GET FREE TRAFFIC TO UR SITE

Free advertising

hi click me $ $ $

google search box

Sunday, April 19, 2009

TrainSignal Cisco CCNA Security 640 553 DVD (Including Bonus DVD) [Tutorial]




TrainSignal Cisco CCNA Security 640 553 DVD (Including Bonus DVD) [Tutorial]
In as little as 13 hours, you'll learn how to Identify, lockdown, & secure Vulnerabilities in a small to medium enterprise branch network... and have the Knowledge necessary to pass the Cisco CCNA Security/IINS 640-553 Exam... Guaranteed!

Cisco CCNA Security Training Course FAQs

"Am I qualified to take this course?"

YES! If you are a network administrator, an aspiring network administrator, or have on-the-job security experience, this course will build a stronger foundation of advanced security concepts.

YES! If you have Cisco CCNA Certification or a basic understanding of Cisco Routers and Switches (without certification), this course is for you.

Note: The prerequisite to take the Cisco CCNA Security exam is Cisco CCNA certification.

Note: If you plan to continue on to the CCSP certification, the Cisco CCNA Security certification is the prerequisite.


"Do I need Cisco equipment to complete this training course?"

NO You do not need any Cisco equipment to watch the videos or to pass the Cisco CCNA Security/IINS 640-553 exam; however, working hands-on with Cisco equipment may enhance your training experience.
"I already have my CCNA. Do I need my Cisco CCNA Security certification?"

YES! The ability to secure a Cisco network is one of the most marketable skills for any Cisco professional and network security has never been more important.


Cisco CCNA Security Course Outline:


Video 1
Hackers – Their Motives and Methods

Learn about Hacker Roles and why they hack. Discover what your Network Security Goals should be, and how to implement Network Security Best Practices to achieve those goals to keep from suffering the consequences of ineffective network security.

* Why Do Hackers Hack?
* General Network Security Goals
* The Consequences of Ineffective Network Security
* Where Network Attacks Originate From
* Social Engineering Attacks
* Trojan Horses and Privilege Escalation Attacks
* Using Ping Sweeps and Port Scans on Your Own Network
* Best Practices

Video 2
Introduction to SDM (Security Device Manager)

Improve productivity, simplify router deployments, and troubleshoot complex connectivity issues using the Security Device Manager. Plus, launch, login, and tour SDM and discover some Real World SDM issues as you learn to manage your router away from the Command Line.

* Cisco's Security Device Manager (SDM)
* Pre-installation Configuration
* Installing SDM
* Launching and Loading SDM
* SDM Settings - User Preferences
* SDM Configure Window
* Additional Tasks Tab
* SDM Monitor Window
* SDM in Internet Explorer Problem

Video 3
Authentication, Authorization, and Accounting (AAA)

Learn how Authentication works in AAA, what happens when you specify different devices used for Authentication, and discover commands used in Authentication, Authorization, and Accounting that will be useful in the real world and on the exam. Plus, configure TACAS+ and RADIUS security protocols.

* What is AAA?
* TACAS+ vs. RADIUS
* TACAS+ and RADIUS Configuration
* Authentication Configuration
* No Authentication Option
* Telnet Login Problem
* Real World Not About AAA Lists
* Using AAA for Privileged EXEC Mode and PPP
* Accounting
* Authorization
* Configuring AAA with SDM

Video 4
Layer 2 Security

Learn how to prevent security threats like CAM Overflow attacks by configuring and implementing Port Security, Sticky Addresses, Lightweight Extensible Authentication Protocol (LEAP), and SPAN. Plus, discover the relationship between DHCP Snooping, Dynamic ARP Inspection, and IP Source Guard and learn to configure and operate Root Guard and BPDU Guard.

* Basic L2 Security Features
* Cisco Password Rules Review
* Preventing CAM Overflow Attacks with Port Security
* Port Security
* Configuring Port Security
* Misconfiguring Port Security
* Aging Time for Secure Addresses
* Sticky Addresses
* Configuring MAC Table Event Notification
* Dot1x Port-Based Authentication
* Cisco Lightweight Extensible Authentication Protocol (LEAP)
* Extensible Authentiaction Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
* Local SPAN Configuration
* Remote SPAN Configuration
* Filtering Intra-VLAN Traffic
* VLAN Access List (VACL)
* Private VLAN
* DHCP Snooping
* Dynamic ARP Inspection
* IP Source Guard
* MAC Address Flooding Attacks
* VLAN Hopping
* Root Guard
* BPDU Guard

Video 5
Layer 3 Security

This is one of the most important videos in the course because of the volume of detailed information that you will use on the exam and in the real world. Learn about "Salting" your MD5 to make an encrypted password even stronger and discover how Network Time Protocol (NTP) will be important in your security deployment. Plus, learn to configure and use Superviews, Autosecure, Security Audits, and One-Step Lockdown via SDM to thwart ICMP based attacks, IP Spoofing, and Recon Attacks.

* Configuring Enable Password
* Privileged Level Password vs. Privleged Level Secret
* Encrypting Passwords
* Strong Passwords vs. Weak Passwords
* Creating and Testing Minimum Length Password Policy
* ”Salting” your MD5
* Network Time Protocol (NTP)
* Configuring NTP Master Time Source
* Synchronizing System Clocks
* Configuring Peering with NTP Peers Command
* Other Clock Commands
* Telnet and SSH
* Creating Banners
* Different Types of Network Attacks
* Denial of Services (DoS) Attack and SYN Flooding Attack
* TCP Intercept Defense
* ICMP (Ping) Sweep, Port Scan and Port Sweep
* Ping of Death vs. Invite of Death and Ping Floods
* Smurf Attacks
* Availability Attacks: Don't Forget the Physical Layer!
* IP Spoofing
* IP Source Routing
* Packet Sniffers and Queries
* Other Confidentiality Attacks
* Password Attacks
* Salami Attack
* Other Network Attacks Types - Trust Exploitation
* Superviews - Role-Based CLI Views
* AutoSecure
* One-Step Lockdown
* Security Audit
* NTP and SSH in SDM
* Differences Between SDM and AutoSecure
* SNMP
* Logging
* Viruses and Worms
* Cisco IOS Logging Enhancements
* Buffer Overflow
* Cisco IOS Resilient Conofiguration and Login Enhancements
* exec-timeout Command

Video 6
The Intrusion Prevention System (IPS)

Learn the differences between Intrusion Detection (IDS) and Intrusion Prevention (IPS) and how they operate. Plus, discover the different approaches to identifying malicious traffic and learn to use NIPS, HIPS and Honeypots to stop it. We'll also configure your Intrusion Prevention System using the Security Device Manager (SDM) and we'll use the Command Line to verify this IPS configuration.

* Intrusion Detection (IDS) vs. Intrusion Prevention (IPS)
* Signatures and Signature Types
* NIPS and HIPS
* Honeypots
* Configuring IPS in SDM
* Editing IPS Rules
* Editing Global Settings
* SDEE Message Logs
* Viewing Signatures
* Editing and Deleting Signatures
* Verifying Your IPS Configuration

Video 7
Firewalls

Learn to enable a Cisco router to act as a firewall using the Cisco IOS Firewall Set. Plus, discover concepts relatively new to Cisco like Zone-based Firewalls that are meant to phase out CBAC and the “ip inspect” command. We'll also configure and edit a firewall using the Security Device Manager's (SDM) Basic Firewall Wizard and we'll draw distinctions between the Basic Firewall Wizard and SDM's Advanced Firewall Wizard.

* Firewall Basics
* Stateless and Stateful Firewalls
* Application Layer Gateway (ALG)
* The Cisco IOS Firewall Feature Set Components
* Authentication Proxy
* Plan for Firewall Success Then Succeed!
* ACL Review
* Extended ACL Review
* Extended Access Control Lists
* Real-World ACL Success Tips
* Introduction to Turbo ACLs
* CBAC and “ip inspect” command
* Real-World Tips and Best Practices
* TCP and UDP Generic Inspection
* Deep Pocket Inspection (DPI)
* Zone-Based Firewall Configuration
* Class Maps and Policy Maps
* Basic Zone Commands
* Configuring Zone Pairs
* Configuring Firewall with SDM's Basic Firewall Wizard
* Editing Firewall with SDM
* SDM's Advanced Firewall Wizard
* Watch Your Directions - More Tips
* ICMP Inspection
* Final Note

Video 8
Cryptography and Virtual Private Networks (VPNs)

Learn how Asymetric and Symetric Algorithms can be used to implement Cryptography Techniques that help encrypt clear text passwords. Plus, configure your own IKE policy using the Command Line and get your hands dirty by using the Security Device Manager (SDM) to configure Site-to-Site VPN and Generic Routing Encapsulation (GRE) over IPsec.

* Cryptography Techniques
* Asymmetric and Symmetric Algorithms
* RSA Algorithm
* Diffie-Hellman (DH)
* A Word or Two About SHA
* What is VPN?
* VPN Terminology and Theory
* Introduction to PKI and the Certificate of Authority
* Public Key Cryptography Standards (PKCS)
* Internet Key Exchange (IKE)
* Steps to Configure Site-to-Site VPN
* Configuring IKE Policy Using Command Line
* Policy Match Criteria
* Crypto ACLs
* Mirror Configuration
* Creating Crypto Map
* Using SDM to Configure Site-to-Site VPN
* Generating Mirror in SDM
* Testing Our Configuration
* Verifying SDM Configuration Using Command Line
* The Return of Generic Routing Encapsulation (GRE) Over IPSec
* Using SDM to Configure GRE over IPSec

Video 9
Introduction to Voice and SAN Security

You do not need to be an expert in Voice Networking or Storage Area Networking (SAN) to learn how to keep these types of networks secure. Learn the differences between FCAP and FCPAP, discover the details of LUN and LUN Masking, and delve deeper into VoIP (Voice Over IP). Whatever your experience level may be, this detailed overview of Voice and SAN Networking will provide you the insight you need to get into one of the fastest growing areas in the IT field.

* Voice Over IP Overview
* Gateways and Gatekeepers
* VoIP Protocols
* Typical VoIP Attacks and Precautions
* Introduction to Storage Area Networking (SAN)
* SAN Transport Technologies and Protocols
* SAN Security - LUNS and LUN Masking
* SAN Zones
* Virtual SANs (VSANs)
* FCAP and FCPAP

Video 10
Introduction to Cisco Network Solutions

Cisco Packet Tracer 5.0


Image

Info:
The Packet Tracer 5.0 will bring many new brilliant features. Just to mention some of them:

1. PT5.0 will be multi-user. It means you will be able to run multiple instances of PT5.0 on one or more computers and then connect them together trough IP sockets. With this feature you will be able to create one big topology, distributed across computers on your classroom and each student will work on his small part of the big picture. It can lead to network games, challenge labs, etc.
2. Open Devel API PT5.0 will offer an open development API for Flash Action Script and C . You will be able to write your own PT addons, features, etc. One of the great addon could be a plugin which connects the virtual PT5.0 devices to a real devices!

And at last, but not least, some new protocol support:

IPv6
Multi-Area OSPF
Route Redistribution
Multilayer Switch (3560)
SSH
RSTP
Frame Relay update
Interface range
Different grades for different commands in labs
Possibility for locking PT to the student's name

Download:
CODE: SELECT ALL
http://uploading.com/files/0YDN4CB1/Cisco_Packet_Tracer_5.0.rar.html

Cisco Network Magic Professional 5.1






DownloadProviderQuality
Arrow Bullet Direct Download-Cisco Network Magic Professional 5.1LDQuality Level
Arrow Bullet Fast Download-Cisco Network Magic Professional 5.1SWQuality Level






Cisco Network Magic Professional 5.1 | 28Mb 



Code:
Having trouble connecting your devices together and to the Internet or printing from any computer? With Network Magic Pro 5.1, you can skip the tech support phone calls, online forums and expensive on-site consultants. Network Magic Pro provides do-it-yourself tools to help you set up, manage and secure your network like an IT professional. With point-and-click ease, you can: * Connect your devices together in minutes * Share Internet connections, printers and files * Protect your network with enhanced WPA security capabilities and status alerts * Repair your network and Internet connections to stay online and productive * Control access to the Internet and track online activity with remote desktop screenshots  Features: - Easy to Use- No IT Expertise Needed - Perform tasks from centralized location - Connect to the network - Add a Device - Wireless Connection Manager - NAS Support - Share Folders & Printers - New Security Enhancements(encryption support for WPA) - Monitor and Control - New Parental Monitoring - Network Reports - Web sites visited, software application used, and devices added or removed - Manage and Troubleshoot - Internet Speed Test - Health and Security Alerts - Proactively monitors network�s activity and health - Internet Connection Repair - Create a seamless network across Windows, XP, Vista and Mac


