Archive for May 5, 2011

Advanced Linux Network Administrator Trainings

Advanced Linux Network Administrator Trainings Videos 2 CD

Trainsignal- Linux Network Administrator Trainings Videos 2 CD | 499MB


The CBT covers a wide range of real world Linux challenges in greater depth than courses costing 2-5 times more! Even if you are new to Linux, take a look at some of the knowledge you will acquire from our hands-on course...

* Explain fundamental management of Linux systems from the command line
* Demonstrate knowledge of user administration
* Understand file permissions
* Understand software configurations
* Manage Linux-based clients, server systems and security, and much more
-Fun, interactive scenarios make our lessons easy to retain! Install and configure a DNS Server and develop a DNS Infrastructure for your organization
-Learn how and why to use a Primary DNS Suffix
-Create Forward/Reverse Lookup Zones on multiple servers
-Create and manage Resource Records, including A, PTR, CNAME, MX, NS, and SRV Records
-Set up DNS Clients to interact with Active Directory and connect to internet resources

16 Hours (on CD) of Top Quality Linux Training Videos Contains:

-Learn About the Strengths and Weaknesses of Linux
-Master Linux and Be Prepared for the CompTIA Linux+ Exam!
-Learn All About the Different Linux Certifications and Their Benefits
-Analyze the Pros and Cons of Linux vs. Windows
-Master Installing Linux and All of the Intricacies that Come With the Install
-Never touched Linux before? This Lab Covers How to Perform All of Your Daily Tasks Both GUI & Command Line
-Using X Windows Demystified
-Create, Modify and Delete Users, Groups Along With Their Permissions.
-Identify & Manage Linux Processes and Process Trees
-Monitor & Troubleshoot Network Activity
-Create and Modify Basic Shell Script
-Manage & Configure Print Jobs
-Learn About Scheduling Jobs and Managing Runlevels & System Initialization
-Dive in and Tune Your Kernel Runtime Parameters
-Better Understand the Linux File System & Storage Management
-Setup System Backups & Restores
-Configure Basic TCP/IP Settings & Network Server Feature
-Troubleshoot Networking & Hostname Resolution Problems
-Read and Configure Linux Log Files
-Learn How to Share Files between OpenOffice & MS Office
-Install, Configure & Administer Samba Server (Windows File Sharing)
-Install and Administer a Web Site using Apache Web Server!
-Configure and Use Linux’s FTP Server to Share Files and Post Web Site Content
-Install and Administer DNS and DHCP on your Linux Server
-Maximize your Security on Linux Using Policies, SELinux and much more
-Learn How to Diagnose, Troubleshoot and Understand Hardware Resource Issues
-Monitor System Performance and Troubleshoot you Linux Box w/System Log Files
-Want to Learn How to Dual Boot Windows XP and Linux? The Bonus Video Walks You Through the Planning and Execution of Just That!!!
-Learn How to Play Windows Media Video(WMV) Files in Linux



All links are interchangeable.

Wireshark Network Forensics and Security

Wireshark Network Forensics and Security Video Trainings With Tools

Wireshark Network Forensics and Security Video Trainings With Tools | 1.95GB


This course focuses on network forensics including capture locations, stealth-mode capture,optimal capture and display filters, validating encrypted logins, identifying reconnaissance processes, locating header and payload signatures, catching penetration tests, malware behavior, backdoor communications and virus traffic.

Recommended prerequisite knowledge:
  • Basic security knowledge (resources, viruses, worms, denial of service)
  • Basic and advanced network components (hubs, switches, routers, firewalls, IDS)
  • Very strong knowledge of Wireshark functionality and features
  • Navigation
  • Capture filters and methods
  • Packet details (TCP/IP protocols and applications)
  • Display filtering on protocol or field or bit value
  • Search by display filter, hex value or string
  • Basic Wireshark graphs and tables (IO, conversations, endpoints)
  • Advanced Wireshark graphs (CALC, SEQ/ACK, RTT)
  • Save packets based on filters, markers or range value
  • Very strong knowledge of TCP/IP protocol and application functionality
  • Port usage and resolution
  • Name resolution (network and hardware address) and route resolution
  • ICMP functionality (packet structure, functionality)
  • TCP functionality (handshake, fault tolerance, recovery)
  • DNS functionality (address lookup, errors)
  • IP functionality (addressing, fragmentation)
  • ARP functionality (structure, functionality)
  • Follow TCP Streams
  • Expert Info/Expert Info Composite interpretation

