Jump to content

Search the Community

Showing results for tags 'Offer'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


    • LINUX
    • ORACLE
    • GNS3

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL







Found 10,000 results

  1. Distilled - SearchLove 2014 Conference Videos English | .bin | H264 960x540 | AAC 2 ch | pdf | 11.32 GB eLearning, Search Engine Optimization, Internet Marketing <!--more--> These are the SearchLove 2014 Con Videos (including companying Presentations as either PDF or Powerpoint) from Distilled.net: Details SearchLove San Diego 2014 Adam Monago - Responsive Delivery Adria Saracino - Beyond Manual Outreach All Speakers - Let’s Get Real Chris Savage - Why your Next Hire Should be a Video Producer Dana DiTomaso - Taking Down Your Local Competition Grace Ng - Designing Effective Experiments John Gagnon - Trends & Techniques for Marketers & Data Geeks Jon Wuebben - Optimizing Content Justine Jordan - Optimizing the Email Experience Lisa Gerber - The SEO of Storytelling Mark Johnstone - Ideas with Legs Michael King - Automation Demystified Mike Pantoliano - It’s Customer Lifetime Value Searchlove Boston Videos 2014 Aaron Weyenberg - A Story of a Redesign Adam Melson - Listening to Your Customers' Wants All Speakers - Let's Get Real Chris Savage - Building Audiences with Video Darren Shaw - How to Prioritize Your Local Search Work Joanna Lord - The Loyalist Advantage Josh Braaten - How to Build a Data-Driven Company Margot Bloomstein - Slow Your Roll Mark Johnstone - Lessons Learned from the Creative Industry Marshall Simmonds - Log File Analysis Matthew Brown - Learn from the Herd Melanie Spring - Rock Your Brand Rand Fishkin - Why Great Marketers Must be Great Skeptics Rick Backus - From Content to Clients Sheena Medina - Community Building in a New Social Era Stephanie Chang - Stretching Your Search Skills Will Critchlow - The Golden Age of Digital Marketing Screenshots Problem with unrar or link die , please request here : goo.gl/t4uR9G Password for Unrar : tut4dl [hide][uploaded] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Rapidgator] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  2. Pluralsight - TDD as a Design Tool | 401MB Duration: 1h 58m | Video: AVC (.mp4) 1024x768 30fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Beginner | Language: English <!--more--> This course shows how to use Test Driven Development (TDD) in a real-world setting. It moves beyond the discussing the basics of TDD; instead of focusing on the mechanics of TDD, this course uses TDD as a design tool. The course will cover unit testing both server- (node.js) and client-side (Angular) code. The goal of the course is to demonstrate how to use TDD to design a better code base. Screenshots Problem with unrar or link die , please request here : goo.gl/t4uR9G Password for Unrar : tut4dl [hide][uploaded] [Hidden Content] [Hidden Content] [Hidden Content] [Rapidgator] [Hidden Content] [Hidden Content] [Hidden Content]]
  3. Construct 2 Mobile Monetization English | Audio: aac, 44100 Hz, 2 channels, s16, 55 kb/s | Video: h264, yuv420p, 576x360, 100 kb/s, 30.00 fps | 62MB Genre: eLearning <!--more--> This course was designed to take the guess work out of adding banner and full screen ads to your mobile games created with Construct 2 and CocoonJS. The course starts out by explaining how to setup your games to run on most screen resolutions, and then migrates into setting up mobiles ads from MoPub and Admob. All of this is possible by using the CocoonJS object in Construct 2 and the Ludei Cloud Compiler. What are the requirements? Construct 2 Personal or Business License Premium CocoonJS Account Basic understanding of Construct 2 What am I going to get from this course? Over 9 lectures and 56 mins of content! Learn how to setup your games to work with most screen resolutions Learn display ads in your Construct 2 projects using the CocoonJS object. Create a Mopub and AdMob Account Link your AdMob account to MoPub Configuring ads in the CocoonJS Cloud Compiler What is the target audience? Costruct 2 users that want to learn how to monetize their games with CocoonJS If you use and love Construct 2 to build amazing games, but struggle with getting your game on mobile and making money with it, this course is for you Screenshots Problem with unrar or link die , please request here : goo.gl/t4uR9G Password for Unrar : tut4dl [hide][uploaded] [Hidden Content] [Rapidgator] [Hidden Content]]
  4. Front-End First Testing and Prototyping Javascript Apps | 400MB Duration: 3h 21m | Video: VC-1 (.flv) 1024x768 15fps | Audio: WMA 44.1KHz 2ch Genre: eLearning | Level: Beginner | Language: English <!--more--> Being a productive front-end web developer can be challenging at times. In this course we will uncover how the front-end can be unit tested and rapidly prototyped separate from the back-end. We will cover the basics of unit testing and use a variety of tools and techniques to help assist with mocking and prototyping. Then we will uncover how to integrate these techniques with common front-end frameworks such as KnockoutJS, Backbone.js, and AngularJS. Screenshots Problem with unrar or link die , please request here : goo.gl/t4uR9G Password for Unrar : tut4dl [hide][uploaded] [Hidden Content] [Hidden Content] [Hidden Content] [Rapidgator] [Hidden Content] [Hidden Content] [Hidden Content]]
  5. Unit Testing In Java With JUnit | 328 MB Duration: 2h 37m | Video: WMV3 (.flv) 1024x768 15fps | Audio: WMA 44.1KHz 2ch Genre: eLearning | Level: Intermediate | Language: English <!--more--> Do you want to get started with unit testing in Java? Perhaps you already know a little about JUnit, but you've always wanted to learn more about this useful framework? Either way, this course will teach you what you need to know to not only get started with JUnit, but to master all of the features of the JUnit framework. In this course, we'll start out by learning the basics of JUnit and how to create some basic unit tests. Then, we'll go into some of the lesser known advanced features of JUnit that will really help you write elegant tests with less code. After that, I'll show you how to integrate JUnit with your existing Ant or Maven build system and how you can automate the creation of JUnit reports. Finally, we'll wrap things up by going beyond the basic uses of JUnit by learning how to use stubs and mocks to really isolate classes and we'll also learn how to use JUnit for more than just unit testing. By the end of this course, you'll be a JUnit pro and will have a handful of useful tools and techniques you can use to make the most of the JUnit framework. If you are interested in JUnit, you won't want to miss this course. Screenshots Problem with unrar or link die , please request here : goo.gl/t4uR9G Password for Unrar : tut4dl [hide][uploaded] [Hidden Content] [Hidden Content] [Rapidgator] [Hidden Content] [Hidden Content]]
  6. Lynda - Up and Running with Cubase 7 | 337MB Duration: 1h 14m | Video: AVC (.mov) 960x540 15fps | Audio: AAC 48KHz 2ch Genre: eLearning | Level: Beginner | Language: English <!--more--> Get up and running with the cutting-edge DAW Cubase 7 in this quick one-hour class. Author Pieter Schlosser shows how to use Cubase 7 to create your music, starting with the very first steps: setting up audio and VST connections, utilizing templates, and customizing your Cubase workspace. Then learn how to import audio, set your tempo, and create a click track and markers. The next chapter shows you how to record and edit audio tracks, including how to overdub and loop, as well as apply and edit fades and crossfades. Then, Pieter moves into MIDI recording and editing, covering how to choose sounds, edit performances in the Piano Roll view, and use MIDI controller lanes to enhance the performance. He wraps up the course with a chapter on adding effects, creating aux sends, automating your mix, and exporting the final track. Topics include: * Choosing a template from the Project Assistant * Importing a drum loop as a starting point * Recording guitar * Choosing an amp and inserting other effects * Adding virtual instruments * Adding a compressor * Working with presets * Exporting the final mix Screenshots Problem with unrar or link die , please request here : goo.gl/t4uR9G Password for Unrar : tut4dl [hide][uploaded] [Hidden Content] [Hidden Content] [Rapidgator] [Hidden Content] [Hidden Content]]
  7. Tuts+ Premium - Running a Freelance Design Business MP4 | AVC 2497kbps | English | 1280x720 | 30fps | 4 hours | AAC stereo 93kbps | 4.1 GB <!--more--> Interested in working for yourself, but not sure what freelancing as a designer is like? We’ve got you covered. In this introductory course, Ben Gribbin introduces you to the world of freelancing and gives specific tips for designers. Ben draws on experience from running his own freelance business to tackle the tricky fundamentals of setting up your own business and selling your design skills to clients. He’ll break down the nuts and bolts of making the jump in order to get you started on the right track. Introduction 2m 53s Introduction 2m 53s Getting Started 54m 34s Full Time or Part Time 8m 55s Before you start freelancing 7m 5s Legalizing & Paper work 4m 33s Business Plans 5m 19s Your office - where? 16m 40s Work schedule 6m 58s Making the jump 5m 4s Business Basics 2h 24m 4s Branding for Freelancers 11m 34s Marketing for Freelancers 9m 34s Creating a portfolio 12m 58s Managing your money 17m 57s Rates 13m 3s Services you'll offer 3m 55s Making a name for yourself 6m 32s Procrastination & getting used to being self-employed 7m 41s Finding your first client 9m 31s Selling yourself and winning the contract 6m 33s Contracts 10m 36s Invoicing 5m 49s Carrying out the work 6m 16s Handling client meetings 12m 31s Communication 9m 34s Growing Your Business 33m 8s Improving your skills 8m 37s Finding repeat and regular clients 8m 59s Increasing your business income and size 6m 28s Hitting the right work balance 5m 4s Customer Service 4m Conclusion 3m 59s Conclusion 3m 59s Screenshots Problem with unrar or link die , please request here : goo.gl/t4uR9G Password for Unrar : tut4dl [hide][uploaded] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Rapidgator] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  8. Lynda - GarageBand Essential Training (Updated Nov 24, 2014) English | Nov 24, 2014 | .MP4 | Video: AVC 1280x720 15&30fps | Audio: AAC 48KHz 2ch | 731 MB Genre: E-learning GarageBand is the most accessible, affordable, and easy-to-learn multitrack recording application available. Learn how to start creating your own music with GarageBand here in this course. Garrick Chow shows how to create a new project, add loops (prerecorded sounds and drum beats) to quickly build a song, create your own custom loops, and use Drummer to create custom beats . He describes how to connect a MIDI keyboard controller and record with software instruments. Then he shows how to edit tracks, create a click track, and even print musical notation of your MIDI tracks. Next, he demonstrates how to record audio tracks into GarageBand, focusing on recording guitars and using multiple takes to create a comp track. Garrick then explains how to arrange, edit, and mix your projects using the arrangement track and the built-in effects. Next, he shows how to export your project, share it with the world, save it to iCloud, and archive it. Finally, Garrick shows how to use your iPad with GarageBand and how to open projects created in GarageBand for iOS, the mobile version of the app. Topics include: Creating a new project Adding tracks Working with loops Recording Software Instrument tracks Getting real sounds into your Mac Recording and compositing multiple tracks Arranging, editing, and mixing your project Sharing your music with the Share menu Controlling GarageBand remotely from an iPad Download No.Password .=-I-=. Interchangeable .=-I-=. 5.%.Recovery Let PM if the links are dead, I'm willing to help you [Hidden Content]
  9. LinuxCBT – Network Administration Edition | Size: 295MB * Linux Network Administration Essentials – Module 7 o Discuss & demonstrate the usage of commonly used networking tools: o PING – Demonstrate PING flooding of remote hosts – ICMP Attack Techniques o PING – Cisco PIX Integration & Debugging of ICMP Echo Requests/Echo Replies o Traceroute – Cisco PIX Integration & provisioning of ICMP traffic types o MTR (PING & Traceroute functionality) plus Cisco PIX debugging of ICMP data flow o ARP o NETSTAT/LSOF o IFCONFIG o Route o DIG & NSLOOKUP o Whois o Who, w, wc, last, cat, grep, vi, pico, head, tail, etc. o Message of the day banners (MOTD), /etc/issue file (pre-login banner/display info.) * * Implement Dynamic Host Configuration Protocol (DHCP) services o Explain the various steps of the DHCP process o Configure global & scope-level DHCP options o Configure IP reservations based on layer 2 MAC addresses o Disable Cisco PIX DHCP services o Enable Linux DHCP services o Configure Windows 2003/XP/Linux clients to receive dynamic addresses from Linux * * Discuss Xinetd super server concepts and applications o Identify