Code:
http://uploading.com/files/729PUI24/Network_Magic_Pro_5.1.8354.0.rar.html

Cisco Network Magic Pro 5.0.8282


Image

Info:
Set up, manage and secure your network with point and click ease
With Network Magic Pro 5.0, you can skip the tech support phone calls, online forums and expensive on-site consultants. Network Magic Pro provides do-it-yourself tools to help you set up, manage and secure your network like an IT professional.

With point-and-click ease, you can:
* Connect your devices together in minutes
* Share Internet connections, printers and files
* Protect your network with enhanced WPA security capabilities and status alerts
* Repair your network and Internet connections to stay online and productive
* Control access to the Internet and track online activity with remote desktop screenshots

Key Features
* Easy to Use- No IT Expertise Needed
o Perform tasks from centralized location
An enhanced interface plus new in-product wizards streamline networking tasks, taking the guesswork and effort out of getting connected, monitoring activity and repairing your network
* Connect to the network
o Add a Device
Easily connects all of the devices you use in your daily life; computers, printers, cameras and game consoles to your wireless or broadband network
o Wireless Connection Manager
Helps you connect to a secure network
o NAS Support
Connect Network Attached Storage (NAS) devices to your network, allowing you to easily back up your data
* Share Folders & Printers
o Share Printers and Files
Eliminate the need to email yourself to get access to files or print documents from different computers
* Protect
o New Security Enhancements
Add protection to your network with wireless protection (encryption support for WPA), enabling you to lock out intruders.
* Monitor and Control
o New Parental Monitoring
Gives parents the ability to monitor their kids' online activity. Restrict Internet access plus take real-time desktop screenshots to track web sites visited and programs used, providing peace of mind and a safer online experience
o Network Reports
View detailed activity reports for each computer on your network; informing you of web sites visited, software application used, and devices added or removed
* Manage and Troubleshoot
o Internet Speed Test
Test your Internet speed so you can be aware of service or performance issues
o Health and Security Alerts
Proactively monitors and informs you of your network\'s activity and health, giving you advice on how to resolve issues and improve your online experience.
o Internet Connection Repair
Quickly troubleshoot, pinpoint, and repair Internet connection problems
* Cross-platform Support
o Integrate Macs and PCs
Create a seamless network across Windows, XP, Vista and Mac so you can easily share printers and files across all of your computers.
o Integrate Macs and PCs into one network. (sold separately)
* Online Backup
o 6 Months of Online Backup from Carbonite
Automatically back up everything on your computer so you don\'t lose your valuable files. Our partner, Carbonite, makes it simple by providing unlimited, always on, backup so you don\'t have to make decisions about what or when to back-up.


Download:
CODE: SELECT ALL
http://uploading.com/files/HC6U59KZ/Cisco_Network_Magic_Pro_5.0.8282.rar.html

OR
CODE: SELECT ALL
http://rapidshare.com/files/222759919/Cisco_Network_Magic_Pro_5.0.8282.rar

Wednesday, April 15, 2009

USB Drive Antivirus 2.3

USB Drive Antivirus 2.3

One Antivirus Software is Not Enough

USB thumb drives and removable hard disk are now common throughout the workplace. They offer a compact storage solution for carting around work projects, personal documents. However, they also bring new problems which common antivirus can not solve:

1.Data leakage: account information, bids, contracts and much more commercial confidentiality data can easily be downloaded onto any removable media devices- from a memory stick to ipod . And once it leaves your computer, the integrity of that sensitive data is at risk.

2.Virus infection: more and more viruses,worms and trojans infect computer via USB drives, once an infected USB drives is plugged into computer,the virus in it will spread through the whole system.
Most of major antivirus products such as Kaspersky,Norton can't detect or remove this new type of virus.

0day.car.net.pk
USBScan.jpg (43 KB) USBProcess.jpg (69 KB) USBTools.jpg (76 KB) USBImmunity.jpg (53 KB) USBFix.jpg (63 KB) USBSettings.jpg (56 KB)

USB Drive Antivirus provides fully USB security solutions , it not only allows you to prevent data leak from usb port, but also provides 100% protection against any malicious programs trying to attack via USB storage.

Today, you need two antiviruses to protect your computer completely:
one is common antivirus, the other one is USB Drive Antivirus which can make up the shortage of common antivirus when using USB storage devices

Product Highlights

Prevent data leakage via USB removable devices
You can set the USB port status to Read only or Readable/Writable on the machine, also you can disable usage of any usb storage devices to prevent data leaks across USB flash drives. more information

100% protection against any virus via USB drives
USB Drive Antivirus uses innovative technology to block any threats via USB drive,any USB drives inserted into computer, USB Drive Antivirus will automatically scan it and remove threats. The majority of anti virus software are unable even to guarantee 50% protection.

Remove USB virus in your infected system
USB Drive Antivirus also has the ability to detect and remove usb/autorun virus in your computer. What you need to do is clicking the scan button,and waiting for virus scan to complete.

The best solution to protect offline computer
Other antivirus software should update signature database regularly, and they can not effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. USB Drive Antivirus uses advanced detection techniques, it doesn't mainly rely on virus signature, so it can protect offline computer from usb virus effectively without updating frequently.

The world's fastest and smallest antivirus software
With USB Drive Antivirus, it’s not necessary to sacrifice speed for detection and scanning. Compare with other antivirus software and you'll discover that USB Drive Antivirus installer is just 1 MB. The program utilizes approximately 6 to 8 MB of RAM.

100% compatible with other antivirus
Incompatibility between antivirus programs is an issue. In the vast majority of cases, installing two antivirus programs from different vendors on one machine (for increased protection) is technically impossible. However, USB Drive Antivirus is 100% compatible with all other security products in fully testing, including Norton,Nod32,Bitdefender,Kaspersky,etc.

Easy to use
USB Drive Antivirus has been specifically designed to perform effectively regardless of the user’s level of computer expertise.
Just install and forget it.

Pay once and get it all
Other antivirus products should be paid for updates every year. The USB Drive Antivirus keys are lifetime. You receive all future program updates free of charge. 

Support all kinds of USB removable media
  • Pen Drives
  • iPods and iPhones
  • USB Flash cards
  • USB MP3 players
  • USB Audio players
  • External hard drives
  • Pocket PCs
  • Mobile phones
  • Other USB mass storage enabled devices

more info @
http://www.usbantivirus.net
download link

Monday, April 6, 2009

Microsoft Windows 7 Build 7068 x86

 


Microsoft Windows 7 Build 7068 (x86)

Product keys (same as build 7000 and all other previous builds):

TQ32R-WFBDM-GFHD2-QGVMH-3P9GC
6JKV2-QPB8H-RQ893-FW7TM-PBJ73
QXV7B-K78W2-QGPR6-9FWH9-KGMM7
4HJRK-X6Q28-HWRFY-WDYHJ-K8HDH
GG4MQ-MGK72-HVXFW-KHCRF-KW6KY

Note: These keys will only work if you install the "Ultimate" edition!


How to use:
Burn and mount, boot from it (if you're not yet on Win 7).
If you're already using Win 7, extract the .iso contents
and run setup.exe to upgrade your installation (and grab
a pot of coffee, it will take some hours).
It's not possible to upgrade from x86 to x64 or vice versa!

