Monday, September 17, 2007

Network+ Study Guide




Author: David Groth, Toby Skandier


http://rapidshare.com/files/9260199/Network___05.4Ed.rar.html

Sunday, September 16, 2007

Hackers area


Access Diver

AccessDiver is a security tester for WEB sites. It incorporates a set of powerful features which help you find and organize failures and weaknesses from your web site. Here is a quick list of the features available: Contains fast security that uses up to 100 bots to do its analysis. Detects directory failures by comparing hundreds of known problems to your site. AccessDiver is fully proxy compliant and has a proxy analyzer (speed / anonymity) and a proxy hunter built-in. A built-in word leecher helps you increase the size of your dictionaries to expand and reinforce your analysis. A powerful task automizer manages your jobs transparently. You can tackle unlrelated tasks while Accessdiver is working, saving you time. An on-the-fly word manipulator lets you increase the strength of your dictionaries easily when doing your analyzis. A PING tester is included to tell you the efficiency of your site and the efficiency of an Internet address you would like to access. A DNS resolver lets you look up the host name of an IP address and reverse the process to learn an unknown host name. A feature called 'HTTP debugger' helps your understanding of how actual HTTP protocol works. It opens up the process so you see what really happens during a connection problem. A WHOIS gadget lets you retrieve owner information of a domain name (in case you would like to buy the domain or contact the actual owner). An update notifier automatically tells you when a new version of AccessDiver is available. And I welcome you to discover the other extremely features by yourself... A leeching system allows you to collect new proxies to make better proxy lists n A proxy Hunting system allows you to get even more proxies by scanning IP regions... A file splitting and file merging system allows you to mixup files, or cut them in mutiple parts. That's good to handle wordlists or proxylists.

DOWNLOAD HERE


http://www.accessdiver.com/php/getad.php

BRUTUS

Brutus is one of the fastest, most flexible remote password crackers you can get your hands on - it's also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page. Development continues so new releases will be available in the near future. Brutus was written originally to help me check routers etc. for default and common passwords Features Brutus version AET2 is the current release and includes the following authentication types : HTTP (Basic Authentication) HTTP (HTML Form/CGI) POP3 FTP SMB Telnet Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples. The current release includes the following functionality : Multi-stage authentication engine 60 simultaneous target connections No username, single username and multiple username modes Password list, combo (user/password) list and configurable brute force modes Highly customisable authentication sequences Load and resume position Import and Export custom authentication types as BAD files seamlessly SOCKS proxy support for all authentication types User and password list generation and manipulation functionality HTML Form interpretation for HTML Form/CGI authentication types Error handling and recovery capability inc. resume after crash/failure.

DOWNLOAD

http://www.hoobie.net/brutus/brutus-aet2.zip

Ethical hacking tool

Net Tools is cutting-edge security and network monitoring software for the Internet and Local Area Networks, providing clients with the ability and confidence to meet the challenges of tomorrow's technology. Keeping pace with the industry trends, we offer professional tools that support the latest standards, protocols, software, and hardware for both wired and wireless networks. The main goal is the creation of high quality software. Net Tools is a very strong combination of network scanning, security, file, system, and administrator tools useful in diagnosing networks and monitoring your PC and computer's network connections for system administrators. Next to the essential core tools it includes a lot of extra valuable features. It’s a Swiss Army knife for everyone interested in a set of powerful network tools for everyday use. This all-in-one toolkit includes also a lot of handy file and system utilities next to the huge amount of network tools. The menus are fully configurable, so in this way you won’t get lost in the extremely large amount of essential tools. All the additional features will make this application a must have for all system administrators. There are numerous constructive and valuable applications included in Net Tools that can be used for a great amount of purposes. The latest version of Net Tools is hybrid; it means that it’s capable of working together with applications that are made and designed for Net Tools, so in this way more flexibility and user-friendliness is obtained. This software is designed for the Microsoft Windows OS (Windows 98, NT, 2000, 2003, XP, Vista). It’s entirely compatible and has thoroughly been tested on Windows XP. With the 150+ tools it is a great collection of useful tools for network users. The size of Net Tools 4.5.74 is approximately 25 Mb.

Contents Net Tools 4.5 (build 74) contains a whole variety of network tools. Here is a list of the most important tools:

1) IP Address Scanner 2) IP Calculator 3) IP Converter 4) Port Listener 5) Port Scanner 6) Ping 7) NetStat (2 ways) 8) Trace Route (2 ways) 9) TCP/IP Configuration 10) Online - Offline Checker 11) Resolve Host & IP 12) Time Sync 13) Whois & MX Lookup 14) Connect0r 15) Connection Analysator and protector 16) Net Sender 17) E-mail seeker 18) Net Pager 19) Active and Passive port scanner 20) Spoofer 21) Hack Trapper 22) HTTP flooder (DoS) 23) Mass Website Visiter 24) Advanced Port Scanner 25) Trojan Hunter (Multi IP) 26) Port Connecter Tool 27) Advanced Spoofer 28) Advanced Anonymous E-mailer 29) Simple Anonymous E-mailer 30) Anonymous E-mailer with Attachment Support 31) Mass E-mailer 32) E-mail Bomber 33) E-mail Spoofer 34) Simple Port Scanner (fast) 35) Advanced Netstat Monitoring 36) X Pinger 37) Web Page Scanner 38) Fast Port Scanner 39) Deep Port Scanner 40) Fastest Host Scanner (UDP) 41) Get Header 42) Open Port Scanner 43) Multi Port Scanner 44) HTTP scanner (Open port 80 subnet scanner) 45) Multi Ping for Cisco Routers 46) TCP Packet Sniffer 47) UDP flooder 48) Resolve and Ping 49) Multi IP ping 50) File Dependency Sniffer 51) EXE-joiner (bind 2 files) 52) Encrypter 53) Advanced Encryption 54) File Difference Engine 55) File Comparasion 56) Mass File Renamer 57) Add Bytes to EXE 58) Variable Encryption 59) Simple File Encryption 60) ASCII to Binary (and Binary to ASCII) 61) Enigma 62) Password Unmasker 63) Credit Card Number Validate and Generate 64) Create Local HTTP Server 65) eXtreme UDP Flooder 66) Web Server Scanner 67) Force Reboot 68) Webpage Info Seeker 69) Bouncer 70) Advanced Packet Sniffer 71) IRC server creater 72) Connection Tester 73) Fake Mail Sender 74) Bandwidth Monitor 75) Remote Desktop Protocol Scanner 76) MX Query 77) Messenger Packet Sniffer 78) API Spy 79) DHCP Restart 80) File Merger 81) E-mail Extractor (crawler / harvester bot) 82) Open FTP Scanner 83) Advanced System Locker 84) Advanced System Information 85) CPU Monitor 86) Windows Startup Manager 87) Process Checker 88) IP String Collecter 89) Mass Auto-Emailer (Database mailer; Spammer) 90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server) 91) Fishing Port Scanner (with named ports) 92) Mouse Record / Play Automation (Macro Tool) 93) Internet / LAN Messenger Chat (Server + Client) 94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control 95) Hash MD5 Checker 96) Port Connect - Listen tool 97) Internet MAC Address Scanner (Multiple IP) 98) Connection Manager / Monitor 99) Direct Peer Connecter (Send/Receive files + chat) 100) Force Application Termination (against Viruses and Spyware) 101) Easy and Fast Screenshot Maker (also Web Hex Color Picker) 102) COM Detect and Test 103) Create Virtual Drives 104) URL Encoder 105) WEP/WPA Key Generator 106) Sniffer.NET 107) File Shredder 108) Local Access Enumerater 109) Steganographer (Art of hiding secret data in pictures) 110) Subnet Calculater 111) Domain to IP (DNS) 112) Get SNMP Variables 113) Internet Explorer Password Revealer 114) Advanced Multi Port Scanner 115) Port Identification List (+port scanner) 116) Get Quick Net Info 117) Get Remote MAC Address 118) Share Add 119) Net Wanderer 120) WhoIs Console 121) Cookies Analyser 122) Hide Secret Data In Files 123) Packet Generator 124) Secure File Splitting 125) My File Protection (Password Protect Files, File Injections) 126) Dynamic Switch Port Mapper 127) Internet Logger (Log URL) 128) Get Whois Servers 129) File Split&Merge 130) Hide Drive 131) Extract E-mails from Documents 132) Net Tools Mini (Client/Server, Scan, ICMP, Net Statistics, Interactive, Raw Packets, DNS, Whois, ARP, Computer's IP, Wake On LAN) 133) Hook Spy 134) Software Uninstaller 135) Tweak & Clean XP 136) Steganographic Random Byte Encryption 137) NetTools Notepad (encrypt your sensitive data) 138) File Encrypter/Decrypter 139) Quick Proxy Server 140) Connection Redirector (HTTP, IRC, ... All protocols supported) 141) Local E-mail Extractor 142) Recursive E-mail Extractor 143) Outlook Express E-mail Extractor 144) Telnet Client 145) Fast Ip Catcher 146) Monitor Host IP 147) FreeMAC (MAC Address Editor) 148) QuickFTP Server (+user accounts support) 149) NetTools Macro Recorder/Player (Keybord and Mouse Hook) 150) Network Protocol Analyzer 151) Steganographic Tools (Picture, Sounds, ZIP Compression and Misc Methods) 152) WebMirror (Website Ripper) 153) Extra Tools (nmap console & win32 version) 154) ...

DOWNLOAD

http://www.x-devs.com/mab/NetTools4.5.74.zip

You can download the .NET Framework from the Microsoft site by clicking here. If you are not sure the Microsoft .NET Framework is installed click here. Mirrors: { www.softpedia.com } (version 4.5.74) { www.download.com } (version 4.5.47) { www.hackerscenter.com } (version 4.5.74) { www.freewarefiles.com } (version 4.5.74) { www.freewarelist.org } (version 4.5.74) { www.planetmirror.com } (version 4.5.74) { www.uptodown.com } (version 4.5.74) { www.cowscorpion.com }(version 4.5.47) { www.astalavista.com } (version 2.0) { www.astalavista.com } (version 3.1) { www.gpes.cy.edu.tw } (version 3.1) { torrent: www.thepiratebay.org } (version 4.5.74)


Big Hacking Kit


Golden eye 2005
HellLabs Proxy Checker v7.4.18
HostScan v1.6.5.531
Invisible Browsing v4.0
IPScanner v1.86
Ascii Factory 0.6
Cool Beans NFO Creator v2.0.1.3
Dizzy v1.10
Feuer’s NFO File Maker v2.0
Ims NFO&DIZ Maker 1.87
Inserter v1.12
NFO Creator v3.5.2
NFO Maker 1.0
Patchs All In One 2005
SoftIce 4.05 -Win 2000-XP
IP Address Scanner
IP Calculator
IP Converter
Port Listener
Port Scanner April 2005
Ping
NetStat 2005
Cool Trace Route 2005
TCP/IP Configuration
Online - Offline Checker
Resolve Host & IP
Time Sync
Whois & MX Lookup
Connect0r
Connection Analysator and prtotector
Net Sender April 2005
E-mail seeker
Cool Net Pager
Active and Passive port scanner
Spoofer
Hack Trapper
HTTP flooder (DoS)
Mass Website Visiter
Advanced Port Scanner
Trojan Hunter Multi IP April 2005
Port Connecter Tool
Advanced Spoofer
Cool Advanced Anonymous E-mailer April 2005
Simple Anonymous E-mailer
Anonymous E-mailer with Attachment Support
Mass E-mailer
E-mail Bomber
E-mail Spoofer
Simple Port Scanner (fast)
Advanced Netstat Monitoring
X Pinger
Web Page Scanner
Cool Fast Port Scanner
Deep Port Scanner
Fastest Host Scanner (UDP)
Get Header
Open Port Scanner
Multi Port Scanner
HTTP scanner (Open port 80 subnet scanner)
Multi Ping for Cisco Routers
TCP Packet Sniffer
UDP flooder
Cool Resolve and Ping
Multi IP ping
File Dependency Sniffer
EXE-joiner
Encrypter
Advanced Encryption
File Difference Engine
File Comparasion
Mass File Renamer
Add Bytes to EXE
5Cool Cool Variable Encryption
59) Simple File Encryption
60) ASCII to Binary
Enigma
Password Unmasker
Credit Card Number Validate and generate
Create Local HTTP Server
eXtreme UDP Flooder
Web Server Scanner
Force Reboot
Cool Webpage Info Seeker
Bouncer
Advanced Packet Sniffer
IRC server creater
Connection Tester
Fake Mail Sender
Bandwidth Monitor
Remote Desktop Protocol Scanner
MX Query
Messenger Packet Sniffer
Cool API Spy
DHCP Restart
File Merger
E-mail Extractor (crawler / harvester bot)
Open FTP Scanner
Fast Patch
Predator’s Extreme Loader Generator 0.3
Srlzer - Patch generator
Yoda’s Process Patcher
Buddha Patch File Creator 2.2
CodeFusion
Cool Beans NFO Creator 2.0.1 build 3
Patch Creation Wizard v1.2
Patch On The Fly v0.75
Rlzer
RTD - WINpatch v1.0
Tola’s Patching Engine

Analysis :
OllyDbg 1.10
W32Dasm 8.93 /w patch
PEiD 0.92

Rebuilding :
ImpRec 1.6
Revirgin 1.3
LordPE RoyalITS

Packers :
FSG 2.0
MEW 11 1.2 SE
UPX 1.25

Patchers :
dUP 1.11
CodeFusion 3.0
Universal Patcher Pro 2.0
aPatch 1.07 (*New)
PMaker 1.1.0.0 (*New)
Tola’s Patch Engine 2.03b (*Nuevo)
ABEL Loader 2.31 (*Nuevo)

HEX Editor :
BView 5.6.2

Decompilers :
DeDe 3.50.04
Flasm

Unpackers :
Alot! ( ASProtect, ACProtect etc )

Others :

FileMon

Download CODE



http://rapidshare.com/files/39841518/appz1.zip
http://rapidshare.com/files/39840818/appz2.zip

Flux Hacking Kit v1.0

Real Warez Downloads!
This is the first release of a remote administration tool named Flux. This application allows you to administer a remote computer, capable of bypassing a router or protected by a firewall

http://rapidshare.com/files/32228163/Flux.zip
http://rapidshare.com/files/37171513/addon.exe.rar

For more information and hacking videos do visit

http://wehackershackingtools.blogspot.com/






Thursday, September 13, 2007

Cisco documentation





Contents:
Introduction
Application Networking Services
Broadband Cable
Cisco Interfaces and Modules
Cisco IOS Software
Cisco IOS XR Software
Interoperability Systems
Network Management
Optical Networking
Routers
Security and VPN
Server Networking and Virtualization
Service Exchange
Storage Networking
Switches
Universal Gateways and Access Servers
Video
Voice and Unified Communications
Wireless
Obtaining Documentation
Cisco.com
Product Documentation DVD
Ordering Documentation
Documentation Feedback
Cisco Product Security Overview
Reporting Security Problems in Cisco Products
Product Alerts and Field Notices
Obtaining Technical Assistance
Cisco Support Website
Submitting a Service Request
Definitions of Service Request Severity
Obtaining Additional Publications and Infor


http://rapidshare.com/files/44690232/CDA2oo6.part01.rar
http://rapidshare.com/files/44694727/CDA2oo6.part02.rar
http://rapidshare.com/files/44698985/CDA2oo6.part03.rar
http://rapidshare.com/files/44703268/CDA2oo6.part04.rar
http://rapidshare.com/files/44707684/CDA2oo6.part05.rar
http://rapidshare.com/files/44713002/CDA2oo6.part06.rar
http://rapidshare.com/files/44718169/CDA2oo6.part07.rar
http://rapidshare.com/files/44723396/CDA2oo6.part08.rar
http://rapidshare.com/files/44728619/CDA2oo6.part09.rar
http://rapidshare.com/files/44733670/CDA2oo6.part10.rar
http://rapidshare.com/files/44739198/CDA2oo6.part11.rar
http://rapidshare.com/files/44745412/CDA2oo6.part12.rar
http://rapidshare.com/files/44751095/CDA2oo6.part13.rar
http://rapidshare.com/files/44757027/CDA2oo6.part14.rar
http://rapidshare.com/files/44763584/CDA2oo6.part15.rar
http://rapidshare.com/files/44770281/CDA2oo6.part16.rar
http://rapidshare.com/files/44800957/CDA2oo6.part17.rar
http://rapidshare.com/files/44834766/CDA2oo6.part18.rar
http://rapidshare.com/files/44839752/CDA2oo6.part19.rar
http://rapidshare.com/files/44843445/CDA2oo6.part20.rar
http://rapidshare.com/files/44846564/CDA2oo6.part21.rar
http://rapidshare.com/files/44849501/CDA2oo6.part22.rar
http://rapidshare.com/files/44853139/CDA2oo6.part23.rar
http://rapidshare.com/files/44855986/CDA2oo6.part24.rar
http://rapidshare.com/files/44859021/CDA2oo6.part25.rar
http://rapidshare.com/files/44861520/CDA2oo6.part26.rar
http://rapidshare.com/files/44864078/CDA2oo6.part27.rar
http://rapidshare.com/files/44866551/CDA2oo6.part28.rar
http://rapidshare.com/files/44868790/CDA2oo6.part29.rar
http://rapidshare.com/files/44870978/CDA2oo6.part30.rar
http://rapidshare.com/files/44873329/CDA2oo6.part31.rar
http://rapidshare.com/files/44875509/CDA2oo6.part32.rar
http://rapidshare.com/files/44878009/CDA2oo6.part33.rar
http://rapidshare.com/files/44880058/CDA2oo6.part34.rar
http://rapidshare.com/files/44882115/CDA2oo6.part35.rar
http://rapidshare.com/files/44888252/CDA2oo6.part36.rar
http://rapidshare.com/files/44892008/CDA2oo6.part37.rar
http://rapidshare.com/files/44896122/CDA2oo6.part38.rar
http://rapidshare.com/files/44900776/CDA2oo6.part39.rar
http://rapidshare.com/files/44905505/CDA2oo6.part40.rar
http://rapidshare.com/files/44919647/CDA2oo6.part41.rar
http://rapidshare.com/files/44925072/CDA2oo6.part42.rar
http://rapidshare.com/files/44931489/CDA2oo6.part43.rar
http://rapidshare.com/files/44938136/CDA2oo6.part44.rar
http://rapidshare.com/files/44943850/CDA2oo6.part45.rar
http://rapidshare.com/files/44949926/CDA2oo6.part46.rar
http://rapidshare.com/files/44963965/CDA2oo6.part47.rar
http://rapidshare.com/files/44970869/CDA2oo6.part48.rar
http://rapidshare.com/files/44977799/CDA2oo6.part49.rar
http://rapidshare.com/files/44983863/CDA2oo6.part50.rar
http://rapidshare.com/files/44989621/CDA2oo6.part51.rar
http://rapidshare.com/files/44994970/CDA2oo6.part52.rar
http://rapidshare.com/files/45000231/CDA2oo6.part53.rar
http://rapidshare.com/files/45006164/CDA2oo6.part54.rar
http://rapidshare.com/files/45012088/CDA2oo6.part55.rar
http://rapidshare.com/files/45018360/CDA2oo6.part56.rar
http://rapidshare.com/files/45024408/CDA2oo6.part57.rar
http://rapidshare.com/files/45030617/CDA2oo6.part58.rar
http://rapidshare.com/files/45036251/CDA2oo6.part59.rar
http://rapidshare.com/files/45041563/CDA2oo6.part60.rar
http://rapidshare.com/files/45046560/CDA2oo6.part61.rar
http://rapidshare.com/files/45049535/CDA2oo6.part62.rar