services controlled by Xinetd o Enable & disable Xinetd-controlled services & examine results o Implement access control on Xinetd controlled services o Implement Xinetd IP and port-level daemon redirection o Discuss Xinetd & TCP Wrappers relationship and dual-layer security benefits * * Implement Very Secure VSFTPD File Transfer Protocol (FTP) services o Implement anonymous FTPD o Implement user-level FTPD access o Implement FTPD banners o Disable anonymous access o Configure VSFTPD to run under the auspices of Xinetd super server for increased security o Implement bandwidth rate-limiting to control bandwidth usage * * Discuss Linux & Windows Integration via Samba o Install Samba support o Install Samba Web-based Administration Tool (SWAT) o Configure Samba file & print sharing o Evaluate access to Samba file & print server o Configure Samba Windows Internet Name Server (WINS) support o Evaluate Windows XP/2003 client access to Samba-WINS server * * Discuss the Network File System (NFS) concepts and Linux support o Implement the NFS daemon o Review /etc/exports parameters and options o Evaluate access to NFS exports o Implement NFS connectivity across a WAN connection via IPSEC VPN-connectivity * * Discuss the CRON scheduling system concepts and application o Identify various predefined CRON entries and schedules o Define custom cron jobs system-wide o Define custom cron jobs user-wide o Evaluate results of cron jobs * * Implement the Berkeley Internet Daemon (BIND) Domain Name Server (DNS) o Implement BIND 9.x o Configure BIND as a caching-only DNS server o Test caching-only name resolution from Windows 2003 & Linux hosts o Secure access to caching-only/recursive name server via ACLs o Configure BIND as a primary DNS server o Test primary name resolution from Windows 2003 & Linux hosts o Configure BIND as a secondary(slave) DNS server o Restrict communications between primary & secondary DNS servers o Implement updates between master and secondary DNS servers via IPSEC VPN o Configure DNS zones on Linux BIND & Windows 2003 DNS – activate replication o Implement poor man’s load balancing using DNS round robin o Evaluate results of BIND configuration using DIG o Configure DNS zones o Configure zone transfers o Configure secure-zone transfers o Evaluate BIND’s configuration files named.conf & named.custom o Configure BIND sub-domain delegation. i.e. internal.linuxcbt.net o Configure BIND to support reverse domains o Configure Linux/Windows 2003 clients to use Linux BIND DNS server o DNS Transaction Signatures (TSIG) implemenation o Identify BIND logging information for troubleshooting purposes o Configure BIND DNS with IP Aliasing (Sub-Interfaces) to host DNS on separate IP address * * Implement Network Monitoring & Graphing tools using SNMP, etc. o Implement Multi Router Traffic Grapher (MRTG) o Graph Cisco Firewall with MRTG o Implement Cacti Network Graphing Tool o Download and Install Cacti and required components (RRDTool, MySqL, etc.) o Explore Cacti Interface, options, etc. o Graph Cisco, Linux & Windows 2003 resources with Cacti using SNMP & Scripts * * Implement Network Time Protocol (NTP) & Time Synchronization services for local subnets o Discuss features and distributed nature of the hierarchial NTP service o Ascertain and select optimal Stratum 1 NTP servers for synchronization o Review default NTP configuration o Configure NTP to synchronize with NTP servers o Configure internal Linux clients to syncrhonize with internal Stratum 2 NTP server o Configure Cisco PIX firewall to synchronize with internal Stratum 2 NTP server o Use NTP-related tools such as NTPQ, NTPTRACE to ascertain NTP-related information [Hidden Content]
  10. LinuxCBT - Proxy Edition Training | 972.22 MB Course Objective Proxy Security - Module II Squid Proxy Initialization Discuss Squid concepts & applications Discuss DNS application Configure DNS on primary SuSE Linux server for the Squid Proxy environment Confirm DNS environment Start Squid and evaluate default configuration Install Squid Proxy server General Proxy Usage Configure web browser to utilize Proxy services Grant permissions to permit local hosts to utilize Proxy services Discuss ideal file system layout - partitioning Explore key configuration files Use client to test the performance of Proxy services Discuss HIT/MISS logic for serving content Configure Proxy support for text-based (lftp/wget/lynx) HTTP clients Squid Proxy Logs Discuss Squid Proxy logging mechanism Identify key log files Discuss & explore the Access log to identify HITS and/or MISSES Discuss & explore the Store log to identify cached content Convert Squid logs to the Common Log Format (CLF) for easy processing Discuss key CLF fields Configure Webalizer to process Squid-CLF logs Revert to Squid Native logs Discuss key Native log fields Configure Webalizer to process Squid Native logs Squid Network Configuration & System Stats Discuss cachemgr.cgi Common Gateway Interface(CGI) script Explore the available metrics provided by cachemgr.cgi Change default Squid Proxy port Modify text/graphical clients and test communications Discuss Safe Ports - usage & applications Squid Access Control Lists (ACLs) Intro to Access Control Lists (ACLs) - syntax Define & test multiple HTTP-based ACLs Define & test ACL lists - to support multiple hosts/subnets Define & test time-based ACLs Nest ACLs to tighten security Implement destination domain based ACLs Exempt destination domains from being cached to ensure content freshness Define & test Anded ACLs Discuss the benefits of Regular Expressions (Regexes) Implement Regular Expressions ACLs to match URL patterns Exempt hosts/subnets from being cached or using the Squid cache Force cache usage Configure enterprise-class Cisco PIX firewall to deny outbound traffic Configure DNS round-robin with multiple Squid Proxy caches for load-balancing Discuss delay pool concepts & applications - bandwidth management Configure delay pools - to support rate-limiting Examine results of various delay pool classes Enforce maximum connections to deter Denial of Service (DoS) attacks Verify maximum connections comply with security policy Squid Proxy Hierarchies Discuss Squid cache hierarchy concepts & applications Ensure communications through a primary cache server - double-auditing Discuss and configure parent-child bypass based on ACLs Configure Intranet ACLs for peer-cache bypass Discuss & implement Squid cache hierarchy siblings Configure transparent Proxy services Squid on Windows Download & Install Manipulate configuration Test connectivity from multiple platforms Evaluate results Reverse Proxy Install Squid3 Configure forward Proxy access for local subnet Test connectivity Discuss reverse Proxy features Configure reverse proxy Evaluate results [Hidden Content]
  11. Size: 9.992 GB Type: Tutorial Cisco TAC Videos on different Platform of Switches and Routers. Learn valuable lessons gleaned by the TAC during the past 5+ years as we have provided support for real world customers. We will focus on interesting case studies, best practices, and how to best leverage your interactions with the TAC to solve your UCS issues. The session will cover both the UCS B-Series (primarily) and the C-Series Rack S [Hidden Content] [Hidden Content]
  12. LinuxCBT - OpenPGP Edition Training Video | 766.7 MB Focus: Pretty Good Privacy (PGP) Security Duration: 11 Hours Course Objective OpenPGP Security - Module IX Introduction - Topology - Features Discuss course outline Explore system configuration Identify key systems to be used Explore network topology Enumerate and discuss key OpenPGP features Explore GPG Configuration Identify installed GPG packages in various Linux distros Discuss the key contents of those packages Explore configuration hierarchy Discuss security as it pertains to private key management Explain the purpose of public and private keys Discuss symmetric and asymmetric encryption provided by OpenPGP-compliant Apps Generate | Import | Export OpenPGP Usage Keys Discuss features and benefits Obtain shell access on remote systems Generate usage (private|public) keys Identify the generated keys Discuss how usage keys are used Generate usage keys on remote systems Export OpenPGP public key chain on various systems Import OpenPGP public keys on various systems Evaluate the results of exchanging public keys Digital Signatures Discuss features and benefits as they pertain to data integrity Identify default digital signatures on multiple hosts Explain the differences between signing and encrypting correspondence Sign and export data to remote systems - Inline Create detached OpenPGP signatures for data Confirm the signed data on the remote systems Recap non-repudiation benefits provided by digitally signing correspondence Encryption | Decryption | Sign & Encrypt Content Discuss features and benefits Generate files for usage Encrypt content using symmetric (shared-key) algorithm Decrypt content using the shared-key, based on the symmetric algorithm Evaluate results on multiple machines Explain caveats associated with symmetric encryption Encrypt content to a given recipient, using their public key - asymmetric encryption Decrypt content on various hosts Attempt to decrypt content without the corresponding private key Evaluate results Encrypt using ASCII-armoured and binary (OpenPGP-compliant) formats Decrypt both ASCII-armoured and binary formats Recap encryption decryption processes Discuss the requirements of signing and encrypting content Sign and encrypt content to various recipients Confirm signed and encrypted content Attempt to confirm and decrypt content as the unintended recipient Evaluate results OpenPGP Key Management | Web of Trust | Internet Key Distribution Discuss features and benefits Explore GPG key management facility Update properties of public/private key pairs Add sub-keys to public/private key pairs Sign remote users' public keys Evaluate results Discuss the web of trust functionality Create a web of trust with various hosts Evaluate trust confirmation Discuss the features of OpenPGP Internet key distribution servers Generate and upload public keys to an Internet key server Download the uploaded public keys to the public keyrings of various hosts Evaluate results Perl Scripting with GPG Discuss features and benefits Create a Perl script to backup key directories and files Ensure that the script GPG-protects the content post-backup Include error-handling to ensure that each step of the script is routed appropriately Configure the script to transfer the encrypted content to a remote host ust 'scp' Evaluate results OpenPGP (GPG | PGP Desktop) on Win32 Discuss features and benefits Download and install GPG for Win32 Generate usage keys Exchange public keys with a user on a Linux system Sign and encrypt content to and from the Win32 user Confirm results Download and install GPG4WIN (GUI-based GPG for Win32) Explore features Sign and encrypt content to and from the Win32 user Confirm results Integrate GPG4WIN with MS Outlook Sign and encrypt e-mail messages Confirm and decrypt e-mail messages Install PGP Desktop for Win32 Explore features and interface Generate usage keys Exchange public keys with Linux user Sign and encrypt content to and from the Win32 user using PGP Desktop Evaluate results Draw parallels between Win32 based OpenPGP tools and GPG for Linux | Unix Recap OpenPGP functionality included in /GPG|GPG4WIN|PGP Desktop [Hidden Content]
  13. Swiss Reflexology - A Step by Step Guide English | Duration: 01:00:39 | AVi ,XViD, 608x464 | mp3, 48kHZ, 128kb/s | 349 MB Genre: eLearning Swiss Reflex can offer a pleasant and side effect free progression to a healthier, more balanced and relaxed way of life. Reflexology as a complementary therapy has grown in popularity as different approaches to health care have become more widely available. Applies to the feet in order to access the body, treatment can really boost the immune system and can ease a wide range of health problems. Swiss Reflex has developed along similar lines, with therapists able to diagnose and treat specific difficulties by pinpointing areas of the feet which corresponds to the body as a whole. Join Victoria Sprigg, a holistic therapist who practices Swiss Reflex, in consultation with five of her clients who have experienced the benefits of this remarkable treatment. Victoria deals with a variety of conditions ranging from chronic backache to sluggish digestive system, demonstrating techniques that can be tried at home to bring relief and relaxation in equal measure. For those who are concerned about the actual condition of their feet, there are some great tips combating the kind of fungal infestation that can be the scourge of a hectic lifestyle. Swiss Reflex offers a fascinating perspective on health care that through regular use can be classic prevention rather than cure. The aim is to promote and maintain good health and in a modern world where stress and tension are every day experiences. Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me [Hidden Content] Click my nick to see more my articles
  14. iPexpert's Cisco CCIE Wireless Lab VoD: Next Generation English | flv | H264 1280x720 | AAC 1 ch | 11 hrs 47 min | 2.45 GB eLearning About iPexpert's Cisco CCIE Wireless Lab VoD :: Next Generation During this high-definition, studio-recorded video course, you'll instantly be engaged as you watch Jeff Rensink, one of the industry's most respected CCIE wireless instructors, explain the theory, conduct white boarding and configure countless advanced, technology-focused lab scenarios on nearly every protocol or technology that you'll encounter on the actual CCIE Wireless lab exam. As you begin your CCIE lab preparation, it's important to understand the protocols and technologies listed in the CCIE blueprint in mastery detail. iPexpert's CCIE Wireless Lab Video Course was designed to do that. The quality and amount of content covered, as well as the quality of the delivery and presentation of this one-of-a-kind video class, makes for a training resource that's unmatched within the Cisco training industry. Also, it's our commitment to ensure that content is added and updated on a regular basis. All updates and additions are instantly made available to you at no additional cost. Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me [Hidden Content] Click my nick to see more my articles
  15. IPexpert's CCNP Security 300-208 SISAS VoD English | flv | H264 1280x720 | AAC 1 ch | 9 hrs 39 min | pdf | 1.74 GB Genre: eLearning Implementing Cisco Secure Access Solutions (SISAS 300-208) The following list is a short outline of the videos / technologies that wil be deplained in this class module. TrustSec Overview ISE Licensing Model ISE Architecture Identity Stores AAA Basics AAA for Device Administration Wireless Security Fundamentals Part 1 Wireless Security Fundamentals Part 2 Central Web Authentication Guest Services Profiling & CoA 802.1x Fundamentals 802.1x Monitor Mode 802.1x Low Impact Mode 802.1x Closed Mode Wired 802.1x Configuration Wireless 802.1x Configuration Wireless Guest Access Configuration MACsec Downlink MACSec Configuration Posture Assesment BYOD Access Security Group Access Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me [Hidden Content] Click my nick to see more my articles
  16. Digital Tutors - Rigging Your First Character in MODO 801 3h 22m | AVC 1280x720 15 fps | AAC 96 Kbps 48.0 KHz | 1.36GB Genre: eLearning | Project Files Included In this series of MODO tutorials we'll learn core rigging concepts and tools when rigging characters for animation. We'll start by getting our model ready to be rigged. We'll then create the character's skeleton from the ground up. Next, we'll skin the model to its skeleton and refine its deformations while learning helpful weight-painting techniques. To conclude the course, we'll create an animator-friendly control system, with the help of constraints, expressions, and the channel links tool, so that our rig is robust and efficient. By the end of this MODO training, you'll have the skill set needed to rig your own characters for animation. Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me [Hidden Content] Click my nick to see more my articles
  17. Alex Cass & Alex Becker - The SEO Omega Course DVDRips | MP4/AVC, ~583 kb/s | 640x480 | Duration: ~7 hours | English: AAC, 66 kb/s (1 ch) | + PDF Guides | 3.27 GB Genre: Business, Job, SEO What is SEO Omega SEO Omega is the latest effective seo techniques and complete course to get top rank in search engines. Do not miss out on this latest offering from Becker and Cass. SEO Omega is very easy in applying and very effective for newbies. What is in SEO Omega? 1) It includes a brand new training program 2) A killer software offer 3) SEO Omega By Alex is a chance to get continuing training on what is working and effective in SEO. 4) Avoid black hat methods and apply white hat methods for more profitable traffic. 5) SEO Omega provides you top search engine rankings. Get rank at first on search engine and get maximum traffic with this amazing seo software SEO Omega. Millionaire SEO reveals how to rank for huge (tough) keyword in days with 2 mins copy and paste sites These so-called experts will tell you: You need to create 1000 word blog posts to rank That you shouldnt dare piss off Google by building links That social media is the only reliable way to get traffic Recommend that you that you torture yourself by writing 100 lengthy posts before even turning on the search engines on to your site [Hidden Content] Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me [Hidden Content] Click my nick to see more my articles
  18. Over 45 Videos that to teach you practical attacks to test the security of Wi-fi and wired networks from scratch. Notes: This Price is for the 2nd 100 students, so it will go up after the number of students reaches 200. All the videos in this course are downloadable. What are the requirements? Basic IT skills Wi-Fi card (preferably one that supports injection) Kali Linux (can be download for free from [Hidden Content]) What am I going to get from this course? Over 47 lectures and 5 hours of content! 47 detailed videos about practical attacks against Wi-Fi networks A number of practical attacks that can be used without knowing the key to the target network Control connections of clients around you without knowing the password. Gather detailed information about clients and networks like their OS, opened ports ...etc. Crack WEP/WPA/WPA2 encryptions using a number of methods. ARP Spoofing/ARP Poisonning Launch Various Man In The Middle attacks. Gain access to any account accessed by any client in your network. Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls, videos, images ..etc. Detect ARP poisoning and protect your self and your network against it. You will be able to use more than 20 penetration testing tools such as ettercap, wireshark, aircrack-ng suit ...etc. Combine individual attacks to launch even more powerful attacks. What is the target audience? Anybody who is interested in learning about network penetration testing Anybody interested into learning how to protect networks from hackers. [hide][Hidden Content] [Hidden Content]]
  19. A collection of small videos for each technology is in progress as a study project. These may benefit CCNA,CCNP, CCIE students as revision material. To watch in Youtube: [Hidden Content] To download from 4shared.com: [Hidden Content] Available to download: Study Project Videos 1 - 30 More videos will be available in future. Anybody with resources is free to share them as torrent files. Hope you enjoy the study videos. Please be kind to send your comments. Thank You.
  20. LinuxCBT - RegEx Edition | 600 MB LinuxCBT RegEx Edition focuses on the application of POSIX and Perl-compatible Regular Expressions. Regular Expressions are critical to efficiently parsing textual data (log file content, data feeds, files & directories, etc.). RegEx support is included with Linux | Unix operating systems via ubiquitous tools such as: grep, awk, sed, Perl, PHP, etc., and provides systems administrator/engineers and developers alike, the ability search, time-effectively, considerable amounts of textual data, using literals, character classes, metacharacters, metasequences, etc. Let LinuxCBT RegEx Edition cost-effectively teach you Regular Expressions! Quote: * Introduction - Features o Discuss course outline o Explore system configuration o Identify key systems to be used o Install the Bluefish graphical editor - Supports POSIX and ERL-compatible RegExes o List key Regular Expressions applications o Enumerate and discuss key Regular Expressions features * Metacharacters o Enumerate important metacharacters o Provide examples of asterisk '*' usage o Apply simple character classes to searches o Perform searches in the Bluefish editor using literals and metacharacters o Explain and apply anchors: '^', ' * Character Classes o Discuss features and applications o Perform searches in the Bluefish editor using character classes o Search for case-insensitive characters o Negate character class values using the circumflex character: '^' o Specify ranges and inclusions o Search for string boundaries o Alternate between POSIX and Perl-compatible Regular Expressions in Bluefish Edit* RegExes with GREP & EGREP o Discuss features and applications o Perform simple GREP searches o Use EGREP to find strings based on RegExes o Parse installed applications using EGREP o Extract 'su' attempts from the system log file: /var/log/messages o Parse log file entries based on specific dates * Parenthetical Expressions o Discuss features and applications o Compare and contrast with character classes o Search for strings using the Bluefish Edito Combine anchors with parenthesis and evaluate results o Search for multiple groups of strings using alternation o Use parenthetical expressions with EGREP o Nest expressions using parenthesis * Quantifiers o Discuss features and benefits o Define RegEx tokens o Enumerate and discuss RegEx quantifiers o Test '?' using the Bluefish Editor and EGREP o Test '*' using the Bluefish Editor and EGREP o Test '+' using the Bluefish Editor and EGREP o Test '*' using the Bluefish Editor and EGREP o Test '' - arbitrary quantifiers with the Bluefish Editor and EGREP o Combine anchors, parenthesis and various quantifiers * Shortcut Sequences - POSIX & Perl o Discuss features and benefits o Enumerate and discuss key shortcut sequences o Test shortcut sequences using the Bluefish Edit* Awk - Field Parser o Discuss features and applications o Use awk to extract fields from the process listing o Apply RegEx literal strings to awk search and evaluate results o Apply RegEx character classes to awk search and evaluate results o Apply RegEx parenthetical expressions to awk search and evaluate results o Apply RegEx quantifiers to awk search and evaluate results o Incorporate conditional RegEx matching with awk search and evaluate results o Extract fields, based on RegExes, from system log file: /var/log/messages * SED - Stream Edito Discuss features and applications o Perform text transformation of text file using string literals o Perform text transformation of text file using string literals and character classes o Perform text transformation of text file using string literals and anchors o Perform text transformation of text file using string literals and character classes o Evaluate results * GNU Utilities (GREP|Awk|SED) for Windows o Discuss features and benefits o Identify and connect to Windows Server target system o Download and install GNU utilities for Windows: GREP, Awk, SED o Perform EGREP searches and evaluate results o Perform gawk searches and evaluate results o Perform SED substitutions and evaluate results * Perl Regular Expressions o Discuss features and applications o Write simple Perl script to compare command line argument to RegEx and evaluate results o Alter Perl script to read text file and perform RegEx comparisons and evaluate results o Incorporate character classes, parenthetical expressions, case-insensitivity and quantifiers o Evaluate results o Substitute matched text using Perl RegExes o Substitute matched text using Perl RegExes from the command line o Update system log using text substitution from the command line * PHP Regular Expressions o Discuss features and applications o Perform POSIX and Perl-compatible RegExes from the command line o Substitute text using RegExes o Evaluate results o Design HTML form to collect fields via the browser o Design back-end, action script to process the POST fields using RegExes o Halt processing if POST fields do NOT meed criteria based on RegExes o Evaluate results * Apache Regular Expressions o Discuss features and benefits o Identify key configuration files o Explore key RegEx-supporting Apache directives o Match a range of directories using RegExes with directive o Restrict access to files using RegExes with directive o Match URL directory values using RegExes with directive o Redirect users to alternate content using RegExes with directive [Hidden Content]
  21. LinuxCBT - WinPHP Edition-d3x | 784 MB Genre: e-Learning Course Objective PHP on Windows - Scripting Environment - Module IV Basics Download & Install Explore environment Explain supported variables Define variables and evaluate accordingly Implement references Generate arrays from strings Access distinct array elements Join arrays into strings Manipulate arrays with applicable functions Explore useful PHP information Conditions Discuss features Parse CLI parameters as needed Compare strings Confirm file existences Validate the presence of URL variables Discuss SWITCH & CASE Loops Discuss applicability List common types Explore FOR Implement and evaluate FOREACH Look at WHILE where applicable Iterate over lists and file I/O File I/O Enumerate relevant features Obtain statistics from files Generate lists from directory calls Confirm directory status Read files into arrays Transform data and generate modified output Intersperse data where desired Generate Checksums Discuss supported hashes Produce checksums for variable content Compare results with predefined binaries Normalize Files Discuss problem Identify targets Code applicable hooks to parse files Transform file names Produce transformations HTTP Request | Response | cURL Discuss concepts and applications Integrate Client URL library Generate GET & POST requests Parse on the back-end accordingly Dicuss caveats Properly encode URL request string Validate captured variables FTP Discuss applicability Invoke appropriate library Connect to remote FTP services Retrieve variabilized content Evaluate results HTTP Request | Response | cURL Discuss concepts and applications Integrate Client URL library Generate GET & POST requests Parse on the back-end accordingly Dicuss caveats Properly encode URL request string Validate captured variables MySQL Interface Layout data structure for application Retrieve data via FTP for transformation Transform process data for SQL submission Interface to MySQL from PHP Evaluate MySQL back-end PHP with HTML Discuss concepts and applications Integrate PHP with HTML Retrieve data from persistent data store Present data usign PHP & HTML Evaluate results Key Variables Define and use SESSION variables Validata variables with routine functions Explore superglobal variables Discuss relevance and sample scenarios [Hidden Content]
