This site does not infringe any Copyrights. It only lists through Freedom of Information Act what is listed on Search Engines. We do not host any files or promote the long term use of them. Please read User Agreement.


Link To Us And Get Listed In the Sidebar!!

==>>Why Some Server Administrators Make Mistakes With Their Parent Directories?<<==

It happened because somebody just dropped a server on their network without fully considering the consequences of their action. They didn't bother to properly design a server access control list, and because it is available on the public internet, it gets listed on search engines. Quite often a server administrator is very upset at his mistake, and is looking to "pursue each ISP in attempts to track down the guilty parties". Some may even try to convince others that they're breaking some laws. Unfortunately, he is ignoring the person who had the most power to prevent this situation. Themself. Live, learn, realize that you made a mistake configuring your server, and get back to working. Unless your business is that of hunting PD Searchers, it really will not be worth your while to waste money and time chasing ISPs and shadows of people you have no legal right to pursue in the first place. Simply buck up to your mistake and be glad that there is a blog that lets people know if thier directory is open to the public.



Site Map

Preview Directory Of The Month | 29 Childrens Animal Encyclopedias | Academics | Actual Tests Cisco & Others | Ajax | Algorithim | Animation | Anit-Spam | Apple & OSX | Artificial Intelligence | Asbestos Cancer & Mesthelioma | ASP | Assembly Language | Astronomy | Bluetooth | Book Of The Month | Business Management | C++ Ebooks | Chemistry | Christian / Evangelism Ebooks | Cisco | Computer Forensics | Computer Mix | Computer Mix 2 | Computer Mix 3 | Computer Mix 4 | Computer Mix 5 | Computer Security | Conspiracy | Conspiracy 2 | Cryptography | Data Mining | Dating & Sex | Dictionaries | Digital Photography | DNA Biology | Electronics | Elementry Go Theory | Energy Conversion | Engineering | Engineering 2 | Facial Expression Recognition | Fitness & Bodybuilding | Flash | Fluid Mechanics | For Dummies | For Dummies 2 | FreeBSD | Free Ebooks Section | Free Energy | Gaming Strategy | General Programming | General Programming 2 | General Programming 3 | Genomics | GNU Debugging | Google Ebooks | Guitar Ebooks & Manuals | Hacking | Hacking 2 | Home Improvement | HowTo's & Tutorials | HowTo's & Tutorials 2 | Internet Security | Investing | Java | Java 2 | Job Interview | Law Enforcement | Linux | Linux 2 | Magic & Hypnosis | Malicious Code | Manga Comics | Martial Arts | Mathematics | McGraw Hill | Medical | Microprocessors | Microsoft Press | Military Training | Money Management | More Programming | More Programming 2 | MySql | Network Analysis | Neurology | Non-IT Ebooks | Novels - Various Authors | Novels - Various Authors 2 | Object Recovery | Online Unleashed | Operating Systems | Oracle 9i & 10g | Oreilly | O'Reilly & Others | O'Reilly & Others 2 | O'Reilly & Others 3 | Origami | Patenting & Inventing | Perl | PHP | Physics | Photography | PhotoShop | Poker | Political | Programming Mix | Programming Mix #2 | Project Management | Psychology Texts & Ebooks | Python Ebooks | Random Mix | Random Mix 2 | Random Mix 3 | RapidShare Links | RapidShare Links 2 | RapidShare Links 3 | Real Estate | Recipes | Resevoir Engineering | Robotics | Sam's TeachYourself | Science | Scrambled Mixes | Self Help | Small Business Ideas | Software Books & Manuals | Software Testing | Stock Trading | Telecommunication | Various Software | VHDL | VOIP | Web Design | Web Marketing | Wicca & Occult | Windows Server Os | Wireless | Writing & Grammar | XML & Feed Syndication |

Friday, May 30, 2008

Computer Security

Get Downloads Here

index of parent directory
all_papers_zipped/ 09-Oct-2004 22:45 -
bibliographies/ 09-Oct-2004 22:45 -
control and containment/ 09-Oct-2004 22:45 -
csc551/ 25-Oct-2004 15:12 -
mathimatical worm spread modeling/ 09-Oct-2004 22:45 -
OS/ 09-Oct-2004 22:45 -
Others/ 09-Oct-2004 22:45 -
papers about worms and other intrusions/ 09-Oct-2004 22:45 -
presentation/ 05-Nov-2004 22:35 -
Read Now!/ 09-Oct-2004 22:45 -
Simulations/ 09-Oct-2004 22:45 -
Strictly IDS/ 09-Oct-2004 22:45 -
Vulnerabilities analysis and research/ 09-Oct-2004 22:45 -
Towards survivable intrusion detection system.pdf 09-Oct-2004 22:45 145k
transport layer survey.pdf 09-Oct-2004 22:45 256k
Usability_ An approach to usable security based on event ..> 09-Oct-2004 22:45 709k
Viruses and worms_ more than a technical problem.htm 09-Oct-2004 22:45 16k

Click Here For Web Link

index of parent directory
A data-driven finite state machine model for analyzing servers.pdf 09-Oct-2004 22:45 161k
Multiple vulnerabilities in SNMP.pdf 09-Oct-2004 22:45 380k
Prolepsis on the problem of Trojan-horse based integrity.pdf 09-Oct-2004 22:45 286k
repairing return address stack for BuffOvflw protection.pdf 09-Oct-2004 22:45 193k

Click Here For Web Link

index of parent directory
Cooperative response strategies for large scale attack mitigation.pdf 09-Oct-2004 22:45 139k
Detection_ DOME.pdf 09-Oct-2004 22:45 235k
Dynamic control of worm propagation.pdf 09-Oct-2004 22:45 142k
Formation and simulation_ Worm anatomy and model.pdf 09-Oct-2004 22:45 267k
Information warfare_ Monitoring and early warning for internet worms.pdf 09-Oct-2004 22:45 222k
Intrusion detection_ Anomaly detection of web-based attacks.pdf 09-Oct-2004 22:45 247k
Modeling malware spreading dynamics.pdf 09-Oct-2004 22:45 790k
Network interactions_ Experiences with worm propagation simulations.pdf 09-Oct-2004 22:45 215k
Papers from Hotnets-II_ Honeycomb_ creating intrusion detection signatures using honeypots.pdf 09-Oct-2004 22:45 108k
Reliable identification of bounded-length viruses is NP-complete.pdf 09-Oct-2004 22:45 251k

Click Here For Web Link

index of parent directory
AdvancedExploitDevelopment.pdf 05-Aug-2005 17:45 614k
Blindfolded_SQL_Injection.pdf 03-May-2006 17:03 349k
Hacker.Handbook.[215 kB_www.netz.ru].rar 25-Aug-2004 01:40 215k
Hacking Exposed - Network Security Secrets & Solutions - 3rd Edition.rar 13-May-2004 00:41 1.2M
Hacking.a.Terror.Network.Nov.2004.eBook-DDU.rar 13-Nov-2005 20:44 5.4M
Honeypots for Windows 2005 - APress.rar 17-Nov-2005 17:22 16.0M
ITUnderground2004_Linux_kernel_backdoors.ppt 01-Feb-2006 20:56 898k
Jon Erickson - Hacking The Art Of Exploitation (No Starch Press, 2003).chm 03-Feb-2006 22:20 520k
Manipulating_SQL_Server_Using_SQL_Injection.pdf 02-May-2006 19:42 240k
O'REILLY.-.Linux.Security.Cookbook.chm 28-Apr-2004 16:49 657k
OReilly,.IRC.Hacks.(2004).DDU.ShareConnector.chm 21-Dec-2005 22:53 3.2M
OReilly.Windows.Server.Hack.chm 22-Jun-2005 13:14 1.8M
SecureCoding.chm 03-Feb-2006 21:59 642k
Syngress.Writing.Security.Tools.and.Exploits.Dec.2005.eBook-DDU.pdf.tar.gz 18-Sep-2006 01:15 6.8M
THE SHELLCODER'S HANDBOOK.zip 20-Jun-2006 02:17 2.6M
The Database Hacker's Handbook. Defending Database Servers.chm 02-Sep-2006 01:12 1.1M
o'reilly - secure programming cookbook for c and c++.chm 23-Feb-2004 23:57

index of parent directory
CT02-001.the.ssh.crc32.exploit.txt 09-May-2002 18:44 24K
CT02-002.BHO_could_hide_malicious_code.txt 02-Apr-2002 22:06 11K
CT02-003.Protecting_Office_for_Mac_X_Antipiracy_Server_Ports.txt 07-May-2002 19:52 20K
CT02-004.Parasite_Programs.txt 11-Nov-2002 19:26 31K
CT02-005.Understanding_Capturing_Files_in_Word_Field_Codes.txt 27-Sep-2002 22:24 12K

http://ftp.cerias.purdue.edu/pub/advisories/ciac/CIACTech02/

CT03-001.Spam_Using_Messenger.txt 30-Oct-2002 18:06 8.5K

http://ftp.cerias.purdue.edu/pub/advisories/ciac/CIACTech03/

CT04-001.Remote_Detection_of_Mydoom_A.txt 30-Jan-2004 23:47 9.3K

http://ftp.cerias.purdue.edu/pub/advisories/ciac/CIACTech04/

ct05-001_Operation_of_Sinit-Calypso_Worm.txt 04-May-2005 20:06 13K

http://ftp.cerias.purdue.edu/pub/advisories/ciac/CIACTech05/

ct06-001.Protecting_Against_SQL_Injection_Attacks.txt 06-Sep-2006 22:33 20K

http://ftp.cerias.purdue.edu/pub/advisories/ciac/CIACTech05/

index of parent directory
Account.pdf 62K
Admin Password Hacking.rar 573K
Anti-Virus.rar 101K
ApacheRelease.pdf 1.5M
BLOG Hacking.rar 606K
BLOG Security.rar 113K
Bios-Password.rar 108K
Breaking20FirewallsZXO003.rar 1.2M
Coffe Net Security.rar 103K
CrackBase.pdf 221K
DNSAttackingProtocolEdition.pdf 185K
Fake-Page.rar 83K
FileInC.pdf 382K
Hidden.rar 637K
MD5Crack.zip 27K
Mobilelementour.rar 676K
Network_Programming.zip 349K
PHP_farsi_Ebook.zip 1.3M
Password-Trick.rar 64K
Port-Scanning.rar 158K
Ramz-Negari.rar 133K
Remote-Desktop.rar 137K
Security Tricks.rar 156K
Server Hacking.pdf 97K
Softs Bug.rar 122K
Spam-Filtering.rar 166K
Spam.rar 128K
System Security.rar 148K
TCP-IP.rar 58K
TCP-UDP.rar 124K
TFTP.rar 104K
Telnet-Port.rar 109K
The Methodology of web hacking.rar 286K
Trojan Work.rar 132K
Trojans.rar 113K
Ullysse.rar 35K
Virus.rar 128K
Web Server Hacking1.rar 226K
Windows-Hosting.rar 139K
Windows XP SP 2.rar 135K
Wireless_cracking_WEP.htm 947K
Writing Shell Code.rar 161K
XP Advanced Keylogger v2.5.rar 1.6M
a-adv.rar 1.7M
apachebookformatfina.zip 920K
call.rar 128K
ddos.rar 1.2M
dev.ir.chm 1.3M
hack_games_persian.zip 575K
idle_scan (hidden).rar 217K
java ebook farsi.zip 555K
lavaBlue.zip 233K
md5crackers.txt 1.1K
netbrute-3.1.zip 171K
orkathack.txt 4.8K
perlbackdoor.txt 2.0K
rpc-exploit.rar 560K
tcp.rar 166K
trojan-tcpip.zip 13K
trojan_in_vb.zip 348K

Click Here For Web Link

index of parent directory
How to Transparent mode in DHCP network environment.doc 29-Jan-2007 19:54 306K
How to configure DNS Relay.doc 29-Jan-2007 19:54 224K
How to configure High Availability.doc 29-Jan-2007 19:54 185K
How to configure IDP_IPS rule.doc 31-Jan-2007 12:22 308K
How to configure IPSec VPN failover.doc 29-Jan-2007 19:55 1.2M
How to configure L2TP and PPTP servers for remote users in PPPoE.doc 31-Jan-2007 12:22 368K
How to configure SAT(Port Forwarding) for DMZ server.doc 31-Jan-2007 12:22 655K
How to configure VLAN.doc 29-Jan-2007 19:56 441K
How to configure VLAN and route failover.doc 29-Jan-2007 19:55 603K
How to configure WAN load sharing and failover for two ISPs.doc 29-Jan-2007 19:56 485K
How to configure ZoneDefense for D-Link switch model DES-3226S.doc 29-Jan-2007 19:56 239K
How to configure user authentication for web access.doc 29-Jan-2007 19:56 583K
How to create Certification Authority and import into firewall.doc 31-Jan-2007 12:22 290K
IPSec_failover_HQ_VER.zip 30-May-2007 10:15 5.1M
Kak_podkluchit'sya_k_Internet_ispolsuya_WAN1.doc 09-Jun-2007 16:14 2.2M
Thumbs.db 15-Mar-2004 12:45 8.5K
_rus_Bandwidth Management.pdf 28-Mar-2006 15:57 755K
_rus_ VLAN and route failover.pdf 28-Mar-2006 15:57 909K
_rus_ Virtual private network using a PPTP _or L2TP_ lan-to-lan tunnel_Word Format.pdf 28-Mar-2006 15:57 746K
_rus_ Virtual private network using an IPsec lan-to-lan tunnel.pdf 28-Mar-2006 15:57 744K
_rus_ WAN failover for two ISPs using policy based routing.pdf 28-Mar-2006 15:57 463K
_rus_ ZoneDefense for D-Link switch model DES-3226S.pdf 28-Mar-2006 15:57 348K
change_log_DFL_2_11_05 23-Jan-2007 15:24 5.2K
knowlegebase/ 01-Feb-2006 15:41 -
vpn_RUS.pdf 13-May-2005 16:32 2.6M

Click Here For Web Link

0 Comments:

Post a Comment

<< Home