designed for Cyber Cafe owners of who need to control, charge for, and report on the use of computers for
gaming, Internet access or any program usage for up to 200 computers. Purchase package includes Server and Client software. CCPro easily block local drives or any other window that you wish your customer not to have access to. Customize all programs, buttons, backgrounds, colors, sounds, and rates for the client interface, as well as languages for both the server and the client software (Language Module Editor available to create your own language). A Print Manager add-on is now available. HTML sales reports can be generated, viewed, exported, and printed from any browser. All employee activities and sales are logged to help protect your profits and the integrity of your cafe.
DOWNLOAD Cyber Cafe Pro 5.250
PASS:warezcafe.org
Tuesday, November 4, 2008
Cyber Cafe Pro 5.250
Posted by srujan at 10:30 AM 0 comments
Labels: free software, software
Invisible Browsing 6.5
Invisible Browsing hides, changes or masks your IP address, letting you surf anonymously preventing your IP or other information to be collected without your permission.
Invisible Browsing is an efficient Internet Explorer Privacy Solution erasing automatically and in real time, all your online tracks.
Invisible Browsing allows you to change your IP anytime by routing your Internet traffic through overseas servers. Proxies are tested in advance providing a high speed anonymous Internet connection.
Invisible Browsing Features:
>> Masks, Hides Your IP Address
>> Automatic/Manual Mode
>> Proxy Driver
>> Auto Change Proxy
>> Blocks Potentially Harmful Code (ActiveX)
>> Blocks Invasive Code (JavaScript)
>> Browser Cleaner
>> Automatic/Manual Mode
The two running modes available, Automatic and Manual help both the advanced internet user and less experienced one to stay invisible online.
Through the automatic mode you can keep your privacy simple and easy by pressing a single button, while the manual running mode provides you advanced features like Proxy Driver.
>> Proxy Driver
The Proxy Driver is a new and major feature of Invisible Browsing.
As the proxies’ quality differs by download speed and response time, this feature allows you to adapt the proxy list provided by Invisible Browsing to your geographical location and your internet connection.
There is also an option available which allows you to import and test the proxy list that you find on the web.
>> Auto Change Proxy - Continuous - Automatic Anonymity
Invisible Browsing comes with an auto change proxy feature. This option allows you to define a list of proxies from the main list provided by Invisible Browsing and have them changed automatically at specified time period. In this way you are provided with continuous, automatic surfing anonymity.
>> Online Privacy - Browser Cleaning
Invisible Browsing maintains your online privacy by permanently erasing all your online tracks such as Browser Cookies, Internet URL History, Typed URL history, Auto Complete Forms, Password History and Temporary Files.
Invisible Browsing - Features
Invisible Browsing hides, changes or masks your IP address, letting you surf anonymously preventing your IP or other information to be collected without your permission.
Invisible Browsing is an efficient Internet Explorer Privacy Solution erasing automatically and in real time, all your online tracks.
Invisible Browsing - a complete Online Privacy Solution - providing you with inside and outside protection through a rich set of functionalities:
> Masks, Hides, Spoofs Your IP Address
Invisible Browsing will mask, hide or spoof your IP address, letting you surf anonymously preventing your IP or other information to be collected without your permission. It allows you to change your IP anytime by routing your Internet traffic through overseas servers.
All proxies are tested in advanced providing a high speed anonymous Internet connection.
> Automatic/Manual Mode
The two running modes available, Automatic and Manual help both the advanced internet user and less experienced one to stay invisible online.
Through the automatic mode you can keep your privacy simple and easy by pressing a single button, while the manual running mode provides you advanced features like Proxy Driver.
> Proxy Driver
The Proxy Driver is a new and major feature of Invisible Browsing.
As the proxies’ quality differs by download speed and response time, this feature allows you to adapt the proxy list provided by Invisible Browsing to your geographical location and your internet connection.
There is also an option available which allows you to import and test the proxy list that you find on the web.
> Auto Change Proxy
Invisible Browsing also comes with an auto change proxy feature. This options allows you to define a list of proxies from the main list provided by Invisible Browsing and changes them automatically at specified times interval. In this way you are providing with continuous,
automatic surfing anonymity.
> Browser Cleaning - Complete Online Privacy
Invisible Browsing maintains your online privacy by permanently erasing all your online tracks such as Browser Cookies, Internet URL History, Typed URL history, Auto Complete Forms and Password History, Internet Explore Favorites and Temporary Files.
> Blocks Potentially Harmful Code (ActiveX)
Invisible Browsing allows you to block ActiveX. ActiveX controls add interest to sites through multimedia etc., but ActiveX controls can also harbor malicious code (viruses). Most sites will function properly with ActiveX controls disabled.
> Blocks Invasive Code (JavaScript)
Invisible Browsing will also block invasive code such as JavaScript. Because JavaScript can be used in harmful way such as to capture your IP address, Invisible Browsing allows you to prevent JavaScript from running.