Download:
CODE
Windows_7_Build_7068.part01.rar
Windows_7_Build_7068.part02.rar
Windows_7_Build_7068.part03.rar
Windows_7_Build_7068.part04.rar
Windows_7_Build_7068.part05.rar
Windows_7_Build_7068.part06.rar
Windows_7_Build_7068.part07.rar
Windows_7_Build_7068.part08.rar
Windows_7_Build_7068.part09.rar
Windows_7_Build_7068.part10.rar
Windows_7_Build_7068.part11.rar
Windows_7_Build_7068.part12.rar
Windows_7_Build_7068.part13.rar
Windows_7_Build_7068.part14.rar


Mirror:
CODE
ind-win7-7086-x86.rar
ind-win7-7086-x86.r00
ind-win7-7086-x86.r01
ind-win7-7086-x86.r02
ind-win7-7086-x86.r03
ind-win7-7086-x86.r04
ind-win7-7086-x86.r05
ind-win7-7086-x86.r06
ind-win7-7086-x86.r07
ind-win7-7086-x86.r08
ind-win7-7086-x86.r09
ind-win7-7086-x86.r10
ind-win7-7086-x86.r11
ind-win7-7086-x86.r12
ind-win7-7086-x86.r13
ind-win7-7086-x86.r14
ind-win7-7086-x86.r15
ind-win7-7086-x86.r16
ind-win7-7086-x86.r17
ind-win7-7086-x86.r18
ind-win7-7086-x86.r19
ind-win7-7086-x86.r20
ind-win7-7086-x86.r21
ind-win7-7086-x86.r22
ind-win7-7086-x86.r23
ind-win7-7086-x86.r24
ind-win7-7086-x86.r25
ind-win7-7086-x86.r26
ind-win7-7086-x86.r27
ind-win7-7086-x86.r28
ind-win7-7086-x86.r29
ind-win7-7086-x86.r30
ind-win7-7086-x86.r31
ind-win7-7086-x86.r32
ind-win7-7086-x86.r33
ind-win7-7086-x86.r34
ind-win7-7086-x86.r35
ind-win7-7086-x86.r36
ind-win7-7086-x86.r37
ind-win7-7086-x86.r38
ind-win7-7086-x86.r39
ind-win7-7086-x86.r40
ind-win7-7086-x86.r41
ind-win7-7086-x86.r42
ind-win7-7086-x86.r43
ind-win7-7086-x86.r44
ind-win7-7086-x86.r45
ind-win7-7086-x86.r46
ind-win7-7086-x86.r47
ind-win7-7086-x86.r48
ind-win7-7086-x86.r49
ind-win7-7086-x86.r50
ind-win7-7086-x86.r51
ind-win7-7086-x86.r52
ind-win7-7086-x86.r53
ind-win7-7086-x86.sfv


 
 

Sunday, April 5, 2009

Autodesk Maya 2009 Unlimited Mac OS X

Autodesk Maya 2009 Unlimited Mac OS X

 



Autodesk Maya 2009 Unlimited Mac OS X
The award-winning Autodesk® Maya® software is a powerful, integrated 3D modeling, animation, visual effects, and rendering solution. Because Maya is based on an open architecture, all your work can be scripted or programmed using a well-documented and comprehensive API (application programming interface) or one of two embedded scripting languages, the Maya Embedded Language (MEL) or Python®. This level of openness, combined with an industry-leading suite of 3D visual effects, computer graphics, and character animation tools, enables you to realize your creative vision for your film, television, game development, and design projects.


Download
CODE

AM09U_highdefw.part1.rar
AM09U_highdefw.part2.rar
AM09U_highdefw.part3.rar
AM09U_highdefw.part4.rar
AM09U_highdefw.part5.rar


CRACK (ONLY)
CODE

AM09K_highdefw.zip

Mozilla Firefox 3.0.8 FOR MAC



 





The Web is all about innovation, and this web browser sets the pace with dozens of new features, including the smart location bar, one-click bookmarking and blindingly fast performance. Firefox has security, speed and new features that will change the way you use the Web. Dont settle for anything less.

Whats New in this Version
- Fixed two security issues.


System Requirements

* Mac OS X 10.4 or later
* 256MB of RAM or higher recommended
* 200MB hard disk space


CODE

Firefox_203.0.8.dmg

Adobe Flash Player 10.0.22.87 FOR MAC

Adobe Flash Player 10.0.22.87 FOR MAC

 
The standard for delivering high-impact, rich web content. Designs, animation and application user interfaces are deployed immediately across all browsers and platforms, attracting and engaging users with a rich web experience.
Adobe Flash Player
System Requirements

* Mac OS X 10.1 or later
* 500MHz PowerPC G3 processor or higher
* Firefox, Safari, and Opera

CODE

install_flash_player_osx_ub.dmg.zip

Adobe Reader 9.1 FOR MAC



 


Adobe Reader 9.1 FOR MAC / RAPIDSHARE LINK
POST BY AUTHOR FAISALABG



Adobe Reader is free software that lets you view and print Adobe Portable Document Format (PDF) files on a variety of hardware and operating system platforms. This new version of the familiar Adobe Acrobat Reader provides a host of rich features that enable you to:

* Submit Adobe PDF forms that are created with fillable form fields in such applications as Adobe Acrobat Professional and Adobe Form Designer
* Play back a variety of embedded multimedia content, such as QuickTime and MP3 files
* Read and organize high-fidelity eBooks
* Activate search and accessibility capabilities built into your PDF files
* Display Adobe Photoshop? Album slide shows and electronic cards and export images for online photo processing (online photo services vary regionally)

What's new in this version:
Addresses a number of customer workflow issues and a critical security vulnerability while providing more stability.

System requirements

" PowerPC® G4 or G5 or Intel® processor
" Mac OS X v10.4.1110.5.6
" 128MB of RAM (256MB recommended)
" 405MB of available hard-disk space
" Safari 2.0.4 or later

CODE

AdbeRdr910_en_US_i386.pkg.zip

Netscape Navigator 9.0.0.6 FOR MAC



 


Netscape Navigator 9.0.0.6 is a browser-only release. It does not contain an e-mail client, newsgroup reader, or HTML composer. Users of the Netscape 7.x suite may choose not to install Netscape Navigator 9 to avoid the loss of these features. You can have the best of both worlds by keeping Netscape 7.x installed for mail and news and installing Navigator 9 for browsing the Web.

What's new in this version:

* Security fixes included in Mozilla Firefox 2.0.0.12 have been included in Netscape Navigator 9.0.0.6.
* An add-on has been included in this version to help users migrate to either Flock or Firefox
* The WeatherBug add-on has been removed from this version of Navigator.

Operating System Requirements:

This product is designed to run on the following operating systems:

* Mac OS X 10.5 Intel
* Mac OS X 10.5 PPC
* Mac OS X 10.4 Intel
* Mac OS X 10.4 PPC
* Mac OS X 10.3.9
* Mac OS X 10.3
* Mac OS X 10.2

Additional Requirements:

* Mac OS X 10.4 PPC
* Mac OS X 10.3.9
* Mac OS X 10.4 Intel
* Mac OS X 10.0
* Mac OS X 10.1
* Mac OS X 10.5 PPC
* Mac OS X 10.2
* Mac OS X 10.5 Intel
* Mac OS X 10.3

* Mac OS Classic

MacOSX 10.5.6

MacOSX 10.5.6
 


iPC MacOSX 10.5.6 for ordinary PC
Release Notes
Please make sure to read these notes very carefully!
We cannot be held responsible if you do not read the requirements.

MacOSX 10.5.6

iPC MacOSX 10.5.6 for ordinary PC
Release Notes
Please make sure to read these notes very carefully!
We cannot be held responsible if you do not read the requirements.

1. Choose only what your system has and nothing else
2. DO NOT select more than one driver of the same type!!
For example, do not select 2 SMBIOS kexts and do not select 2 AppleHDA audio drivers, etc.
This will in many cases cause the install to fail
3. If you kernel panic on startup then try doing a bare install with only the essentials (no extra drivers)
4. If you get a kernel panic screen and want to see what caused it, please boot in verbose mode (-v boot flag at the F8 boot prompt)
5. Default bootloader installed is PC_EFI v9, other bootloaders are available under "Alternate Bootloaders"
6. Default kernel installed is 9.6.0 Vanilla kernel
7. IF YOU ARE NOT INSTALLING VANILLA, PLEASE REMEMBER TO PICK A CHIPSET DRIVER TO AVOID GETTING "STILL WAITING FOR ROOT DEVICE"
8. If you are nForce owners, need to pick one of the nForce chipset drivers, recommend trying the "AppleNForceATA Test" first!
9. IF YOU INSTALL VOODOO 9.5.0 KERNEL YOU MUST INSTALL 9.5.0 (10.5.5) SEATBELT.KEXT
10. If you are on an AMD or SSE2 System you MUST choose the Voodoo 9.5.0 kernel under Kernels.
11. Voodoo kernel has a built in opt-code patcher so no binary patching is required
12. On the first boot make sure to boot with the -f boot flag!
Do this to make sure that all installed kexts are loaded properly. It is only required once.
13. If you installed the Chameleon with Boot Image support bootloader, and you want to activate the iPC OSx86 boot image,
then boot your system and run the following command in Terminal:
Code:

