Tuesday, 22 January 2013

Linux and Ubuntu eBooks Collection Download Free

Linux and Ubuntu eBooks Collection
191 PDF Books | 1.93 GB

Linux is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released October 5, 1991 by Linus Torvalds.

Ubuntu is a computer operating system based on the Debian Linux distribution and distributed as free and open source software, using its own desktop environment. It is named after the Southern African philosophy of ubuntu ("humanity towards others"). Ubuntu is designed primarily for use on personal computers, although a server edition also exists.

A PDF collection of 191 eBooks about Linux and Ubuntu. eBooks are sorted on publisher's name.

Books list:


Addison-Wesley Moving to Ubuntu Linux (2007).pdf
Addison-Wesley Multicore Application Programming, For Windows Linux and Oracle Solaris (2011).pdf
Addison-Wesley Open Source Web Development with LAMP, Using Linux Apache MySQL Perl and PHP (2002).pdf
Addison-Wesley Practical TCP-IP, Designing Using and Troubleshooting TCP-IP Networks on Linux and Windows (2003).pdf
Addison-Wesley Professional Linux Kernel Development 3rd (2010).pdf
Addison-Wesley Professional Spring Into Linux (2005).pdf
Apress Automating Linux and UNIX System Administration 2nd (2009).pdf
Apress Beginning SUSE Linux 2nd (2006).pdf
Apress Beginning Ubuntu LTS Server Administration, From Novice to Professional 2nd (2008).pdf
Apress Beginning Ubuntu Linux 3rd (2008).pdf
Apress Beginning Ubuntu Linux, From Novice to Professional 4th (2009).pdf
Apress Beginning Ubuntu Linux, From Novice to Professional 5th (2010).pdf
Apress Beginning Ubuntu Server Administration, From Novice to Professional (2008).pdf
Apress Beginning the Linux Command Line (2009).pdf
Apress Foundations of CentOS Linux, Enterprise Linux On the Cheap (2009).pdf
Apress Hardening Linux (2005).pdf
Apress Linux Recipes for Oracle DBAs (2009).pdf
Apress Linux System Administration Recipes, A Problem-Solution Approach (2009).pdf
Apress Mac for Linux Geeks (2009).pdf
Apress Pro Bash Programming, Scripting the GNU-Linux Shell (2009).pdf
Apress Pro Linux Embedded Systems (2010).pdf
Apress Pro Linux System Administration (2009).pdf
Apress Pro OpenSolaris, A New Open Source OS for Linux Developers and Administrators (2009).pdf
Apress Pro Oracle Database 10g RAC on Linux (2006).pdf
Apress Pro Oracle Database 11g RAC on Linux (2010).pdf
Apress Pro Ubuntu Server Administration (2009).pdf
Apress Professional Linux Programming (2004).pdf
Apress Smart Home Automation with Linux (2010).pdf
Apress The Definitive Guide to Linux Network Programming (2004).pdf
Apress The Definitive Guide to SUSE Linux Enterprise Server (2006).pdf
Apress Ubuntu Netbooks, The Path to Low-Cost Computing (2009).pdf
Apress Ubuntu on a Dime, The Path to Low-Cost Computing (2009).pdf
BS Publications Introduction to Linux, Installation and Programming (2008).pdf
CEHv6 Module 22 Linux Hacking.pdf
CHFI v3 Module 09 Windows Linux Macintosh.pdf
CHFI v3 Module 11 Linux Forensics.pdf
Course Technology Bootstrap Yourself with Linux-USB Stack, Design Develop Debug and Validate Embedded USB (2012).pdf
Course Technology Introducing Fedora, Desktop Linux (2011).pdf
Course Technology Linux+ 2005 in Depth (2005).pdf
Elsevier Digital Press Deploying Linux on the Desktop (2005).pdf
Hungry Minds Debian GNU-Linux Bible (2001).pdf
Hungry Minds Linux+ Certification Bible (2002).pdf
Hungry Minds Red Hat Linux Networking and System Administration (2002).pdf
Hungry Minds Red Hat Linux Security and Optimization (2002).pdf
IBM Learning Linux Integration with Windows (Samba), Student Exercises (Course Code QLX26) (2003).pdf
IBM Learning Linux Integration with Windows (Samba), Student Notebook (Course Code QLX26) (2003).pdf
IBM Press DB2 9 for Linux UNIX and Windows, DBA Guide Reference and Exam Prep 6th (2008).pdf
MCGraw-Hill Osborne CompTIA Linux+ Certification Study Guide (2008).pdf
MCGraw-Hill Osborne Fedora Core 7 and Red Hat Enterprise Linux, The Complete Reference (2007).pdf
MCGraw-Hill Osborne Hacking Exposed Linux 3rd (2008).pdf