A good hacking tool site

Hackers Hacking Downloads

http://hackersdownload.blogspot.com/search/label/Hacking%20Tools

Learnkey - Cisco MCNS (Managing Cisco Network Security) 6 CD




links:


http://rapidshare.com/files/51297104/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part15.rar
http://rapidshare.com/files/51296476/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part16.rar
http://rapidshare.com/files/51296273/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part13.rar
http://rapidshare.com/files/51296106/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part14.rar
http://rapidshare.com/files/51295339/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part11.rar
http://rapidshare.com/files/51295138/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part12.rar
http://rapidshare.com/files/51294416/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part10.rar
http://rapidshare.com/files/51293771/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part9.rar
http://rapidshare.com/files/51292835/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part7.rar
http://rapidshare.com/files/51292716/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part8.rar
http://rapidshare.com/files/51291076/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part6.rar
http://rapidshare.com/files/51289325/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part5.rar
http://rapidshare.com/files/51288613/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part4.rar
http://rapidshare.com/files/51288133/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part3.rar
http://rapidshare.com/files/51287662/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part1.rar
http://rapidshare.com/files/51287185/Learnkey-Cisco.MCNS.Managing.Cisco.Network.Security.6.CD.part2.rar

Wednesday, September 12, 2007

Install a Local Area Network (LAN)




Install a Local Area Network (LAN) - Video Tutorial

Here is a very nice, useful and small video Tutorial about How to Physicaly Install a Local Area Network. In this video, you will learn the differnce of a HUB and a Switch, a Cable modem and a Wireless modem. You will learn how connect the parts to each other and lots more...


http://rapidshare.com/files/53319764/LAN_-_Tutorial.wmv

Cisco AIO Tutorials LABS





Content:

Cisco_Press_-_Introduction_to_Cisco_Router_Configuration.rar
CCNA_SEMESTER_2_V2.1.2.ISO
CCNA_SEMESTER_1_V2.1.2.ISO
Cisco_IT_Builder.rar
CNAP Fundamentals_of_Wireless_LANS_V1.0.iso
CNAP Fundamentals_of_Wireless_Lan_V1.1.iso
CNAP Fundamentals_of_Wireless_LANs_V1.1.iso
CNAP Fundamentals_of_Java_Programming_V1.2.iso
CNAPFundamentals_of_Java_Programming_V1.1.iso
CNAP CCSP_Cisco_Secure_PIX_Firewall_Advanced_V_2.0.iso
CNAP Fundamentals_of_Network_Security_V_1.1.iso
CNAP CCNA_3.0_Bridge_1.iso
CNAP CCNA_Networking_Basics_V3.0.iso
CNAP Fundamentals_of_Web_Design_V1.2.iso
CNAP Intrusion_Detection_System_V2.1.iso
CNAP IT_Essentials_I_-_PC_Hardware_and_Software_V2.0.iso
CNAP IT_Essentials_II_-_Network_Operating_Systems_V2.0.iso
CNAP Virtual_Private_Networks_V1.01.iso
CNAP Fundamentals_Of_UNIX_V2.0.iso
CNAP PIX_Firewall_Advanced_V2.0.iso
CNAP PIX_Firewal_Advanced_V1.01.iso
CNAP PIX_Firewall_Fundamentals_V1.11.iso

===========================================================================
In this tutorial most of them are in iso files format, Its not just a video tutorials, those are mostly Labs, it means you open an html file inside that, and you will see 2 parts, one in flash and another in text.

At each lesson you finished, you will get to challange flash where you have to practice things you have learned, its like working on real cisco device.

You'll have the flash SSH shell, and you have to type in the cisco commands, and in case you make a mistake, you'll get wrong alerts and you can then either correct it or need to read and listen to the section again and see the correct answer by clicking the DEMO option, that will show you the entire solution.

by the way, this is original cisco materials that you need to pay $$$$$$ for it, but for keen learners it is for freeee!!



the links:

http://rapidshare.com/files/43201523/Cisco_AIO.part01.rar
http://rapidshare.com/files/43202919/Cisco_AIO.part02.rar
http://rapidshare.com/files/43200167/Cisco_AIO.part03.rar
http://rapidshare.com/files/43204128/Cisco_AIO.part04.rar
http://rapidshare.com/files/43205246/Cisco_AIO.part05.rar

CCNA Deluxe





http://www.megaupload.com/?d=PFQAS9U2

CCNA Discovery v4.0, New CCNA Curriculum


http://rapidshare.com/files/47652434/CCNA_Disc_v4.0.part1.rar
http://rapidshare.com/files/47652435/CCNA_Disc_v4.0.part2.rar
http://rapidshare.com/files/47652436/CCNA_Disc_v4.0.part3.rar
http://rapidshare.com/files/47652437/CCNA_Disc_v4.0.part4.rar

CCNA Exploration v4.0, New CCNA Curriculum



http://rapidshare.com/files/47383764/Exp_v4.0.part1.rar
http://rapidshare.com/files/47383765/Exp_v4.0.part2.rar
http://rapidshare.com/files/47383766/Exp_v4.0.part3.rar
http://rapidshare.com/files/47383767/Exp_v4.0.part4.rar

Eccouncil - Hacking forensic INVESTIGATOR




Course Description The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute. Many of today's top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the "cyber-criminal." It is no longer a matter of "will your organization be comprised (hacked)?" but, rather, "when?" Today's battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cyber-criminal, then this is the course for you.

Who Should Attend
Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, IT managers

Prerequisites
It is strongly recommended that you attend the CEH class before enrolling into CHFI program.

Duration:
5 days (9:00 – 5:00)
Certification
The CHFI 312-49 exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the CHFI certification.