sudo /BootPicture/SetupBootPicture 1024 768

14. If your system's sound does not work even after installing the proper sound drivers there may be an issue with the System Preferences.
Go to System Preferences >> Sound >> Output >> and make sure that "Internal Speakers" is chosen and not Headphones or something else.
15. If you are using an NVIDIA video card older than the 6xxx series (e.g. FX5500),
you may not be able to boot with an injector installed (-v will show the boot process hang after the injector probes the card).
You will then need to install the "NVkush Complete Package" to get video working, this contains working kexts for these cards from 10.5.5.
Even then, though, there may be graphics glitches (issues with older cards).
16. DO NOT install the iPC OSx86 Base System over an existing Base System!
This may cause the install to fail while installing boot.efi. Its always best to do a fresh install.


Download code:

iPC_10_5_6_PPF4_Final.part01.rar
iPC_10_5_6_PPF4_Final.part02.rar
iPC_10_5_6_PPF4_Final.part03.rar
iPC_10_5_6_PPF4_Final.part04.rar
iPC_10_5_6_PPF4_Final.part05.rar
iPC_10_5_6_PPF4_Final.part06.rar
iPC_10_5_6_PPF4_Final.part07.rar
iPC_10_5_6_PPF4_Final.part08.rar
iPC_10_5_6_PPF4_Final.part09.rar
iPC_10_5_6_PPF4_Final.part10.rar
iPC_10_5_6_PPF4_Final.part11.rar
iPC_10_5_6_PPF4_Final.part12.rar
iPC_10_5_6_PPF4_Final.part13.rar
iPC_10_5_6_PPF4_Final.part14.rar
iPC_10_5_6_PPF4_Final.part15.rar
iPC_10_5_6_PPF4_Final.part16.rar
iPC_10_5_6_PPF4_Final.part17.rar
iPC_10_5_6_PPF4_Final.part18.rar
iPC_10_5_6_PPF4_Final.part19.rar
iPC_10_5_6_PPF4_Final.part20.rar
iPC_10_5_6_PPF4_Final.part21.rar
iPC_10_5_6_PPF4_Final.part22.rar
iPC_10_5_6_PPF4_Final.part23.rar
iPC_10_5_6_PPF4_Final.part24.rar
iPC_10_5_6_PPF4_Final.part25.rar
iPC_10_5_6_PPF4_Final.part26.rar
iPC_10_5_6_PPF4_Final.part27.rar
iPC_10_5_6_PPF4_Final.part28.rar
iPC_10_5_6_PPF4_Final.part29.rar
iPC_10_5_6_PPF4_Final.part30.rar
iPC_10_5_6_PPF4_Final.part31.rar
iPC_10_5_6_PPF4_Final.part32.rar
iPC_10_5_6_PPF4_Final.part33.rar
iPC_10_5_6_PPF4_Final.part34.rar
iPC_10_5_6_PPF4_Final.part35.rar
iPC_10_5_6_PPF4_Final.part36.rar
iPC_10_5_6_PPF4_Final.part37.rar
iPC_10_5_6_PPF4_Final.part38.rar
iPC_10_5_6_PPF4_Final.part39.rar
iPC_10_5_6_PPF4_Final.part40.rar
iPC_10_5_6_PPF4_Final.part41.rar
iPC_10_5_6_PPF4_Final.part42.rar
iPC_10_5_6_PPF4_Final.part43.rar
iPC_10_5_6_PPF4_Final.part44.rar
iPC_10_5_6_PPF4_Final.part45.rar
iPC_10_5_6_PPF4_Final.part45.rar
iPC_10_5_6_PPF4_Final.part46.rar

feedjit