Your Ad Here

We have moved to http://access-xperia.blogspot.com

ATX If you are this blogs reader, I encourage you to visit and join ATX. This blog will not be discontinued but all the recent updates will be on ATX. ATX brings you a more exciting look, more premium software for free and ofcourse a chance to win invitations of some selected sites.

Visit and readACCESS THE XPERIA

Resource site of Computer software, Phone application, E-books, Programming codes, yahoo tools, tutorials, hacking tools, keylogger, trojan, hacking, MP3 and much more. ::CORE™::

Saturday, September 26, 2009

How to crack shareware





CORE™

How to crack shareware





CORE™

How to crack cd protections



CORE™

How to crack cd protections



CORE™

Collection Of Banned Books




ILLEGAL COLLECTION OF BANNED BOOKS ONLY FOR YOU
  • !! Noam Chomsky - Fa..> 14-Mar-2008 07:15   41M  
  •       !! The.World.Is.Flat..> 14-Mar-2008 07:15  1.7M  
  •       (Ebook Eng Pdf) Chom..> 14-Mar-2008 07:17  7.6M  
  •       British Legal System..> 14-Mar-2008 07:17   29K  
  •       Building a North Ame..> 14-Mar-2008 07:17  295K  
  •       CIA Secret Weapons.pdf  14-Mar-2008 07:17   18K  
  •       Coming Financial Cra..> 14-Mar-2008 07:17  318K  
  •       Conspiracy - CIA and..> 14-Mar-2008 07:17  161K  
  •       Crown Against Concub..> 14-Mar-2008 07:17  264K  
  •       David Hawkins - Powe..> 14-Mar-2008 07:17  117K  
  •       David Icke - 911 How..> 14-Mar-2008 07:17  254K  
  •       David Icke - An Othe..> 14-Mar-2008 07:17  100K  
  •       David Icke - Bush Bi..> 14-Mar-2008 07:17  145K  
  •       David Icke - Caverns..> 14-Mar-2008 07:17   46K  
  •       David Icke - Federal..> 14-Mar-2008 07:17  203K  
  •       David Icke - Say NO ..> 14-Mar-2008 07:17  297K  
  •       David Icke - The Big..> 14-Mar-2008 07:19   10M  
  •       David Icke - The Eur..> 14-Mar-2008 07:19  233K  
  •       David Icke - The Hid..> 14-Mar-2008 07:19   65K  
  •       David Icke - The Rot..> 14-Mar-2008 07:19  212K  
  •       David Icke - Was Hit..> 14-Mar-2008 07:19  146K  
  •       David Icke - WTC - P..> 14-Mar-2008 07:19  123K  
  •       Freemasonry - Hermes..> 14-Mar-2008 07:19   21K  
  •       Freemasonry - Rite o..> 14-Mar-2008 07:19   67K  
  •       Geneology of Prince ..> 14-Mar-2008 07:19   18K  
  •       George Orwell 1984.pdf  14-Mar-2008 07:19  395K  
  •       Hitler's Salad Days ..> 14-Mar-2008 07:19  1.2M  
  •       Hollow Earth Theory ..> 14-Mar-2008 07:19   57K  
  •       Hollow Earth Theory ..> 14-Mar-2008 07:19   52K  
  •       Hughes - The Secret ..> 14-Mar-2008 07:19  339K  
  •       Jon Rappoport - AIDS..> 14-Mar-2008 07:20  422K  
  •       Karl Marx - Communis..> 14-Mar-2008 07:20  250K  
  •       Kissinger and Rockef..> 14-Mar-2008 07:20  131K  
  •       Land-Mine Legislatio..> 14-Mar-2008 07:20   74K  
  •       Life in a Nazi Camp ..> 14-Mar-2008 07:20  1.0M  
  •       Living Crystals of A..> 14-Mar-2008 07:20   28K  
  •       Manly P Hall - The L..> 14-Mar-2008 07:20  195K  
  •       Marrs - An Overview ..> 14-Mar-2008 07:20  133K  
  •       Memorandum by J.E.Ho..> 14-Mar-2008 07:20   41K  
  •       Merton - Crown again..> 14-Mar-2008 07:20  138K  
  •       Milton William Coope..> 14-Mar-2008 07:20   42K  
  •       Nasa Masonic Conspir..> 14-Mar-2008 07:20   65K  
  •       New World Order and ..> 14-Mar-2008 07:20   86K  
  •       New World Order By M..> 14-Mar-2008 07:20   75K  
  •       New World Order or O..> 14-Mar-2008 07:20   61K  
  •       NORAD Intercept Proc..> 14-Mar-2008 07:20   63K  
  •       Nikola Tesla - The P..> 14-Mar-2008 07:20   29K  
  •       Priory of Sion.pdf      14-Mar-2008 07:20  250K  
  •       Project Megiddo.pdf     14-Mar-2008 07:20  110K  
  •       Project Superman - M..> 14-Mar-2008 07:20  283K  
  •       Public School Kids D..> 14-Mar-2008 07:20  160K  
  •       Remer - 20 July 1944..> 14-Mar-2008 07:20  175K  
  •       Remote Viewing By Ti..> 14-Mar-2008 07:20  304K  
  •       Roger Craig - When T..> 14-Mar-2008 07:20  185K  
  •       Rogue State - A guid..> 14-Mar-2008 07:20  838K  
  •       Rosicrucians Past an..> 14-Mar-2008 07:20   32K  
  •       Salem The Great Ligh..> 14-Mar-2008 07:20   27K  
  •       Secret Nazi Conspira..> 14-Mar-2008 07:21  501K  
  •       Skull&Bones the Ivy ..> 14-Mar-2008 07:21   32K  
  •       Tai Chi As a Spiritu..> 14-Mar-2008 07:21   33K  
  •       The Banker's Conspir..> 14-Mar-2008 07:21  2.0M  
  •       The Biblical Count o..> 14-Mar-2008 07:21  119K  
  •       The BitTorrent Bible..> 14-Mar-2008 07:21  496K  
  •       The Black Box and Ot..> 14-Mar-2008 07:26   26M  
  •       The Bohemian Grove a..> 14-Mar-2008 07:26  650K  
  •       The Brotherhood and ..> 14-Mar-2008 07:26  219K  
  •       The CIA How to think..> 14-Mar-2008 07:26   12K  
  •       The Conqueror Worm b..> 14-Mar-2008 07:26  5.9K  
  •       The Doctrine of Fasc..> 14-Mar-2008 07:27  2.8M  
  •       The Modern Humans Co..> 14-Mar-2008 07:30   19M  
  •       The Modern Humans Co..> 14-Mar-2008 07:36   29M  
  •       The Modern Humans Co..> 14-Mar-2008 07:41   26M  
  •       The Modern Humans Co..> 14-Mar-2008 07:45  1.5K  
  •       The Modern Humans Co..> 14-Mar-2008 07:45   22M  
  •       The Pegasus File.pdf    14-Mar-2008 07:45   87K  
  •       The Protocols of Zio..> 14-Mar-2008 07:45  179K  
  •       The Raven by Edgar A..> 14-Mar-2008 07:45   11K  
  •       The Strange Life of ..> 14-Mar-2008 07:45  388K  
  •       US Military Interven..> 14-Mar-2008 07:45  115K  
  •       Vegetius - The Milit..> 14-Mar-2008 07:45  172K  
  •       Victory Act of 2003.pdf 14-Mar-2008 07:45  170K  
  •       What Is The Illumina..> 14-Mar-2008 07:45  381K  
  •       Whats Wrong With Mcd..> 14-Mar-2008 07:45  282K  
  •       White Papers (Skull ..> 14-Mar-2008 07:45  139K  
  •       Who is the Beast - T..> 14-Mar-2008 07:45   95K  
  •       25 Ways To Suppress ..> 14-Mar-2008 07:45   79K  
  •       911 Synthetic Terror..> 14-Mar-2008 07:46  2.3M  
  •       1977 Senate Hearing ..> 14-Mar-2008 07:46  1.0M  
  •       Accessible Remains o..> 14-Mar-2008 07:46   31K  
  •       Amitakh Chiappalone ..> 14-Mar-2008 07:46   60K  
  •       Benson, Ragnar - Bre..> 14-Mar-2008 07:46   48K  
  •       Big Lies - Israel My..> 14-Mar-2008 07:46  410K  
  •       Social Engineering D..> 14-Mar-2008 08:07    -  
  •       FBI.report_megiddo.m..> 14-Mar-2008 08:07  110K  
  •       Frequency.WeaponsMin..> 14-Mar-2008 08:07  395K  
  •       George.Orwell_1984.pdf  14-Mar-2008 08:07  395K  
  •       Graham.accuses.bush...> 14-Mar-2008 08:07   85K  
  •       Halliburton_Admin.Co..> 14-Mar-2008 08:07  177K  
  •       HR10.-.9.11.Recommen..> 14-Mar-2008 08:07  922K  
  •       HR5111.-.Illegal.Imm..> 14-Mar-2008 08:07   48K  
  •       Icke, David  - The B..> 14-Mar-2008 08:09   10M  
  •       Freedom From War.pdf    14-Mar-2008 08:09  110K  
  •       ID.Theft.by.the.US.G..> 14-Mar-2008 08:09  1.0M  
  •       illuminati - priory ..> 14-Mar-2008 08:09  186K  
  •       Karl.Marx_Communist...> 14-Mar-2008 08:10  250K  
  •       Michael Ruppert - Cr..> 14-Mar-2008 08:10  4.0M  
  •       Michael.Hardt&Antoni..> 14-Mar-2008 08:11  1.3M  
  •       NWO.-.Final.Warning...> 14-Mar-2008 08:11  1.8M  
  •       Order.Out.of.Chaos.-..> 14-Mar-2008 08:11  1.3M  
  •       pentagon_climate.war..> 14-Mar-2008 08:11  433K  
  •       Project20Mk20Ultra.pdf  14-Mar-2008 08:11  471K  
  •       Project.Megiddo.pdf     14-Mar-2008 08:11  110K  
  •       Public.School.Kids.D..> 14-Mar-2008 08:11  160K  
  •       RebuildingAmericasDe..> 14-Mar-2008 08:11  853K  
  •       Rockefeller.Syndicat..> 14-Mar-2008 08:12   49K  
  •       Skull_and_Bones_the_..> 14-Mar-2008 08:12   43K  
  •       rothschild.pdf          14-Mar-2008 08:12  446K  
  •       Space.Preservation.A..> 14-Mar-2008 08:12   55K  
  •       the.Pegasus.File.pdf    14-Mar-2008 08:12   87K  
  •       The Iron Triangle - ..> 14-Mar-2008 08:12  1.5M  
  •       Stranger Then Fictio..> 14-Mar-2008 08:30  1.5M  
  •       Unabomber.Manifesto_..> 14-Mar-2008 08:31  209K  
  •       victoryact.pdf          14-Mar-2008 08:31  170K  
  •       The Secret Team - By..> 14-Mar-2008 08:31  1.7M  
  •       What To Do If The FB..> 14-Mar-2008 08:31   17K  
  •       Wall Street and The ..> 14-Mar-2008 08:31  620K  
  •       The Best Democracy M..> 14-Mar-2008 08:31  571K  
  •       A.chance.to.build.th..> 14-Mar-2008 08:32   42K  
  •       The.Bush.Record/        14-Mar-2008 08:32    -  
  •       A.Global.Economy.wit..> 14-Mar-2008 08:32  134K  
  •       Antony.Sutton_Wall.S..> 14-Mar-2008 08:32  620K  
  •       Breaking Big Brother..> 14-Mar-2008 08:32   32K  
  •       Chomsky, Noam - Medi..> 14-Mar-2008 08:32  470K  
  •       ebook.-.pdf.-.David...> 14-Mar-2008 08:32  122K  
  •       ebook.-.PDF.The.Brai..> 14-Mar-2008 08:32  134K  
  •       FBI.Report_Cthulhu.C..> 14-Mar-2008 08:32   70K  
  •       DoD_Manpower_Statist..> 14-Mar-2008 08:32  1.0M  
  •       Fatherland_Security_..> 14-Mar-2008 08:32  568K  
  •       FBI.flyer_you.are.te..> 14-Mar-2008 08:32   63K  
  •       FBI.flyer_you.are.te..> 14-Mar-2008 08:32   56K  
  •       joint_vision_2020_pa..> 14-Mar-2008 08:32  1.1M  
  •       joint_vision_2020_pa..> 14-Mar-2008 08:33  2.3M  
  •       Manly.P.Hall_The.Sec..> 14-Mar-2008 08:33  3.3M  
  •       MK.Ultra_Senate.Hear..> 14-Mar-2008 08:33  471K  
  •       NORAD_intercept.proc..> 14-Mar-2008 08:33   63K  
  •       SearchForTheManchuri..> 14-Mar-2008 08:34  1.5M  
  •       Smoking.Gun.Proof.-...> 14-Mar-2008 08:34  400K  
  •       Smoking.Gun.Proof.-...> 14-Mar-2008 08:34  342K  
  •       Smoking.Gun.Proof.-...> 14-Mar-2008 08:34  323K  
  •       Smoking.Gun.Proof.-...> 14-Mar-2008 08:34  372K  
  •       Smoking.Gun.Proof.-...> 14-Mar-2008 08:34  382K  
  •       Springmeier.-.Bloodl..> 14-Mar-2008 08:34  910K  
  •       The Bohemian Grove a..> 14-Mar-2008 08:35  4.1M  
  •       The Taking of Americ..> 14-Mar-2008 08:35  512K  
  •       1971.AIDS.Flowchart-..> 14-Mar-2008 08:36  4.3M  
  •       Black Box Voting - B..> 14-Mar-2008 08:36  1.1M  
  •       checking_irans_nucle..> 14-Mar-2008 08:36  1.9M  
  •       CHOMSKY_Noam_-_Neces..> 14-Mar-2008 08:37  2.5M  
  •       Coleman.-.CONSPIRATO..> 14-Mar-2008 08:37  831K  
  •       conserving_the_force..> 14-Mar-2008 08:37  161K  
  •       department_of_defens..> 14-Mar-2008 08:38  3.4M  
  •       DoD_Dictionary_of_Mi..> 14-Mar-2008 08:38  1.8M  
  •       ! - CIA Psycohologic..> 14-Mar-2008 08:40  191K  
  •       ! - Defeating Electr..> 14-Mar-2008 08:40   68K  
  •       ! - Pay no Fine - A ..> 14-Mar-2008 08:40  318K  
  •       Alger Press - Your B..> 14-Mar-2008 08:40  1.1M  
  •       Army Research Instit..> 14-Mar-2008 08:40  362K  
  •       Balent, Matthew - Th..> 14-Mar-2008 08:41  5.4M  
  •       Benson, Ragnar - The..> 14-Mar-2008 08:43  8.2M  
  •       Canada Emergency Mea..> 14-Mar-2008 08:43  950K  
  •       Peaceful Paths LLC -..> 14-Mar-2008 08:43  149K  
  •       U.S. Marine Corps - ..> 14-Mar-2008 08:44  3.9M  
  •       Wellard, Paul - The ..> 14-Mar-2008 08:45  8.5M   
DOWNLOAD HERE



CORE™

Collection Of Banned Books




ILLEGAL COLLECTION OF BANNED BOOKS ONLY FOR YOU
  • !! Noam Chomsky - Fa..> 14-Mar-2008 07:15   41M  
  •       !! The.World.Is.Flat..> 14-Mar-2008 07:15  1.7M  
  •       (Ebook Eng Pdf) Chom..> 14-Mar-2008 07:17  7.6M  
  •       British Legal System..> 14-Mar-2008 07:17   29K  
  •       Building a North Ame..> 14-Mar-2008 07:17  295K  
  •       CIA Secret Weapons.pdf  14-Mar-2008 07:17   18K  
  •       Coming Financial Cra..> 14-Mar-2008 07:17  318K  
  •       Conspiracy - CIA and..> 14-Mar-2008 07:17  161K  
  •       Crown Against Concub..> 14-Mar-2008 07:17  264K  
  •       David Hawkins - Powe..> 14-Mar-2008 07:17  117K  
  •       David Icke - 911 How..> 14-Mar-2008 07:17  254K  
  •       David Icke - An Othe..> 14-Mar-2008 07:17  100K  
  •       David Icke - Bush Bi..> 14-Mar-2008 07:17  145K  
  •       David Icke - Caverns..> 14-Mar-2008 07:17   46K  
  •       David Icke - Federal..> 14-Mar-2008 07:17  203K  
  •       David Icke - Say NO ..> 14-Mar-2008 07:17  297K  
  •       David Icke - The Big..> 14-Mar-2008 07:19   10M  
  •       David Icke - The Eur..> 14-Mar-2008 07:19  233K  
  •       David Icke - The Hid..> 14-Mar-2008 07:19   65K  
  •       David Icke - The Rot..> 14-Mar-2008 07:19  212K  
  •       David Icke - Was Hit..> 14-Mar-2008 07:19  146K  
  •       David Icke - WTC - P..> 14-Mar-2008 07:19  123K  
  •       Freemasonry - Hermes..> 14-Mar-2008 07:19   21K  
  •       Freemasonry - Rite o..> 14-Mar-2008 07:19   67K  
  •       Geneology of Prince ..> 14-Mar-2008 07:19   18K  
  •       George Orwell 1984.pdf  14-Mar-2008 07:19  395K  
  •       Hitler's Salad Days ..> 14-Mar-2008 07:19  1.2M  
  •       Hollow Earth Theory ..> 14-Mar-2008 07:19   57K  
  •       Hollow Earth Theory ..> 14-Mar-2008 07:19   52K  
  •       Hughes - The Secret ..> 14-Mar-2008 07:19  339K  
  •       Jon Rappoport - AIDS..> 14-Mar-2008 07:20  422K  
  •       Karl Marx - Communis..> 14-Mar-2008 07:20  250K  
  •       Kissinger and Rockef..> 14-Mar-2008 07:20  131K  
  •       Land-Mine Legislatio..> 14-Mar-2008 07:20   74K  
  •       Life in a Nazi Camp ..> 14-Mar-2008 07:20  1.0M  
  •       Living Crystals of A..> 14-Mar-2008 07:20   28K  
  •       Manly P Hall - The L..> 14-Mar-2008 07:20  195K  
  •       Marrs - An Overview ..> 14-Mar-2008 07:20  133K  
  •       Memorandum by J.E.Ho..> 14-Mar-2008 07:20   41K  
  •       Merton - Crown again..> 14-Mar-2008 07:20  138K  
  •       Milton William Coope..> 14-Mar-2008 07:20   42K  
  •       Nasa Masonic Conspir..> 14-Mar-2008 07:20   65K  
  •       New World Order and ..> 14-Mar-2008 07:20   86K  
  •       New World Order By M..> 14-Mar-2008 07:20   75K  
  •       New World Order or O..> 14-Mar-2008 07:20   61K  
  •       NORAD Intercept Proc..> 14-Mar-2008 07:20   63K  
  •       Nikola Tesla - The P..> 14-Mar-2008 07:20   29K  
  •       Priory of Sion.pdf      14-Mar-2008 07:20  250K  
  •       Project Megiddo.pdf     14-Mar-2008 07:20  110K  
  •       Project Superman - M..> 14-Mar-2008 07:20  283K  
  •       Public School Kids D..> 14-Mar-2008 07:20  160K  
  •       Remer - 20 July 1944..> 14-Mar-2008 07:20  175K  
  •       Remote Viewing By Ti..> 14-Mar-2008 07:20  304K  
  •       Roger Craig - When T..> 14-Mar-2008 07:20  185K  
  •       Rogue State - A guid..> 14-Mar-2008 07:20  838K  
  •       Rosicrucians Past an..> 14-Mar-2008 07:20   32K  
  •       Salem The Great Ligh..> 14-Mar-2008 07:20   27K  
  •       Secret Nazi Conspira..> 14-Mar-2008 07:21  501K  
  •       Skull&Bones the Ivy ..> 14-Mar-2008 07:21   32K  
  •       Tai Chi As a Spiritu..> 14-Mar-2008 07:21   33K  
  •       The Banker's Conspir..> 14-Mar-2008 07:21  2.0M  
  •       The Biblical Count o..> 14-Mar-2008 07:21  119K  
  •       The BitTorrent Bible..> 14-Mar-2008 07:21  496K  
  •       The Black Box and Ot..> 14-Mar-2008 07:26   26M  
  •       The Bohemian Grove a..> 14-Mar-2008 07:26  650K  
  •       The Brotherhood and ..> 14-Mar-2008 07:26  219K  
  •       The CIA How to think..> 14-Mar-2008 07:26   12K  
  •       The Conqueror Worm b..> 14-Mar-2008 07:26  5.9K  
  •       The Doctrine of Fasc..> 14-Mar-2008 07:27  2.8M  
  •       The Modern Humans Co..> 14-Mar-2008 07:30   19M  
  •       The Modern Humans Co..> 14-Mar-2008 07:36   29M  
  •       The Modern Humans Co..> 14-Mar-2008 07:41   26M  
  •       The Modern Humans Co..> 14-Mar-2008 07:45  1.5K  
  •       The Modern Humans Co..> 14-Mar-2008 07:45   22M  
  •       The Pegasus File.pdf    14-Mar-2008 07:45   87K  
  •       The Protocols of Zio..> 14-Mar-2008 07:45  179K  
  •       The Raven by Edgar A..> 14-Mar-2008 07:45   11K  
  •       The Strange Life of ..> 14-Mar-2008 07:45  388K  
  •       US Military Interven..> 14-Mar-2008 07:45  115K  
  •       Vegetius - The Milit..> 14-Mar-2008 07:45  172K  
  •       Victory Act of 2003.pdf 14-Mar-2008 07:45  170K  
  •       What Is The Illumina..> 14-Mar-2008 07:45  381K  
  •       Whats Wrong With Mcd..> 14-Mar-2008 07:45  282K  
  •       White Papers (Skull ..> 14-Mar-2008 07:45  139K  
  •       Who is the Beast - T..> 14-Mar-2008 07:45   95K  
  •       25 Ways To Suppress ..> 14-Mar-2008 07:45   79K  
  •       911 Synthetic Terror..> 14-Mar-2008 07:46  2.3M  
  •       1977 Senate Hearing ..> 14-Mar-2008 07:46  1.0M  
  •       Accessible Remains o..> 14-Mar-2008 07:46   31K  
  •       Amitakh Chiappalone ..> 14-Mar-2008 07:46   60K  
  •       Benson, Ragnar - Bre..> 14-Mar-2008 07:46   48K  
  •       Big Lies - Israel My..> 14-Mar-2008 07:46  410K  
  •       Social Engineering D..> 14-Mar-2008 08:07    -  
  •       FBI.report_megiddo.m..> 14-Mar-2008 08:07  110K  
  •       Frequency.WeaponsMin..> 14-Mar-2008 08:07  395K  
  •       George.Orwell_1984.pdf  14-Mar-2008 08:07  395K  
  •       Graham.accuses.bush...> 14-Mar-2008 08:07   85K  
  •       Halliburton_Admin.Co..> 14-Mar-2008 08:07  177K  
  •       HR10.-.9.11.Recommen..> 14-Mar-2008 08:07  922K  
  •       HR5111.-.Illegal.Imm..> 14-Mar-2008 08:07   48K  
  •       Icke, David  - The B..> 14-Mar-2008 08:09   10M  
  •       Freedom From War.pdf    14-Mar-2008 08:09  110K  
  •       ID.Theft.by.the.US.G..> 14-Mar-2008 08:09  1.0M  
  •       illuminati - priory ..> 14-Mar-2008 08:09  186K  
  •       Karl.Marx_Communist...> 14-Mar-2008 08:10  250K  
  •       Michael Ruppert - Cr..> 14-Mar-2008 08:10  4.0M  
  •       Michael.Hardt&Antoni..> 14-Mar-2008 08:11  1.3M  
  •       NWO.-.Final.Warning...> 14-Mar-2008 08:11  1.8M  
  •       Order.Out.of.Chaos.-..> 14-Mar-2008 08:11  1.3M  
  •       pentagon_climate.war..> 14-Mar-2008 08:11  433K  
  •       Project20Mk20Ultra.pdf  14-Mar-2008 08:11  471K  
  •       Project.Megiddo.pdf     14-Mar-2008 08:11  110K  
  •       Public.School.Kids.D..> 14-Mar-2008 08:11  160K  
  •       RebuildingAmericasDe..> 14-Mar-2008 08:11  853K  
  •       Rockefeller.Syndicat..> 14-Mar-2008 08:12   49K  
  •       Skull_and_Bones_the_..> 14-Mar-2008 08:12   43K  
  •       rothschild.pdf          14-Mar-2008 08:12  446K  
  •       Space.Preservation.A..> 14-Mar-2008 08:12   55K  
  •       the.Pegasus.File.pdf    14-Mar-2008 08:12   87K  
  •       The Iron Triangle - ..> 14-Mar-2008 08:12  1.5M  
  •       Stranger Then Fictio..> 14-Mar-2008 08:30  1.5M  
  •       Unabomber.Manifesto_..> 14-Mar-2008 08:31  209K  
  •       victoryact.pdf          14-Mar-2008 08:31  170K  
  •       The Secret Team - By..> 14-Mar-2008 08:31  1.7M  
  •       What To Do If The FB..> 14-Mar-2008 08:31   17K  
  •       Wall Street and The ..> 14-Mar-2008 08:31  620K  
  •       The Best Democracy M..> 14-Mar-2008 08:31  571K  
  •       A.chance.to.build.th..> 14-Mar-2008 08:32   42K  
  •       The.Bush.Record/        14-Mar-2008 08:32    -  
  •       A.Global.Economy.wit..> 14-Mar-2008 08:32  134K  
  •       Antony.Sutton_Wall.S..> 14-Mar-2008 08:32  620K  
  •       Breaking Big Brother..> 14-Mar-2008 08:32   32K  
  •       Chomsky, Noam - Medi..> 14-Mar-2008 08:32  470K  
  •       ebook.-.pdf.-.David...> 14-Mar-2008 08:32  122K  
  •       ebook.-.PDF.The.Brai..> 14-Mar-2008 08:32  134K  
  •       FBI.Report_Cthulhu.C..> 14-Mar-2008 08:32   70K  
  •       DoD_Manpower_Statist..> 14-Mar-2008 08:32  1.0M  
  •       Fatherland_Security_..> 14-Mar-2008 08:32  568K  
  •       FBI.flyer_you.are.te..> 14-Mar-2008 08:32   63K  
  •       FBI.flyer_you.are.te..> 14-Mar-2008 08:32   56K  
  •       joint_vision_2020_pa..> 14-Mar-2008 08:32  1.1M  
  •       joint_vision_2020_pa..> 14-Mar-2008 08:33  2.3M  
  •       Manly.P.Hall_The.Sec..> 14-Mar-2008 08:33  3.3M  
  •       MK.Ultra_Senate.Hear..> 14-Mar-2008 08:33  471K  
  •       NORAD_intercept.proc..> 14-Mar-2008 08:33   63K  
  •       SearchForTheManchuri..> 14-Mar-2008 08:34  1.5M  
  •       Smoking.Gun.Proof.-...> 14-Mar-2008 08:34  400K  
  •       Smoking.Gun.Proof.-...> 14-Mar-2008 08:34  342K  
  •       Smoking.Gun.Proof.-...> 14-Mar-2008 08:34  323K  
  •       Smoking.Gun.Proof.-...> 14-Mar-2008 08:34  372K  
  •       Smoking.Gun.Proof.-...> 14-Mar-2008 08:34  382K  
  •       Springmeier.-.Bloodl..> 14-Mar-2008 08:34  910K  
  •       The Bohemian Grove a..> 14-Mar-2008 08:35  4.1M  
  •       The Taking of Americ..> 14-Mar-2008 08:35  512K  
  •       1971.AIDS.Flowchart-..> 14-Mar-2008 08:36  4.3M  
  •       Black Box Voting - B..> 14-Mar-2008 08:36  1.1M  
  •       checking_irans_nucle..> 14-Mar-2008 08:36  1.9M  
  •       CHOMSKY_Noam_-_Neces..> 14-Mar-2008 08:37  2.5M  
  •       Coleman.-.CONSPIRATO..> 14-Mar-2008 08:37  831K  
  •       conserving_the_force..> 14-Mar-2008 08:37  161K  
  •       department_of_defens..> 14-Mar-2008 08:38  3.4M  
  •       DoD_Dictionary_of_Mi..> 14-Mar-2008 08:38  1.8M  
  •       ! - CIA Psycohologic..> 14-Mar-2008 08:40  191K  
  •       ! - Defeating Electr..> 14-Mar-2008 08:40   68K  
  •       ! - Pay no Fine - A ..> 14-Mar-2008 08:40  318K  
  •       Alger Press - Your B..> 14-Mar-2008 08:40  1.1M  
  •       Army Research Instit..> 14-Mar-2008 08:40  362K  
  •       Balent, Matthew - Th..> 14-Mar-2008 08:41  5.4M  
  •       Benson, Ragnar - The..> 14-Mar-2008 08:43  8.2M  
  •       Canada Emergency Mea..> 14-Mar-2008 08:43  950K  
  •       Peaceful Paths LLC -..> 14-Mar-2008 08:43  149K  
  •       U.S. Marine Corps - ..> 14-Mar-2008 08:44  3.9M  
  •       Wellard, Paul - The ..> 14-Mar-2008 08:45  8.5M   
DOWNLOAD HERE



CORE™

Norton Trial Reset 2.9A and Norton Removal Tool

 

Norton Heal Pack - Norton Trial Reset 2.9A (latest one) and Norton Removal Tool [Single Link] | 5.61 Mb

Norton 2009 TrialReset v2.9A will reset the trial period (generally to 90 days) every time you start your computer.

Tested on WinXP (x86) & Vista (x86/x64).

Norton 2009 TrialReset v2.9A is for the Norton Internet Security 2009 (v16.5.0.135), Norton AntiVirus 2009 (v16.5.0.134), and

Norton 360 v3 Premier Edition (v3.0.0.135).

NET framework v3.5 must be installed.


DOWNLOAD LINK




CORE™

Norton Trial Reset 2.9A and Norton Removal Tool

 

Norton Heal Pack - Norton Trial Reset 2.9A (latest one) and Norton Removal Tool [Single Link] | 5.61 Mb

Norton 2009 TrialReset v2.9A will reset the trial period (generally to 90 days) every time you start your computer.

Tested on WinXP (x86) & Vista (x86/x64).

Norton 2009 TrialReset v2.9A is for the Norton Internet Security 2009 (v16.5.0.135), Norton AntiVirus 2009 (v16.5.0.134), and

Norton 360 v3 Premier Edition (v3.0.0.135).

NET framework v3.5 must be installed.


DOWNLOAD LINK




CORE™

Digital tutors-mental ray Nodes Online Reference Library

 

A visual exploration of each mental ray node in Maya.


Software: Maya 2008 and up
Run Time: 9 hrs.



The Following Nodes are Covered in this Reference

Contour Contrast
contour_contrast_function_levels Node
contour_contrast_function_simple Node

Contour Output
contour_only Node
contour_PS Node
contour_composite Node

Contour Shader
contour_shader_simple Node
contour_shader_layerthinner Node
contour_shader_combi Node
contour_shader_curvature Node
contour_shader_widthfromlight Node
contour_shader_depthfade Node
contour_shader_factorcolor Node
contour_shader_maxcolor Node
contour_shader_framefade Node
contour_shader_silhouette Node
contour_shader_widthfromlightdirection Node
contour_shader_widthfromcolor Node

Contour Store
contour_store_function Node
contour_store_function_simple Node

Data Conversion
mib_color_mix Node
mib_color_average Node
mib_color_alpha Node
mib_color_intensity Node
mib_color_interpolate Node

Environment
mib_lookup_cube6 Node
mib_lookup_cube1 Node
mib_lookup_spherical Node
mia_env_blur Node
mib_lookup_background Node

Geometry
mib_geo_cone Node
mib_geo_cube Node
mib_geo_cylinder Node
mib_geo_torus Node
Lens
mia_lens_bokeh Node
mib_lens_stencil Node
mia_exposure_simple Node
mib_lens_clamp Node
mia_physical_sky Node
physical_lens_DOF Node
oversampling_lens Node
mia_exposure_photographic Node

Lights
mib_blackbody Node
mib_cie_d Node
mib_FG_occlusion Node
mib_light_photometric Node
mib_light_spot Node
mia_physical_sun Node
mib_light_infinite Node
mib_light_point Node
mia_light_portal Node
physical_light Node

Materials
mib_DGS_material Node
transmat Node
path_material Node
mib_illum_lambert Node
mib_illum_blinn Node
misss_fast_shader Node
misss_fast_simple_maya Node
mi_car_paint_phen_x Node
mi_car_paint_phen_x_passes Node
mi_metallic_paint_x Node
mi_metallic_paint_x_passes Node
mia_material_x Node
mia_material_x_passes Node
misss_fast_shader_X Node
misss_fast_shader_X_passes Node
mib_illum_ward_deriv Node
mi_car_paint_phen Node
mib_illum_glossy_refract_part2 Node
misss_set_normal Node
mi_metallic_paint Node
misss_skin_specular Node
mia_material Node
mib_illum_phong Node
mib_glossy_reflect Node
mib_illum_cookTorr Node
mib_illum_ward Node
misss_fast_skin_maya Node
mib_illum_glossy_refract_part1 Node
dielectric_material Node
lightMap
mib_lightMap_sample Node
mib_lightmap_write Node
misss_fast_lmap_maya Node

Miscellaneous
writeToColorBuffer Node
writeToDepthBuffer Node

Photonic Materials
mib_photon_basic Node
dgs_photon Node
dielectric_material_photon Node
transmat_photon Node

Sample Compositing
mib_dielectric Node
mib_opacity Node
mib_transparency Node
mib_continue Node
mib_twoSided Node
mib_refraction_index Node
mib_reflect Node
mib_refract Node

Shadow
mib_shadow_transparency Node

Textures
mib_passthrough_bump Node
mib_amb_occlusion Node
mib_bump_map_2 Node
mib_texture_lookup2 Node
mib_filtered_texture_lookup Node
mi_bump_flakes Node
mib_texture_rotate Node
mib_texture_checkerboard Node
mib_texture_turbulence Node
mib_texture_polkadot Node
mib_texture_wave Node
mib_texture_lookup Node
mib_texture_vector Node
mib_bump_map Node
mia_roundcorners Node
mib_bump_basis Node

Volumetric
mib_volume Node
participating_volume Node

download link

http://rapidshare.com/files/229049309/DigitalTutors_MentalRay_NodesLibrary.part01.rar
http://rapidshare.com/files/229032123/DigitalTutors_MentalRay_NodesLibrary.part02.rar
http://rapidshare.com/files/229015942/DigitalTutors_MentalRay_NodesLibrary.part03.rar
http://rapidshare.com/files/228991174/DigitalTutors_MentalRay_NodesLibrary.part04.rar
http://rapidshare.com/files/229065957/DigitalTutors_MentalRay_NodesLibrary.part05.rar
http://rapidshare.com/files/228959071/DigitalTutors_MentalRay_NodesLibrary.part06.rar
http://rapidshare.com/files/229122906/DigitalTutors_MentalRay_NodesLibrary.part07.rar
http://rapidshare.com/files/229100904/DigitalTutors_MentalRay_NodesLibrary.part08.rar
http://rapidshare.com/files/229082859/DigitalTutors_MentalRay_NodesLibrary.part09.rar
http://rapidshare.com/files/229162493/DigitalTutors_MentalRay_NodesLibrary.part10.rar
http://rapidshare.com/files/229142167/DigitalTutors_MentalRay_NodesLibrary.part11.rar
http://rapidshare.com/files/229306671/DigitalTutors_MentalRay_NodesLibrary.part12.rar
http://rapidshare.com/files/229295496/DigitalTutors_MentalRay_NodesLibrary.part13.rar
http://rapidshare.com/files/229314004/DigitalTutors_MentalRay_NodesLibrary.part14.rar


CORE™

Digital tutors-mental ray Nodes Online Reference Library

 

A visual exploration of each mental ray node in Maya.


Software: Maya 2008 and up
Run Time: 9 hrs.