Course Outline v2

Module I: Computer Forensics in Today's World
Introduction
History of Forensics
Definition of Forensic Science
Definition of Computer Forensics
What Is Computer Forensics?
Need for Computer Forensics
Evolution of Computer Forensics
Computer Forensics Flaws and Risks
Corporate Espionage Statistics
Modes of Attacks
Cyber Crime
Examples of Cyber Crime
Reason for Cyber Attacks
Role of Computer Forensics in Tracking Cyber Criminals
Rules of Computer Forensics
Computer Forensics Methodologies
Accessing Computer Forensics Resources
Preparing for Computing Investigations
Maintaining professional conduct
Understanding Enforcement Agency Investigations
Understanding Corporate Investigations
Investigation Process
Digital Forensics
Module II: Law And Computer Forensics
What Is Cyber Crime?
What Is Computer Forensics?
Computer Facilitated Crimes
Reporting Security Breaches to Law Enforcement
National Infrastructure Protection Center
FBI
Federal Statutes
Cyber Laws
Approaches to Formulate Cyber Laws
Scientific Working Group on Digital Evidence (SWGDE)
Federal Laws
The USA Patriot Act of 2001
Freedom of Information Act
Building Cyber Crime Case
How the FBI Investigates Computer Crime?
How to Initiate an Investigation?
Legal Issues Involved in Seizure of Computer Equipments
Searching With a Warrant
Searching Without a Warrant
Privacy Issues Involved in Investigations
International Issues Related to Computer Forensics
Crime Legislation of EU
Cyber Crime Investigation
Module III: Computer Investigation Process
Investigating Computer Crime
Investigating a Company Policy Violation
Investigation Methodology
Evaluating the Case
Before the Investigation
Document Everything
Investigation Plan
Obtain Search Warrant
Warning Banners
Shutdown the Computer
Collecting the Evidence
Confiscation of Computer Equipments
Preserving the Evidence
Importance of Data-recovery Workstations and Software
Implementing an Investigation
Understanding Bit-stream Copies
Imaging the Evidence Disk
Examining the Digital Evidence
Closing the Case
Case Evaluation
Module IV: Computer Security Incident Response Team
Present Networking Scenario
Vulnerability
Vulnerability Statistics
What Is an Incident?
A Study by CERT Shows Alarming Rise in Incidents (security Breach)
How to Identify an Incident
Whom to Report an Incident?
Incident Reporting
Category of Incidents
Handling Incidents
Procedure for Handling Incident
Preparation
Identification
Containment
Eradication
Recovery
Follow up
What Is CSIRT?
Why an Organization Needs an Incident Response Team?
Need for CSIRT
Example of CSIRT
CSIRT Vision
Vision
Best Practices for Creating a CSIRT
Step 1: Obtain Management Support and Buy-In
Step 2: Determine the CSIRT Development Strategic
Step 3: Gather Relevant Information
Step 4: Design your CSIRT Vision
Step 5: Communicate the CSIRT Vision
Step 6: Begin CSIRT Implementation
Step 7: Announce the CSIRT
Other Response Teams Acronyms and CSIRTs around the world
World CSIRT
Module V: Computer Forensic Laboratory Requirements
Budget Allocation for a Forensics Lab
Physical Location Needs of a Forensic Lab
Work Area of a Computer Forensics Lab
General Configuration of a Forensic
Equipment Needs in a Forensics Lab
Ambience of a Forensics Lab
Environmental Conditions
Recommended Eyestrain Considerations
Structural Design Considerations
Electrical Needs
Communications
Basic Workstation Requirements in a Forensic Lab
Consider stocking the following hardware peripherals
Maintain Operating System and Application Inventories
Common Terms
Physical Security Recommendations for a Forensic Lab
Fire-Suppression Systems
Evidence Locker Recommendations
Evidence Locker Combination Recommendations
Evidence Locker Padlock Recommendations
Facility Maintenance
Auditing a Computer Forensics Lab
Auditing a Forensics Lab
Forensics Lab
Mid Sized Lab
Forensic Lab Licensing Requisite
Forensic Lab Manager Responsibilities
Module VI: Understanding File systems and Hard disks
Disk Drive Overview - I
Hard Disk
Disk Platter
Tracks
Tracks Numbering
Sector
Sector addressing
Cluster
Cluster Size
Slack Space
Lost Clusters
Bad Sector
Understanding File Systems
Types of File System
List of Disk File Systems
List of Network file systems
Special Purpose File systems
Popular Linux File systems
Sun Solaris 10 File system - ZFS
Windows File systems
Mac OS X File system
CD-ROM / DVD File system
File system Comparison
Boot Sector
Exploring Microsoft File Structures
Disk Partition Concerns
Boot Partition Concerns
Examining FAT
NTFS
NTFS System Files
NTFS Partition Boot Sector
NTFS Master File Table (MFT)
NTFS Attributes
NTFS Data Stream
NTFS Compressed Files
NTFS Encrypted File Systems (EFS)
EFS File Structure
Metadata File Table (MFT)
EFS Recovery Key Agent
Deleting NTFS Files
Understanding Microsoft Boot Tasks
Windows XP system files
Understanding Boot Sequence DOS
Understanding MS-DOS Startup Tasks
Other DOS Operating Systems
Registry Data
Examining Registry Data
Module VII: Windows Forensics
Locating Evidence on Windows Systems
Gathering Volatile Evidence
Pslist
Forensic Tool: fport
Forensic Tool - Psloggedon
Investigating Windows File Slack
Examining File Systems
Built-in Tool: Sigverif
Word Extractor
Checking Registry
Reglite.exe
Tool: Resplendent Registrar 3.30
Microsoft Security ID
Importance of Memory Dump
Manual Memory Dumping in Windows 2000
Memory Dumping in Windows XP and Pmdump
System State Backup
How to Create a System State Backup?
Investigating Internet Traces
Tool - IECookiesView
Tool - IE History Viewer
Forensic Tool: Cache Monitor
CD-ROM Bootable Windows XP
Bart PE
Ultimate Boot CD-ROM
List of Tools in UB CD-ROM
Desktop Utilities
File Analysis Tools
File Management Tools
File Recovery Tools
File Transfer Tools
Hardware Info Tools
Process Viewer Tools
Registry Tools
Module VIII: Linux and Macintosh Boot processes
UNIX Overview
Linux Overview
Understanding Volumes -I
Exploring Unix/Linux Disk Data Structures
Understanding Unix/linux Boot Process
Understanding Linux Loader
Linux Boot Process Steps
Step 1: The Boot Manager
Step 2: init
Step 2.1: /etc/inittab
runlevels
Step 3: Services
Understanding Permission Modes
Unix and Linux Disk Drives and Partitioning Schemes
Mac OS X
Mac OS X Hidden Files
Booting Mac OS X
Mac OS X Boot Options
The Mac OS X Boot Process
Installing Mac OS X on Windows XP
PearPC
MacQuisition Boot CD
Module IX: Linux Forensics
Use of Linux as a Forensics Tool
Recognizing Partitions in Linux
File System in Linux
Linux Boot Sequence
Linux Forensics
Case Example
Step-by-step approach to Case 1 (a)
Step-by-step approach to Case 1 (
Step-by-step approach to Case 1 ©
Step-by-step approach to Case 1 (d)
Case 2
Challenges in disk forensics with Linux
Step-by-step approach to Case 2 (a)
Step-by-step approach to Case 2 (
Step-by-step approach to Case 2 ©
Popular Linux Tools
Module X: Data Acquisition and Duplication
Determining the Best Acquisition Methods
Data Recovery Contingencies
MS-DOS Data Acquisition Tools
DriveSpy
DriveSpy Data Manipulation Commands
DriveSpy Data Preservation Commands
Using Windows Data Acquisition Tools
Data Acquisition Tool: AccessData FTK Explorer
FTK
Acquiring Data on Linux
dd.exe (Windows XP Version)
Data Acquisition Tool: Snapback Exact
Data Arrest
Data Acquisition Tool: SafeBack
Data Acquisition Tool: Encase
Need for Data Duplication
Data Duplication Tool: R-drive Image
Data Duplication Tool: DriveLook
Data Duplication Tool: DiskExplorer
Module XI: Recovering Deleted Files
Introduction
Digital Evidence
Recycle Bin in Windows
Recycle Hidden Folder
Recycle folder
How to Undelete a File?
Tool: Search and Recover
Tool: Zero Assumption Digital Image Recovery
Data Recovery in Linux
Data Recovery Tool: E2undel
Data Recovery Tool: O&O Unerase
Data Recovery Tool: Restorer 2000
Data Recovery Tool: Badcopy Pro
Data Recovery Tool: File Scavenger
Data Recovery Tool: Mycroft V3
Data Recovery Tool: PC Parachute
Data Recovery Tool: Stellar Phoenix
Data Recovery Tool: Filesaver
Data Recovery Tool: Virtual Lab
Data Recovery Tool: R-linux
Data recovery tool: Drive and Data Recovery
Data recovery tool: active@ UNERASER - DATA recovery
Data recovery tool: Acronis Recovery Expert
Data Recovery Tool: Restoration
Data Recovery Tool: PC Inspector File Recovery
Module XII: Image Files Forensics
Introduction to Image Files
Recognizing an Image File
Understanding Bitmap and Vector Images
Metafile Graphics
Understanding Image File Formats
File types
Understanding Data Compression
Understanding Lossless and Lossy Compression
Locating and Recovering Image Files
Repairing Damaged Headers
Reconstructing File Fragments
Identifying Unknown File Formats
Analyzing Image File Headers
Picture Viewer: Ifran View
Picture Viewer: Acdsee
Picture Viewer: Thumbsplus
Steganography in Image Files
Steganalysis Tool: Hex Workshop
Steganalysis Tool: S-tools
Identifying Copyright Issues With Graphics
Module XIII: Steganography
Introduction
Important Terms in Stego-forensics
Background Information to Image Steganography
Steganography History
Evolution of Steganography
Steps for Hiding Information in Steganography
Six Categories of Steganography in Forensics
Types of Steganography
What Is Watermarking
Classification of Watermarking
Types of Watermarks
Steganographic Detection
Steganographic Attacks
Real World Uses of Steganography
Steganography in the Future
Unethical Use of Steganography
Hiding Information in Text Files
Hiding Information in Image Files
Process of Hiding Information in Image Files
Least Significant Bit
Masking and Filtering
Algorithms and Transformation
Hiding Information in Audio Files
Low-bit Encoding in Audio Files
Phase Coding
Spread Spectrum
Echo Data Hiding
Hiding Information in DNA
TEMPEST
The Steganography Tree
Steganography Tool: Fort Knox
Steganography Tool: Blindside
Steganography Tool: S- Tools
Steganography Tool: Steghide
Steganography Tool: Digital Identity
Steganography Tool: Stegowatch
Tool : Image Hide
Data Stash
Tool: Mp3Stego
Tool: Snow.exe
Tool: Camera/Shy
Steganography Detection
Module XIV: Computer Forensic Tools
Dump Tool: DS2DUMP
Dump Tool: Chaosreader
Slack Space & Data Recovery Tools: Drivespy
Slack Space & Data Recovery Tools: Ontrack
Hard Disk Write Protection Tools: Pdblock
Hard Disk Write Protection Tools: Nowrite & Firewire Drivedock
Permanent Deletion of Files:pdwipe
Disk Imaging Tools: Image & Iximager
Disk Imaging Tools: Snapback Datarrest
Partition Managers: PART & Explore2fs
Linux/unix Tools: Ltools and Mtools
Linux/UNIX tools: TCT and TCTUTILs
Password Recovery Tool: @Stake
ASRData
SMART Screenshot
Ftime
Oxygen Phone Manager
Multipurpose Tools: Byte Back & Biaprotect
Multipurpose Tools: Maresware
Multipurpose Tools: LC Technologies Software
Multipurpose Tools: Winhex Specialist Edition
Multipurpose Tools: Prodiscover DFT
Toolkits: NTI tools
Toolkits: R-Tools-I
Toolkits: R-Tools-II
Toolkits: DataLifter
Toolkits: AccessData
LC Technology International Hardware
Screenshot of Forensic Hardware
Image MASSter Solo and FastBloc
RMON2 Tracing Tools and
MCI DoStracker
EnCase
Module XV: Application password crackers
Password - Terminology
What is a Password Cracker?
How Does A Password Cracker Work?
Various Password Cracking Methods
Classification of Cracking Software
System Level Password Cracking
Application Password Cracking
Application Software Password Cracker
Distributed Network Attack-I
Distributed Network Attack-II
Passware Kit
Accent Keyword Extractor
Advanced Zip Password Recovery
Default Password Database
http://phenoelit.darklab.org/
http://www.defaultpassword.com/
http://www.cirt.net/cgi-bin/passwd.pl
Password Cracking Tools List
Module XVI: Investigating Logs
Audit Logs and Security
Audit Incidents
Syslog
Remote Logging
Linux Process Accounting
Configuring Windows Logging
Setting up Remote Logging in Windows
NtSyslog
EventReporter
Application Logs
Extended Logging in IIS Server
Examining Intrusion and Security Events
Significance of Synchronized Time
Event Gathering
EventCombMT
Writing Scripts
Event Gathering Tools
Forensic Tool: Fwanalog
End-to End Forensic Investigation
Correlating Log files
Investigating TCPDump
IDS Loganalyais:RealSecure
IDS Loganalysis :SNORT
Module XVII: Investigating network traffic
Overview of Network Protocols
Sources of Evidence on a Network
Overview of Physical and Data-link Layer of the OSI Model
Evidence Gathering at the Physical Layer
Tool: Windump
Evidence Gathering at the Data-link Layer
Tool: Ethereal
Tool: NetIntercept
Overview of Network and Transport Layer of the OSI Model
Evidence Gathering at the Network and Transport Layer-(I)
Gathering Evidence on a Network
GPRS Network Sniffer : Nokia LIG
NetWitness
McAffee Infinistream Security Forensics
Snort 2.1.0
Documenting the Gathered Evidence on a Network
Evidence Reconstruction for Investigation
Module XVIII: Router Forensics
What Is a Router?
Functions of a Router
A Router in an OSI Model
Routing Table and Its Components
Router Architecture
Implications of a Router Attack
Types of Router Attacks
Denial of Service (DoS) Attacks
Investigating Dos Attacks
Smurfing – Latest in Dos Attacks
Packet "Mistreating" Attacks
Routing Table Poisoning
Hit-and-run Attacks Vs. Persistent Attacks
Router Forensics Vs. Traditional Forensics
Investigating Routers
Chain of Custody
Incident Response & Session Recording
Accessing the Router
Volatile Evidence Gathering
Router Investigation Steps - I
Analyzing the Intrusion
Logging
Incident Forensics
Handling a Direct Compromise Incident
Other Incidents
Module XIX: Investigating Web Attacks
Indications of a web attack
Responding to a web attack
Overview of web logs
Mirrored Sites
N-Stealth
Investigating static and dynamic IP address
Tools for locating IP Address: Nslookup
Tools for locating IP Address: Traceroute
Tools for locating IP Address:
NeoTrace (Now McAfee Visual Trace)
Tools for locating IP Address: Whois
Web page defacement
Defacement using DNS compromise
Investigating DNS Poisoning
SQL Injection Attacks
Investigating SQL Injection Attacks
Investigating FTP Servers
Investigating FTP Logs
Investigating IIS Logs
Investigating Apache Logs
Investigating DHCP Server Logfile
Module XX: Tracking E-mails and Investigating E-mail crimes
Understanding Internet Fundamentals
Understanding Internet Protocols
Exploring the Roles of the Client and Server in E-mail
E-mail Crime
Spamming, Mail Bombing, Mail Storm
Chat Rooms
Identity Fraud , Chain Letter
Sending Fakemail
Investigating E-mail Crime and Violation
Viewing E-mail Headers
Examining an E-mail Header
Viewing Header in Microsoft Outlook
Viewing Header in Eudora
Viewing Header in Outlook Express
Viewing Header in AOL
Viewing Header in Hot Mail
Viewing Header using Pine for Unix
Viewing Header in Juno
Viewing Header in Yahoo
Examining Additional Files
Microsoft Outlook Mail
Pst File Location
Tracing an E-mail Message
Using Network Logs Related to E-mail
Understanding E-mail Server
Examining UNIX E-mail Server Logs
Examining Microsoft E-mail Server Logs
Examining Novell GroupWise E-mail Logs
Using Specialized E-mail Forensic Tools
Tool:FINALeMAIL
Tool: R-Mail
E-Mail Examiner by Paraben
Network E-Mail Examiner by Paraben
Tracing Back
Tracing Back Web Based E-mail
Searching E-mail Addresses
E-mail Search Site
Handling Spam
Network Abuse Clearing House
Abuse.Net
Protecting Your E-mail Address From Spam
Tool: Enkoder Form
Tool:eMailTrackerPro
Tool:SPAM Punisher
Module XXI: Mobile and PDA Forensics
Latest Mobile Phone Access Technologies
Evidence in Mobile Phones
Mobile Phone Forensic Examination Methodology
Examining Phone Internal Memory
Examining SIM
Examining Flash Memory and Call data records
Personal Digital Assistant (PDA)
PDA Components
PDA Forensics
PDA Forensics - Examination
PDA Forensics - Identification
PDA Forensics - Collection
PDA Forensics - Documentation
Points to Be Remembered While Conducting Investigation
PDA Seizure by Paraben
SIM Card Seizure by Paraben (SIM Card acquisition tool)
Forensic Tool – Palm dd (pdd)
Forensic Tool - POSE
Module XXII: Investigating Trademark and Copyright Infringement
Trademarks
Trademark Eligibility and Benefits of Registering It
Service Mark and Trade Dress
Trademark infringement
Trademark Search
www.uspto.gov
Copyright and Copyright Notice
Investigating Copyright Status of a Particular Work
How Long Does a Copyright Last?
U.S Copyright Office
Doctrine of "Fair Use"
How Are Copyrights Enforced?
SCO Vs. IBM
SCO Vs Linux
Line-by-Line Copying
Plagiarism
Turnitin
Plagiarism detection tools
CopyCatch
Patent
Patent Infringement
Patent Search
Case Study: Microsoft Vs Forgent
Internet Domain Name and ICANN
Domain Name Infringement
Case Study: Microsoft.com Vs MikeRoweSoft.com
How to check for Domain Name Infringement?
Module XXIII: Investigative Reports
Need of an investigative report
Report specification
Report Classification
Report and Opinion
Layout of an Investigative Report
Writing Report
Use of Supporting Material
Importance of Consistency
Salient Features of a Good Report
Investigative Report Format
Before Writing the Report
Writing Report Using FTK
Module XXIV: Becoming an Expert Witness
Who Is an Expert?
Who Is an Expert Witness?
Role of an Expert Witness
Technical Testimony Vs.
Expert Testimony
Preparing for Testimony
Evidence Preparation and Documentation
Evidence Processing Steps
Rules Pertaining to an Expert Witness' Qualification
Importance of Curriculum Vitae
Technical Definitions
Testifying in Court
The Order of Trial Proceedings
Voir dire
General Ethics While Testifying-i
Evidence Presentation
Importance of Graphics in a Testimony
Helping Your Attorney
Avoiding Testimony Problems
Testifying During Direct Examination
Testifying During Cross Examination
Deposition
Guidelines to Testify at a Deposition
Dealing With Reporters
Module XXV: Forensics in action
E-mail Hoax
Trade Secret Theft
Operation Cyberslam
APPENDIX:




1. Investigating Wireless Attacks



Passive Attacks
Netstumbler
Active Attacks On Wireless Networks
Rogue Access Points
Investigating Wireless Attacks
Airmagnet
2. Forensics Investigation Using EnCase
Evidence File
Evidence File Format
Verifying File Integrity
Hashing
Acquiring Image
Configuring Encase
Encase Options Screen
Encase Screens
View Menu
Device Tab
Viewing Files and Folders
Bottom Pane
Viewers in Bottom Pane
Status Bar
Searching
Keywords
Adding Keywords
Grouping
Add multiple Keywords
Starting the Search
Search Hits Tab
Search Hits
Bookmarks
Creating Bookmarks
Adding Bookmarks
Bookmarking Selected Data
Recovering Deleted Files/folders in FAT Partition
Recovering Folders in NTFS
Master Boot Record
NTFS Starting Point
Viewing disk Geometry
Recovering Deleted Partitions
Hash Values
Creating Hash Sets
MD5 Hash
Creating Hash
Viewers
Signature Analysis
Copying Files Folders
E-mail Recovery
Reporting
Encase Boot Disks
IE Cache Images
3. First Responder Procedures
Steps At Crime Scene
People Involved In Incident Response
The Role Of A System Administrator
First Response By Non-Laboratory Staff
Guidelines For Search And Seizure
Planning The Search And Seizure
Evidence Collection
Dealing With Powered Up Computers At Seizure Time
How To Pull The Power
Seizing Computer Equipment
Removable Media
Seizing Portable Computers
How To Remove HD From Laptops?
Initial Interviews
Chain Of Custody
4. Checklist for Choosing a Forensic Examiner
5. Investigation Checklist

http://www.filefactory.com/file/d3140a/
http://www.filefactory.com/file/4a3a82/
http://www.filefactory.com/file/808f22/
http://www.filefactory.com/file/d88331/
http://www.filefactory.com/file/159fb8/
http://www.filefactory.com/file/65061d/
http://www.filefactory.com/file/957b34/
http://www.filefactory.com/file/abcf87/

VideoCert/TurboCert CCNA 640-801 2006



The CCNA certification (Cisco Certified Network Associate) indicates a foundation in and apprentice knowledge of networking. CCNA certified professionals can install, configure, and operate LAN, WAN, and dial access services for small and medium networks, including but not limited to use of these protocols: IP, IGRP, Serial, Frame Relay, IP RIP, VLANs, RIP, Ethernet, Access Lists.

VideoCert self-paced computer based training delivers the most advanced and comprehensive training available. All courses incorporate video, graphics, practice exams, and extensive task examples to thoroughly prepare the student for each certification exam and to function productively in any IT environment.

All courses are distributed on CD-ROM so there is no need for an internet connection. Just install the courses to your personal computer or laptop and let the learning begin. All trainers are certified professionals with an average of 8-12 years of experience in their field.


This CBT package provides the training necessary to prepare for Cisco CCNA certification exam: 640-801
Training Package Overview:

This CBT package provides comprehensive training covering all of the certification objectives outlined by Cisco for the CCNA certification. This training will prepare the student to pass Cisco certification exam: 640-801

The CBT courses included provide thorough, in-depth coverage of each training topic and include task simulations and examples for a complete training solution.

Training Courses:

Course: Cisco Certified Network Associate
Exam: 640-801
Includes: 4 CD-ROMs, 18 Hours of Training, 3 Practice Exams
Training Units: (Partial list of training units/topics)

* Networking Fundamentals
* The OSI Model
* OSI Layers
* Networking Protocols
* Networking Hardware
* Router Fundamentals
* IOS Configuration
* IP Routing
* Routing Tables
* Static & Dynamic Routing
* Console Connections
* Router Boot Configuration
* IOS Commands
* Interface Commands
* Subnetting
* Routing Process
* Router Series
* Router Management and Maintenance
* RIP
* IGRP
* Switching
* ACL
* LAN / WAN Configuration
* VLANs
* TCP/IP
* Troubleshooting Connectivity
* ISDN and Frame Relay
* Static & Dynamic Routing
* Troubleshooting RIP
* Configuring and Troubleshooting IGRP
* Configuring and Troubleshooting LAN/WAN Devices
* Configuring and Troubleshooting OSPF
* Switch Configuration
* Bridging
* Troubleshooting ISDN & Frame Relay
* Configuring and Troubleshooting ACL

CODE
http://www.videocert.com
Download Links

CD1: 306 MB -->> 621.29 MB (ISO)
CODE
http://rapidshare.com/files/27342304/G1-cisccnap1.rar
http://rapidshare.com/files/27342306/G1-cisccnap2.rar
http://rapidshare.com/files/27349872/G1-cisccnap3.rar
http://rapidshare.com/files/27349874/G1-cisccnap4.rar
http://rapidshare.com/files/27395139/G1-cisccnap5.rar
http://rapidshare.com/files/27395140/G1-cisccnap6.rar
http://rapidshare.com/files/27408537/G1-cisccnap7.rar
http://rapidshare.com/files/27408538/G1-cisccnap8.rar
http://rapidshare.com/files/27411784/G1-cisccnap9.rar
http://rapidshare.com/files/27411785/G1-cisccnap10.rar
http://rapidshare.com/files/27411786/G1-cisccna.sfv

CD2: 261 MB -->> 597.41 MB (ISO)
CODE
http://rapidshare.com/files/27506646/G2-cisccnap1.rar
http://rapidshare.com/files/27506648/G2-cisccnap2.rar
http://rapidshare.com/files/27517538/G2-cisccnap3.rar
http://rapidshare.com/files/27517539/G2-cisccnap4.rar
http://rapidshare.com/files/27517542/G2-cisccnap5.rar
http://rapidshare.com/files/27528013/G2-cisccnap6.rar
http://rapidshare.com/files/27528014/G2-cisccnap7.rar
http://rapidshare.com/files/27528015/G2-cisccnap8.rar
http://rapidshare.com/files/27531128/G2-cisccnap9.rar
http://rapidshare.com/files/27531130/G2-cisccnap10.rar
http://rapidshare.com/files/27531131/G2-cisccna.sfv

CD3: 161 MB -->> 366.79 MB (ISO)
CODE
http://rapidshare.com/files/27470357/G3-cisccnap1.rar
http://rapidshare.com/files/27470358/G3-cisccnap2.rar
http://rapidshare.com/files/27470359/G3-cisccnap3.rar
http://rapidshare.com/files/27475423/G3-cisccnap4.rar
http://rapidshare.com/files/27475424/G3-cisccnap5.rar
http://rapidshare.com/files/27475425/G3-cisccnap6.rar
http://rapidshare.com/files/27475426/G3-cisccna.sfv

CD4: 204 MB -->> 502.63 MB (ISO)
CODE
http://rapidshare.com/files/27483262/G4-cisccnap1.rar
http://rapidshare.com/files/27483263/G4-cisccnap2.rar
http://rapidshare.com/files/27483264/G4-cisccnap3.rar
http://rapidshare.com/files/27491293/G4-cisccnap4.rar
http://rapidshare.com/files/27491294/G4-cisccnap5.rar
http://rapidshare.com/files/27491295/G4-cisccnap6.rar
http://rapidshare.com/files/27506641/G4-cisccnap7.rar
http://rapidshare.com/files/27506643/G4-cisccnap8.rar
http://rapidshare.com/files/27506644/G4-cisccna.sfv

Sun Solaris 10 Official Trainings


CDS-300-S10: Network Administration for the Solaris 10 Operating System
CDS-202-S10: Advanced System Administration for the Solaris 10 Operating System
CDS-200-S10: Intermediate System Administration for the Solaris 10 Operating System
CDS-100-S10: Unix Essentials Featuring the Solaris 10 Operating System

Download Links:

http://rapidshare.com/files/7304560/CDS-202-S10_Advanced_System_Administration_for_the_Solaris_10_Operating_System.rar http://rapidshare.com/files/7300684/CDS-200-S10_Intermediate_System_Administration_for_the_Solaris_10_Operating_System.rar http://rapidshare.com/files/7297752/CDS-100-S10_Unix_Essentials_Featuring_the_Solaris_10_Operating_System.rar http://rapidshare.com/files/7419927/CDS-300-S10_Network_Administration_for_the_Solaris_10_Operating_System.part2.rar http://rapidshare.com/files/7417584/CDS-300-S10_Network_Administration_for_the_Solaris_10_Operating_System

TestOut CCNA


More info:

http://testout.com/ccna/index.htm


Savedownload Links:

http://rapidshare.de/files/16630542/CCNA.part01.TIJNEMA.rar
http://rapidshare.de/files/16631642/CCNA.part02.TIJNEMA.rar
http://rapidshare.de/files/16654437/CCNA.part03.TIJNEMA.rar
http://rapidshare.de/files/16655721/CCNA.part04.TIJNEMA.rar
http://rapidshare.de/files/16657419/CCNA.part05.TIJNEMA.rar
http://rapidshare.de/files/16659043/CCNA.part06.TIJNEMA.rar
http://rapidshare.de/files/16660319/CCNA.part07.TIJNEMA.rar
http://rapidshare.de/files/16661571/CCNA.part08.TIJNEMA.rar
http://rapidshare.de/files/16662820/CCNA.part09.TIJNEMA.rar
http://rapidshare.de/files/16663161/CCNA.part10.TIJNEMA.rar


Password: tijnema

Testout’s Microsoft Windows Server 2003 MCSE Certification Suite 10cds set


• Installing, Configuring, and Administering Windows XP Pro 70-270 2CDS
• Managing and Maintaining a Windows 2003 Network 70-290
• Implement, Manage, and Maintain a Network Infrastructure 70-291
• Plan and Maintain a Server 2003 Network Infrastructure 70-293 2CDs
• Plan, Implement, & Maintain an Active Directory Infrastructure 70-294

• Design Server 2003 Active Directory and Network Infrastructure 70-297

• Administer SQL Server 2000 70-228
• Exchange 2003 70-284

FULLY DOWNLOADED AND TESTED

Download Links

1 http://www.megaupload.com/?d=KFZ4CJ13
2 http://www.megaupload.com/?d=4R3VAMFN
3 http://www.megaupload.com/?d=QJXL5XLK
4 http://www.megaupload.com/?d=YO84MNHO
5 http://www.megaupload.com/?d=2LH2LARD
6 http://www.megaupload.com/?d=JWBUAY2R
7 http://www.megaupload.com/?d=1PI6GJSX
8 http://www.megaupload.com/?d=0W1QZ724
9 http://www.megaupload.com/?d=7PE9IG6P
10 http://www.megaupload.com/?d=XQVF81Z8
11 http://www.megaupload.com/?d=YOL3DR40
12 http://www.megaupload.com/?d=LPBTOIGS
13 http://www.megaupload.com/?d=GY3SMXMR
14 http://www.megaupload.com/?d=4DXNMYGD
15 http://www.megaupload.com/?d=0TCK0VMT
16 http://www.megaupload.com/?d=P7UV0KNT
17 http://www.megaupload.com/?d=EMLLAI31
18 http://www.megaupload.com/?d=6M57ES66
19 http://www.megaupload.com/?d=8ZJQDTC6
20 http://www.megaupload.com/?d=IZJ0S5WU
21 http://www.megaupload.com/?d=KDR536VH
22 http://www.megaupload.com/?d=QZYB88TF
23 http://www.megaupload.com/?d=2O826E9M
24 http://www.megaupload.com/?d=02BCH18V
25 http://www.megaupload.com/?d=YNL03PPT
26 http://www.megaupload.com/?d=0HHIR6QL
27 http://www.megaupload.com/?d=VAP7AZT3
28 http://www.megaupload.com/?d=H55JXRNK
29 http://www.megaupload.com/?d=KFGY3ZQ4
30 http://www.megaupload.com/?d=U3H6B2PW
31 http://www.megaupload.com/?d=6M197BJ8
32 http://www.megaupload.com/?d=01ABHMCK
33 http://www.megaupload.com/?d=2ULMKJGS
34 http://www.megaupload.com/?d=Y91FKH60
35 http://www.megaupload.com/?d=BH4V4S65
36 http://www.megaupload.com/?d=YMYHFLTC
37 http://www.megaupload.com/?d=D90YA9PO
38 http://www.megaupload.com/?d=QJ9SOCN0
39 http://www.megaupload.com/?d=7GRZWSB1
40 http://www.megaupload.com/?d=SDXPAWII
41 http://www.megaupload.com/?d=WI6N66GM
42 http://www.megaupload.com/?d=YY73HYMY

Password is www.arabdl.com

CCNA INTRO + ICDN Exam Certification Guide






ALL U need to PASS CCNA exam


By Wendell Odom.
Published by Cisco Press.
Series: Exam Certification Guide.


INTRO Book Description
The official self-study test preparation guide for the Cisco CCNA INTRO exam 640-821
Pages: 672
Master CCNA INTRO exam topics, including:
* TCP/IP and OSI networking models
* Operating Cisco routers and LAN switches
* LAN switching basics, VLANs, and Trunking
* IP addressing and subnetting
* Basic router configuration and operation
* Discovering information about an IP network
* Dynamic routing protocols
* Analog modems, PAP/CHAP, DSL and Cable


ICND Book Description
The official self-study test preparation guide for the Cisco CCNA ICND exam 640-811
Pages: 720

Master CCNA ICND exam topics, including:

* LAN switching concepts
* STP, VLANs, and trunking
* IP addressing and subnetting
* RIP, IGRP, EIGRP, OSPF, and static route configuration
* VLSM support and route summarization
* CIDR and NAT
* Point-to-point leased line implementation
* ISDN and Dial-on-Demand Routing (DDR)
* Frame Relay configuration
* IP Access Control List (ACL) security


CODE:

http://rapidshare.com/files/28385382/Cisco_Press_INTRO_.rar
http://rapidshare.com/files/28385383/Cisco_Press_ICND.rar

Tuesday, September 11, 2007

Ethical Hacking and Countermeasures Tools



links:

http://rapidshare.com/files/34575422/CEH3.01.part1.rar
http://rapidshare.com/files/34591667/CEH3.01.part2.rar
http://rapidshare.com/files/34592206/CEH3.01.part3.rar
http://rapidshare.com/files/34593290/CEH3.01.part4.rar
http://rapidshare.com/files/34593437/CEH3.01.part5.rar

CBT Nuggets Archieve server



http://rapidshare.com/files/48469548/CBT_Nuggets.part001.rar.rar
http://rapidshare.com/files/48469905/CBT_Nuggets.part002.rar.rar
http://rapidshare.com/files/48470233/CBT_Nuggets.part003.rar.rar
http://rapidshare.com/files/48470977/CBT_Nuggets.part004.rar.rar
http://rapidshare.com/files/48471789/CBT_Nuggets.part005.rar.rar
http://rapidshare.com/files/48472673/CBT_Nuggets.part006.rar.rar
http://rapidshare.com/files/48473302/CBT_Nuggets.part007.rar.rar
http://rapidshare.com/files/48474072/CBT_Nuggets.part008.rar.rar
http://rapidshare.com/files/48474944/CBT_Nuggets.part009.rar.rar
http://rapidshare.com/files/48475445/CBT_Nuggets.part010.rar.rar
http://rapidshare.com/files/48475785/CBT_Nuggets.part011.rar.rar
http://rapidshare.com/files/48476227/CBT_Nuggets.part012.rar.rar
http://rapidshare.com/files/48476652/CBT_Nuggets.part013.rar.rar
http://rapidshare.com/files/48477029/CBT_Nuggets.part014.rar.rar
http://rapidshare.com/files/48477349/CBT_Nuggets.part015.rar.rar
http://rapidshare.com/files/48477704/CBT_Nuggets.part016.rar.rar
http://rapidshare.com/files/48478024/CBT_Nuggets.part017.rar.rar
http://rapidshare.com/files/48478289/CBT_Nuggets.part018.rar.rar
http://rapidshare.com/files/48478589/CBT_Nuggets.part019.rar.rar
http://rapidshare.com/files/48478935/CBT_Nuggets.part020.rar.rar
http://rapidshare.com/files/48479296/CBT_Nuggets.part021.rar.rar
http://rapidshare.com/files/48479795/CBT_Nuggets.part022.rar.rar
http://rapidshare.com/files/48480282/CBT_Nuggets.part023.rar.rar
http://rapidshare.com/files/48480791/CBT_Nuggets.part024.rar.rar
http://rapidshare.com/files/48481406/CBT_Nuggets.part025.rar.rar
http://rapidshare.com/files/48482068/CBT_Nuggets.part026.rar.rar
http://rapidshare.com/files/48482524/CBT_Nuggets.part027.rar.rar
http://rapidshare.com/files/48483030/CBT_Nuggets.part028.rar.rar
http://rapidshare.com/files/48483530/CBT_Nuggets.part029.rar.rar
http://rapidshare.com/files/48483946/CBT_Nuggets.part030.rar.rar
http://rapidshare.com/files/48484529/CBT_Nuggets.part031.rar.rar
http://rapidshare.com/files/48484902/CBT_Nuggets.part032.rar.rar
http://rapidshare.com/files/48485428/CBT_Nuggets.part033.rar.rar
http://rapidshare.com/files/48485900/CBT_Nuggets.part034.rar.rar
http://rapidshare.com/files/48486519/CBT_Nuggets.part035.rar.rar
http://rapidshare.com/files/48487067/CBT_Nuggets.part036.rar.rar
http://rapidshare.com/files/48487574/CBT_Nuggets.part037.rar.rar
http://rapidshare.com/files/48488207/CBT_Nuggets.part038.rar.rar
http://rapidshare.com/files/48488672/CBT_Nuggets.part039.rar.rar
http://rapidshare.com/files/48489128/CBT_Nuggets.part040.rar.rar
http://rapidshare.com/files/48489742/CBT_Nuggets.part041.rar.rar
http://rapidshare.com/files/48490268/CBT_Nuggets.part042.rar.rar
http://rapidshare.com/files/48490838/CBT_Nuggets.part043.rar.rar
http://rapidshare.com/files/48491482/CBT_Nuggets.part044.rar.rar
http://rapidshare.com/files/48492016/CBT_Nuggets.part045.rar.rar
http://rapidshare.com/files/48492451/CBT_Nuggets.part046.rar.rar
http://rapidshare.com/files/48492922/CBT_Nuggets.part047.rar.rar
http://rapidshare.com/files/48493543/CBT_Nuggets.part048.rar.rar
http://rapidshare.com/files/48493961/CBT_Nuggets.part049.rar.rar
http://rapidshare.com/files/48494450/CBT_Nuggets.part050.rar.rar
http://rapidshare.com/files/48495081/CBT_Nuggets.part051.rar.rar
http://rapidshare.com/files/48495534/CBT_Nuggets.part052.rar.rar
http://rapidshare.com/files/48496178/CBT_Nuggets.part053.rar.rar
http://rapidshare.com/files/48496599/CBT_Nuggets.part054.rar.rar
http://rapidshare.com/files/48497222/CBT_Nuggets.part055.rar.rar
http://rapidshare.com/files/48497864/CBT_Nuggets.part056.rar.rar
http://rapidshare.com/files/48498372/CBT_Nuggets.part057.rar.rar
http://rapidshare.com/files/48499068/CBT_Nuggets.part058.rar.rar
http://rapidshare.com/files/48499658/CBT_Nuggets.part059.rar.rar
http://rapidshare.com/files/48500238/CBT_Nuggets.part060.rar.rar
http://rapidshare.com/files/48500814/CBT_Nuggets.part061.rar.rar
http://rapidshare.com/files/48501289/CBT_Nuggets.part062.rar.rar
http://rapidshare.com/files/48501866/CBT_Nuggets.part063.rar.rar
http://rapidshare.com/files/48502382/CBT_Nuggets.part064.rar.rar
http://rapidshare.com/files/48502887/CBT_Nuggets.part065.rar.rar
http://rapidshare.com/files/48503514/CBT_Nuggets.part066.rar.rar
http://rapidshare.com/files/48504196/CBT_Nuggets.part067.rar.rar
http://rapidshare.com/files/48504815/CBT_Nuggets.part068.rar.rar
http://rapidshare.com/files/48505408/CBT_Nuggets.part069.rar.rar
http://rapidshare.com/files/48506101/CBT_Nuggets.part070.rar.rar
http://rapidshare.com/files/48506778/CBT_Nuggets.part071.rar.rar
http://rapidshare.com/files/48507438/CBT_Nuggets.part072.rar.rar
http://rapidshare.com/files/48508186/CBT_Nuggets.part073.rar.rar
http://rapidshare.com/files/48508875/CBT_Nuggets.part074.rar.rar
http://rapidshare.com/files/48509536/CBT_Nuggets.part075.rar.rar
http://rapidshare.com/files/48510019/CBT_Nuggets.part076.rar.rar
http://rapidshare.com/files/48510534/CBT_Nuggets.part077.rar.rar
http://rapidshare.com/files/48511155/CBT_Nuggets.part078.rar.rar
http://rapidshare.com/files/48511918/CBT_Nuggets.part079.rar.rar
http://rapidshare.com/files/48512625/CBT_Nuggets.part080.rar.rar
http://rapidshare.com/files/48513258/CBT_Nuggets.part081.rar.rar
http://rapidshare.com/files/48514026/CBT_Nuggets.part082.rar.rar
http://rapidshare.com/files/48514668/CBT_Nuggets.part083.rar.rar
http://rapidshare.com/files/48515415/CBT_Nuggets.part084.rar.rar
http://rapidshare.com/files/48516086/CBT_Nuggets.part085.rar.rar
http://rapidshare.com/files/48516762/CBT_Nuggets.part086.rar.rar
http://rapidshare.com/files/48517380/CBT_Nuggets.part087.rar.rar
http://rapidshare.com/files/48518120/CBT_Nuggets.part088.rar.rar
http://rapidshare.com/files/48518988/CBT_Nuggets.part089.rar.rar
http://rapidshare.com/files/48519751/CBT_Nuggets.part090.rar.rar
http://rapidshare.com/files/48520496/CBT_Nuggets.part091.rar.rar
http://rapidshare.com/files/48521327/CBT_Nuggets.part092.rar.rar
http://rapidshare.com/files/48522044/CBT_Nuggets.part093.rar.rar
http://rapidshare.com/files/48522852/CBT_Nuggets.part094.rar.rar
http://rapidshare.com/files/48523622/CBT_Nuggets.part095.rar.rar
http://rapidshare.com/files/48524336/CBT_Nuggets.part096.rar.rar
http://rapidshare.com/files/48524908/CBT_Nuggets.part097.rar.rar
http://rapidshare.com/files/48525738/CBT_Nuggets.part098.rar.rar
http://rapidshare.com/files/48526585/CBT_Nuggets.part099.rar.rar
http://rapidshare.com/files/48527151/CBT_Nuggets.part100.rar.rar
http://rapidshare.com/files/48527944/CBT_Nuggets.part101.rar.rar
http://rapidshare.com/files/48528528/CBT_Nuggets.part102.rar.rar
http://rapidshare.com/files/48529260/CBT_Nuggets.part103.rar.rar
http://rapidshare.com/files/48530051/CBT_Nuggets.part104.rar.rar
http://rapidshare.com/files/48530672/CBT_Nuggets.part105.rar.rar
http://rapidshare.com/files/48531355/CBT_Nuggets.part106.rar.rar
http://rapidshare.com/files/48532117/CBT_Nuggets.part107.rar.rar
http://rapidshare.com/files/48532674/CBT_Nuggets.part108.rar.rar
http://rapidshare.com/files/48533339/CBT_Nuggets.part109.rar.rar
http://rapidshare.com/files/48534023/CBT_Nuggets.part110.rar.rar
http://rapidshare.com/files/48534840/CBT_Nuggets.part111.rar.rar
http://rapidshare.com/files/48535364/CBT_Nuggets.part112.rar.rar
http://rapidshare.com/files/48536035/CBT_Nuggets.part113.rar.rar
http://rapidshare.com/files/48536902/CBT_Nuggets.part114.rar.rar
http://rapidshare.com/files/48537634/CBT_Nuggets.part115.rar.rar
http://rapidshare.com/files/48538272/CBT_Nuggets.part116.rar.rar
http://rapidshare.com/files/48538972/CBT_Nuggets.part117.rar.rar
http://rapidshare.com/files/48539576/CBT_Nuggets.part118.rar.rar
http://rapidshare.com/files/48540124/CBT_Nuggets.part119.rar.rar
http://rapidshare.com/files/48540908/CBT_Nuggets.part120.rar.rar
http://rapidshare.com/files/48541548/CBT_Nuggets.part121.rar.rar
http://rapidshare.com/files/48542238/CBT_Nuggets.part122.rar.rar
http://rapidshare.com/files/48543140/CBT_Nuggets.part123.rar.rar
http://rapidshare.com/files/48543716/CBT_Nuggets.part124.rar.rar
http://rapidshare.com/files/48544420/CBT_Nuggets.part125.rar.rar
http://rapidshare.com/files/48545244/CBT_Nuggets.part126.rar.rar
http://rapidshare.com/files/48546391/CBT_Nuggets.part127.rar.rar
http://rapidshare.com/files/48547271/CBT_Nuggets.part128.rar.rar
http://rapidshare.com/files/48547911/CBT_Nuggets.part129.rar.rar
http://rapidshare.com/files/48548710/CBT_Nuggets.part130.rar.rar
http://rapidshare.com/files/48549530/CBT_Nuggets.part131.rar.rar
http://rapidshare.com/files/48550338/CBT_Nuggets.part132.rar.rar
http://rapidshare.com/files/48551011/CBT_Nuggets.part133.rar.rar
http://rapidshare.com/files/48551753/CBT_Nuggets.part134.rar.rar
http://rapidshare.com/files/48552799/CBT_Nuggets.part135.rar.rar
http://rapidshare.com/files/48553649/CBT_Nuggets.part136.rar.rar
http://rapidshare.com/files/48554492/CBT_Nuggets.part137.rar.rar
http://rapidshare.com/files/48555333/CBT_Nuggets.part138.rar.rar
http://rapidshare.com/files/48556329/CBT_Nuggets.part139.rar.rar
http://rapidshare.com/files/48557431/CBT_Nuggets.part140.rar.rar
http://rapidshare.com/files/48558438/CBT_Nuggets.part141.rar.rar
http://rapidshare.com/files/48559204/CBT_Nuggets.part142.rar.rar
http://rapidshare.com/files/48560234/CBT_Nuggets.part143.rar.rar
http://rapidshare.com/files/48561396/CBT_Nuggets.part144.rar.rar
http://rapidshare.com/files/48562470/CBT_Nuggets.part145.rar.rar
http://rapidshare.com/files/48563469/CBT_Nuggets.part146.rar.rar
http://rapidshare.com/files/48564345/CBT_Nuggets.part147.rar.rar
http://rapidshare.com/files/48565040/CBT_Nuggets.part148.rar.rar
http://rapidshare.com/files/48565836/CBT_Nuggets.part149.rar.rar
http://rapidshare.com/files/48566578/CBT_Nuggets.part150.rar.rar
http://rapidshare.com/files/48567259/CBT_Nuggets.part151.rar.rar
http://rapidshare.com/files/48567931/CBT_Nuggets.part152.rar.rar
http://rapidshare.com/files/48568524/CBT_Nuggets.part153.rar.rar
http://rapidshare.com/files/48569109/CBT_Nuggets.part154.rar.rar
http://rapidshare.com/files/48570114/CBT_Nuggets.part155.rar.rar
http://rapidshare.com/files/48570723/CBT_Nuggets.part156.rar.rar
http://rapidshare.com/files/48571609/CBT_Nuggets.part157.rar.rar
http://rapidshare.com/files/48572220/CBT_Nuggets.part158.rar.rar
http://rapidshare.com/files/48572924/CBT_Nuggets.part159.rar.rar
http://rapidshare.com/files/48573660/CBT_Nuggets.part160.rar.rar
http://rapidshare.com/files/48574383/CBT_Nuggets.part161.rar.rar
http://rapidshare.com/files/48575489/CBT_Nuggets.part162.rar.rar
http://rapidshare.com/files/48576222/CBT_Nuggets.part163.rar.rar
http://rapidshare.com/files/48576974/CBT_Nuggets.part164.rar.rar
http://rapidshare.com/files/48577836/CBT_Nuggets.part165.rar.rar
http://rapidshare.com/files/48578628/CBT_Nuggets.part166.rar.rar
http://rapidshare.com/files/48579415/CBT_Nuggets.part167.rar.rar
http://rapidshare.com/files/48580290/CBT_Nuggets.part168.rar.rar
http://rapidshare.com/files/48581042/CBT_Nuggets.part169.rar.rar
http://rapidshare.com/files/48581840/CBT_Nuggets.part170.rar.rar
http://rapidshare.com/files/48582731/CBT_Nuggets.part171.rar.rar
http://rapidshare.com/files/48583606/CBT_Nuggets.part172.rar.rar
http://rapidshare.com/files/48584618/CBT_Nuggets.part173.rar.rar
http://rapidshare.com/files/48585848/CBT_Nuggets.part174.rar.rar
http://rapidshare.com/files/48586699/CBT_Nuggets.part175.rar.rar
http://rapidshare.com/files/48587767/CBT_Nuggets.part176.rar.rar
http://rapidshare.com/files/48588504/CBT_Nuggets.part177.rar.rar
http://rapidshare.com/files/48589940/CBT_Nuggets.part178.rar.rar
http://rapidshare.com/files/48590927/CBT_Nuggets.part179.rar.rar
http://rapidshare.com/files/48591841/CBT_Nuggets.part180.rar.rar
http://rapidshare.com/files/48594121/CBT_Nuggets.part181.rar.rar
http://rapidshare.com/files/48595093/CBT_Nuggets.part182.rar.rar
http://rapidshare.com/files/48595779/CBT_Nuggets.part183.rar.rar
http://rapidshare.com/files/48596444/CBT_Nuggets.part184.rar.rar
http://rapidshare.com/files/48597297/CBT_Nuggets.part185.rar.rar
http://rapidshare.com/files/48597949/CBT_Nuggets.part186.rar.rar
http://rapidshare.com/files/48598893/CBT_Nuggets.part187.rar.rar
http://rapidshare.com/files/48599648/CBT_Nuggets.part188.rar.rar
http://rapidshare.com/files/48600422/CBT_Nuggets.part189.rar.rar
http://rapidshare.com/files/48601067/CBT_Nuggets.part190.rar.rar
http://rapidshare.com/files/48601865/CBT_Nuggets.part191.rar.rar
http://rapidshare.com/files/48602792/CBT_Nuggets.part192.rar.rar
http://rapidshare.com/files/48603655/CBT_Nuggets.part193.rar.rar
http://rapidshare.com/files/48604763/CBT_Nuggets.part194.rar.rar
http://rapidshare.com/files/48605451/CBT_Nuggets.part195.rar.rar
http://rapidshare.com/files/48606121/CBT_Nuggets.part196.rar.rar
http://rapidshare.com/files/48606874/CBT_Nuggets.part197.rar.rar
http://rapidshare.com/files/48607494/CBT_Nuggets.part198.rar.rar
http://rapidshare.com/files/48608158/CBT_Nuggets.part199.rar.rar
http://rapidshare.com/files/48608785/CBT_Nuggets.part200.rar.rar
http://rapidshare.com/files/48609454/CBT_Nuggets.part201.rar.rar
http://rapidshare.com/files/48610236/CBT_Nuggets.part202.rar.rar
http://rapidshare.com/files/48610935/CBT_Nuggets.part203.rar.rar
http://rapidshare.com/files/48611653/CBT_Nuggets.part204.rar.rar
http://rapidshare.com/files/48612213/CBT_Nuggets.part205.rar.rar
http://rapidshare.com/files/48612952/CBT_Nuggets.part206.rar.rar
http://rapidshare.com/files/48613570/CBT_Nuggets.part207.rar.rar
http://rapidshare.com/files/48614248/CBT_Nuggets.part208.rar.rar
http://rapidshare.com/files/48614914/CBT_Nuggets.part209.rar.rar
http://rapidshare.com/files/48615565/CBT_Nuggets.part210.rar.rar
http://rapidshare.com/files/48616273/CBT_Nuggets.part211.rar.rar
http://rapidshare.com/files/48616448/CBT_Nuggets.part212.rar.rar



passCode:
free