skip to main |
skip to sidebar
Internet Download Manager-IDM 5.18 Build 5 | 5 MB
Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all othhttp://i26.tinypic.com/30bfl6w.jpger popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.
Download
Read more...
IVT Bluesoleil 6.4.25 | 38 MB
blueSoleil 6 is one of the most popular and professional Windows-based Bluetooth application, emerging from IVT by great innovation and independence, fulfilling all demands of an integrated wirelessly accessed a wide variety of Bluetooth enabled digital devices, such as mobile phones, headsets, printers, keyboards and so on. You can also form networks and exchange data with other Bluetooth enabled computers.
Download
Read more...
WiFi Attacking Tools 2009 |35 MB
The pack contains the MOST updated and licensed softwares.
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.
2. AirSnort 0.2.6
AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in " Weaknesses in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement this attack, but he has not made his software public. AirSnort, along with WEPCrack, which was released about the same time as AirSnort, are the first publicly available implementaions of this attack.
3. AeroPeek 2.02
AiroPeek NX captures and decodes packets, with special emphasis on the 802.11 protocol. AiroPeek NX receives all wireless LAN packets based on user settable configuration parameters and stores these packets in memory. For example, you can set a filter to capture all packets, only 802.11 authentication request frames, or all frames except beacons frames. Just about any combination of packet types and protocols are possible.
Download
Read more...
Disclimer:We do not host or upload on our site we just post the links found fron other sites.