌåÇÒ ÇáßãÈíæÊÑhttp://www.crosswinds.net/~abuzaben/droos/winfax.htm
ÈÑÇãÌ ÇäÊÑäíÊ
Åä åÐÇ ÇáÈÑäÇãÌ íÞæã ÈãÓÇÚÏÊß Ýí ÊÍãíá ÇáãáÝÇÊ ãä Úáì ÇáÔÈßÉ ÈØÑíÞÉ ÓÑíÚÉ æÂãäÉ ÍíË ÈÅãßÇäå ãÊÇÈÚÉ ÊäÒíá åÐÇ ÇáãáÝ ÅÐÇ ÞØÚ ÇáÅÊÕÇá ÈÏæä ÇáÚæÏÉ áÊÍãíáå ãä ÌÏíÏ æíãßä ÅÏÇÑÉ ÇáãáÝÇÊ ÇáæÇÌÈ ÊÍãíáåÇ ÈÏÇÎáå æíÛáÞ ÇáÌåÇÒ áæÍÏå ÈÚÏ ÇáÊßãíá Åä ÃÍÈÈÊGetRight (32-bit) v4.5http://www.get-right.com/getrt450.exes/n: 146647922132
ÝíÑæÓÇÊ ÎØíÑÉ ÇÏÎá åäÇ ¡¡ æÑÈäÇ íÓÊÑhttp://aljar7.4t.com/virus.htm
Posted by Lamba at 12:52
Labels: Computer Tutorials
0 comments: Post a Comment
Newer Post Older Post Home Subscribe to: Post Comments (Atom) Search Our Tutorials Enter your search terms Web Easy-tutorials.blogspot.com Submit search form
Easy TutorialsHow to find MP3's real quickly How To Find Ftp's The Easy Way' How to find a remote IP How to Extend the life of the yousendit download links how to execute chm files in linux LabelsComputer Tutorials (205) PartnersAnimeDownloadzBleach Anime WallpaperLuxury Sports CarsNaruto CardsNaruto-WallpaperTech-Trail Blog Archive? 2007 (206) ? June (206) How to find MP3's real quickly How To Find Ftp's The Easy Way' How to find a remote IP How to Extend the life of the yousendit download l... how to execute chm files in linux How to edit right click menu How to Download-Upload Files from email How To Download Movies, From IRC How To Download Directly From Crackdb.com How To Download Bittorrent Files How to do a high Quality DivX rip How To Disable Picture And Fax Viewer How To Directly Go To Inbox, Write Msg, w Hotmail,... How To Delete Those Persistent Nasty Files How To Customise Your start Button How to copy songs from your iPod to your PC How To Copy A Dvd Which Will Play On A X Box How To Convert File System, fat - fat32 to ntfs How to clear Bios info 2 How to clear Bios info How To Change Thumbnail Size And Quality How to change the serial number used in Windows XP... How To Change A Cmos Battery HOW TO CAPTURE STREAMING MEDIA How To Bypass Web Filters, tutorial How to Bypass BIOS Passwords how to burn quicker in windows xp How to build a black box How To Boot Xp Faster (updated) How To Block Websties Without Software, block webs... HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING How To Backup Ps2 Games How to Back Up the Registry How To Add Your Own Windows Tips How To Add An Option To Print, the Contents of a F... How To Add A Url Address Bar To The Taskbar How To Access Your Folders From Your Taskbar How Long Has Your XP System Been Running How Linux boots How Download MP3s from Fanscape.com or other Strea... How Do U See Hidden Files, Using DOS.. How do I Test My VirusScan Installation How do I remove an extra operating system from by How do I overburn a CD with Nero How 2 Find EVERYTHING uploaded on Rapidshare Hide Drives and Partitions Hex, How to turn binary or decimal to hex have satallite tv for almost free IF not free!!! Have Notepad In Send To Hardware Firewall Hard drive Gone Bad Guide to Slipstreaming Service Pack 2 Guide to IIS Exploitation Guide For Getting Free Stuff Graffiti On Walls 4 Adobe Photoshop Cs 8.0 Google Tips & Tricks, (utilizing search engine) just type crack: app name Google Crack Search Go to Windows updates anonymously Getting started with Linux for nOObs! Getting older programs to run on Windows XP getting movies, mp3,games using google Getting Counter-strike Source To Work Getting A 1gb Yahoo China Account Get unlimited bandwidth from your host for free Get The Music You Want To Hear Get the Most Out of Your DVD Recorder Get In Windows 2000 As Administrator General Keyboard Shortcuts, General Keyboard Short... Freebsd Install Guide Free World Dialup Free Hosting FREE Hosting List php, mysql and more FREE Hosting For WAREZ Free Access To Websites Without Registering Formatting An Hdd, when fdisk won't Flashing A Video Card Bios [advanced Guide], Step-... FlashGet v1.4 - More Download Simultaneously FLASHGET INTEGRATION IN OPERA,MOZILLA,NETSCAPE Flashget Broadband Tweak FlashFXP FAQ Firefox Tweaks Firefox Speed Tweaks Finding Missing Files From A Release Find Stuff Excellent tricks and techniques of Google Hacks Evolution Of Computer Viruses History Of Viruses Erasing_Your_Presence_From_System_Logs Enable Folder and Icon Refresh, Win XP Tweak Email Forge, sends email from anyone Eliminate Ie's Autocomplete Reminder Ebay Hackcracktip Easily Find Serial Numbers On Google.., easy to do... Easily Disconnect-reconnect From Broadband Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1... DVD Regions Information Dvd Copying-ripping Definitions Dual Boot After The Fact Driverguide.com Dreamweaver Tut That Teaches U, to search a databa... Downloading Windows Media Streams Downloading Files, Using Archives And Images Download Timeframes Download Music And Video With ,edia Player9, quick... Download Mp3's Without Using Filesharing Download From Ftpz, Using Ftp Search Sitez Download from a paypal site without paying a penny... Download Free Music legally,, legally Dos User - No Boot Dos Disk, No Edit.com,How to cr... Doom 3 Speed Up, Guaranteed 40% better Do You Want To Learn Maya 6, look, some tutorials Discover New Music You'll Probably Love Disable Windows Logo Key Disable The Send Error Report, to Microsoft Disable Compression On Xp, NTFS partition, Disk Cl... Directx Explained Direct Link To Any Page You Want To In Hotmail Digital Photo Id Cards, Greate Info Digital Faq -learn Everything About Digital, Captu... Digital Camera Guide Delete Files From The Recent File List In Windows Delete An undeletable File Debug, Learn how crack windows Data Capacity of CDs [Tutorial] Creating Universal Ghost Usb Boot Disk And Cd Creating a Board aka Forum on your own PC ! Create One-click Shutdown And Reboot Shortcuts Create Bootable XP SP integrated CD Create Bootable Win XP SP1 CD(nero) Create An Ftp Server On Your Pc With Serv-u Create A Personal Screen Saver In Win Xp! Create A Huge File Crap Software Config Settings, How to set-up the f... Cracking Zip Password Files Cracking Bios, use the followin' code COPY X BOX GAMES! Converting to NTFS Converting Movies To Psp Format Convert To Basic And Dynamic Disks In Windows Xp Convert Stubborn Webpage To pdf connect A Psx Pad To Pc, Warning soldering is invo... Configuring ZoneAlarm Pro Security Settings, A Zon... Computer Matinence Computer Acronyms COMMON FTP ERROR CODES CMD Prompt here, add to folder context menu window... Closing Open Holes, System Security How to close o... Clear Unwanted Items From Add And Remove Choosing An Internet Merchant Account, nice info o... Choosing A Good Domain Name, ya..good name is impo... Check For Dos, Check to see if you are infected. Changing Default Location For Installing Apps Change Your Ip In Less Then 1 Minute Change The Storage Location Of 'my Documents', a b... Change The Default Location For Installing Apps Change Text on XP Start Button Change Music In The Malibu And The Pole Position, ... Caught A Virus? cannot use my password to get back into Windows XP... Calculating Offsets Bypass Internet Censorship Burning Bin & Cue Using Nero Burn a BIN without a CUE using NERO Burn .bin file Without A .cue file BulletProof FTP Server Tutorial Bulk Editing Of .xxx to .zip or .mp3 Broken Ie, How to fix it Border And Text Effects In Psp8, For use with PSP8... Boot Winxp Fast Boot Block Recovery For Free Block Adservers Bit Torrent Tutorials BIOS Update Procedure Bin & Cue Simple Tut Big Brother And Ndisuio.sys, A new Internet phenom... Beep Codes Error Codes Beep Code Manual Bandwidth Explained! Backtracking EMAIL Messages B.A. regedit Automatic Windows Installation, No keypress requir... Auto End Tasks to Enable a Proper Shutdown, Win XP... anti leech hacking tutorial Anonymity of Proxy, Anonymity Of Proxy learn it in... Anonymity All mIRC Commands ALL About Spyware All About Movie Tags (what Is A Dvdrip, Cam Etc.) All about ftp must read Advanced Shellcoding Techniques Accessing The Entire Internet On Your 3 Phone, U81... A Web Standards Checklist, How to make a proper we... A very small tut for RealMedia A Basic Guide to the Internet 8 People Can Use The Same Msn Dial Up Account 36 Graphics & Design Ebooks 250+ Tech books online 23 Ways To Speed WinXP, Not only Defrag 20 Great Google Secrets 16x Dvd+-rw Dl Dvd Writer Comparison Guide 10 Security Enhancements 10 reasons why PCs crash U must Know [PHP] Navigations -[ How to rip Dynamic Flash Template ]- #DataVault, Irc Warez (Ty 4 Moving X) Tech-TrailiPhone arrives UK iPhone Boss: iSorry Nintendo DS winner iPhone Hacked Google Introduces Voice-Activated Local Search Networks