DOWNLOAD Invisible Browsing 6.5
Posted by srujan at 10:29 AM 0 comments
Labels: free software, software
FBI Wireless Hacking Live DVD
This version is for all systems except systems with the Intel B/G wireless cards (IPW2200).
- Live CD with all the tools you need to hack a WLAN / wireless Access point -
Linux Live-CD - OS runs from CD - 635 mb - .iso
- also used by the FBI …
WEP Hacking - The Next Generation
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104. The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, crac*ing WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP crac*ing program such as Aircrac* would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared. This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours. As Special Agent Bickers noted, “It doesn’t matter if you use 128 bit WEP keys, you are vulnerable!”
WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products.
WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver.
Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long.
A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of “strong” encryption while a 128 bit key has 104.
The IV is placed in encrypted frame’s header, and is transmitted in plain text.
Traditionally, cracking WEP keys has been a slow and boring process.
An attacker would have to capture hundreds of thousands or millions of packets a process that could take hours or even days, depending on the volume of traffic passing over the wireless network.
After enough packets were captured, a WEP cracking program such as Aircrack would be used to find the WEP key.
Fast-forward to last summer, when the first of the latest generation of WEP cracking tools appeared.
This current generation uses a combination of statistical techniques focused on unique IVs captured and brute-force dictionary attacks to break 128 bit WEP keys in minutes instead of hours.
DOWNLOAD FBI Wireless Hacking Live DVD
http://rapidshare.com/files/91343443/FBI_FIELD_KIT.part01.rar
http://rapidshare.com/files/91354777/FBI_FIELD_KIT.part02.rar
http://rapidshare.com/files/91354768/FBI_FIELD_KIT.part03.rar
http://rapidshare.com/files/91370255/FBI_FIELD_KIT.part04.rar
http://rapidshare.com/files/91370252/FBI_FIELD_KIT.part05.rar
http://rapidshare.com/files/91370253/FBI_FIELD_KIT.part06.rar
http://rapidshare.com/files/91381152/FBI_FIELD_KIT.part07.rar
http://rapidshare.com/files/91381174/FBI_FIELD_KIT.part08.rar
http://rapidshare.com/files/91381166/FBI_FIELD_KIT.part09.rar
http://rapidshare.com/files/91458174/FBI_FIELD_KIT.part10.rar
http://rapidshare.com/files/91458248/FBI_FIELD_KIT.part11.rar
http://rapidshare.com/files/91457511/FBI_FIELD_KIT.part12.rar
Posted by srujan at 10:28 AM 0 comments
Labels: tips and tricks, videos
PowerSuite 1.5
Simple Package.
Uniblue’s PowerSuite combines RegistryBooster 2, SpeedUpMyPC 3 and SpyEraser, into one advanced yet simple solution delivering improved information security, maximized computer performance and increased system stability.
How Does PowerSuite Work?
Although firewalls and anti-virus products are important, on their own they won’t be enough to protect you from intrusive spyware, or improve your PC’s performance. This is why PowerSuite has been developed to be the perfect support bundle for Windows PC users, operating with existing firewalls and antivirus programs.
PowerSuite combines Uniblue’s range of award winning and market leading utility products into a single package that provides advanced functionality without compromising simplicity or ease of use. By integrating RegistryBooster 2, SpeedUpMyPC 3 and SpyEraser, home and business users are offered a range of professional level tools that deliver the outstanding levels of performance, stability and security that the modern computer user requires and demands.
Use PowerSuite to:
* Maximize your computer’s processing power
* Accelerate data download speeds
* Remove spyware, increasing data protection and security
* Scan and optimize your PC’s registry, improving system stability
* Benefit from other privacy protection and file shredding features
DOWNLOAD PowerSuite 1.5
Posted by srujan at 10:26 AM 0 comments
Labels: free software
AutoRun Design Specialty 8.0.1.1
AutoRun Design Specialtyis a more powerful visual tool to create professional autorun (autoplay) interfaces and presentations for your CD/DVDs. It is the easiest way to create, edit professional autorun (autoplay) interface and generate autorun files for CD/DVDs in a WYSIWYG environment, just click, point, place and test (preview). So all is visual, fast, simple. AutoRun Design Specialty is easy to learn, with demos and wizards you can get started in just minutes!
Main Page, Splash Screen, Screen Background, Agreement Form, Security Form, Exit Form and unlimited Sub Pages. Page Shadow, Page FadeIn and FadeOut, and many effects.
19 Objects: Button, ImageButton, Image, Bevel, Label, ALabel,ALinkLabel, Text, ScrollText, Memo, RichText, Flash, Browser, AVI, MediaPlayer, SlideShow, Edit, RadioButton and CheckBox.
DOWNLOAD AutoRun Design Specialty 8.0.1.1
Posted by srujan at 10:26 AM 0 comments
Labels: free software, software