MCGraw-Hill Osborne Hacknotes, Linux and Unix Security Portable Reference (2003).pdf
MCGraw-Hill Osborne Linux Administration, A Beginner's Guide 5th (2009).pdf
MCGraw-Hill Osborne Linux, The Complete Reference 6th (2008).pdf
MCGraw-Hill Osborne Red Hat Linux Administration, A Beginner's Guide (2003).pdf
MCGraw-Hill Osborne Ubuntu Certified Professional Study Guide (LPI-199) (2008).pdf
MCGraw-Hill Osborne Ubuntu Server Administration (2009).pdf
MacFreda Publishing Ubuntu Pocket Guide and Reference (2009).pdf
Manning Minimal Perl for UNIX and Linux People (2007).pdf
Morgan Kaufmann Linux Networking Clearly Explained (2001).pdf
New Riders Publishing Advanced Linux Programming (2001).pdf
New Riders Publishing Inside Linux (2000).pdf
New Riders Publishing Linux Clustering, Building and Maintaining Linux Clusters (2003).pdf
Newnes Embedded Linux Development Using Eclipse (2008).pdf
No Starch Press How Linux Works, What Every Super-User Should Know (2004).pdf
No Starch Press LINUX Appliance Design, A Hands-On Guide to Building Linux Appliances (2007).pdf
No Starch Press Linux Firewalls (2007).pdf
No Starch Press Linux in the Workplace, How to Use Linux in Your Office (2002).pdf
No Starch Press Programming Linux Games (2001).pdf
No Starch Press The Linux Command Line, A Complete Introduction (2012).pdf
No Starch Press The Linux Cookbook, Tips and Techniques for Everyday Use (2001).pdf
No Starch Press The Linux Programming Interface (2010).pdf
No Starch Press Ubuntu Linux for Non-Geeks 2nd (2007).pdf
OReilly Anatomy of a Linux System (2001).pdf
OReilly Building Embedded Linux Systems 2nd (2008).pdf
OReilly Building Secure Servers with LINUX (2003).pdf
OReilly Java Programming on Linux (2001).pdf
OReilly LINUX Network Administrator's Guide 2nd (2000).pdf
OReilly LINUX System Administration (2007).pdf
OReilly LINUX System Programming (2007).pdf
OReilly LPI Linux Certification in a Nutshell 3rd (2010).pdf
OReilly Learning Debian GNU Linux (1999).pdf
OReilly Learning Red Hat Enterprise Linux and Fedora 4th (2004).pdf
OReilly Linux Annoyances for Geeks (2006).pdf
OReilly Linux Cookbook (2004).pdf
OReilly Linux Desktop Hacks (2005).pdf
OReilly Linux Device Drivers 3rd (2005).pdf
OReilly Linux Networking Cookbook (2008).pdf
OReilly Linux Security Cookbook (2003).pdf
OReilly Linux Unwired (2004).pdf
OReilly Linux in a Nutshell 6th (2009).pdf
OReilly Linux iptables, Pocket Reference (2004).pdf
OReilly Managing RAID on Linux (2003).pdf
OReilly Python for Unix and Linux System Administration (2008).pdf
OReilly Running Linux 5th (2005).pdf
OReilly Ubuntu, Up and Running (2010).pdf
OReilly Understanding the Linux Kernel 3rd (2005).pdf
Oracle 10g Managing Oracle on Linux for DBAs_SG.pdf
Packt Publishing Designing and Implementing Linux Firewalls and QoS (2006).pdf
Packt Publishing Linux E-mail 2nd (2009).pdf
Packt Publishing Linux Shell Scripting Cookbook (2011).pdf
Packt Publishing Linux Thin Client Networks Design and Deployment (2007).pdf
Packt Publishing Scalix, Linux Administrator's Guide (2008).pdf
Palgrave Macmillan Introducing UNIX and Linux (2002).pdf
Paraglyph Press Degunking Linux (2005).pdf
Peachpit Press Visual QuickStart Guide Unix and Linux 4th (2009).pdf
Pragmatic Bookshelf Publishing Ubuntu Kung Fu, Over 300 Tips Tricks Hints and Hacks (2008).pdf
Prentice Hall A Practical Guide to Fedora and Red Hat Enterprise Linux 5th (2010).pdf
Prentice Hall A Practical Guide to Linux Commands, Editors and Shell Programming 2nd (2010).pdf
Prentice Hall A Practical Guide to Ubuntu Linux (2008).pdf
Prentice Hall A Practical Guide to Ubuntu Linux 3rd (2011).pdf
Prentice Hall Linux Administration Handbook 2nd (2007).pdf
Prentice Hall The Linux Programmer's Toolbox (2007).pdf
Prentice Hall The Official Ubuntu Book 5th (2010).pdf
Prentice Hall The Official Ubuntu Book 6th (2011).pdf
Prentice Hall The Official Ubuntu Server Book 2nd (2010).pdf
Prentice Hall UNIX and Linux System Administration Handbook 4th (2011).pdf
Prentice Hall Understanding the Linux Virtual Memory Manager (2004).pdf
QUE LPIC Prep Kit 101 General Linux 1 (2000).pdf
