<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6869570400842091447</atom:id><lastBuildDate>Thu, 24 Oct 2024 08:28:15 +0000</lastBuildDate><title>Ebooks</title><description></description><link>http://hackerevollution-ebooks.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>9</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6869570400842091447.post-4491819657483474586</guid><pubDate>Thu, 04 Jun 2009 14:23:00 +0000</pubDate><atom:updated>2009-06-04T07:26:21.021-07:00</atom:updated><title>Hacks e Mods do Windows XP para iniciantes</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtBuLFAL2lwuBRJK06sf7BMEwCIoFylW_VtMJWbja1gibisf1ZNAjx-IDcGZ8lTM0xm5ytwk8AYTs0r49uYHttcp4Xyg6D_dlodM2i8w0dnslRQUlY_BLZ2f5L6jXmDbQW0xUYzrgbRA/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 249px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtBuLFAL2lwuBRJK06sf7BMEwCIoFylW_VtMJWbja1gibisf1ZNAjx-IDcGZ8lTM0xm5ytwk8AYTs0r49uYHttcp4Xyg6D_dlodM2i8w0dnslRQUlY_BLZ2f5L6jXmDbQW0xUYzrgbRA/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5343478472867752082&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;O livro esmiuça todas as alternativas e opções de customização do windows.São opções de alteração no registro, indicações e tutoriais de várias ferramentas de manutenção, dicas de performance e muito mais.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;SERVIDOR: MEGAUPLOAD -&lt;br /&gt; TAMANHO: 15 MB&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.megaupload.com/?d=T4W38Q4L&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 100px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRCw7s6MMKMx1TN_U1WbsuATXbnNXg41oUqer43VckwaW0ocslIlqNT_wo9Aj7q_ysfXAeG8sqq9j1RxV_xH6P2cd_9pAJfBdLKfKmcF4PQoX_EHz8iajthkkKxWxm4SP3PR1XDWhtUw/s320/icone+do+site.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5343478471763176242&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://hackerevollution-ebooks.blogspot.com/2009/06/hacks-e-mods-do-windows-xp-para.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtBuLFAL2lwuBRJK06sf7BMEwCIoFylW_VtMJWbja1gibisf1ZNAjx-IDcGZ8lTM0xm5ytwk8AYTs0r49uYHttcp4Xyg6D_dlodM2i8w0dnslRQUlY_BLZ2f5L6jXmDbQW0xUYzrgbRA/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6869570400842091447.post-1242877965108702291</guid><pubDate>Tue, 26 May 2009 00:35:00 +0000</pubDate><atom:updated>2009-05-25T17:38:48.861-07:00</atom:updated><title>Universidade Hacker - Edição 4</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEJCMZCfs0ZXEUjeuuVGqJtcKDoJB9Epnu0Yjg3rtxVuXrTSlFjmn0d5cFuTwjnzO2c_o9CExC-YAKvqiryscGpc-2niSKxHBcKthZe2JzcyhzEHSeG7nFMjSt7fIx0z8bQD7j5yDvZQ/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 275px; height: 378px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEJCMZCfs0ZXEUjeuuVGqJtcKDoJB9Epnu0Yjg3rtxVuXrTSlFjmn0d5cFuTwjnzO2c_o9CExC-YAKvqiryscGpc-2niSKxHBcKthZe2JzcyhzEHSeG7nFMjSt7fIx0z8bQD7j5yDvZQ/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5339925112275116882&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(51, 51, 255);&quot;&gt;Descrição do Download&lt;/span&gt;:&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;p style=&quot;text-align: center; font-weight: bold;&quot;&gt;Desvende todos os segredos do submundo dos hackers!&lt;/p&gt;&lt;div style=&quot;text-align: center; font-weight: bold;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: center; font-weight: bold;&quot;&gt;- Aprenda as mais modernas técnicas de invasão e defesa&lt;br /&gt;- Conheça os assuntos que um hacker deve dominar&lt;br /&gt;- Saiba tudo que é necessário para se proteger&lt;/p&gt;&lt;div style=&quot;text-align: center; font-weight: bold;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: center; font-weight: bold;&quot;&gt;Grade curricular completa do curso, com as disciplinas:&lt;/p&gt;&lt;div style=&quot;text-align: center; font-weight: bold;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: center; font-weight: bold;&quot;&gt;- Vulnerabilidades;&lt;br /&gt;- Programação;&lt;br /&gt;- Psicologia Hacker;&lt;br /&gt;- Redes;&lt;br /&gt;- Sistemas Operacionais;&lt;br /&gt;- Fundamentos Jurídicos;&lt;br /&gt;- Engenharia Social;&lt;br /&gt;- Plataformas Microsoft, Unix e Apple;&lt;br /&gt;- Laboratório de Redes;&lt;br /&gt;- Hardware;&lt;br /&gt;- Kernel Avançado;&lt;br /&gt;- Ataque, Defesa e Contra-ataque.&lt;/p&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Tamanho: 121 Mb&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Número de Páginas: 318 Páginas&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Formato: PDF&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Idioma: Português&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;&lt;a href=&quot;http://rapidshare.com/files/78039691/Universidade.Hacker.By.thiagoluga_www.therebels.com.br.part1.rar&quot;&gt;Parte 1&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://rapidshare.com/files/78045438/Universidade.Hacker.By.thiagoluga_www.therebels.com.br.part2.rar&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Parte 2&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://hackerevollution-ebooks.blogspot.com/2009/05/universidade-hacker-edicao-4.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEJCMZCfs0ZXEUjeuuVGqJtcKDoJB9Epnu0Yjg3rtxVuXrTSlFjmn0d5cFuTwjnzO2c_o9CExC-YAKvqiryscGpc-2niSKxHBcKthZe2JzcyhzEHSeG7nFMjSt7fIx0z8bQD7j5yDvZQ/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6869570400842091447.post-3139437212486691303</guid><pubDate>Wed, 20 May 2009 00:43:00 +0000</pubDate><atom:updated>2009-05-19T17:45:03.695-07:00</atom:updated><title>Hacker Inside Volume 2</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFSZWvyxiVELc_A5TS5xpZgP1WAqfb2FGzGqHRS09gpUacfEXMuYH4BDEZR24Tgh7TnCTKz3oUvJWsQtJsKs_GbkPgIune2gytIudy_AZ3IWRCum7wCwp_nsY24exUWWl6FdWpVAIvbQ/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 244px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFSZWvyxiVELc_A5TS5xpZgP1WAqfb2FGzGqHRS09gpUacfEXMuYH4BDEZR24Tgh7TnCTKz3oUvJWsQtJsKs_GbkPgIune2gytIudy_AZ3IWRCum7wCwp_nsY24exUWWl6FdWpVAIvbQ/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337700647611446194&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Excelente !&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.megaupload.com/?d=TJCZ3V92&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 100px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHO6dUG5H6Few3XVH9KlHIBtbSJUgQOBwis1i9Avco-DDoY9hQc44sJvDiPRAvP5CQXHhFWHv4W9aJLXn7uIFBECK2G8_fUocBBU-cbXdQ3DdfeXTRHubTqInGxJD_Yk5Z8aHXgIrJSw/s320/icone.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337700639166167938&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://hackerevollution-ebooks.blogspot.com/2009/05/hacker-inside-volume-2.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFSZWvyxiVELc_A5TS5xpZgP1WAqfb2FGzGqHRS09gpUacfEXMuYH4BDEZR24Tgh7TnCTKz3oUvJWsQtJsKs_GbkPgIune2gytIudy_AZ3IWRCum7wCwp_nsY24exUWWl6FdWpVAIvbQ/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6869570400842091447.post-5929868689975490320</guid><pubDate>Tue, 19 May 2009 17:58:00 +0000</pubDate><atom:updated>2009-05-19T10:59:32.275-07:00</atom:updated><title>Curso de Hacker Completo</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpSBDvbqt-QwgBI0dmjdHsL-HG7gKayyQBXHJRF9iezwxYJojz0hDTZnhIlVH9OapzEHf1M-tjhwf3THQSDWKzqbLWWf8XdSnos_c9b9JoTfMhjBc61HNP1tyKICmIkJafTmwGnIEILQ/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 250px; height: 250px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpSBDvbqt-QwgBI0dmjdHsL-HG7gKayyQBXHJRF9iezwxYJojz0hDTZnhIlVH9OapzEHf1M-tjhwf3THQSDWKzqbLWWf8XdSnos_c9b9JoTfMhjBc61HNP1tyKICmIkJafTmwGnIEILQ/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337596101105583874&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;É o maior acervo de material do gênero. Com aulas ministradas por um professor da area!! O pacote conta com video-aulas, e-books, tutoriais, realmente completo!!! Vale conferir!!! &lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;Use por sua conta e risco!!!!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Tamanho: 14 mb&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Hospedagem: Easy-share&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0); font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://w14.easy-share.com/1701122587.html&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 100px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdeajcCi97x4dbGc1j7yRiolr8Mw3JqjY7neqEnD0v-LmzFvMx1XOCaQ-JcK6aDeAZRO_ARF_RunoEh16FElKe9hMBgdsAY9xVR_cCGLNZ0wWZKCvdhI4ySPGteMKzHhIoAOHcULP7Fw/s320/icone.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337596095636134946&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://hackerevollution-ebooks.blogspot.com/2009/05/curso-de-hacker-completo.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpSBDvbqt-QwgBI0dmjdHsL-HG7gKayyQBXHJRF9iezwxYJojz0hDTZnhIlVH9OapzEHf1M-tjhwf3THQSDWKzqbLWWf8XdSnos_c9b9JoTfMhjBc61HNP1tyKICmIkJafTmwGnIEILQ/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6869570400842091447.post-4867628585460972698</guid><pubDate>Tue, 19 May 2009 17:55:00 +0000</pubDate><atom:updated>2009-05-19T12:06:09.533-07:00</atom:updated><title>Hackers Segredos e confissões</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMFi7tIzXpWSlyIemw8ROLsj92uZvoPGJWftm9hNC5XuZmVyFlKolMzpfB9OB4A0OeyQTjaHv4dCnUBvWWW8XbIPN7xtM6oXSIe9Ehk_n94xXK8yZFjZXKiNUIuT4TkFXG6lHPypDyJA/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 264px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMFi7tIzXpWSlyIemw8ROLsj92uZvoPGJWftm9hNC5XuZmVyFlKolMzpfB9OB4A0OeyQTjaHv4dCnUBvWWW8XbIPN7xtM6oXSIe9Ehk_n94xXK8yZFjZXKiNUIuT4TkFXG6lHPypDyJA/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337613341504422546&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt;Descrição: Esta obra apresenta de uma forma bem ampla assuntos relacionados a sistemas de segurança da informação em geral. A maioria dos conteudos foram retirados de sites parar fins de estudo, não sendo alterado as informações,e suas respectivas originalidades, e nem mesmo seus autores. Todo conteudo desse E-book é somente para estudo próprio, não me responsabilizo pelo mal uso das informações aqui contidas.sÃ£o Geral:&lt;/span&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0); font-weight: bold;&quot;&gt; O E-book trata- se assuntos técnicos relacionados a: Criptografia, Segurança da Informação,Invasão, Falhas em Sistemas, ví­rus, trojans, exploits, proteção em geral, informática em geral, antiví­rus, Firewall, Hacking e dentre muitos outros tópicos.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;Tamanho&lt;/span&gt;: 6,70 mb&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;Hospedagem: Rapid-share&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://rapidshare.com/files/80729704/HackersSecretsAndConfessions_baixarbr.zip.html&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 100px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9Vld2FbaDW4Sy5zIz6pv63ZwGwzLHRgkkNha-bd6C0V6vxcdpL5EjP0VVInvNA3e64BMjagucEAvMU6gC8uJNpiVAKfJg42KFptmX6uDxn9KMPRu8UngeV7QN5Ag9LjUkmzUmGDnfzw/s320/icone.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337595463036011458&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://hackerevollution-ebooks.blogspot.com/2009/05/hackers-segredos-e-confissoes.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMFi7tIzXpWSlyIemw8ROLsj92uZvoPGJWftm9hNC5XuZmVyFlKolMzpfB9OB4A0OeyQTjaHv4dCnUBvWWW8XbIPN7xtM6oXSIe9Ehk_n94xXK8yZFjZXKiNUIuT4TkFXG6lHPypDyJA/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6869570400842091447.post-2048059486168417956</guid><pubDate>Tue, 19 May 2009 17:54:00 +0000</pubDate><atom:updated>2009-05-19T10:55:35.793-07:00</atom:updated><title>Pacote de Eboock Hacker 2007</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA4nidaFl2OtbosVgAD99dWOAqH_n6eKEMPMyrZu4rsTCpoSy2gIvh0XCfLrYob1Qg2499hjtF8YRdbtbYLb9pyd8UrRG1an7MsUtbQDeqRfWRpofAhORKoKRXEGnDLRdvCVj9ez_5gw/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 231px; height: 226px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA4nidaFl2OtbosVgAD99dWOAqH_n6eKEMPMyrZu4rsTCpoSy2gIvh0XCfLrYob1Qg2499hjtF8YRdbtbYLb9pyd8UrRG1an7MsUtbQDeqRfWRpofAhORKoKRXEGnDLRdvCVj9ez_5gw/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337595076274606930&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;No pacote Acompanha&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;* Hackerismo: 16 Arquivos em Doc&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Livro - O Guia do Hacker Brasileiro - Marcos Flávio Araújo Assunção&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Revista Hacker Brasil&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Segurança na Internet&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Universidade Hacker - 12 Arquivos PDF&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Gerador de CPF e CNPJ Válidos&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Guia do Hacker Brasileiro&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Guia do Hacker Brasileiro Critica&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Desativando Auxiliar NetBIOS TCP/IP&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Anti Trojan com Manual&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Como roubar senha de Hotmail&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Linux Dicas &amp;amp; Truques&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Apostila Básica De Linux (Pt Br)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Guia Prático para o Debian GNU Linux (pt BR)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; * Referência de comandos - Linux (pt_BR)&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt; *Páginas: 11 arquivos (várias pastas com documentos)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;Tamanho&lt;/span&gt;: 12,1 mb&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;Hospedagem: Rapid-share&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://rapidshare.com/files/80952565/Pack.Hacker.rar&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 100px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoTuBdfYxDAIy5JTp1SiJ_tkdF5S1vmm2L5fc9YrQ7H4Z55N1UNeKryATkaXfZbCt8WJ6dN5yJJTfo5lu5Mdtq6N54tn1qSSsBWrgAqmmTLptZA9ZbRo9GH5ANHeP7OzzltkW31OmLKA/s320/icone.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337595075804924610&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://hackerevollution-ebooks.blogspot.com/2009/05/pacote-de-eboock-hacker-2007.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA4nidaFl2OtbosVgAD99dWOAqH_n6eKEMPMyrZu4rsTCpoSy2gIvh0XCfLrYob1Qg2499hjtF8YRdbtbYLb9pyd8UrRG1an7MsUtbQDeqRfWRpofAhORKoKRXEGnDLRdvCVj9ez_5gw/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6869570400842091447.post-5084580433809645243</guid><pubDate>Tue, 19 May 2009 17:50:00 +0000</pubDate><atom:updated>2009-05-19T10:53:52.321-07:00</atom:updated><title>A Arte de Invadir [Kevin Mitnick]</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPCuuashFv3IPu0gatbo-hw5kXPhDSofQ-hEvFNbLO9faVcPiOVxWxJOZNBX-pCmDB7tSB_uCBlXhUSNuM66ZIB4TZZYz_Y3Dq94E5_skOgkGKN25ZzFFvcAolkLd52aXciwY0ZBfbQA/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 246px; height: 303px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPCuuashFv3IPu0gatbo-hw5kXPhDSofQ-hEvFNbLO9faVcPiOVxWxJOZNBX-pCmDB7tSB_uCBlXhUSNuM66ZIB4TZZYz_Y3Dq94E5_skOgkGKN25ZzFFvcAolkLd52aXciwY0ZBfbQA/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337594265644707906&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;Mitnick apresenta dez capítulos interessantes, cada um é o resultado de uma entrevista com um hacker real sobre um ataque real. Leitura obrigatória para qualquer pessoa que tenha interesse em segurança de informação.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;Algumas histórias são chocantes, servem de advertência, outras o farão rir com a ousadia inspirada do hacker.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;Kevin D. Mitnick é um hacker celebrado que se regenerou e agora usa seu conhecimento e habilidades para ajudar corporações, organizações e agências de governo a se protegerem dos tipos de ataques descritos neste livro e em seu best-seller anterior, A arte de enganar, também publicado pela Pearson Education. É co-fundador da &lt;/span&gt;&lt;a style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot; href=&quot;http://www.defensivethinking.com/&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Defensive Thinking&lt;/span&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;, uma empresa de consultoria na área de segurança de informação que se dedica a ajudar as corporações e até governos a proteger informações vitais. Ele apareceu em Good Morning America, 60 Minutes e Burden of Proff, e se estabeleceu como autoridade líder em prevenir violações de segurança e crime cibernético. William L. Simon é autor e roteirista premiado. Também colaborou com Kevin Mitnick em A arte de enganar.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; color: rgb(0, 0, 0);&quot;&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;Tamanho&lt;/span&gt;: 2mb&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.badongo.com/file/2371339&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 100px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEht_PkRrm48X8lARSOMsE3K8F9NhzIU0yJh4SREmyGe9G2VXiqklYd-elu7z0u5MYei6xobzNsHsumrCXvDM2DlhL7n_5PJmTHkTqwrR13S6yaEJHGw5LiWCpSSLzl8SdFsz7BRimX0Jg/s320/icone.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337594262833771314&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://hackerevollution-ebooks.blogspot.com/2009/05/arte-de-invadir-kevin-mitnick.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPCuuashFv3IPu0gatbo-hw5kXPhDSofQ-hEvFNbLO9faVcPiOVxWxJOZNBX-pCmDB7tSB_uCBlXhUSNuM66ZIB4TZZYz_Y3Dq94E5_skOgkGKN25ZzFFvcAolkLd52aXciwY0ZBfbQA/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6869570400842091447.post-2661319576928867221</guid><pubDate>Tue, 19 May 2009 17:33:00 +0000</pubDate><atom:updated>2009-05-19T10:38:17.023-07:00</atom:updated><title>Linguagens e Tecnicas de Programação</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXD7EaPn2QdobqwUf8iO6nEWhItFtaLhuQprLFAPfAZem9tbV4T4-VDB1b7AkbwT_E6hiHOkz5UEkQqA2tlLHvbpVcLjOSkiax1Yb-lTKKVrQlrdQAcybZbTzreBQNsQMGoSArUwOUuA/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 273px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXD7EaPn2QdobqwUf8iO6nEWhItFtaLhuQprLFAPfAZem9tbV4T4-VDB1b7AkbwT_E6hiHOkz5UEkQqA2tlLHvbpVcLjOSkiax1Yb-lTKKVrQlrdQAcybZbTzreBQNsQMGoSArUwOUuA/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337590078647175106&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 100%; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: 100%;&quot;&gt;&lt;span style=&quot;font-size: 100%;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: 100%;&quot;&gt;Aprenda todas as linguagens e tecnicas de programação.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://w17.easy-share.com/1700764783.html&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 100px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsOAC40RTCM7-mxClM2L-8rEN-LVo_JyOK7ljEBMUd8r68PuwNJiqm8P2aqgrfi0AQmkRtow3b7p3X8jv3qwWm9IMPPi69fm5FdlqyPNAOTRlcdv63ub1Np9PCVGaaWaQ1jcZevIKJTg/s320/icone.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337590074707390098&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://hackerevollution-ebooks.blogspot.com/2009/05/linguagens-e-tecnicas-de-programacao.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXD7EaPn2QdobqwUf8iO6nEWhItFtaLhuQprLFAPfAZem9tbV4T4-VDB1b7AkbwT_E6hiHOkz5UEkQqA2tlLHvbpVcLjOSkiax1Yb-lTKKVrQlrdQAcybZbTzreBQNsQMGoSArUwOUuA/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6869570400842091447.post-271323134188403847</guid><pubDate>Tue, 19 May 2009 17:30:00 +0000</pubDate><atom:updated>2009-05-19T10:33:13.009-07:00</atom:updated><title>Guia do Hacker Brasileiro - Ebook Completo</title><description>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmoDLLC-IRgzYNXbY_1fd_I1nnbbqHcWMY-m3u9pGzC2quEpzDpVINDSIHyuojc8WIvfC07Q30OwUazrN6S9aKv3UVJkRBMNGFwwTdH1l6UErtbiC9OdNSDsByuiJiq6qX-jT-GLSYvQ/s1600-h/1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 285px; height: 356px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmoDLLC-IRgzYNXbY_1fd_I1nnbbqHcWMY-m3u9pGzC2quEpzDpVINDSIHyuojc8WIvfC07Q30OwUazrN6S9aKv3UVJkRBMNGFwwTdH1l6UErtbiC9OdNSDsByuiJiq6qX-jT-GLSYvQ/s320/1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337589278317848626&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;O mais completo material sobre Hacker na literatura brasileira.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://w17.easy-share.com/1701572922.html&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 100px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk8XWeoVdEPpuXq7kcKkIWROYM3Af4102sbDZO93hzMCIb_o-e5UUEwZqWseRB46At-9VU5_S0YTdZEkG5GmqTiHZino-v1nKexN41FW-51vES_y7hITkuDz3gMfdUvczFU619ZG1j8w/s320/icone.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5337589274253142722&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;</description><link>http://hackerevollution-ebooks.blogspot.com/2009/05/guia-do-hacker-brasileiro-ebook.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhmoDLLC-IRgzYNXbY_1fd_I1nnbbqHcWMY-m3u9pGzC2quEpzDpVINDSIHyuojc8WIvfC07Q30OwUazrN6S9aKv3UVJkRBMNGFwwTdH1l6UErtbiC9OdNSDsByuiJiq6qX-jT-GLSYvQ/s72-c/1.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>