  22. LinuxCBT - WinPerl Edition Training | 783 MB Course Objective Perl on Windows – Scripting Environment – Module II Basics Download & Install ActivePerl Install Bluefish Editor Explore & confirm environment Discuss attributes & features Define & manipulate variables Concatenate values Conditions Discuss applicability Explore CLI Arguments Determine variable availability Use Regular Expression (RegEx) to validate CLI Arguments Perform file tests Loops Discuss features & attributes Use WHILE to iterate accordingly Explore UNTIL in conjunction with file I/O Iterate using FOR Use FOREACH with arrays Cycle through CLI Arguments Array Functions Define applicability Remove trailing | leading items Append | prepend list elements Sort elements Subroutines Define & Invoke Pass values and process Log items received Apply array management File I/O Discuss features & modes Iterate over file handle Generate resultant file with alternate handle Handle line delimiters accordingly Transform data Evaluate results Modules Explain benefits Identify tools & archives Implement compression module Move data with FTP Evaluate results Mass Move | Normalization Discuss system limitations Generate list of relevant items Incorporate RegEx support Transform delimiters wholesale Promulgate transformations Mail Services Discuss rules Construct mailer Generate messages Incorporate into processes Evaluate results Case Normalization Parse files & strings Determine current delimiters Normalize accordingly Retrofit existing process Confirm output Router Interaction Discuss features Install module Connect to Cisco device and ascertain useful data Parse as needed MySQL Connectivity Discuss features Implement routines Interface router data with MySQL Miscellaneous Emulate Linux ‘uptime’ Generate M3U feed More info: [Hidden Content] [Hidden Content]
  23. LinuxCBT PHP Edition Training Video | 387 MB Course Objective PHP - Hyper Text Pre-Processor - Dynamic Web Applications & CLI - Module IV Installation Identify Online PHP resources Download PHP Identify Apache prerequisite packages and programs - Modular support (mod.so) Extract, compile and install PHP with Apache modular support Compile and install PHP with Command Line Interface (CLI) support Identify key PHP configuration files & directories Configure Apache httpd.conf with PHP integration to provide PHP support Configure Apache with PHP binary and source support PHP Basics Explain PHP-supported long/short/ASP parse-tags & identify configuration changes in php.ini Hello World script output using echo to the web browser Describe the various comments supported by PHP Examine the ouput of PHP-maintained variables using phpinfo() Explain supported data types via variables (integers, strings, floating points, here documents, arrays, etc.) Test instantiation of supported variables with default types Explain Quoting rules and variable interpolation Demonstrate escape sequences such as tab, new lines, spaces, etc. Exercise the echo command Define basic associated arrays (i.e. hashes/dictionaries) Define nested associative arrays General Information Examine key CGI PHP-server variables HTTP_USER_AGENT PHP_SELF REQUEST_METHOD DOCUMENT_ROOT REMOTE_ADDR HTTP_REFERRER Explore HTTP GET Request Methods via the URLString and Forms Explore HTTP POST Request Methods via the URLString and Forms NULL Variables Basic Math - PEMDAS Integer and String Comparison Operators Examine execution operators for executing Linux Shell commands and obtaining the ouput Variable assignment via execution operations Illustrate the usage of nested arrays Control Structures IF - comparisons against integers and strings Else/Elseif - comparisons against integers and strings Test whether variables are of the same type Comparison negation C-stlye for loops definition and usage Generate HTML option boxes using C-style for loops foreach list iterator loop definition and usage Generate HTML based on the contents of the list iterated by foreach While loops definition and usage Examine filesystem listings using execution operators and while loops do While definition and usage Break Continue Switch - for concise if/elseif conditional examination General Information II Discuss the applications of Server Side Includes (SSI) Server Side Includes using require Server Side Includes using include Explain and examine the differences between require and include Demonstrate distributed include applications by including content using HTTP Header, leftnav, body, and footer definition and integration with require/include HTML Form defintion using include and control structures PHP Functions definition and sample usage ISSET & UNSET for examining and controlling variables Discuss the way PHP handles uploaded files Identify key configuration files which affect uploaded files HTTP File I/O - uploads & processing via HTML forms Define back-end action pages to handle HTTP file uploads Examine available file attributes of HTTP-uploaded files PHP SMTP E-mail integration discussion Define scripts to process forms and generate SMTP-based e-mail Examine PHP Mail function options Use mutt on the Linux system to examine PHP-generated SMTP-based e-mail PHP - Dynamic Web Programming PHP cookie concepts & usage discussion Cookie definition and examination on server and client system (Mozilla Firefox) Set and unset cookies on client system Make decisions based on the existence of cookies on the client system Session Variables concepts & usage discussion Identify pertinent configuration options for session variables Define session variables Integrate cookies with session variables Download MySQL RDBMS packages for usage with PHP Install MySQL RDBMS for usage with PHP Download the latest phpMyAdmin for installation Install phpMyAdmin with Apache supportfor web-based administration of MySQL RDBMS Recompile PHP for MySQL RDBMS support Update PHP configuration information to support MySQL Define basic database structure for usage Structured Query Language (SQL) integration with PHP Explain steps for connecting PHP scripts to MySQL Define and execute SELECT queries Define and execute INSERT queries Define and execute UPDATE queries Define and execute DELETE queries Forms Processing with MySQL integration Forms with Cookies Forms with Session Variables PHP - Command Line Interface (CLI) Discuss concepts and applications Identify CLI binary Discuss the possible ways of executing PHP scripts from the CLI Define and execute PHP one-liners Execute scripts using PHP binary as a prefix Explore executing PHP via the Interpreter mode PHP-Linux SHEBANG definition and usage Execute basic commands CLI - File I/O usage - Stat files Examine file attributes Determine access and modification times and make decisions using control structures PHP - Input Validation Define form and action script to process form fields Submit form-fields for processing Examine results Define input validation masks with regular expressions Evaluate results Extend validation masks to command line interface (CLI) Supply PHP CLI with input Confirm validation masks [Hidden Content]
  24. LinuxCBT - KornSHell Edition Training Video | 522.01 MB Course Objective LinuxCBT feat. KornSHell Edition - Module VII Introduction - Features Discuss KornSHell history Explore system configuration Identify key systems to be used Discuss key features Shell Basics Create KornSHell users on various systems Identify key KornSHell binaries and configuration files Explore key KornSHell variables Discuss shell redirection and piping Command Chaining | Substitution Discuss features and applications Explain general usage of 'test' command Evaluate sequential execution of processes Invoke commands contingently using logical AND and OR Implement command substitution Evaluate defined variables using command substitution Variables Discuss features and applications Discuss and reference positional parameters Explore standard command exit status variable Learn how to define variables Define persistent variables Unset variables and evaluate The Prompt - $PS{1..4} Discuss various prompt shell variables Setup vi-style command history access Customize primary prompt with useful KornSHell variables Define a persistent prompt Evaluate results Functions Discuss features and benefits Explore POSIX and KornSHell functions Define useful functions in a script Reference functions from a script Discuss how positional parameters are supported with funcitons Evaluate results Loops Discuss features and benefits Identify the supported iteration mechanisms Implement for | while | until loops Create finite and infinite loops Evaluate results Conditions Discuss features and applications Explore comparison testing Perform numeric comparisons Perform string comparisons Branch out using if | elif | else Evaluate results Error Handling Discuss features and applications Create script which requires a positional parameter Error handle as necessary Confirm the existence of the file referenced by the positional parameter Compartmentalize error handling into a function Evaluate results Backup Script Discuss features and benefits Write a script to backup various files and directories Ensure that script is executed with appropriate number of positional parameters Auto-create backup file name using a unique date identifier Tar and compress (using gzip) backup items Incorporate error handling Evaluate results Arrays Discuss features and applications Explain supported arrays Define indexed array with various items Reference individual and total array elements Evaluate results Build indexed array using command substitution Loop through array elements Define associative array with various items Expose total array elements Regular Expressions Discuss features and applications Highlight key metacharacters Use character-classes Implement RegExes with shell commands: ls|grep|awk|sed Evaluate results Kornshell on Solaris Compare & contrast Linux and Solaris Korn implementation Create KornSHell user on Solaris Identify key files Explore Solaris KornSHell as the user Customize Solaris KornSHell environment Run scripts created on Linux Evaluate results Case Discuss features and benefits Explain usage Create cases based on simple RegExes Write script to identify file types using case Explore case usage in system scripts Evaluate results Job Control Discuss features and benefits Background and foreground jobs Interact with running jobs Isolate jobs from TTY Evaluate results Typeset Discuss features and benefits Define variables of disparate types Justfiy variables Transform positional parameters and variables Enumerate system variables Scope variables in and out of functions Evaluate results Input Validation Discuss features and benefits Ensure the requisite number of positional parameters Confirm input prior to execution Evaluate results [Hidden Content]
  25. LinuxCBT - Awk & Sed Edition Training | 581.87 MB Introduction - Features Discuss course outline Explore system configuration Identify key systems to be used Install the Bluefish graphical editor - Supports POSIX and PERL-compatible RegExes Discuss features common and distinct to: Awk and Sed Regular Expressions Review Enumerate important metacharacters Provide examples of quatinfier usage Apply simple character classes to searches Perform searches in the Bluefish editor using literals and metacharacters Explain and apply anchors: '^', '$' Intro to Sed - Stream Editor Discuss features and applications Explain general usage syntax Print specific lines from input Delete specific lines from input Match streams using RegExes Search for ranges of text using line numbers and text ranges Save transformed output Sed - Search & Replace Discuss features and applications Discuss Left-hand and Righ-hand side (LHS | RHS) sections in search & replace actions Acquire input from: STDIN, PIPES and Files and transform according to criteria Backup and overwrite source files using Sed one-liners Perform substitutions based on matched addresses Reuse matched strings in replacement output Perform text substitutions across multiple files Perform multiple replacements in one command Apply substitutions globally across all matches Sed - Scripts Discuss features and applications Explain general usage syntax Create script to remove blank lines from input stream Create script to make general substitutions Perform case-insensitive replacements via Sed script Insert strings into desried location in the input stream via Sed script Strip trailing numeric values from input stream via Sed script Apply changes to multiple files Save scripts for reuse Intro to Awk - Field Processor & Reporter Discuss features and benefits Explain general usage syntax Print full lines from input Print desired fields from input Match patterns using RegExes Control the input field | column delimiters Save output Awk - Scripts Discuss features and benefits Explain structure of Awk scripts Implement BEGIN and END blocks Parse system files using Awk script Awk - Variables Discuss features and applications Enumerate and discuss key Awk system variables Increment counters based on matched patterns using Awk Explain variable concatenation Explore arrays (lists of values) Create arrays using the split function Awk - Operators Discuss features and applications Explore Boolean and Relational operators Discuss looping strategies Evaluate conditional testing using system variables Evaluate results Awk - Process Records Discuss features and benefits Define and evaluate multiple input field separators with files with mixed delimiters Normalize output by controlling the Output Field Separator (OFS) Extract records from system file and evaluated Account for number of processed and matched records in END block Awk - Print Formatting Discuss features and applications Compare and contrast 'print' and 'printf' output formatting Discuss 'printf' supported data types Evaluate 'printf' application in reporting Awk & Sed - Various Examples Discuss features and applications Parse and cleanup HTML and PHP files with Sed & Awk Replace values in system file with Awk Evaluate results Awk & Sed - Win32 Discuss features and benefits Download and install Awk & Sed for Win32 Transfer Linux files to Windows Test various parsing and substitution on Linux files Evaluate results Sed - File Name Transformations - Batch Enumerate poorly-named files for transformation Identify key replacement strings for regular expressions match Define and apply regular expressions for transformations Transform prefixes and suffixes Evaluate results Awk - E-Mail Address Parsing Generate sample data set Define regular expressions patterns for transformation Transform sample data Evaluate results [Hidden Content]
  • Create New...