QUE Linux Programming by Example (2000).pdf
QUE Linux Socket Programming by Example (2000).pdf
QUE Practical Linux (2000).pdf
QUE Special Edition Using Linux 4th (1999).pdf
QUE Special Edition Using Linux 5th (2000).pdf
QUE Special Edition Using Linux System Administration (2000).pdf
SAMS Linux Complete, Command Reference (1997).pdf
SAMS Linux Hardware Handbook (2000).pdf
SAMS Linux Performance Tuning and Capacity Planning (2002).pdf
SAMS Linux Phrasebook (2006).pdf
SAMS Linux Shell Scripting with Bash (2004).pdf
SAMS Linux, Complete Command Reference (1997).pdf
SAMS Maximum Linux Security 2nd (2001).pdf
SAMS Oracle DBA on UNIX and Linux (2002).pdf
SAMS Red Hat Enterprise Linux 5 Administration Unleashed (2007).pdf
SAMS Teach Yourself Linux-Mandrake in 24 Hours (2000).pdf
SAMS Teach Yourself Red Hat Fedora 4 Linux All in One (2005).pdf
SAMS Teach Yourself Red Hat Linux Fedora in 24 Hours (2004).pdf
SAMS Ubuntu Unleashed (2011).pdf
SAMS Ubuntu Unleashed (2012).pdf
SAMS Ubuntu Unleashed 2010 (2010).pdf
SAMS openSUSE Linux Unleashed (2008).pdf
Springer Publishing Guide to Assembly Language Programming in Linux (2005) (Scan, OCR).pdf
Sybex CompTIA Linux+ Study Guide Edition (2009).pdf
Sybex LPIC-1 Linux Professional Institute Certification, Study Guide (2005).pdf
Sybex LPIC-1 Linux Professional Institute Certification, Study Guide 2nd (2009).pdf
Sybex Linux Administrator Street Smarts, A Real World Guide to Linux Certification Skills (2007).pdf
Sybex Linux Samba Server Administration (2001).pdf
Sybex Setting Up LAMP, Getting Linux Apache MySQL and PHP Working Together (2004).pdf
Syngress Publishing Hack Proofing Linux, A Guide to Open Source Security (2001).pdf
Syngress Publishing How to Cheat at Securing Linux (2007).pdf
Syngress Publishing UNIX and Linux Forensic Analysis DVD Toolkit (2008).pdf
Wiley Fedora 10 and Red Hat Enterprise Linux Bible (2009).pdf
Wiley Fedora 11 and Red Hat Enterprise Linux Bible (2009).pdf
Wiley Fedora Bible 2010 Edition, Featuring Fedora Linux 12 (2010).pdf
Wiley Installing and Administering Linux 2nd (2002).pdf
Wiley LPIC-1 Linux Professional Institute Certification Study Guide 2nd (2009).pdf
Wiley Linux All-in-One Desk Reference for Dummies 2nd (2006).pdf
Wiley Linux All-in-One Desk Reference for Dummies 3rd (2008).pdf
Wiley Linux All-in-One for Dummies 4th (2010).pdf
Wiley Linux Bible (2005).pdf
Wiley Linux Bible (2006).pdf
Wiley Linux Bible (2007).pdf
Wiley Linux Bible (2008).pdf
Wiley Linux Bible (2009).pdf
Wiley Linux Bible (2010).pdf
Wiley Linux Command Line and Shell Scripting Bible (2008).pdf
Wiley Linux Smart Homes for Dummies (2006).pdf
Wiley Linux Timesaving Techniques for Dummies (2004).pdf
Wiley Linux Toys II (2006).pdf
Wiley Linux for Dummies 7th (2006).pdf
Wiley Linux for Dummies 8th (2007).pdf
Wiley OpenSUSE 11.0 and SUSE Linux Enterprise Server Bible (2008).pdf
Wiley Professional Linux Kernel Architecture (2008).pdf
Wiley Red Hat Enterprise Linux 4 for Dummies (2005).pdf
Wiley Red Hat Fedora Linux 2 All-in-One Desk Reference for Dummies (2004).pdf
Wiley Red Hat Linux 9 for Dummies (2003).pdf
Wiley Red Hat Linux Networking and System Administration 3rd (2005).pdf
Wiley SUSE Linux 10 Bible (2006).pdf
Wiley SUSE Linux 10 for Dummies (2006).pdf
Wiley SUSE Linux Toolbox, 1000+ Commands for openSUSE and SUSE Linux Enterprise (2008).pdf
Wiley Sair Linux and GNU Certification Level II, Apache and Web Servers (2001).pdf
Wiley Ubuntu Linux Bible (2007).pdf
Wiley Ubuntu Linux Secrets (2009).pdf
Wiley Ubuntu Linux ToolBox, 1000+ Commands for Ubuntu and Debian Power Users (2008).pdf
Wiley Ubuntu, Powerful Hacks and Customizations (2010).pdf
Wordware Publishing Advanced Linux 3D Graphics Programming (2001).pdf
Wrox Press Beginning Linux Programming 4th (2008).pdf
Wrox Press Beginning Red Hat Linux 9 (2003).pdf
Wrox Press Professional LAMP, Linux Apache MySQL and PHP5 Web Development (2006).pdf
Wrox Press Professional Linux Kernel Architecture (2008).pdf
Wrox Press Professional Linux Programming (2007).pdf
Wrox Press Professional Ubuntu Mobile Development (2010).pdf

DOWNLOAD LINKS


Rapidgator:

http://uploaded.net/file/8m8l528v/sx3ih.Linux.and.Ubuntu.eBooks.Collection.part1.rar
http://uploaded.net/file/1umoat54/sx3ih.Linux.and.Ubuntu.eBooks.Collection.part2.rar

Lumfile:

Saturday, 26 May 2012

How to Crack a Program using OllyDbg



Software Cracking is the art of breaking security protections in a software. Generally software cracks are distributed in the form of patches to the original software or keygen programs which generate arbitrary key / serial combinations. A Cracker works his way through a program by disassembling it and understanding the security protections built into it. He then proceeds to alter the behavior of the program by finding and changing (patching) the routines responsible for the security mechanisms, in order to allow full unlimited access to the program. Alternately, he can also reverse engineer the key / serial comparison routines and write a keygen for the program. This allows users to generate arbitrary valid keys / serials for the program.

Download Now

Thursday, 3 May 2012

ATM Skimmers: Hacking the Cash Machine



Most of the ATM skimmers I’ve profiled in this blog are comprised of parts designed to mimic and to fit on top of existing cash machine components, such as card acceptance slots or PIN pads. But sometimes, skimmer thieves find success by swapping out ATM parts with compromised look-alikes.
ATM Card skimmer, using modified ATM component
ATM Card skimmer, using modified ATM component
On May 16, 2009, a company representative from ATM maker Diebold was servicing an ATM at a Bank of America branch in Sun Valley, Calif., when he discovered a skimming device and a camera that were attached to the machine. The technician took pictures of the camera and card skimmer (click picture at right for larger image), and then went into the branch to contact his supervisor.
But when the Diebold employee returned, the camera had been removed from the ATM, suggesting that the skimmer scammer was lurking somewhere nearby and had swooped in to salvage his remaining equipment. This is similar to what happened when an ATM technician discovered a compromised ATM a year ago.
Investigators of the present scam learned that the thief had somehow pried off the plastic cover of the ATM’s card acceptance slot and replaced it with an identical, compromised version that included a modified magnetic stripe reader and a flash storage device. The new card slot came with its own clear plastic face that was situated in front of the plastic one that was already attached to the ATM’s internal card reader (see picture below). The entire fraudulent device was glued onto the ATM with silicon.
Real card reader and skimmer overlayBelow are a few close-ups of the silicon-based magnetic stripe reader attached to the compromised card acceptance slot overlay.
A close-up of an ATM card skimmer
A close-up of an ATM card reader
Here’s a closer look at the electronics inside this handmade reader:
A close-up of an ATM card skimmerThe camera was in a trim piece that was attached above the PIN pad, cleverly designed to match the rest of the ATM in color and contour. Although the camera was removed by the thief, investigators said the trim piece was similar to a hidden camera found attached to an identical ATM at a Washington Mutual bank branch in the area.

Backside of hidden camera for ATM skimmer
Backside of hidden camera for ATM skimmer
In other skimmer cases, ATM thieves also have been known to hack apart and modify portions of the ATM. Last week, the Palm Beach Sun Sentinel published a story about crooks in Boynton Beach, Fla. who have been cutting the bottom of ATM card readers to remove the microchip inside and replace it with their own battery-operated card reader.
If you visit a cash machine that looks strange, tampered with, or out of place, then try to find another ATM. And remember, the most important security advice is to watch out for your own physical safety while using an ATM: Use only machines in public, well-lit areas, and avoid ATMs in  secluded spots. Also, cover the PIN pad with your hand when entering your PIN: That way, if even if the thieves somehow skim your card, there is less chance that they will be able to snag your PIN as well.