Tools Kit:

Trace Files Included:
arp-bad padding.cap
.and more
Wireshark Network Video trainings include:
  1. 0106-IO_Graphing.avi
  2. 0106-IO_Graphing.mp3
  3. 0106-IO_Graphing_iPod.m4v
  4. 0107-Flowgraph.avi
  5. 0107-Flowgraph.mp3
  6. 0107-Flowgraph_iPod.m4v
  7. 0206-SEQ_ACK_Analysis.avi
  8. 0206-SEQ_ACK_Analysis.mp3
  9. 0206-SEQ_ACK_Analysis_iPod.m4v
  10. 0208_dhcp.wmv
  11. 0208_dhcp_iPod.m4v
  12. 0306-TCP_Window.avi
  13. 0306-TCP_Window.mp3
  14. 0306-TCP_Window_iPod.m4v
  15. 0308_tcpconloss.wmv
  16. 0308_tcpconloss_iPod.m4v
  17. 0406-Signatures.avi
  18. 0406-Signatures.mp3
  19. 0406-Signatures_iPod.m4v
  20. 0506-Whois.avi
  21. 0506-Whois.mp3
  22. 0506-Whois_iPod.m4v
  23. 0606-Recon_Co_Person.avi
  24. 0606-Recon_Co_Person.mp3
  25. 0606-Recon_Co_Person_iPod.m4v
  26. 07-11-icmpredirect.wmv
  27. 07-11-icmpredirect_iPod.m4v
  28. 0706-Email_Recon.avi
  29. 0706-Email_Recon.mp3
  30. 0706-Email_Recon_iPod.m4v
  31. 0806-MITM.avi
  32. 0806-MITM.mp3
  33. 0806-MITM_iPod.m4v
  34. 0906-Wireshark_Flood.avi
  35. 0906-Wireshark_Flood.mp3
  36. 0906-Wireshark_Flood_iPod.m4v
  37. 0907-padding.wmv
  38. 0907-padding_iPod.m4v
  39. 1006-Snort_Rules1.avi
  40. 1006-Snort_Rules1.mp3
  41. 1006-Snort_Rules1_iPod.m4v
  42. 1106-Snort_Rules2.avi
  43. 1106-Snort_Rules2.mp3
  44. 1106-Snort_Rules2_iPod.m4v
  45. 1206-IDS-Import.avi
  46. 1206-IDS-Import.mp3
  47. 1206-IDS-Import_iPod.m4v
  48. aug07-reassembly.wmv
  49. aug07-reassembly_iPod.m4v
  50. jan08_dns.wmv
  51. jan08_dns_iPod.m4v
  52. jul07-macnames.wmv
  53. jul07-macnames_iPod.m4v
  54. jun07-aclrules.wmv
  55. jun07-aclrules_iPod.m4v
  56. oct07-ioadvanced.wmv
  57. oct07-ioadvanced_iPod.m4v
  58. WSU01-7_iPod.m4v
  59. WSU0107-Advanced_Statistics.wmv
  60. WSU02-10-telnet.wmv
  61. WSU02-10_telnet_sample_iPod.m4v
  62. WSU03-S4.wmv
  63. WSU0405-TCP_Security.wmv

Rar archives have 5% recovery as well.

Feel Free To Ask if You Have Any Difficulty.
If links are dead it is requested to directly reply as well as pm me so that the links may be re-up.

ASP.NET AJAX ToolKit Web Deployment

ASP.NET AJAX ToolKit Web Deployment Video Tutorials

ASP.NET AJAX ToolKit Web Deployment Video Tutorials

Step by Step ASP.NET AJAX ToolKit and Web Deployment Video Tutorials Source code Included | 799MB


The ASP.NET AJAX Control Toolkit is a free download and contains more than 40 additional AJAX controls and components that work on top of the core ASP.NET AJAX functionality now built-into .NET 3.5 (and available as a separate download for ASP.NET 2.0). In addition to having Microsoft developers contribute, the project also has dozens of non-Microsoft contributors adding great features and controls.
ASP.NET Ajax is a very powerful Ajax framework. However, when you build a real Ajax site like those out there in the Web 2.0 world, you face many problems that you will hardly find documented anywhere. In this article, I will show some advance-level ideas that I learned while building Pageflakes. We will look at the advantages and disadvantages of Batch calls, Ajax call timeouts, browser call jam problems, ASP.NET 2.0's bug in web service response caching, and so on.
Ajax is a group of interrelated web development methods used on the client-side to create interactive web applications. With Ajax, web applications can retrieve data from the server asynchronously in the background without interfering with the display and behavior of the existing page.
Ajax uses a combination of HTML and CSS to mark up and style information. The DOM is accessed with JavaScript to dynamically display, and to allow the user to interact with the information presented. JavaScript and the XMLHttpRequest object provide a method for exchanging data asynchronously between browser and server to avoid full page reloads.
Ajax, shorthand for Asynchronous Javascript and XML, is a set of technologies that allows you to create Web applications that don't need to refresh Web pages in the browser. You can operate behind the scenes, connecting to the server, uploading and downloading data, and display the results in the browser using dynamic HTML. Using Ajax gives your Web pages the feel of a desktop application-the whole display will no longer flash when you click a button. VTC Author Steve Holzner helps you get started developing and building your own Ajax capable web pages. A familiarity with JavaScript, XML, PHP is recommended for this course. To begin learning, simply click the links.

In this video series you will learn how to use ASP.NET AJAX.

List of AJAX Video Tutorials:

1. Get Started with the ASP.NET AJAX Control Toolkit? 1 | Get Started with the ASP.NET AJAX Control Toolkit?11 minutes, 15 seconds
2. CascadingDropDown Control Extender? 2 | CascadingDropDown Control Extender?27 minutes, 56 seconds
3. TextBoxWatermark Control Extender? 3 | TextBoxWatermark Control Extender?6 minutes, 5 seconds
4. Popup Control Extender? 4 | Popup Control Extender?8 minutes, 51 seconds
5. ModalPopup Extender Control? 5 | ModalPopup Extender Control?10 minutes, 29 seconds
6. AlwaysVisible Control Extender? 6 | AlwaysVisible Control Extender?6 minutes, 17 seconds
7. Accordion Control? 7 | Accordion Control?9 minutes, 31 seconds
8. Collapsable Panel Extender? 8 | Collapsable Panel Extender?11 minutes, 53 seconds
9. Draggable Panel Extender? 9 | Draggable Panel Extender?6 minutes, 16 seconds
10. DynamicPopulate Extender? 10 | DynamicPopulate Extender?11 minutes, 19 seconds
11. FilteredTextbox Extender? 11 | FilteredTextbox Extender?5 minutes, 30 seconds
12. HoverMenu Extender? 12 | HoverMenu Extender?7 minutes, 41 seconds
13. ToggleButton Extender? 13 | ToggleButton Extender?7 minutes, 57 seconds
14. DropShadow Extender? 14 | DropShadow Extender?2 minutes, 53 seconds
15. PasswordStrength Extender? 15 | PasswordStrength Extender?15 minutes, 11 seconds
16. Get Started with the ASP.NET AJAX Animation Extender Control? 16 | Get Started with the ASP.NET AJAX Animation Extender Control?20 minutes, 45 seconds
17. ConfirmButton Extender? 17 | ConfirmButton Extender?3 minutes, 34 seconds
18. Slider Control? 18 | Slider Control?10 minutes, 32 seconds
19. AutoComplete Control 19 | AutoComplete Control7 minutes, 7 seconds
20. Configure the ASP.NET AJAX Calendar Control? 20 | Configure the ASP.NET AJAX Calendar Control?8 minutes, 56 seconds
21. DropDown Control? 21 | DropDown Control?11 minutes, 51 seconds
22. MaskedEdit Controls? 22 | MaskedEdit Controls?17 minutes, 33 seconds
23. MutuallyExclusive Checkbox Extender? 23 | MutuallyExclusive Checkbox Extender?10 minutes, 52 seconds
24. NoBot Control? 24 | NoBot Control?21 minutes, 53 seconds
25. ListSearch Extender? 25 | ListSearch Extender?11 minutes, 49 seconds
26. Use the PagingBulletedList Extender Control? 26 | Use the PagingBulletedList Extender Control?25 minutes, 31 seconds
27. Use the NumericUpDown Extender Control? 27 | Use the NumericUpDown Extender Control?21 minutes, 50 seconds
28. ValidatorCallout Extender? 28 | ValidatorCallout Extender?11 minutes, 6 seconds
29. ResizableControl Extender? 29 | ResizableControl Extender?30 minutes, 18 seconds
30. Tabs Control? 30 | Tabs Control?8 minutes, 13 seconds
31. SlideShow Extender? 31 | SlideShow Extender?19 minutes, 27 seconds
32. UpdatePanelAnimation Extender? 32 | UpdatePanelAnimation Extender?20 minutes, 0 seconds
33. The AJAX Toolkit Reorder Control 33 | The AJAX Toolkit Reorder Control21 minutes, 56 seconds
34. Utilize the AJAX Rating Control in the ASP.NET Toolkit 34 | Utilize the AJAX Rating Control in the ASP.NET Toolkit20 minutes, 59 seconds
35. Control Extenders 35 | Control Extenders3 minutes, 36 seconds
36. Color Picker 36 | Color Picker9 minutes, 40 seconds
37. Combo Box 37 | Combo Box9 minutes, 33 seconds
38. Editor Control 38 | Editor Control4 minutes, 22 seconds
39. Editor Control Custom 39 | Editor Control Custom8 minutes, 30 seconds
40. Create a New Custom Extender 40 | Create a New Custom Extender26 minutes, 5 seconds

Rar archives have 5% recovery as well.

Server 2008 Active Directory

Server 2008 Active Directory Configuration Video Training

Server 2008 Active Directory Configuration Video Training

Server 2008 Active Directory Configuration Video Training Exam 70-640 | 1.10GB


Configure Active Directory Domain Services in a distributed environment, implement Group Policies, perform backup and restore, and monitor and troubleshoot Active Directory related issues.

After completing this course, students will be able to:

  1. Install Active Directory Domain Services
  2. Implement fine-grained password policies
  3. Deploy Read-Only Domain Controllers
  4. Restrict group membership and access to software
  5. Configure AD DS Domain Controller Roles
  6. Manage security using security templates
  7. Describe Active Directory Domain Services and DNS integration
  8. Monitor Active Directory Domain Services using Event Viewer
  9. Configure Active Directory Integrated Zones
  10. Monitor Active Directory Domain servers using reliability and performance monitor.
  11. Configure read only DNS zones
  12. Configure Active Directory Domain Services Auditing.
  13. Configure Active Directory Objects
  14. Back up the Active Directory Domain Services.
  15. Automate AD DS object management
  16. Restore the Active Directory Domain Services


Video Training:


Feel Free To Ask if You Have Any Difficulty.
If links are dead it is requested to directly reply as well as pm me so that the links may be re-up.

CCNA Video Mentor Second Edition

CCNA Video Mentor CCNA Exam 640-802 Video Learning

CCNA Video Mentor CCNA Exam 640-802 Video Learning

CCNA Video Mentor Second Edition | 286MB

More than four hours of personal, visual instruction


CCNA Video Mentor is a unique video product that provides you with more than four hours of personal visual instruction from best-selling author and instructor Wendell Odom. In the 20 videos presented on the DVD, Wendell walks you through common Cisco® router and switch configuration topics. Designed to develop and enhance hands-on skills, each video guides you through essential configuration tasks for both the CCENT and CCNA® certification exams, including router and switch configuration, IP subnetting, RIP, OSPF, and EIGRP configuration, configuring VLANs, IPv6, PAT, PPP and CHAP, and access lists.

Lab Layout
Each video lab presents suggested reading lists, detailed objectives, lab diagrams, and video captures. Audio instruction throughout offers tips and shortcuts that truly make learning easy.

Network Animation
Animated network diagrams show you lab setup, device addressing, and how traffic flows through the network.

Command-Line Interface (CLI) Video
Video screencasts of router and switch CLI demonstrate command entry, configuration techniques, and device response.


Links are Interchangeable

Cisco PIX Adaptive Security CBT

Netmaster Class Cisco PIX Adaptive Security CBT

Netmaster Class Cisco Pic Adaptive Security CBT


The Cisco PIX Firewall and/or the Adaptive Security Appliance (ASA) are the cornerstone of the Cisco Self Defending Network. This training package allows you to master these key Cisco security technologies in the most efficient manner possible.
The LEARNiT: PIX/ASA package includes the following:

-Extremely detailed Reference Sheets explaining all major features of the products
-Video-On-Demand recordings by NetMasterClass instructors
-Practice Exam Database

This course is recommended for the following IT Professionals:

Those that want to master the PIX/ASA devices for network implementations
Those that want to obtain the CCSP Certification
Those that want to begin CCIE Security track preparation

Video-on-Demand Outline

1. Initial Configurations

* Configuring the Boot Variable
* Utilizing Local Name Resolution
* Configuring PIX/ASA Interfaces
* Network Address Translation
* Configuring Default Routes
* Configuring Logging
* Verifying Configurations
* Saving Configurations

2. NAT Translations

* Verifying Configurations

3. Permitting Connections

* ICMP Control
* ACLs
* Verifying Configurations

4. AAA

* Server-Group Configuration
* Authentication
* Accounting
* Verifying Configurations

5. Protocol Inspection

* Default Protocol Inspection
* Default Manipulation
* Verifying Configurations

6. Contexts Virtual Firewalls

* Configuration
* Management
* Verification

Password: gameover
Rar archives contain 5% recovery as well.

Cisco Networkers 2009 PKI for Large Scale IPsec

Cisco Networkers 2009 PKI for Large Scale IPsec

Cisco Networkers 2009 PKI for Large Scale IPsec

Cisco Networkers 2009 PKI for Large Scale IPsec | 1.01GB


This session covers public key infrastructure (PKI) architectures, designs, and practical applications including an introduction to PKI public/private key pairs, core concepts, setting up a basic PKI infrastructure, auto-enrollment, recovering from an outage, certificate revocation list (CRL) checking, and PKI architecture for large-scale deployments. An example case is presented for a GET-VPN DMVPN scenario.

All links are interchangeable.

CCNA Video Training 14 Module

CCNA Video Training 14 Module

CCNA Video Training 14 Module

Lammle Press- CCNA 14 Modules Trainings | 2.49GB


Complete 14 Module DVD Series
Module 1 Internetworking
Introduction to basic networking Hardware and logical addressing OSI Reference Model The seven layers and their functions Ethernet Networking .

Module 2: Introduction to TCP/IP
Introducing the Internet Protocol Stack The DoD Model Application layer protocols Host to Host Layer protocols Network layer protocols Written Lab:.

Module 3: IP address, Subnetting, VLSM and Summarization
Introduction to IP addressing Hexadecimal and Binary addressing Class C Subnetting Class B Subnetting Class A Subnetting Variable Length Subnet Masks.

Module 4: Introduction to the Cisco IOS
How a router and switch boots Memory types in a router and switch User mode Privileged mode Administrative functions Hostname Banner Passwords.

Module 5: IOS Management and IP Troubleshooting
How to verify and copy your IOS to a tftp server How to verify and copy an IOS from a TFTP server How to verify and copy your configuration to a tftp.

Module 6: IP Routing
Introduction to IP Routing Static Routing Dynamic Routing RIP Routing RIPv2 Routing Verifying RIP Routing Hands-on Lab 6.1: Static Routing Hands-on.

Module 7: EIGRP and OSPF
Introduction to Enhanced IGRP Configuring and Verifying EIGRP Introduction to OSPF OSPF wildcard masking OSPF Elections Verifying OSPF Hands-on Lab.

Module 8: Layer-2 Switching and Spanning Tree Protocol
Introduction to layer-2 switching The MAC address table The three switch functions Spanning-Tree Protocol (STP) Determining the Root bridge STP.

Module 9: Virtual LANs (VLANs)
Introduction to Virtual LANs Configuring VLANs Assigning Switch port memberships Configuring trunk ports Inter-VLAN routing Router on a stick.

Module 10: Access-lists
Introduction to Access Lists Standard Access Lists Extended Access Lists Names Access Lists Configuring Access lists with wildcards Verifying and.

Module 11: Network Address Translation
Introduction to Network Address Translation (NAT) Static NAT Dynamic NAT Port Address Translation (PAT) Verifying and Troubleshooting NAT Hands-on.

Module 12: Wireless LANs
Introduction to Wireless LAN's WLAN Technologies IEEE 802.11 Specifications WLAN Security Hands-on Labs 12.1: Analyzing WLAN Traffic Time.

Module 13: IPv6
Introduction to IPv6 IPv6 addressing IPv6 Routing Protocols Configuring and Verifying IPv6 Hands-on Labs 13.1: Configuring and Verifying IPv6 Time.

Module 14: Wide Area Networks (WANs) and Security Device Manager
Introduction to Wide Are Networks High-level Data Link Control (HDLC) Point-to-point protocol (PPP) Frame Relay Security Device Manager (Covers SDM.


SAP Business One v8.80.202

SAP Business One v8.80.202

SAP Business One v8.80.202 | 1.74 GB


The SAP Business One application integrates all core business functions across your entire company ? including financials, sales, customer relationship management, e-commerce, inventory, and operations. Unlike many other small business solutions on the market today, SAP Business One is a single application, eliminating the need for separate installations and complex integration of multiple modules.

Year: 2009
Version: 8.80.202
Developer: SAP AG
Platform: MS SQL Server 2005, 2008, IBM DB2
Compatibility with Vista: Yes
System Requirements: Intel Pentium IV, 1 Gb RAM, 2.5 Gb HDD
Language: English Russian

SAP Business One is an integrated enterprise resource planning (ERP) system written and distributed by SAP AG based in Walldorf, Germany. It caters for business software requirements of small and medium sized enterprises (SMEs).

Solution SAP Business One - a complete solution for business management, specifically designed for midsize and small businesses. SAP Business One solution targeted primarily at the problem of operative and long-term management.
This system creates a common information space and allows us to see the full picture of the state of the enterprise. The decision not only provides ready-to-business processes, covering all aspects of the enterprise, but also provides flexible tools for coping with the processes it in your company.

SAP Business One easily integrates with external applications and third-party accounting systems due to the large
number of standard interfaces. As a result, the Company receives a versatile and effective tool to automate and streamline business processes, as well as prompt and reliable information for decision-making. SAP Business One allows you to make your business more profitable and controlled.

With an SAP Business One solution, you can:

* Improve efficiency for a stronger bottom line ? Centralize and integrate your entire business ? across sales, inventory, purchasing, operations, and financials ? in one system, eliminating redundant data entries, errors, and costs.
* Focus on growing your business ? Streamline operations from end to end, so you can focus on making your business more profitable.
* Make smarter, faster decisions ? Put your business information into a single data source, so you can instantly drill down to complete, up-to-date information ? and so your people can respond quickly to customer needs and be more empowered to make decisions.
* Get faster time to value ? Be up and running within six to eight weeks with a single application. The intuitive user experience minimizes user training and reduces the cost of ongoing IT support.
* Support your changing needs ? With easy-to-use customization tools and over 550 add-on solutions provided by our software solution partners, SAP Business One can be flexibly tailored and extended to meet your specific business needs.

SAP Business One contains 15 core modules :

* Administration Module, where configuration is performed.
* Financials Module, where various accounting and financial activities are conducted.
* Sales Opportunities Module, where existing customers and potential accounts are maintained.
* Sales Module, where orders are entered, shipped and invoiced.
* Purchasing Module, where purchase orders are issued and goods received into inventory.
* Business Partners Module, where Business Partners (customers, vendors, and leads) are maintained.
* Banking Module, where cash is received and paid out.
* Inventory Module, where Inventory is valued and managed.
* Production Module, where bill of materials are defined and manufacturing is tracked.
* MRP Module, where purchase and production planning takes place.
* Service Module, where after-service products are managed.
* Human Resources Module, where employee information is maintained.
* Reports Module, where system-default and user-defined reports are generated (as on-screen tables, printouts or Excel files: Print Layout Designer, Advanced Layout Designer (To be discontinued in 2009 due to purchase of Business Objects), XL Reporter and Crystal Reports 2008 Basic (One Free License per customer)).
* E-commerce, allowing customers to buy and sell online to consumers or other businesses.
* WebCRM. Allows employees to manage customer support cases, salespeople to manage prospects, and customers to submit cases all via a web browser client.

Rar archives have 5% recovery as well.

Installation Guide: