Friday, June 5, 2009

War of boot fix

C++ Error // Jammer v.2 update

















heres an update with what we discussed in the thread about (programming related)combining all the pakets in that thread so this is it plusa few more

just rememebr to change the pkt delay for packets i have set it pretyt low








download now

download now

Labels:

Thursday, June 4, 2009

Room Destroy 8.4.0
















- Bugs fixed (Number of logged bot, number of bot in room, ID leaves the room when using Arial font, can not remove user from ignore list etc...)
- Add C++ Error boot option
- Allow to load http server from file and using random sever
- Remove .manifest file creation, manifest file is now inside the .exe file itself







download now

download now

Labels: ,

Y!Supra V 1.0.0.45
















* Imrpoved: YMSG version 102
* Fixed: Sometimes wallpaper color and image settings wouldn't enabled properly







download now

download now

Labels:

Wednesday, June 3, 2009

C++ Error // Jammer

















Pretty simple uses ymsgdc login by dazz still worksa good and fast

This needs Pm's to be open on messy 8 or 9 ive only tried 9 but im sure the error script will handle 8 as well
load 100+ names i used 100 names and it hammers pretty good lol 200-300 would smash hell out of messy but why bother






download now

download now

Labels:

Tuesday, June 2, 2009

Yahaven 2.7.1 update 03/6/2009
















*Whats New?*

- Audio alert options added for boot detected, automatic shield and cloak.
- Bandwidth monitor moved next to antiboot in options.
- Chatters ignore list menu option to remove users with ears added.
- Chatters ignore list menu option to remove males added.
- Eight second delay added on winamp status.
- Ghost icon not changing colour fixed.
- Increasing increment delay added to cloak reconnecting.
- Old profile viewer added.
- Option to auto ignore anyone with a cam on thats not male added.
- Option to show/hide antiboot packet count meter.
- Option to remove voice users from ignore when connecting voice added.
- Option to use server tester once per session added.
- Regular expressions have been added to chat text filters and wildcards.
- Regular expressions tester added.
- Smileys now animate when hovering over picture in smiley pallet.
- Smileys now update on pallet to match current smiley set.
- Some more icons cleaned up.
- Tattoo's moved to fonts and colours option panel.
- Transformer emoticon added.
- Voice icons not being removed from ignore list when switching voice off fixed.







download now

download now

Labels:

Hacking Firefox: More Than 150 Hacks





















They dreamed of a better browser . . . and before you could say “”explore no more,”" Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you’ve always dreamed of creating.

Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control. Step-by-step instructions for these hacks and dozens more Settings, content, and extension hacks

Hacking the interface and themes Performance boosters Anti-phishing and security hacks Toolbar and status bar tweaks Navigation, download, and search hacks Hacks for common plugins Extension and theme creation.






download now

Labels:

Practical Network Design Techniques





















The authors of Practical Network Design Techniques, Second Edition: A Complete Guide for WANs and LANs build upon the popular first edition by combining pre-existing network design fundamentals with new material on LAN devices and topologies, wireless local networks, and LAN internetworking issues.

This new edition has two parts. The first part focuses on wide area networks; the second, which is entirely new, focuses on local area networks. Because Ethernet emerged victorious in theLAN war, the second section pays particular attention to Ethernet design and performance characteristics. The volume retains much valuable information from the first edition, and integrates and prominently highlights WAN information that is alsorelevant to the LAN design process. To maximize the book’s utility, the authors include a number of practical networking problems and their solutions, along with examples of methods needed to perform economic comparisons among differing communications services and hardware configurations. The second edition provides a thorough understanding of major network design problems and is an invaluable reference for data communications professionals.






download now

download now

Labels:

Wireless Engineering Body of Knowledge
















Responding to requests from industry for a program to ensure consistency and excellence among wireless technical professionals, the IEEE Communications Society (ComSoc) created its Wireless Communication Engineering Technologies (WCET) Certification. Beginning in September 2008, ComSoc is holding the WCET testing twice a year at locations worldwide. The WEBOK is organized according to the areas of expertise in the WCET Delineation, namely RF Engineering; Propagation & Antennas; Wireless Access Technologies; Network & Service Architecture; Network Management & Security; Facilities Infrastructure; Agreements, Standards, Policies & Regulations; and Fundamental Knowledge. Included in the WEBOK is a large list of additional publications and documents that candidates should review to become completely prepared for the WCET exam. The book is also a valuable reference for any wireless professional.






download now

password:
www.warezwitch.com

Labels:

Adobe Indesign CS4





















Adobe® InDesign® CS4 software breaks down the barriers between online and offline publishing. Create compelling print layouts, immersive content for playback in the Adobe Flash® Player runtime, and interactive PDF documents.
Did you know...
InDesign is part of the InDesign family

InDesign provides a versatile foundation for dynamic publishing workflows, both now and in the future.
Learn more about the InDesign family
Creating digital documents is a snap

See how the strengths of InDesign CS4 and Adobe Flash CS4 Professional together deliver an engaging SWF file complete with animation, interactivity, video, and sound.
View the interactive magazine excerpt play button
Publishing long documents has never been easier

Create high-impact, personalized content and long documents tailored for unique audiences using logical, condensed steps and advanced features.







part1
part2
part3
part4
part5
part6

password:
Messiah_07
Keygen + Crack:
download

Labels:

Avg Internet Security 8.5.339



















viruses, trojans, malware and so on.

Description:

AVG Internet Security gives you maximum protection with real-time scanning, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is analyzed to ensure nothing can get onto your system without your knowledge. AVG Internet Security gives you maximum protection with real-time scanning, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is analyzed to ensure nothing can get onto your system without your knowledge.







download now

Password:
jamester

Labels:

Sunday, May 31, 2009

Password Door 8.4.2


















Password Door can add the password protection feature to any program on your computer. It will not modify the original programs, so it will never destroy the programs and you will never lose data.

There are a lot of fine software installed on your computer, you know them well: MS-Office, WinZip, Windows Media Player, Real One Player, AcdSee, Outlook Express. Most of them have no password protection, so anyone who shares your workstation can launch one of these applications and use it to browse or modify your data that was created by it. You don't want to have to learn to use new software that have the password protection feature, but you do want the password protection feature for your existing software. Now you can use Password Door to add password protection to any software. When software is protected by Password Door, anyone who wants to use that software must enter the correct password in order to launch it.

Password protects any program on your computer.

It is very easy to protect a program: Password Door will automatically detect all the installed programs on your computer and list them on the main window, you only need to double-click at any item in the "Installed Programs" list box, then specify a password for it, the program then will be protected.

Password protects programs anywhere.

If you protected a program, then all the instances of the program will be totally protected, if you moved the program to another location, or renamed the program, or installed a new instance of the program, the protection will be still applied.
If you uninstalled a protected program, the protection will be kept, once you re-installed the program again, the protection then will be automatically enabled again.


Advanced features allow you protect almost 100% programs.

You can simply use the drag and drop feature to protect any program. You click at the "Target" icon in the main window of Password Door, and hold down the left mouse button, then move to any existed window, release left mouse button. Then the program who owned the window will be automatically captured and protected. Password Door also supports to protect programs with the "ClassName" and "Window Title" attributes.

Password Door will not modify any program.

Password Door doesn't use the encryption mode to protect a program, it will not modify the protected programs, or any file of the programs. So it will never cause the programs to be destroyed and you will never lose any data.

Protects Password Door itself.

You can specify the admin password to protect the Password Door itself. Anyone who want to launch the Password Door must enter the correct password. The password also will protect the uninstaller, you must provide the correct password in order to uninstall the software.

Supports schedule options.

Password Door supports schedule options. For example: protect a program from 8:00 to 17:00 every day. The schedule option supports to protect programs daily, weekly and monthly.

Size : 1.3 MB





download now

Labels:

Google Earth Gold v6.0.2900.5512
















Google Earth combines satellite imagery, maps and the power of Google Search to put the worlds geographic information at your fingertips.
Fly from space to your neighborhood.
Type in an address and zoom right in.
Search for schools, parks, restaurants, and hotels. Get driving directions.
Tilt and rotate the view to see 3D terrain and buildings.
Save and share your searches and favorites.
Even add your own annotations.






download now

Labels:

Norton Antivirus 2009 Gaming Edition 16.5.0.135














Norton AntiVirus 2009 Gaming Edition download description

Winning Protection that won’t slow you down

The Norton AntiVirus 2009 Gaming Edition application was designed to be the fastest virus protection you can get. It stops spyware, worms, bots, and other threats cold—without slowing down your PC. When you’re gaming, your protection should get out of the way. Norton AntiVirus 2009 Gaming Edition does exactly that.

Gamer Mode
No alerts + no notifications = no interruptions
Optional settings to temporarily suspend updates, behavioral scanning and intrusion prevention
Enabled automatically when your PC is in full screen mode
Activate manually with a quick click on the Norton system tray icon

Lightning Fast
Rapid Pulse Updates every 5 to 15 minutes
Installs in less than a minute
Adds less than 1 second to boot time

Light as a Feather
Uses less than 6MB memory even without the Gamer Mode performance boost
Needs less than 50MB hard disk space on installation
Runs only 2 processes at a time
Performance graphs display CPU and memory usage and how little Norton is using

Respects your needs
Smart Scheduler holds resource intensive actions for when you are not using your PC
Resource usage table shows you the what, when and how long for background actions taken by Norton AntiVirus
Delivers consistently strong protection - that’s why Norton AntiVirus has won more consecutive Virus Bulletin 100 awards than any other AV software







download now


Labels: