Language Hacking German

Hacking Financial Markets - 25 Tools For Trading & Investing  eBooks & eLearning

Posted by FenixN at April 2, 2016
Hacking Financial Markets - 25 Tools For Trading & Investing

Hacking Financial Markets - 25 Tools For Trading & Investing
HDRips | MP4/AVC, ~776 kb/s | 1280x720 | Duration: 2 hours | English: AAC, 72 kb/s (2 ch) | 700 MB
Genre: Trading

Learn to use online tools such as StockTwits, Google, Amibroker and Finviz to trade stocks, commodities, CFDs & forex.

Introduction to Information Security  eBooks & eLearning

Posted by FenixN at April 27, 2016
Introduction to Information Security

Introduction to Information Security
HDRips | MP4/AVC, ~1493 kb/s | 1280x720 | Duration: ~8 hours | English: AAC, 128 kb/s (2 ch) | 6,09 GB
Genre: Development / Programming / Security

Introduction to Information Security LiveLessons provides technical professionals with a relatively brief, high-level overview of information security concepts, including the fundamental steps needed to secure a system, the types of threats and vulnerabilities they may encounter, and what steps can and should be taken to mitigate those threats and vulnerabilities.

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying  eBooks & eLearning

Posted by FenixN at April 23, 2016
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
Audio CDs in WAV / English: PCM, 1411 kb/s (2 ch) | Duration: 03:20:27 | 2015 | ISBN-10: N/A | ASIN: B0167ITGZ8 | 1.97 GB
Genre: Security, Hacking

The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you.

Social Life-Hacking  eBooks & eLearning

Posted by FenixN at Nov. 24, 2015
Social Life-Hacking

Social Life-Hacking
HDRip | MP4/AVC, ~4994 kb/s | 1280x720 | Duration: 00:28:00 | English: AAC, 318 kb/s (2 ch) | + PDF Guide | 1,04 GB
Genre: Dating, Relationships, Sex, Psychology

Harmoniously mesh together social circles, social networking and cold approach to take your lifestyle to the next level. Living a life of abundance and enjoying every moment of it, being a fascinating man women can’t help being drawn into, building a social circle of beautiful women and amazing men are some of those things that aren’t talked about or really even considered in the pickup artist community.

Joshua Pellicer - Hacking Attraction  eBooks & eLearning

Posted by FenixN at Dec. 10, 2013
Joshua Pellicer - Hacking Attraction

Joshua Pellicer - Hacking Attraction
Flash Video | MP4 / AVC, ~1134 kb/s | 800x450 | Duration: 15 Hours | English: AAC, 128 kb/s (2 ch) | 8.24 GB
Genre: Psychology

Joshua Pellicer (The Tao of Badass) explains his theory about the four different natural personality types of men and the hidden "super power" of each type. These training videos follow a general pattern where the viewer first learns how to recognise which "super power" they already have, improve this strength until it is the best it can possibly be, and then work on their weaknesses so they are able to adapt their personality appropriately for any given situation where they wish to attract a woman.

Trojaner Kompendium - Christian Bernstein (German language)  eBooks & eLearning

Posted by arin at Sept. 13, 2005


Christian Bernstein, «Wissen ist Macht. Trojaner Kompendium» German | PDF | 286 Kb | 21 Pages


Ich schreibe dieses Dokument um meinen Teil dazu beizutragen, dass das Internet nicht aus einer Masse von dummen Usern besteht, die keine Ahnung von Computern, Internet und Sicherheit haben.

Sichere Daten auf iPhone und iPad  eBooks & eLearning

Posted by FenixN at April 27, 2016
Sichere Daten auf iPhone und iPad

Sichere Daten auf iPhone und iPad
HDRips | MP4/AVC, ~72 kb/s | 1280x720 | Duration: 1 hours 51 mins | German: AAC, 128 kb/s (1 ch) | 208 MB
Genre: Security

Ob es um die Einstellungen im iOS-Betriebssystem, den Safari-Browser, die Ortungsdienste, iMessage, Facetime oder andere wichtige Apps geht: In diesem Video-Training erhalten Sie eine praktische Anleitung, wie Sie die Daten, die Sie durch Gebrauch im Netz hinterlassen oder auf Ihrem Device gespeichert haben, vor den Augen und den Zugriff von außen schützen können. Sehen Sie zum Beispiel, dass Bilder in E-Mails nicht ganz so harmlos sind, wie Sie vielleicht denken, und dass Viren und Schadsoftware auch in der mobilen Welt eine Rolle spielen.

World Hacker's - 25th Chaos Communication Congress  eBooks & eLearning

Posted by FenixN at Dec. 8, 2011
World Hacker's - 25th Chaos Communication Congress

World Hacker's - 25th Chaos Communication Congress
DVDRip | mp4 / AVC, 1033 kb/s | 720x576 | 00:35:42 | English: AAC, 63 kb/s (1 ch) | 281 mb

A clever or ingenious device or expedient; adroit technique: the tricks of the trade. A collection of engaging techniques, some unreleased and some perhaps forgotten, to make pentesting fun again. From layer 3 attacks that still work, to user interaction based exploits that aren't 'clickjacking', to local root privilege escalation without exploits and uncommon web application exploitation techniques.

World Hacker's - 26th Chaos Communication Congress  eBooks & eLearning

Posted by FenixN at Dec. 8, 2011
World Hacker's - 26th Chaos Communication Congress

World Hacker's - 26th Chaos Communication Congress
5xDVDRip | mp4 / AVC, ~1497 kb/s | 720x576 | 5 х ~60 min | English: AAC, 64 kb/s (1 ch) | 2.79 Gb

Authorship recognition based on linguistics (known as Stylometry) has contributed to literary and historical breakthroughs. These successes have led to the use of these techniques in criminal investigations and prosecutions. Stylometry, however, can also be used to infringe upon the privacy of individuals who wish to publish documents anonymously. Our research demonstrates how various types of attacks can reduce the effectiveness of stylometric techniques down to the level of random guessing and worse. These results are made more significant by the fact that the experimental subjects were unfamiliar with stylometric techniques, without specialized knowledge in linguistics, and spent little time on the attacks.

Penetration Testing With the Metasploit Framework  eBooks & eLearning

Posted by FenixN at Oct. 27, 2016
Penetration Testing With the Metasploit Framework

Penetration Testing With the Metasploit Framework
HDRips | MP4/AVC, ~521 kb/s | 1280x720 | Duration: 03:23:05 | English: AAC, 128 kb/s (2 ch) | 984 MB
Genre: Development / Programming

An essential requirement for protecting any organization's computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities.