0

SQL Tutorial

SQL - (pronounced "sequel")

* SQL stands for Structured Query Language, and it is a very powerful and diverse language used to create and query databases. Its loose syntax makes it easy to learn, but mastering its intricate architecture may take a bit longer.

* Arming yourself with a firm understanding of its structure and mechanics will allow you to build simple, dynamic applications for the web or to create robust applications using data and databases.The loose structure and flexibility of this language make it an ideal candidate for the web, especially since there are more than a handful of database applications available for developers o use for free, such as Microsoft's SQL Server Express and MySQL.

* SQL - Fundamentals 

Some of the basic functions of SQL are inputting, modifying, and dropping data from databases. In this tutorial, we use command line examples to give you an idea of what SQL is capable of. Coupled with the use of web languages such as HTML and PHP, SQL becomes an even greater tool for building dynamic web applications.

* SQL - Tutorial Scope 

Reading further, you will encounter a number of hands-on examples intended to introduce you to SQL. The majority of these examples are intended to span across the different available variations of SQL, but the primary focus of this tutorial is Microsoft's SQL Server Express.

*SQL - Getting Started

To get started, you will need to install Microsoft SQL Server Express. For installation help, we suggest you go straight to the developer homepage:

SQL Server Express Download: http://www.microsoft.com/sqlserver/en/us/editions/2012-editions/express.aspx

* It is preferred that you select SQL Server Express 2008 for this tutorial. This version of SQL is available for private use for free, and we've provided the link to Microsoft's site, or you can find the download page by searching for "SQL Server Express" on Google.

* Follow the online installation guide that Microsoft provides, and launch SQL Server Management Studio Express to connect to your SQL database. This Management Studio Application will be your temporary home for the remainder of the tutorial.

 * SQL - World Wide Web 

Building a website on SQL architecture is quickly becoming the standard among web 2.0 sites. With a SQL backend, it is fairly simple to store user data, email lists, or other kinds of dynamic data. E-Commerce web sites, community sites, and online web services rely on SQL databases to manage user data or process user purchases.

SQL has become popular among web developers due to its flexibility and simplicity. With some basic knowledge of HTML, PHP, and a database program such as Microsoft's SQL Server, a developer becomes capable of creating complex websites and applications while relying on online web services to provide a SQL backend in which user data is stored. This tutorial will provide you with just a small taste of this type of programming and architecture.

                                                                              ( Continue )

 

0

Do You Know Who Is the Best Antivirus In The World ?

Do You Know Who Is the Best Antivirus In The World ?
মিডিয়াফার ই Bit Defender ইউজ করে !!



Full Version Download Link : In Torrent :





http://kat.ph/bitdefender-antivirus-plus-2012-build-15-0-27-312-till-2045-fiesta569-zip-t5742007.html




Torrent File Download Korer Link :1. http://www.filehippo.com/download_utorrent/



2 . http://www.filehippo.com/download_bittorrent/



3. http://www.filehippo.com/download_bitcomet/



See More : http://anti-virus-software-review.toptenreviews.com/



Know More @ www.facebook.com/partha0135
0

**** ESET Smart Security + ESET NOD32 AntiVirus 5.2.9.12 + Anti-virus databases for Nod32 (26/06/2012) | 568 MB
ESET Smart Security – a comprehensive product that includes anti-virus engine to the well-known antivirus NOD32, firewall, anti-spyware module and a filter for spam protection. ESET NOD32 Antivirus provides reliable, advanced protection against threats endangering your PC. Also present in the assembly for nod32 antivirus databases.
ESET Smart Security / ESET NOD32 AntiVirus 5.2
ESET Smart Security – a comprehensive product that includes anti-virus engine to the well-known antivirus NOD32, firewall, anti-spyware module and a filter for spam protection. All functions ESET Smart Security is one of the graphical environment, ensuring ease of setup and use the program. Anti-Virus together with the search function spyware will detect and remove a variety of types of malicious applications. Built-in firewall to actively oppose the various network attacks, and anti-spam filter using high quality algorithms for detecting spam, get rid of unwanted mail.
ESET NOD32 Antivirus provides reliable, advanced protection against threats endangering your PC. Viruses, worms, Trojan horses and other troubles now will not cause any harm to information valuable to you. Improved detection methods that are used by the program, even provide protection against future threats, which are the new worms and viruses. The fourth generation of the NOD32 Antivirus System features a fully integrated software suite characterized by an unprecedented high rate of detection, fastest scanning rates and extremely low utilization of system resources.
New features:
Game Mode
When you run demanding programs in full screen mode – you can enjoy the game and work without compromising system performance by automatically reducing the consumption of system resources.
HIPS (Intrusion Prevention System),
Thanks to improved mechanisms for countering sophisticated malware and analysis of all the modules of the system is blocking potentially dangerous actions on the computer. In addition, HIPS allows the user to configure additional safety when working with applications.
Wood advanced options
This feature makes navigating the settings ESET NOD32 Antivirus 5 simple and understandable for the user.
Key features:
“Cloud” scanning
ThreatSense.Net technology allows us to monitor malicious processes, to analyze the parameters of the system and automatically send the malware to ESET virus laboratory for early detection of threats.
Control of removable media
ESET NOD32 Antivirus 5 automatically scans the contents of any USB-connected media, as well as files on a CD-and DVD-ROM. You can also specify how the device is not working – read, read and write, or not open at all.
Quick Start
You will be able to start working immediately after installing ESET NOD32 Antivirus 5, no longer need to wait for the new signature database.
The procedure for treatment:
A. Disable self-defense program installed
Two. Adding to the installer TNOD exceptions set and add itself exe-shnik TNOD also in the exception (perhaps GCD try to eat the pill, do not pay attention, just restore it and add to the exceptions)
Three. Run the medicine and look forward to when the program finds the current key
4. Enable Self-Defense
Five. At a rally key (GBR refuses updated) repeat step 3
6. Among other things, add the site to recommend the program to the exceptions:
Add sktroku * Tukero.Blogspot.com * – it is with stars.
Anti-virus databases
Installation instructions: Download and enter the settings antivirus path to ESET_v3-4-5 with updates.
ESET Smart Security / ESET NOD32 AntiVirus 5.2
Year: 2012
Version: 5.2.9.12
Compatible with Seven: full
System requirements:
Windows Vista, Windows 7, Home Server:
Windows 2000, XP, 2003:
Language: Russian
Medicine: the tablet is present
Anti-virus databases
Publication Type: License
Year: 06/26/2012
Version: EAV / ESS 3,4,5 (32 | 64 bit)
Language: Russian + English
Tablet: Not required
System requirements: Minimum
The size of the assembly: 551 MB

 Download Now: Click Here


0

WinRar V 4.20 Portable

WinRAR is a powerful archive manager. It can backup your data and reduce the size of email attachments, decompress RAR, ZIP and other files downloaded from Internet and create new archives in RAR and ZIP file format.

Using WinRAR puts you ahead of the crowd when it comes to compression by consistently making smaller archives than the competition, saving disk space and transmission costs.
WinRAR provides complete support for RAR and ZIP archives and is able to unpack CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, 7Z, Z archives.



WinRAR offers a graphic interactive interface utilizing mouse and menus as well as the command line interface.
When you purchase WinRAR license you are buying a license to the complete technology, no need to purchase add-ons to create self-extracting files, it's all included.
One price, one payment, once.

You also receive the benefit of a life-time use of the WinRAR archiver. No upgrade fee to pay. When a new release is made, simply download and install, your license is valid for life.

WinRAR is easier to use than many other archivers with the inclusion of a special Wizard mode which allows instant access to the basic archiving functions through a simple question and answer procedure. This avoids confusion in the early stages of use.

WinRAR offers you the benefit of industry strength archive encryption using AES (Advanced Encryption Standard) with a key of 128 bits.

WinRAR supports files and archives up to 8,589 billion gigabytes in size. The number of archived files is, for all practical purposes, unlimited.

WinRAR offers the ability to create selfextracting and multivolume archives.

Recovery record and recovery volumes allow to reconstruct even physically damaged archives.

WinRAR features are constantly being developed to keep WinRAR ahead of the pack.

file download go this link :
http://www.mirrorcreator.com/files/0DXFOUQR/WinRAR_v4.20.zip_links
0

WinRAR 4.1 Full Version


File Download 2 GO This Link :
http://www.2shared.com/file/Y2DITpf7/WinRAR_41_Crack_FullVersion32_.html

0

Advanced System Care With Anti-Virus 2013 Final + License Key


 Download Now: Click Here



0

Windows 8 highly compassed with in 10 MB

Windows 8 highly compassed with in 10 MB

WORKING PROCESS :

১.প্রথমে http://www.mediafire.com/?q0iiolfqi193xqv ক্লিক করুন ফাইল টি ডাউনলোড করে নিন

২. এইবার Winrar http://www.filehippo.com/search?q=winrar দিয়ে এক্সট্রাক করে নিন

৩. সবশেষে ISO ফাইল টিকে DVD তে বার্ন করে নিন
0

Hacking Tutorials

Rte Attack

 

--==:: RTE এটাক ::==--

RTE এটাক । এটি কিছুটা DNN এর মত । ইমেজ ফাইল আপলোড করতে হয় । গুগল ডরক ইউস করে প্রথমে ভুলনেরাবল সাইট বের করতে হবে । নিচের গুগল ডরক দিয়ে সার্চ দিন –
allinurl: 'rte/my_documents/my_files'
এবার কিছু রেসাল্ট শো করবে । সেখানে যেকোনো একটি লিংক এ ক্লিক করুন ।

এবার /my_documents/my_files এবং এর পর যা কিছু থাকুক না কেন এর জায়গায় /RTE_popup_file_atch.asp লিখে এন্টার দিন ।

এবার নিচের মত একটি পেজ পাবেন । সেখানে Choose File এ ক্লিক করে আপনার HTML/JPG/PNG/GIF ফাইল টি আপলোড দিন ।

যদি কোন পপআপ আসে তাহলে ওকে করে দিবেন ।

অনেক সময় লিংক পুরোটা থাকে না অর্থাৎ শুধু my_documents/my_files/A35_bangladesh.html থাকে । তখন আপনি প্রথম যখন লিংক টি

ওপেন করেছিলেন তখন my_documents/my_files/ এই রকম একটা লিংক ছিল শুধু এর পড়ে আপনার ফাইল এর নাম মানে - A35_bangladesh.html অথবা প্রিভিও উইন্ডো থেকে আপনি যে নাম কপি করেছিলেন সেটা দিয়ে এন্টার দিন । দেখবেন কাজ করেছে ।

যত বেশি প্র্যাকটিস করবেন তত ভালো কাজ হবে । অনেক সাইট এ আপলোড হবে না বা বিভিন্ন সমস্যা দেখাবে । সেই সাইট গুলো এড়িয়ে যাবেন । ধন্যবাদ ।
0

Hacking Tutorials


Methods of shell uploading


Now Try these methods below

<--------------------------------------------------------------------------------->
Method 1 :-> *_*
<--------------------------------------------------------------------------------->
well we all know that uploading scripts accepts JPG or GIF or both etc
so its possible some times to bypass it by
renaming the file to
" shell.jpg.php "
Or
" shell.gif.php "
<--------------------------------------------------------------------------------->
Method 2 :-> *_*
<--------------------------------------------------------------------------------->
Sometimes we can upload PHP file by editing the parameters with tools such as
Tamper Data ( Firefox Addon )
Download It Here

Code:
https://addons.mozilla.org/en-US/firefox/addon/tamper-data/


Change the

application/octet-stream
to
image/gif
or
image/jpg
Video Tutorial :->



<--------------------------------------------------------------------------------->
Method 3 :-> *_*
<--------------------------------------------------------------------------------->
We can also upload shell by adding
to the file name

%_00shell.jpgphp

shell.jpg%.php
Or

shell.jpg;php

<--------------------------------------------------------------------------------->
Method 4 :-> *_*
<--------------------------------------------------------------------------------->
Another way is by tricking Apache
by adding PHP languages
For Example :->
file.php.enThe Apache will read the file.php.en
as a normal php file
cause .en refers to English
Another example :->
file.php.ar
As .ar refers to Arabic and Etc Etc.
That helps when we find an uploading center that
denies PHP extensions and allows any other unknown extension.
0

FILE HOSTING SERVICES

0

Hacking FAQ



 What is Hacking?

Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose. Hacking is the art of exploiting the flaws/loopholes in a software/module. Since the word Hacker has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

  
Who is a Hacker?

A Hacker or White Hat Hacker, also known as Ethical Hacker, is a Computer Security expert, who is specialised in penetration testing, and other testing methodologies, to ensure that a company information systems are secure. Such people are employed by companies where these professionals are sometimes called Sneaker.


Who is a Cracker?

Black Hat Hackers, who may also be known as Crackers, are Hackers, who specialise in unauthorized penetration of information systems. They may use computers to attack systems for profit, for fun, or for political motivations, as part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization. They also may distribute computer viruses, Internet Worms, and deliver spam through the use of bot nets.


Who is a Script Kiddy?

A script kiddy is a wannabe cracker. These individuals lack knowledge of how a computer really works but they use well-known easy-to-find techniques and programs or scripts to break into a computer to steal porn, music files, SPAM, etc.


What skills do I need to become a Hacker?

There is no magic to Hacking, but like anything else that is worthwhile it takes dedication, a willingness to learn. It is most important to have a good knowledge of topics such as Operating system and its working, Computer networks, Computer security and of course Programming. Its not possible to become a hacker overnight. Its the skill developed over a long time.


What is the best way to learn Hacking?

The best way to learn Hacking is to start learning about the basics of hacking right from now. There are many books about Hacking that are available today. But before you start learning about the details you must have a basic skills of Programming and knowledge of Computer network security. Internet is the best source to learn about hacking.


How do I secure my computer from being Hacked?

Having a basic knowledge of computer security and related topics such as Virus, Trojans, spyware, phishing etc. is more than enough to secure your computer. Install a good antivirus and a firewall.


Types of Hacker ?
There are good and bad hackers. Here is a window into what they do and why:

White Hat Hackers:
These are the good guys, computer security experts who specialize in penetration testing and other methodologies to ensure that a company’s information systems are secure. These IT security professionals rely on a constantly evolving arsenal of technology to battle hackers.

Black Hat Hackers:
These are the bad guys, who are typically referred to as just plain hackers. The term is often used specifically for hackers who break into networks or computers, or create computer viruses.
Black hat hackers continue to technologically outpace white hats. They often manage to find the path of least resistance, whether due to human error or laziness, or with a new type of attack.

Script Kiddies:
This is a derogatory term for black hat hackers who use borrowed programs to attack networks and deface websites in an attempt to make names for themselves.
Hacktivists: Some hacker activists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact revenge, or simply harass their target for their own entertainment.

State Sponsored Hackers:
Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls the air controls the world.”

Spy Hackers:
Corporations hire hackers to infiltrate the competition and steal trade secrets. They may hack in from the outside or gain employment in order to act as a mole. Spy hackers may use similar tactics as hacktivists, but their only agenda is to serve their client’s goals and get paid.

Cyber Terrorists:
These hackers, generally motivated by religious or political beliefs, attempt to create fear and chaos by disrupting critical infrastructures.
Cyber terrorists are by far the most dangerous, with a wide range of skills and goals. Cyber Terrorists ultimate motivation is to spread fear, terror and commit murder.
 (Collected) 

 
Copyright © Learning World