The Following Nodes are Covered in this Reference

Contour Contrast
contour_contrast_function_levels Node
contour_contrast_function_simple Node

Contour Output
contour_only Node
contour_PS Node
contour_composite Node

Contour Shader
contour_shader_simple Node
contour_shader_layerthinner Node
contour_shader_combi Node
contour_shader_curvature Node
contour_shader_widthfromlight Node
contour_shader_depthfade Node
contour_shader_factorcolor Node
contour_shader_maxcolor Node
contour_shader_framefade Node
contour_shader_silhouette Node
contour_shader_widthfromlightdirection Node
contour_shader_widthfromcolor Node

Contour Store
contour_store_function Node
contour_store_function_simple Node

Data Conversion
mib_color_mix Node
mib_color_average Node
mib_color_alpha Node
mib_color_intensity Node
mib_color_interpolate Node

Environment
mib_lookup_cube6 Node
mib_lookup_cube1 Node
mib_lookup_spherical Node
mia_env_blur Node
mib_lookup_background Node

Geometry
mib_geo_cone Node
mib_geo_cube Node
mib_geo_cylinder Node
mib_geo_torus Node
Lens
mia_lens_bokeh Node
mib_lens_stencil Node
mia_exposure_simple Node
mib_lens_clamp Node
mia_physical_sky Node
physical_lens_DOF Node
oversampling_lens Node
mia_exposure_photographic Node

Lights
mib_blackbody Node
mib_cie_d Node
mib_FG_occlusion Node
mib_light_photometric Node
mib_light_spot Node
mia_physical_sun Node
mib_light_infinite Node
mib_light_point Node
mia_light_portal Node
physical_light Node

Materials
mib_DGS_material Node
transmat Node
path_material Node
mib_illum_lambert Node
mib_illum_blinn Node
misss_fast_shader Node
misss_fast_simple_maya Node
mi_car_paint_phen_x Node
mi_car_paint_phen_x_passes Node
mi_metallic_paint_x Node
mi_metallic_paint_x_passes Node
mia_material_x Node
mia_material_x_passes Node
misss_fast_shader_X Node
misss_fast_shader_X_passes Node
mib_illum_ward_deriv Node
mi_car_paint_phen Node
mib_illum_glossy_refract_part2 Node
misss_set_normal Node
mi_metallic_paint Node
misss_skin_specular Node
mia_material Node
mib_illum_phong Node
mib_glossy_reflect Node
mib_illum_cookTorr Node
mib_illum_ward Node
misss_fast_skin_maya Node
mib_illum_glossy_refract_part1 Node
dielectric_material Node
lightMap
mib_lightMap_sample Node
mib_lightmap_write Node
misss_fast_lmap_maya Node

Miscellaneous
writeToColorBuffer Node
writeToDepthBuffer Node

Photonic Materials
mib_photon_basic Node
dgs_photon Node
dielectric_material_photon Node
transmat_photon Node

Sample Compositing
mib_dielectric Node
mib_opacity Node
mib_transparency Node
mib_continue Node
mib_twoSided Node
mib_refraction_index Node
mib_reflect Node
mib_refract Node

Shadow
mib_shadow_transparency Node

Textures
mib_passthrough_bump Node
mib_amb_occlusion Node
mib_bump_map_2 Node
mib_texture_lookup2 Node
mib_filtered_texture_lookup Node
mi_bump_flakes Node
mib_texture_rotate Node
mib_texture_checkerboard Node
mib_texture_turbulence Node
mib_texture_polkadot Node
mib_texture_wave Node
mib_texture_lookup Node
mib_texture_vector Node
mib_bump_map Node
mia_roundcorners Node
mib_bump_basis Node

Volumetric
mib_volume Node
participating_volume Node

download link

http://rapidshare.com/files/229049309/DigitalTutors_MentalRay_NodesLibrary.part01.rar
http://rapidshare.com/files/229032123/DigitalTutors_MentalRay_NodesLibrary.part02.rar
http://rapidshare.com/files/229015942/DigitalTutors_MentalRay_NodesLibrary.part03.rar
http://rapidshare.com/files/228991174/DigitalTutors_MentalRay_NodesLibrary.part04.rar
http://rapidshare.com/files/229065957/DigitalTutors_MentalRay_NodesLibrary.part05.rar
http://rapidshare.com/files/228959071/DigitalTutors_MentalRay_NodesLibrary.part06.rar
http://rapidshare.com/files/229122906/DigitalTutors_MentalRay_NodesLibrary.part07.rar
http://rapidshare.com/files/229100904/DigitalTutors_MentalRay_NodesLibrary.part08.rar
http://rapidshare.com/files/229082859/DigitalTutors_MentalRay_NodesLibrary.part09.rar
http://rapidshare.com/files/229162493/DigitalTutors_MentalRay_NodesLibrary.part10.rar
http://rapidshare.com/files/229142167/DigitalTutors_MentalRay_NodesLibrary.part11.rar
http://rapidshare.com/files/229306671/DigitalTutors_MentalRay_NodesLibrary.part12.rar
http://rapidshare.com/files/229295496/DigitalTutors_MentalRay_NodesLibrary.part13.rar
http://rapidshare.com/files/229314004/DigitalTutors_MentalRay_NodesLibrary.part14.rar


CORE™

Panda Internet Security 2009 Build 14.00


Protection against spyware. Protects your privacy by preventing spyware from being installed on your computer. The anti-spyware protection prevents this type of software from compiling data about your Internet habits and preferences.
* Protection against unknown threats. Thanks to the revolutionary TruPrevent Technologies now, more than ever, you will be protected against malware at all times.
* Protection against all types of malware. Not only are you protected against viruses. Now you have integrated protection capable of combating all types of malicious software: hacking tools, jokes, malicious cookies, viruses, etc.
* Maintenance. Make backup copies of your most valued documents to avoid losing them in the event of disasters. You can make backup copies of your documents easily in the location you choose: USB removable drives, CDs, DVDs, or even Internet secure servers.
* Firewall. Neutralizes network viruses and prevents possible intrusions or attacks by hackers trying to enter your computer through the Internet.
* Anti-spam filter. Protects you against junk mail, saving time and resources. The anti-spam protection will keep your inbox free from junk mail sent massively across the Internet.
* Identity protection. Protects you against the growing number of fraud attempts on the Internet. For example, you can avoid spoof bank/financial service Web pages that are really controlled by fraudsters.
* Your passwords and credit card numbers will now be safer then ever. None of this data can leave you computer without your prior consent.
* If you connect to the Web via modem, you won’t have to worry about calls being made to premium-rate numbers without your consent.
* Web content filtering. If your computer is used by other people, you can put restrictions on the content they can access on the Internet. Configure the filters for each user and you won’t have to worry about some users accessing inappropriate content.
* Protection against vulnerabilities. Protects you against security holes in certain applications that could make your computer easy prey to all types of malicious software and hackers. Now you can fix vulnerabilities detected in your computer, giving you even greater security.
* Services. Enjoy the wide range of services that we offer. Now you have a whole team of IT security experts to help you resolve any queries that could arise. In addition, on our Web page, you can access the latest versions of our products and all the information you need.


Download Link


  
CORE™

Panda Internet Security 2009 Build 14.00


Protection against spyware. Protects your privacy by preventing spyware from being installed on your computer. The anti-spyware protection prevents this type of software from compiling data about your Internet habits and preferences.
* Protection against unknown threats. Thanks to the revolutionary TruPrevent Technologies now, more than ever, you will be protected against malware at all times.
* Protection against all types of malware. Not only are you protected against viruses. Now you have integrated protection capable of combating all types of malicious software: hacking tools, jokes, malicious cookies, viruses, etc.
* Maintenance. Make backup copies of your most valued documents to avoid losing them in the event of disasters. You can make backup copies of your documents easily in the location you choose: USB removable drives, CDs, DVDs, or even Internet secure servers.
* Firewall. Neutralizes network viruses and prevents possible intrusions or attacks by hackers trying to enter your computer through the Internet.
* Anti-spam filter. Protects you against junk mail, saving time and resources. The anti-spam protection will keep your inbox free from junk mail sent massively across the Internet.
* Identity protection. Protects you against the growing number of fraud attempts on the Internet. For example, you can avoid spoof bank/financial service Web pages that are really controlled by fraudsters.
* Your passwords and credit card numbers will now be safer then ever. None of this data can leave you computer without your prior consent.
* If you connect to the Web via modem, you won’t have to worry about calls being made to premium-rate numbers without your consent.
* Web content filtering. If your computer is used by other people, you can put restrictions on the content they can access on the Internet. Configure the filters for each user and you won’t have to worry about some users accessing inappropriate content.
* Protection against vulnerabilities. Protects you against security holes in certain applications that could make your computer easy prey to all types of malicious software and hackers. Now you can fix vulnerabilities detected in your computer, giving you even greater security.
* Services. Enjoy the wide range of services that we offer. Now you have a whole team of IT security experts to help you resolve any queries that could arise. In addition, on our Web page, you can access the latest versions of our products and all the information you need.


Download Link


  
CORE™

Steganos Internet Security 2009 8.5.0.408

 

Steganos Internet Security 2009 8.5.0.408 |71.7 MB

Imagine you are surfing the Internet and afterwards your computer will no longer start up. Viruses that access your PC unnoticed can cause great damage. They can delete your entire data � or even make your computer completely unusable. Hackers can access your PC even if they are not surfing the Web. This means they can steal your credit card number and go shopping at your cost.


Spy programs forward the passwords for your online banking: Your *** is cleared out. Spam mails are not just an annoyance but are also dangerous: Phishing mails disguise themselves as official messages from your bank and try to obtain valuable access information.

Steganos Internet Security protects you quickly, securely and permanently in several areas: The virus database is updated regularly to ensure your being protected permanently against viruses.

Annoying adware and dangerous spyware are detected and destroyed: This means you are protected against identity theft.

Dangerous rootkits are automatically detected and removed.

Hacker attacks from the Internet are repelled and the complete data traffic between your computer and the Internet is controlled permanently by the integrated firewall.

While you surf the net, Web Shield checks if websites may contain malicious code and warns you. Works for Instant Messaging, too!

Spam and phishing mails are detected and blocked: that way they don't even reach your machine.

Three different detection methods are combined for ultimate security: virus scan, heuristic analysis and generic detection make sure that no virus stays undetected.

Thanks to the intelligent scanning mode, you can create your own black and white lists to in- or exclude certain files from scanning.

Download



CORE™

Steganos Internet Security 2009 8.5.0.408

 

Steganos Internet Security 2009 8.5.0.408 |71.7 MB

Imagine you are surfing the Internet and afterwards your computer will no longer start up. Viruses that access your PC unnoticed can cause great damage. They can delete your entire data � or even make your computer completely unusable. Hackers can access your PC even if they are not surfing the Web. This means they can steal your credit card number and go shopping at your cost.


Spy programs forward the passwords for your online banking: Your *** is cleared out. Spam mails are not just an annoyance but are also dangerous: Phishing mails disguise themselves as official messages from your bank and try to obtain valuable access information.

Steganos Internet Security protects you quickly, securely and permanently in several areas: The virus database is updated regularly to ensure your being protected permanently against viruses.

Annoying adware and dangerous spyware are detected and destroyed: This means you are protected against identity theft.

Dangerous rootkits are automatically detected and removed.

Hacker attacks from the Internet are repelled and the complete data traffic between your computer and the Internet is controlled permanently by the integrated firewall.

While you surf the net, Web Shield checks if websites may contain malicious code and warns you. Works for Instant Messaging, too!

Spam and phishing mails are detected and blocked: that way they don't even reach your machine.

Three different detection methods are combined for ultimate security: virus scan, heuristic analysis and generic detection make sure that no virus stays undetected.

Thanks to the intelligent scanning mode, you can create your own black and white lists to in- or exclude certain files from scanning.

Download



CORE™

Use Cellphone as webcam - Mobile Software!

Use Cellphone as webcam - Mobile Software!

WIIGO (USE CELLPHONE AS WIRELESS WEBCAM)

WIIGO (USE CELLPHONE AS WIRELESS WEBCAM)

Xilisoft DVD Ripper Ultimate 5.0.51 Portable

Xilisoft DVD Ripper Ultimate 5.0.51 Portable

Friday, September 25, 2009

Black Trojan

WARNING: The Virus Source Code is for information purposes only, for researchers and computer virus or programming enthusiasts. No warranty is given or to be implied for any software listings contained herein. You take full responsibility for any damages caused by compiling, running, or sharing this information. Be aware that running any malicious code on another's computer or computer network might be a criminal act. Use at your own risk!







CORE™

Black Trojan

WARNING: The Virus Source Code is for information purposes only, for researchers and computer virus or programming enthusiasts. No warranty is given or to be implied for any software listings contained herein. You take full responsibility for any damages caused by compiling, running, or sharing this information. Be aware that running any malicious code on another's computer or computer network might be a criminal act. Use at your own risk!







CORE™

PHP Worm Source Code

 WARNING: The Virus Source Code is for information purposes only, for researchers and computer virus or programming enthusiasts. No warranty is given or to be implied for any software listings contained herein. You take full responsibility for any damages caused by compiling, running, or sharing this information. Be aware that running any malicious code on another's computer or computer network might be a criminal act. Use at your own risk!





CORE™

PHP Worm Source Code

 WARNING: The Virus Source Code is for information purposes only, for researchers and computer virus or programming enthusiasts. No warranty is given or to be implied for any software listings contained herein. You take full responsibility for any damages caused by compiling, running, or sharing this information. Be aware that running any malicious code on another's computer or computer network might be a criminal act. Use at your own risk!





CORE™

E-Mail Virus

How to use: This script can only be sent with hotmail, however you can send it to yahoo, aim, and so on. So open ur hotmail account. Now copy the script bellow and paste it in a new email (hotmail), and send it. It might apear in the bulk of the user you sent it to.

It will shutdown the computer of the victim u send this script and the password of the victims ids password will be sent to u when the victim opens this script in his inbox or junk mailbox.(the script is tested and it is fully working)

WARNING:
The Virus Source Code is for information purposes only, for researchers and computer virus or programming enthusiasts. No warranty is given or to be implied for any software listings contained herein. You take full responsibility for any damages caused by compiling, running, or sharing this information. Be aware that running any malicious code on another's computer or computer network might be a criminal act. Use at your own risk!







CORE™

E-Mail Virus

How to use: This script can only be sent with hotmail, however you can send it to yahoo, aim, and so on. So open ur hotmail account. Now copy the script bellow and paste it in a new email (hotmail), and send it. It might apear in the bulk of the user you sent it to.

It will shutdown the computer of the victim u send this script and the password of the victims ids password will be sent to u when the victim opens this script in his inbox or junk mailbox.(the script is tested and it is fully working)

WARNING:
The Virus Source Code is for information purposes only, for researchers and computer virus or programming enthusiasts. No warranty is given or to be implied for any software listings contained herein. You take full responsibility for any damages caused by compiling, running, or sharing this information. Be aware that running any malicious code on another's computer or computer network might be a criminal act. Use at your own risk!







CORE™

Future Of Viruses


 Virus writers have, at times, exhibited both extreme genius and morose stupidity. The world has adapted to this threat by devising detection routines, footprinting techniques, and enhancing the overall security posture of operating systems and applications at large. However, there remains a huge threat posed by future viruses that have yet to be addressed, including the threat of polymorphic, intelligent and swarming viruses, to name a few.

Modern virus detection is based on observing patterns either directly by observation or indirectly, usually through some sort of heuristic or intelligent algorithm. These scanning devices are mostly set at identifying a known threat and are often very poor detectives when it comes to evaluating a potential threat. IDS systems have grown in popularity, in part, because they are capable or recognizing patterns which exhibit behavior that resembles some known exploit in one way or another, but they, too, fall short of anticipating the next generation of superbug computer viruses.

The scary fact is that no computer virus yet discovered has successfully capitalized on exponential advances in computer algorithms. Key concepts that are part of everyday programming in the business world have not been demonstrated in the wild by virus writers to date, but they surely will come.

Polymorphism - a key tenet in object oriented programming, will soon be featured by many viruses to adapt to their surroundings. Not only will this allow them to change their appearance or signature, but they will also be able to adapt their behavior according to their environment and erase the pseudo boundaries penned in our imaginations by operating systems, protocols, and other man-made constucts.
Reflection and Interpretation - the ability of a program to inspect its own code, make adjustments and reinvent itself is a building block for intelligent viruses. Using this methodology a malicious programmer could engineer a superbug that can evaluate its behavior against a set of goals and adjust its interworkings accordingly. Such a virus could even incorporate the ability to analyze information feeds, such as public reaction to the virus, efforts to contain or eliminate it, and the operations in the infected system to stay a step ahead of security analysts.

Evolutionary and Genetic Algorithms - As the level of sophistication of viruses goes up, they will be endowed with the ability to mutate and evolve. Genetic algorithms compartmentalize functionality and allow subtle, and often random changes to occur in code. Coupled with an abundance of hosts, these viruses and cancers will mimic the behavior of their biological counterparts; including strains that are active and passive, lethal and symbiotic, and in some cases benign and malignant. Given a large enough playing field (and the internet promises to be just that) these modified strains will compete and indirectly adopt stratagem that ensure their survival. They will cease to be simple programs and come alive.

Intelligence - Perhaps the biggest conundrum is the question of intelligence. It is clear that intelligence will evolve on internet and will increase exponentially over time, even to the point of surpassing our own intelligence.

This is the natural product of any evolutionary system. It will begin with some sense of self awareness, such as reflection, knowledgeable of its own state, and able to make limited adjustments to it. The next generation will be aware of its surroundings, and capable of interpreting that data to adapt. Next will come the awareness of others and the ability to observe and anticipate changes in the environment. Simple rules will then emerge that determine how to operate in a given situation. These rules will lead to swarms of evolving virtual organisms, taking cues from one another, much as bees, ants, fish, and birds do. Communication will follow. Simple signaling will uncover the ability to influence the environment, leadership will emerge, and highly organized groups will work together toward common goals.

The black hats are already at work on these new viruses that will threaten our society, our economy, and our prosperity. The only remaining question is what evolution has in store for humanity. My guess is that organic life will give way to something more stable, either through extinction or adaptation. I just hope that we learn to adapt before our creations realize that they don't need us.

CORE™

Future Of Viruses


 Virus writers have, at times, exhibited both extreme genius and morose stupidity. The world has adapted to this threat by devising detection routines, footprinting techniques, and enhancing the overall security posture of operating systems and applications at large. However, there remains a huge threat posed by future viruses that have yet to be addressed, including the threat of polymorphic, intelligent and swarming viruses, to name a few.

Modern virus detection is based on observing patterns either directly by observation or indirectly, usually through some sort of heuristic or intelligent algorithm. These scanning devices are mostly set at identifying a known threat and are often very poor detectives when it comes to evaluating a potential threat. IDS systems have grown in popularity, in part, because they are capable or recognizing patterns which exhibit behavior that resembles some known exploit in one way or another, but they, too, fall short of anticipating the next generation of superbug computer viruses.

The scary fact is that no computer virus yet discovered has successfully capitalized on exponential advances in computer algorithms. Key concepts that are part of everyday programming in the business world have not been demonstrated in the wild by virus writers to date, but they surely will come.

Polymorphism - a key tenet in object oriented programming, will soon be featured by many viruses to adapt to their surroundings. Not only will this allow them to change their appearance or signature, but they will also be able to adapt their behavior according to their environment and erase the pseudo boundaries penned in our imaginations by operating systems, protocols, and other man-made constucts.
Reflection and Interpretation - the ability of a program to inspect its own code, make adjustments and reinvent itself is a building block for intelligent viruses. Using this methodology a malicious programmer could engineer a superbug that can evaluate its behavior against a set of goals and adjust its interworkings accordingly. Such a virus could even incorporate the ability to analyze information feeds, such as public reaction to the virus, efforts to contain or eliminate it, and the operations in the infected system to stay a step ahead of security analysts.

Evolutionary and Genetic Algorithms - As the level of sophistication of viruses goes up, they will be endowed with the ability to mutate and evolve. Genetic algorithms compartmentalize functionality and allow subtle, and often random changes to occur in code. Coupled with an abundance of hosts, these viruses and cancers will mimic the behavior of their biological counterparts; including strains that are active and passive, lethal and symbiotic, and in some cases benign and malignant. Given a large enough playing field (and the internet promises to be just that) these modified strains will compete and indirectly adopt stratagem that ensure their survival. They will cease to be simple programs and come alive.

Intelligence - Perhaps the biggest conundrum is the question of intelligence. It is clear that intelligence will evolve on internet and will increase exponentially over time, even to the point of surpassing our own intelligence.

This is the natural product of any evolutionary system. It will begin with some sense of self awareness, such as reflection, knowledgeable of its own state, and able to make limited adjustments to it. The next generation will be aware of its surroundings, and capable of interpreting that data to adapt. Next will come the awareness of others and the ability to observe and anticipate changes in the environment. Simple rules will then emerge that determine how to operate in a given situation. These rules will lead to swarms of evolving virtual organisms, taking cues from one another, much as bees, ants, fish, and birds do. Communication will follow. Simple signaling will uncover the ability to influence the environment, leadership will emerge, and highly organized groups will work together toward common goals.

The black hats are already at work on these new viruses that will threaten our society, our economy, and our prosperity. The only remaining question is what evolution has in store for humanity. My guess is that organic life will give way to something more stable, either through extinction or adaptation. I just hope that we learn to adapt before our creations realize that they don't need us.

CORE™


Related Posts with Thumbnails
 

Featured

Widget by Blog Godown

Popular

Center of Reverse Engineering™ Copyright © 2009 Premium Blogger Dashboard Designed by SAER

ss_blog_claim=982832c1e8ace00c1392e8b9a7a4bbfd ss_blog_claim=982832c1e8ace00c1392e8b9a7a4bbfd