FREE LAPTOP FOR ALL WORLD USER

ALL FOR EARNING

FellowEquality.com Link2Communion.com CooperativeMail.com ProsperousBoom.com

Offline Data Entry Job/Work (Earn $1 to $100 Per Assignment)

Tuesday, December 22, 2009

Offline Data Entry Job/Work (Earn $1 to $100 Per Assignment)

There are more companies are going to selling the E-Book through internet. Now days the Online Business is growing in world very fast. So we are start the offline Data Entry Content/ Document editing / Proof Reading) Job/Work. The basic work is typing in Ms-Word & correction the mistake word.

Data Entry, Data Conversion and Proof Reading Terms & Conditions:

This is a easy means of Data Entry, Data Conversion and Proof Reading for different Company's offered by various methods. But one has to follow certain sets of rules and it has to be logical i.e. you can’t afford to ignore the stepwise methods.

Job/work prospect – There is no limit of job / assignment. Workload is per month. Job/work is home based. Assignments are not forced. You can work from any computer including cyber café. The jobs offered are copying, pasting, editing, sorting, converting and indexing data in to any format and we concentrate more on better and speed in Online Data Entry and conversion.

Terms and Conditions – The Company will not be held liable / responsible for any illegal action, claims, losses, damages, costs, charges & expenses for others. We provide Job/Work opportunity only. Every company has some sets of rule and we are no option but our Universal Information Service stress on the following area.

Eligibility and other details.

Eligibility – Minimum age should be above 18 years

Minimum Qualification – No big degrees or diplomas is required. We prefer computer literate and with basic knowledge of English / Internet.

Job/Work Description – Registered Peoples will be required to do Data Entry, Data Conversion and Proof Reading Online or on behalf of its clients, as per the schedule prescribed and against periodic instructions to be issued by the Company. All Data Entry, Data Conversion and Proof Reading Online work are to be done manually and individuals are to keep track of the work he/her done number of posting, sites etc as per the assignment and the details of the entry has to be maintained. No software to be used for entry of subject matter. Executives must work themselves. They cannot employ/ hire individuals to work on their behalf. All new registered peoples must go through the rules and regulations of the company. Some of the hints are given in this website in brief.

Online Job: All work assigned registered peoples has to be carried out online. It is advisable to have your own personal Computers at home / access to any computers / Cyber Cafe but it has to be with Internet connection. Those who do not have Personal computer at home may work from any Internet café.

Income – The system of payments is generally on monthly basis. No fixed amount of monthly stipend / Your earning is paid by us in the case of Data Entry, Data Conversion and Proof Reading Online .for others programs you will received your payment by check, western union, paypal, direct deposit etc. Individuals are eligible to receive the payment on a basis based on mutual agreement. The number of entry the form / assignment completed as per instructions. There is no fixed pay and the payments are based on work done successfully. The amount different with Programs, work done etc.

WE OFFER PART TIME JOBS/Work FOR

· Students

· Housewives

· Job Seekers

· Retired Employee

·Working Professionals
Do You Have Computer and Internet at Home? We give You Online Part Time Jobs/Work.

Earn Up to $1 to $100 Per Assignment

Link Posting Jobs/Work provides you an extra earning opportunity by working part time and working from your home at your convenient.

Read more...

Proof Reading Job/Work (Earn $1 to $100 Per Assignment)

Proof Reading Job/Work (Earn $1 to $100 Per Assignment)

As a data proofreader, you will get assignment to read through manuscripts, audios, Videos, Books and Websites to look for sentences, grammar and spelling errors. You will be proofreading the following. Dissertations, Essays, Research reports, Applications Novels, Short stories, Screenplays, Scripts, Articles, Books, Manuscripts, Proposals, Business plans, Presentations, Advertising copies, press releases, Newsletters, Resumes, Cover letters, Dating profiles, Personal statements, Website text, Auto responders, Forms and letters...

Read more...

Typing Data Entry Job/Work (Earn $1 to $100 Per Assignment)

Typing Data Entry Job/Work (Earn $1 to $100 Per Assignment)

Our company B4-Best can show how to work from home for just a few hours a day with the potential to make infinite amount of money. Interested people can join our Data Entry, Data Conversion Team and make steady income and there is no limit to it.

Read more...

Data Entry,Data COnversion,Proof Reading,Forms Filling Jobs/Work

Post Data Entry Job/Work (Earn $1 to $100 Per Assignment)

Anyone can do it - It is really easy! You simply fill up the application form and submit with the registration fees and watch your account grow as money adds up daily. This type of work is 100% legal, honest & ethical. You can enter data for different types companies. We provide data different companies, organized into relevant categories (business, job, home-based jobs, health, novels, stories, film stories, and service). These companies need people like you to enter data as it spreads about their products helping them to generate sales. This is how they can pay you so much. They are splitting their profits with you. We will show you how to make even more money through our very simple Online Data Entry Job work. The more forms submitted, the more money you can make!

Read more...

Earn $5-$75 or More per day web based Data Entry and Publishing Information Online for different companies,Work Full time-Part time,Be Your Own Boss,Male,Female
Earn $1 to $100 Per Assignment

Male ,Female

Full Time/Part Time

Work online From Home

Ad Posting Job

Earn upto .06$ to .25$ and more/- per ad

Work Anytime From Home, Cyber Cafe

Everymonth Payment Guarantee

Hundreds of Satisfied Members, Growing

Earn upto .06$ to .50$ and more/- per link
Work Anytime From Home, Cyber Cafe
Everymonth Payment Guarantee
Hundreds of Satisfied Members, Growing
Work Full Time/Part Time

Earn upto $5 to $75/- per day and more
Work Anytime From Home, Cyber Cafe
Data Entry and Information Publishing work
Be Your Own Boss
Work Full Time/Part Time

Read more...

Wednesday, November 18, 2009

The numbers are out, and they are huge. On September 26th, more students took the Law School Admissions Test (LSAT) than have ever taken a single administration of the LSAT in the history of the exam. Chalk it up to the recession, the economy, or the sudden increase in all things vampire. Whatever the reason, over 60,000 students lined up to take the first step to becoming a lawyer on September 26th. This turnout continues a sudden increase in LSAT administrations that began roughly in 2007. Prior to that, total LSAT administrations peaked in 1990-91, fell through 1997-98, and jumped to modern numbers (approximately 143,000 test takers) from 2001, onward. For the full graph from the Law School Admission Council, see below.

Except previously, there were law firm jobs to absorb the effluence of law students. As the economy foundered, the number of LSAT takers began to increase again, with June 2009 constituting the single largest June administration in the history of the LSAT. June and September 2009 combined represent 13,681 more tests administered over the previous year, or an increase of 17%. If this increase stays constant for the rest of the testing cycle, that would mean there will be 177,136 LSATs administered this year, the largest percentage increase in eight years.

Which could be a real problem.

It might not be news that Big Law is foundering, but it’s still scary. Powerhouse law firms such as Kirland & Ellis and Baker Botts are laying off attorneys while others are cutting back on new hires and decreasing the number of on-campus interviews. With law jobs shrinking, it’s hard not to wonder where all of the students taking the LSAT and applying to law school are going to go.

The answer will probably entail a change in the old conception of learning and practicing the law. In order to survive, big law firms will have to rethink their billing models, law schools will need to retool their career placements options, and law school graduates are going to have to change their expectations of what a law degree means in the marketplace.

Law Firm Changes

At the beginning of the year, The New York Times reported that more big law firms are considering alternatives to the long-criticized billable hour. Our own, albeit anecdotal, research confirms that more firms are moving away from the decades old model of charging hourly rates. One associate we spoke with at a Big Law firm in Texas reports that her firm is accepting work for a flat rate per project. Instead of charging $350 per hour, for example, the firm charges a fee of $500 to draft a particular document. While Jeremy Rosen, partner at uber-prestigious appellate firm Horvitz & Levy, would not agree that the billable hour is dead, he does admit that “…our firm has accommodated client’s requests for flat fee or other alternative billing arrangements when they are mutually beneficial to both sides.” As clients search for ways to fulfill their legal needs and maintain their bottom line, such flexibility will surely continue.

Law School Changes

On the other side of the spectrum law schools, cognizant of the looming problem, are taking steps. Matt DeGrushe, Dean for Career Services at USC Law School told us that that the Career Services Office “…has been actively identifying smaller and mid-sized firms in Southern California” for their students to apply for positions. The office also launched the Career Management Program this fall that oversees student job searches in a much more comprehensive manner.

Other schools are also experiencing additional interest in their externship programs. The National Law Journal reports that at UCLA Law School, annual externship participation jumped from 41 students in 2007 to 74 in 2009. At Arizona State Law School, participation in summer externships rose from 46 in 2004 to 75 this year.

Still other schools are increasing their loan repayment options to encourage students to go into other areas of the law. At UC Berkeley School of Law, the Loan Repayment Assistance Program has been significantly enhanced. According to their web site, “The program is designed to ease the financial burden faced by alumni who pursue public interest or government work, where salaries are significantly lower than in the private sector.”

Law Student Changes

Gone are the days when law school is an automatic back-up plan for History/English/Communication majors who don’t know what else to do with their degree. With law school tuition soaring, students need to know that they can pay off their degrees. They also need to be more inventive about what their legal career can look like.

A second year law student we spoke with decided to go to a lower-ranked law school that gave scholarship money. The student reports that “I could have gone to a higher-ranked school, but it was more important for me to graduate without too much debt.” She also recognizes that her legal career may not look like she thought it would. “There was very little on campus recruiting at my school this year, so I know I’m going to have to be flexible when it comes to the type of legal job I’ll take.”

We spoke with a second year law student at NYU who explained that the changed economic climate meant an opportunity to work at the Commodity Futures Trading Commission (CFTC). The CFTC protects market users against fraud and abusive practices related to commodity sales. While our 2L ultimately desires a job in Big Law, he felt that working at the CFTC would give him a different resume to help him stand out in the crowd. So far, his plan appears to be working as he explains that “I got a relatively high degree of responsibility on a number of cases ranging from complex litigation against sophisticated defendants to nickel and dime (e.g. <$20M) Ponzi schemes. At the end of the day I got exactly what I was hoping for—direct experience litigating cases and some wonderful insight into the financial markets.”

What to Do

The confluence of more LSAT takers and an economic downturn means that law students need to be savvier consumers. The larger applicant pool might allow law schools to be more selective, so record low acceptance rates may be on the horizon. Or law schools, seeing the increase in applications, might increase their entering class size. While this might seem to be a more favorable response from an applicant’s perspective, it could well result in starker job prospects three years hence. Or perhaps much of the present economic tumult will have passed by then. The future of Big Law remains unclear, but law firms and law schools are doing their best to respond to the new economic climate. Hopefully, the 60,746 September LSAT takers will follow suit.

mss-lsatadmintable-lg

Read more...

DataVault, Irc Warez (Ty 4 Moving X).txt
-[ How to rip Dynamic Flash Template ]-.txt
10 reasons why PCs crash U must Know.txt
10 Security Enhancements.txt
16x Dvd+-rw Dl Dvd Writer Comparison Guide.txt
20 Great Google Secrets.txt
23 Ways To Speed WinXP, Not only Defrag.txt
250+ Tech books online.txt
2600 Hertz Single Tone Generator Schematic.txt
36 Graphics & Design Ebooks.txt
8 People Can Use The Same Msn Dial Up Account.txt
A Basic Guide to the Internet.txt
A Basic UNIX Overview.rtf
A BEGINNERS GUIDE TO Hacking Unix.txt
A Cracking Tutorial
A Guide to Internet Security- Becoming an Uebercracker.txt
A Guide to the Easiest Hacking there is.txt
A List of every TeleNet code that there is.txt
A List Of Government BBS Numbers.txt
A List Of Some OF The Most Useful UNIX Hacking Commands.htm
A Novice’s Guide to Hacking 2004.txt
A Novice’s Guide To Hacking.txt
A Short HACKER SPEAK Glossary.txt
A simple TCP spoofing attack.txt
A Small Guide to Hacking HOTMAIL.txt
A UNIX Hacking Tutorial.txt
A very small tut for RealMedia.txt
A Web Standards Checklist, How to make a proper website.txt
Accessing the bindery files directly.txt
Accessing The Entire Internet On Your 3 Phone, U8110, E616 etc..txt
Advanced Shellcoding Techniques.txt
All about ftp must read.txt
All About Movie Tags (what Is A Dvdrip, Cam Etc.).txt
ALL About Spyware.txt
All mIRC Commands.txt
Almost Everything You Ever Wanted To Know About Security (but.txt
An Architectural Overview of UNIX Network Security.htm
An Extensive Guide to Bell System Man Holes.txt
An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt
An Introduction into TeleScan.txt
An Introduction to Denial of Service.txt
An Introduction to the Computer Underground.txt
An Introductory Guide To TeleNet Commands.txt
Anarchist Cookbook 2004
Anonymity complete GUIDE.rtf
Anonymity of Proxy, Anonymity Of Proxy learn it insideout.txt
Anonymity.txt
ANONYMOUS emails.txt
Anonymous FTP FAQ.htm
ANSIBombs II Tips And Techniques.txt
anti leech hacking tutorial.txt
Area Codes and Time Zones.txt
attacks on networks how to stop.htm
Auto End Tasks to Enable a Proper Shutdown, Win XP Tweak.txt
Automatic Windows Installation, No keypress required!.txt
B.A. regedit.txt
Backdoor.txt
Backdoors.txt
Backtracking EMAIL Messages.txt
Bandwidth Explained!.txt
Basic Networking.txt
BBS CRASHING TECHNIQUES.txt
Becoming A Phreaker - The Quick n’ Easy Way.txt
Beep Code Manual.txt
Beep Codes Error Codes.txt
Bell Hell Volume #1.txt
Bell Hell Volume #2.txt
Best Keyboard Shortcuts.txt
Big Brother And Ndisuio.sys, A new Internet phenomenon.txt
Bin & Cue Simple Tut.txt
BIOS Update Procedure.txt
Bit Torrent Tutorials.txt
Block Adservers.txt
Boot Block Recovery For Free.txt
Boot Winxp Fast.txt
Border And Text Effects In Psp8, For use with PSP8.txt
Breaker B0X.txt
Broken Ie, How to fix it.txt
BRUTE- A brute force approach to hacking Unix passwords.txt
Bulk Editing Of .xxx to .zip or .mp3.txt
BulletProof FTP Server Tutorial.txt
Burn .bin file Without A .cue file.txt
Burn a BIN without a CUE using NERO.txt
Burning Bin & Cue Using Nero.txt
Bust Avoidance For Dipshits.txt
busybox.txt
Bypass Internet Censorship.txt
Calculating Offsets.txt
cannot use my password to get back into Windows XP.txt
Cant See Secure Sites.txt
Caught A Virus.txt
Cellular Listening with a TV .txt
Cellular Telephone Phreaking Phile Series VOL 1.txt
Change Music In The Malibu And The Pole Position, GTA Vice Modders.txt
Change Text on XP Start Button.rtf
Change Text on XP Start Button.txt
Change The Default Location For Installing Apps.txt
Change The Storage Location Of ‘my Documents’, a bit safer for when your PC crashes….txt
Change Your Ip In Less Then 1 Minute.txt
Changing Default Location For Installing Apps.txt
Check For Dos, Check to see if you are infected..txt
Choosing A Good Domain Name, ya..good name is important!.txt
Choosing An Internet Merchant Account, nice info on Internet Merchant Account…txt
Clear Unwanted Items From Add And Remove.txt
Closing Open Holes, System Security How to close open holes.txt
Closing the Net.txt
CMD Prompt here, add to folder context menu windows xp.txt
COMMON FTP ERROR CODES.txt
Compression and Cracks for Dummies.txt
Computer Acronyms.txt
Computer Bulliten Boards and the Law.txt
Computer Chrime - Current Practices, Problems and Proposed So.txt
Computer eMail and Privacy.txt
Computer Hackers News Articles.txt
Computer Matinence.txt
Computer Rights vs First and Forth Amentment Right.txt
Computer Security.txt
Computer Security_2.txt
Computer Viruii.txt
Computerized Governmental Database Systems Containing Persona.txt
Configuring ZoneAlarm Pro Security Settings, A ZoneAlarm Pro Tutorial.txt
connect A Psx Pad To Pc, Warning soldering is involved…txt
Convert Stubborn Webpage To pdf.txt
Convert To Basic And Dynamic Disks In Windows Xp.txt
Converting Movies To Psp Format.txt
Converting to NTFS.txt
COPS and Robbers-Unix System Security.txt
COPY X BOX GAMES!.txt
Copyright Guides for Photographers.txt
Cracking Bios, use the followin’ code.txt
Cracking Zip Password Files.txt
Crap Software Config Settings, How to set-up the firewall.txt
Crash Course in X Windows Security.txt
Create A Huge File.txt
Create A Personal Screen Saver In Win Xp!.txt
Create An Ftp Server On Your Pc With Serv-u.txt
Create Bootable Win XP SP1 CD(nero).txt
Create Bootable XP SP integrated CD.txt
Create One-click Shutdown And Reboot Shortcuts.txt
Creating a Board aka Forum on your own PC !.rtf
Creating Universal Ghost Usb Boot Disk And Cd.txt
Crime and Puzzlement.txt
Cultural Formations in Text-Based Virtual Realties.txt
Cyberspace and the Legal Matrix- Laws or Confusion.txt
Dark Angel’s Phunky Virus Writing Guide .txt
Data Capacity of CDs [Tutorial].txt
Debug, Learn how crack windows.txt
Defamation Liability of Computerized Bulliten Board Operators.txt
Delete An undeletable File.txt
Delete Files From The Recent File List In Windows.txt
Dept of Treasury Letter.txt
Digital Camera Guide.txt
Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt
Digital Photo Id Cards, Greate Info.txt
Direct Link To Any Page You Want To In Hotmail.txt
Directx Explained.txt
Disable Compression On Xp, NTFS partition, Disk Cleanup.txt
Disable The Send Error Report, to Microsoft.txt
Disable Windows Logo Key.txt
Discover New Music You’ll Probably Love.txt
Do You Want To Learn Maya 6, look, some tutorials.txt
Doom 3 Speed Up, Guaranteed 40% better.txt
Doom3 Simple Tweeks, how to run doom with tweeks.txt
Dos User - No Boot Dos Disk, No Edit.com,How to create Imp Files.txt
Download Free Music legally,, legally.txt
Download from a paypal site without paying a penny!.txt
Download From Ftpz, Using Ftp Search Sitez.txt
Download Mp3’s Without Using Filesharing.txt
Download Music And Video With ,edia Player9, quick and easy!.txt
Download Timeframes.txt
Downloading Files, Using Archives And Images.txt
Downloading Windows Media Streams.txt
Drake’s Phreaking Tutorial.txt
Dreamweaver Tut That Teaches U, to search a database with phpmysql.txt
Driverguide.com.txt
Dual Boot After The Fact.txt
Dvd Copying-ripping Definitions.txt
DVD Regions Information.txt
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt
Easily Disconnect-reconnect From Broadband.txt
Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt
Ebay Hackcracktip.txt
Electronic Bulliten Boards and ‘Public Goods’ Explainations o.txt
Electropolos - Communication and Comunity on IRC.txt
Eliminate Ie’s Autocomplete Reminder.txt
Email Forge, sends email from anyone.txt
Enable Folder and Icon Refresh, Win XP Tweak.txt
Erasing_Your_Presence_From_System_Logs.txt
Ethload User’s Guide.txt
Evolution Of Computer Viruses History Of Viruses.txt
Excellent tricks and techniques of Google Hacks.txt
Exploseek, a simple tool to find music on the net.txt
Find Stuff.txt
Finding Missing Files From A Release.txt
Firefox Speed Tweaks.txt
Firefox Tweaks.txt
Firewall Protection how to.rtf
FlashFXP FAQ.txt
Flashget Broadband Tweak.txt
FLASHGET INTEGRATION IN OPERA,MOZILLA,NETSCAPE.txt
FlashGet v1.4 - More Download Simultaneously.txt
Flashing A Video Card Bios [advanced Guide], Step-by-Step Guide for Novice and Expert.txt
Formatting An Hdd, when fdisk won’t.txt
Formulating A Company Policy on Access to and Use and Disclos.txt
Free Access To Websites Without Registering.txt
FREE Hosting For WAREZ.txt
FREE Hosting List php, mysql and more.txt
Free Speech in Cyberspace.txt
Free World Dialup.txt
Free X-box Live !.txt
Freebsd Install Guide.txt
Gender Issues in Online Communications.txt
General Keyboard Shortcuts, General Keyboard Shortcuts.txt
Get In Windows 2000 As Administrator.txt
Get the Most Out of Your DVD Recorder.txt
Get The Music You Want To Hear.txt
Get unlimited bandwidth from your host for free.txt
Getting A 1gb Yahoo China Account.txt
Getting Counter-strike Source To Work.txt
getting movies, mp3,games using google.txt
Getting older programs to run on Windows XP.txt
Getting started with Linux for nOObs!.txt
Go to Windows updates anonymously.txt
Google Crack Search.txt
Google secrets.txt
Google Tips & Tricks, (utilizing search engine).txt
Government Computer Security Techniques.txt
Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt
Guide For Getting Free Stuff.txt
Guide to Hacking with sub7.doc
Guide to IIS Exploitation.txt
Guide to Slipstreaming Service Pack 2.txt
HACKDICT.TXT
Hacker Test.txt
Hackers A-Z.TXT
Hackers Who Break into Computer Systems.txt
hacking and phreaking.doc
Hacking Bank Of America’s Home Banking System.txt
Hacking Compuserve Infomation Service.txt
Hacking Faq.txt
Hacking for Dummies Volume 2.doc
Hacking For Newbies.doc
Hacking GTE Telemail.txt
hacking in telnet ftp.rtf
Hacking IRC - The Definitive Guide.txt
hacking on Telnet explained.doc
hacking on XP part 1.doc
hacking on XP part 2.doc
hacking on XP part 3.doc
hacking on XP part 4.doc
hacking on XP part 5.doc
hacking password protected site.doc
Hacking Password Protected Website’s.doc
hacking passwords.doc
Hacking PC-Pursuit Codes.txt
Hacking Techniques.txt
Hacking TRW.txt
Hacking TYMNET.txt
Hacking Unix System V’s.txt
Hacking VoiceMail Systems.txt
Hacking Wal-Mart Computers.txt
Hacking Webpages.txt
Hard drive Gone Bad.txt
Hardware Firewall.txt
Have Notepad In Send To.txt
have satallite tv for almost free IF not free!!!.txt
Hex, How to turn binary or decimal to hex.txt
Hide Drives and Partitions.txt
How 2 Find EVERYTHING uploaded on Rapidshare.txt
How BT phone cards works.txt
How do I overburn a CD with Nero.txt
How do I remove an extra operating system from by.txt
How do I Test My VirusScan Installation.txt
How Do U See Hidden Files, Using DOS…txt
How Download MP3s from Fanscape.com or other Streaming Audio-Video.txt
How Linux boots.txt
How Long Has Your XP System Been Running.txt
How Phone Phreaks are Caught.txt
How the Traditional Media Clasifications Fail to Protect in t.txt
How To Access Your Folders From Your Taskbar.txt
How To Add A Url Address Bar To The Taskbar.txt
How To Add An Option To Print, the Contents of a Folder!.txt
How To Add Your Own Windows Tips.txt
How to Back Up the Registry.txt
How To Backup Ps2 Games.txt
How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt
How To Block Websties Without Software, block websites.txt
How To Boot Xp Faster (updated).txt
How to build a black box.txt
how to burn quicker in windows xp.txt
How to Bypass BIOS Passwords.txt
How To Bypass Web Filters, tutorial.txt
HOW TO CAPTURE STREAMING MEDIA.txt
How To Change A Cmos Battery.txt
How to change the serial number used in Windows XP, Valid for XP Corporate.txt
How To Change Thumbnail Size And Quality.txt
How to clear Bios info 2.txt
How to clear Bios info.txt
How To Convert File System, fat - fat32 to ntfs.txt
How To Copy A Dvd Which Will Play On A X Box.txt
How to copy songs from your iPod to your PC.txt
How to crash AOL.txt
How To Customise Your start Button.txt
How To Delete Those Persistent Nasty Files.txt
How to dial out of a UNIX System.txt
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for hotmail today - http users.txt
How To Disable Picture And Fax Viewer.txt
How to do a high Quality DivX rip.txt
How To Download Bittorrent Files.txt
How To Download Directly From Crackdb.com.txt
How To Download Movies, From IRC.txt
How to Download-Upload Files from email.txt
how to edit right click menu.rtf
how to execute chm files in linux.txt
How to Extend the life of the yousendit download links.txt
How to find a remote IP.txt
How To Find Ftp’s The Easy Way’.txt
How to find MP3’s real quickly.txt
How to find Security Holes.txt
How To Find Serial Numbers On Google.txt
How to fix corrupted files in XP.txt
How to fix Windows Installer problem.txt
How To Get A Free I-pod Or Flat Screen Tv, check it out.txt
How to get a Shell in 24 hours.txt
HOW TO GET ANY WINDOWS PASSWORD.txt
How to Get someones ISP password, Get free internet.txt
How To Get Top Ranking, Search Engines.txt
How to Hack UNIX System V.txt
How To Hack Windows Xp Admin Passwords.txt
How to hack-change your Windows XP Boot Screen.txt
how To Hide Yourself From Network Users!, And give access to only specific users!.txt
How To Increase Download Speeds By 100-200 Kbsec.txt
How to Install and run Windows CE on your USB Stick.txt
How to learn to hack in easy steps.doc
How to login to a C.B.I. System.txt
How To Make 5cds, 10cds Or 2dvds From Official Dow, These are same as Mandrake PowerPack+.txt
How to make a Free Phone Call.txt
How To Make A Kvcd.txt
how to make a new web site.txt
How To Make A Transparent Background, .fla .swf.txt
how to make a VCD from a DivX.txt
How To Make An Animted Logo.txt
How To Make Free Phone Calls.txt
How to make key generators.txt
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt
How To Make XP Go Faster.txt
How To make your own Radio Station 2.txt
How To Make Your Own Radio Station.txt
How To Make Your Own Radiostation.txt
HOW TO MANUAL - THE END OF DELETERS.txt
How to modify exe files.txt
How To Move Xp Harddrive To New Motherboard.txt
How To optimize DSL-CABLE connection speed.txt
How To Play Movies (divx Etc) With Subs.txt
How to Put an End to Unwanted or Harassing Phone Calls.HAR
How to recover MOST of scratched CD data discs.txt
How to Remove DRM Protection for Video Files.txt
How To Remove Ms Java Vm And Install Sun Java.txt
How To Remove Signin Details Of Msn Passport.txt
How To Remove The Default Admin$ Shares.txt
How to remove the Links folder in IE Favorites.txt
How to Remove WinXP Splash and See Operations.txt
How To Rename Extensions With Ease, with a Renamer.bat file!.txt
How to Rename File Extensions.txt
How To Rename Multiple Files In Winxp.txt
How To Restrict Login Hours Allowed.txt
How to safeguard your files when computer crashes.txt
How to save Windows xp updates.txt
how to search google for RAPIDSHARE links.txt
How To See Hidden Files, Using Dos.txt
How to send ICQ Bombs.txt
How To Set search For All Files In Winxp.txt
How to set up a http server running from you computer.txt
How To Set Up A Proxy In Flashget, As Requested.txt
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt
How To Set Up Direct Connect.txt
HOW TO SET UP FTP SERVER.txt
How To Set Up Proxies In Your Browser.txt
How To Set Zone Alarm Settings!, Fix for ZA ports.txt
How To Setup Your Own Dns (Domain Name Server).txt
How To Speed Up A Slow Computer.txt
How To Speed Up Http Requests On Internet Explorer, as above.txt
How To Stop Spam.txt
How to swear in all languages.txt
How To Unload Cached Dll Files To Free Memory.txt
How to Use and How to Chain Multiple Proxies!.txt
How To Use File Compression In Windows Xp.txt
How To Use Google To Download Mp3’s, and applications…..txt
How To Use Newsgroups.txt
How to use the Web to look up information on hacking.doc
How To Use You Gmail With Msn Messenger.txt
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt
HOWTO Change Windows XP Home to Windows XP Pro.txt
Important Faqs For Sp2.txt
Improve Doom 3’s Performances!!, simple but efficient trick for every1.txt
Improve your dialup modem preformance.txt
Increase XP Folder Settings.txt
Information of Hacking AngelFire Websites.txt
Insert Your Serial For Office 2k, auto install office.txt
Install A New Hard-disk.txt
Install Xp From Dos.txt
Installing Apache on Windows.txt
Installing Gentoo Linux, Amazing step by step tutoria.txt
Installing IIS On Windows Xp Pro.txt
Installing Slackware Linux.txt
Instructions For Removal Of Advertising In Msn Messenger.txt
Introduction to Denail of Service.txt
Ip Address Structure, Expilinatin OF IP Address {A short way}.txt
IP addressing, and gaining IP’s.txt
IP Addressing.txt
IP how to.rtf
Irc How To Downlaod From, How to downlaod from IRC.txt
Irc Servers On nix, For people who want to start own IRC net.txt
ISSN Numbers- An Introduction.txt
Junk Mail- How Did They All Get My Address.txt
Keep Files Private.txt
Keep Folders Hidden.txt
Keyboard Shortcuts Result in Excel 2000 - Movement.txt
Keyboard Shortcuts, Microsoft Word.txt
Keyboard Shortcuts, must read.txt
Kill Microsoft Instant Messenger.txt
Lamination Tips, Its a Fast TUT……txt
Leet Way To Get Your Ip In Windows Xp.txt
LENROS~1.TXT
LENROS~2.TXT
Linking Your Xbox To Your Computer.txt
Linux Howto’s.txt
List Of Sites Not To Go To.txt
Little help for anonymous mailer.txt
Lots Of Windows Xp Tips, Take A Look !.txt
Lyrics With Google.txt
Make A Autorun File For Ur Cd.txt
Make A Batch File To Clean UR PC!!, All In One!!.txt
Make A Roughly 16 Hour Video Dvd.txt
Make Acrobat Reader 6 load faster.txt
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt
Make Mp3 Files Smaller Without Losing Quality.txt
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt
Make Your Pc Faster, Guaranteed.txt
MakeXPgoFaster.txt
making a .cue file, in notepad.txt
Making A .txt Executable Server.txt
Making Bootable Floppy Disk to Boot into Windows.txt
Making Cd Version Of Doom3 Into Dvd Version.txt
Making Web Page Fonts Consistent and Uniform.txt
Manage Saved Ie Passwords.txt
Mastering The Windows XP Registry.txt
Maximize Dial-up Modem Settings.txt
MEMETICS.TXT
Microsoft’s Really Hidden Files, Reveled Hidden files.txt
MINDVOX.TXT
mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt
mIRCcommands.txt
Misc Linux Tips & Tricks.txt
Missing Administrator Account.txt
Mobile Secret Codes.txt
Modify .exe Files And Crack A Program.txt
More Xp Tips and tricks make your computer more faster.txt
MORRIS~1.TXT
Moving and Removing the Start Button.txt
Msn Messenger & Gmail.txt
My Flash Bookmarks, long list of tutorials.txt
Myth about WPA ( How it is done ), Windows Product Activation Technique.txt
NEIDOR~1.TXT
Nero How To Verify The Validity Of The Sn U Use.txt
NetBios explained.doc
New Pc Or New Motherboard.txt
New Way To Relive Some Zinio File.txt
news groups the how to do.txt
NFS Tracing.txt
Nice list of windows shortcuts.txt
Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt
No Text Icons.txt
Ntfs Cluster Size, better harddrive performance.txt
NY_2′S Guide to Obtaining An IP Address. .doc
Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org.txt
Open Windows Explorer To A Different Default Direc.txt
Optimize Broadband & Dsl Connections.txt
Optimize Emule Connection.txt
Organizational Analysis in Computer Science.txt
Outpost Rules, Outpost rules for system & app.txt
Outsmarting System File Protection.txt
Overclocking_Tutorial.txt
Packet Attacks - Version 1.1, { Packet_Attack_Exlained}.txt
Part 0 Dc++.txt
Part 1 Bittorrents.txt
Part 2 Irc (mirc).txt
Part 3 Ftp.txt
Partitioning Your Harddisk With Fdisk.txt
Pc File Extention Listing.txt
Pc Maintenance Guide.txt
Peer2mail Tutorial.txt
Performance Increase Through My Computer.txt
PGP Startup Guide.htm
Phone Systems Tutorial by The Jolly Roger.txt
Phreakers Handbook.txt
Play Games On PS2 Without ModChip.txt
Play On A Bnet Emulator, and f off cd key check =).txt
Port Numbers.txt
Presumed Guilty.txt
Problem With Internet Navigation, Clean Host File.txt
Proxy how to.rtf
Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt
Quick Msc.txt
Quick Phone Modifications.txt
Quick Shutdown for XP, How to create a shutdown shortcut..txt
Quickly Start The Shared Folder Wizard.txt
Raising Hell with Unix.txt
Rapidshare hack!!!!! Free premium acount for all.txt
Rapidshare Hacked, unlimited upload, no countdown.txt
Rapidshare Timelimit.txt
Read This! Av Compare!.txt
Recover A Corrupted System File.txt
Recover a Quick erased CD RW.txt
Reformat&Reinstall.txt
Regedit.exe & Regedt32.exe, Whats the difference.txt
Registry Disassembled a basic tutorial.txt
Reinstall Internet Explorer 6.txt
Release Codes, Read, and Learn….txt
Remarks of the President and Vice President to Silicon Valley.txt
Remote Desktop Through Company Firewall.txt
Remote Shutdown.txt
Remove Linux From Your Pc Safely, …and restoring your MBR.txt
Remove Msn Messenger From Xp, several ways…txt
Removing Banners From Free Webhosts.txt
Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt
Rename ‘recycle Bin’ To Whatever You Want.txt
Reregister All .dll Files Within Registry.txt
Reset your lost Bios Password.txt
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt
REVERSE CODING.txt
RIGGSB~1.TXT
RIGGS_~1.TXT
RIGHTS~1.TXT
RIVERA.TXT
Routing Basics.pdf
Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt
Running A Board forum From Your Own Pc.txt
Running Vanishing Console Programs With A Click!, Ever had a console program that vanis….txt
Safely Editing the Registry….txt
Save Your Desktop Icon Settings.txt
Saving and loading Photoshop actions.txt
Scheduled Tasks - Defrag, how to set up scheduled defrags.txt
ScreenLock Professional v2.0.41.txt
SEARCH eBOOK in FTP SEARCH ENGINE.txt
Search For Ebook Server With Google.com.txt
Search like a real warez d00dz, for warez of course!.txt
Searching For Something To Download, This may help.txt
Secret Backdoor To Many Websites.txt
Secrets Of Lock Picking.txt
Securing WinXP Pro (with what win-xp has to offer.txt
Securing your WINDOWS XP computer.txt
Security holes.txt
Seisure Warrent Documents for Ripco BBS.txt
Set Google as your Default Search in IE.txt
Set Win Explorer to open the folder you want!, Little trick.txt
sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt
sidebar fix.txt
Simple Tweaks For Peak Pc Graphics Performance.txt
Single Click Shutdown.txt
Single-click To Open An Item…, IF the Folder Options is grayed out.txt
Site Security Handbook.txt
SJ-DEC~1.TXT
SJ-RESP.TXT
Slow Loggon Time, one fix for problem.txt
Slow Opening Of File Dialogs.txt
SMTP-Simple Mail Transfer Protocol.txt
Some Cool Site For Tutorials.txt
Some Google Tricks, again.txt
Some More Tips To Improve Your Winxp.txt
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt
Sp2 Tweaks.txt
Speed Up Internet.txt
Speed up menu display.txt
Speed up Mozilla FireFox.txt
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt
Speeding up menus in XP.txt
Speeding up your internet connection under Linux and Windows.html
Spoofing emails, via telenet.txt
Standard ASCII Character Set.txt
Steps to Clean Install XP.txt
Stop A Restart Process In 3steps.txt
Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt
Summary of FBI Computer Systems.txt
SUNDEVIL.TXT
SUPREM~1.TXT
System Changes To Foil Hackers And Browser Hijacke.txt
System File Checker For Windows Xp.txt
TCP packet fragment attacks against firewalls and filters.txt
Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt
Telenet-The Secret Exposed.txt
telnet trick port 25.doc
Testing Wattage Consumption Of Your Computer, Measuring your computer’s wattage.txt
The ABC’s of Payphones part 1.txt
The ABC’s of Payphones part 2.txt
The ABC’s of Payphones part 3.txt
The ABC’s of Payphones part 4.txt
The Antivirus Defense-in-Depth Guide.txt
The Basics of Hacking- Introduction.txt
The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt
ThE Beige BoX .txt
The Constitution in Cyberspace.txt
The Cracking Manual.txt
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt
The Electronic Communication Privacy Act of 1986 - A Laymans .txt
The Greatest Hacker of all time.ASC
The Hacker’s League.txt
The History of British Phreaking.htm
The Inner Circle Book’s Hacking Techniques.txt
The Lamahs-Guide to Pirating Software on the Internet.txt
The M.M.C. Guide to Hacking, Phreaking, Carding.txt
The Modern Phreakers Guide To Beige Boxing.txt
The Modern Phreakers Guide To Payphones.txt
The Moterola Bible.txt
The Myth of the 2600Hz Detector .txt
The National Information Infrastructure-Agenda for Action.txt
The Newbies Handbook- ‘ How to beging in the World of Hacking.txt
The Newbies-User’s Guide to Hacking.txt
The Official Phreaker’s Manual.txt
The Phreakers Handbook-1.txt
The Port Guide, Port number and info.txt
The Pre-History of Cyberspace.txt
The Price of Copyright Violation.txt
The REAL way to hack RemoteAccess.txt
The Secret Service, UUCP,and The Legion of Doom.txt
The Telephone Works.txt
The Ultimate Guide To Installing Windows Xp Sp2.txt
The Ultimate Phreaking Guide .txt
the UNIX operating system (Berkley 4.2).txt
Theft of Computer Software-A National Security Threat.txt
Thoughts on the National Research and Education Network.txt
Three Ways Of Bypass Starforce Cd Protection.txt
Tip for shutdown windows - virus.txt
Tips And Tricks, Windows XP.txt
Tips on Starting Your Own BBS.1
Tired Of Reinstalling Windows.txt
To Get And Show The Ip Via Javascript.txt
Top 5 Myths About Safe Surfing, PC Magazine.txt
Transferring Data.txt
Translating Binary To Text.txt
Translating Binary to Text2.txt
Trojan Ports.txt
Turn MSN Messenger Display Pix into User Pix on XP.txt
Turn Off Unneeded Services, speed up pc.txt
Tutorial Get the serial number you need.txt
Tutorial How to create a bootable Windows XP SP1 CD (Nero).txt
Tutorials - blacksun.box.sk
Ultimate Google Way.txt
ULTIMATE GUIDE TO BYPASS BIOS PASSWORDS!.txt
Understanding the Telephone System.txt
undocumented DOS commands.txt
Uninstall Windows Xp And Return To My Old Windows.txt
Uninstalling Norton 2004 Products.txt
UNIX Computer Security Checklist.0
UNIX Use and Security - By the Prophet.txt
UNIX Use and Security From The Ground Up.htm
UNIX- A Hacking Tutorial.SIR
Unlimited Rapidshare Downloads.txt
Untold Window Tips.txt
Untold Windows Secrets.txt
Untold Windows Tips.txt
Unused space on hard drives recovered.txt
Use Hotkeys To Switch Programs.txt
Useful Download Guide, Fix Down, 0daycn Ttdown, Links.txt
User’s Guide To Avoiding Virus Infections, Keeping an eye out for viruses.txt
Using Google As A Calculator, A Tutorial.txt
Using Google for searching ebooks.txt
Using Rapid Share, How to use them and skip the BS.txt
Video Avatars.txt
Viewing Leftover Driver Entries.txt
Virtual Memory Information.txt
Virtual Memory Optimization Guide Rev. 4.0 - Final.txt
Viruii FAQ.txt
Virus-Trojan FAQ.txt
Want To Download Torrent File By Using Google.txt
Warez Definations.txt
WAREZ DEFINITION.txt
Way To Download From Brturbo, FireFox.txt
We Don’t Need No Education, Online classes made easy.txt
Welcome to The king’s meaning’s of how to kick some-one’s ASS!.txt
What Files are Legal for Distribution on a BBS.txt
What is the Registry.txt
What Should I Do With Image Files.txt
What To Look For In A Code Hacking Program.htm
What To Look For In A Code Hacking Program.txt
What You Should Know About Computer Viruses.DNA
What You Wanted To Know About Movie Jargon, But Were Afraid To Ask.txt
When Good Discs Go Bad.txt
Where Is Winipcfg In Winxp.txt
Who’s Seeding The Net With Spyware.txt
Why wait 35 Seconds at eZshare.txt
Win 2000 Dr. Watsson.txt
Windows 2000 Tips & Tricks.txt
Windows 2003 System Restore, How to activate system restore in W2K3.txt
Windows Scan Count Down Time.txt
Windows Shortcuts.txt
WINDOWS TRUE HIDDEN FILES.txt
Windows Tweak, Hack Your Start Button.txt
Windows Xp - Speed Up Your Network and Internet Access.txt
WINDOWS XP HIDDEN APPS.txt
Windows XP Registry Tweaks.txt
Windows XP Startup and Performance Tweaks.txt
Windows Xp Tips ‘n’ Tricks.txt
Windows Xp Tweaks, A work in progress.txt
Windows XP Tweaks.txt
WinRar Tutorial - Compression profiles, passwords and more.txt
Winsock 2 Repair.txt
WinXP 3 Tips.txt
Winxp Application Defrag, faster access for used programs.txt
Winxp Applications Startup Time, Decrease your Applications startup time.txt
WinXP Bootable CD.txt
Winxp System Response, reboot whitout rebooting.txt
Winxp Tips And Tricks, Winsock 2 repair.txt
Xp Auto Install.txt
Xp Folder View Does Not Stay To You’re Setting., Grab your registry editor and join in.txt
XP REPAIR INSTALL.txt
XP Tweaking.txt
Yahoo + geocities Posts.txt
Yahoo Chat Commands how to.rtf
Yahoo Messeger, no ad’s.txt
You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt
Your Home Page Nevr Being Changed.txt
Your Own Home Server - Introduction.txt
Zen and the Art of Fone Phreaking `97 .txt
[php] Navigations.txt

Read more...

Unix Compilation and Installation from Source Code
Prev Chapter 2. Obtaining, Compiling, Installing, and Removing Nmap Next
Unix Compilation and Installation from Source Code

While binary packages (discussed in later sections) are available for most platforms, compilation and installation from source code is the traditional and most powerful way to install Nmap. This ensures that the latest version is available and allows Nmap to adapt to the library availability and directory structure of your system. For example, Nmap uses the OpenSSL cryptography libraries for version detection when available, but most binary packages do not include this functionality. On the other hand, binary packages are generally quicker and easier to install, and allow for consistent management (installation, removal, upgrading, etc.) of all packaged software on the system.

Source installation is usually a painless process—the build system is designed to auto-detect as much as possible. Here are the steps required for a default install:

1.

Download the latest version of Nmap in .tar.bz2 (bzip2 compression) or .tgz (gzip compression) format from http://nmap.org/download.html.
2.

Decompress the downloaded tarball with a command such as:

bzip2 -cd nmap-.tar.bz2 | tar xvf -

With GNU tar, the simpler command tar xvjf nmap-.tar.bz2 does the trick. If you downloaded the .tgz version, replace bzip2 with gzip in the decompression command.
3.

Change into the newly created directory: cd nmap-
4.

Configure the build system: ./configure

If the configuration succeeds, an ASCII art dragon appears to congratulate you on successful configuration and warn you to be careful, as shown in Example 2.7.

Example 2.7. Successful configuration screen

flog~/nmap> ./configure
checking build system type... x86_64-unknown-linux-gnu
[hundreds of lines cut]
configure: creating ./config.status
config.status: creating Makefile
config.status: creating nsock_config.h
config.status: nsock_config.h is unchanged
( ) /\ _ (
\ | ( \ ( \.( ) _____
\ \ \ ` ` ) \ ( ___ / _ \
(_` \+ . x ( .\ \/ \____-----------/ (o) \_
- .- \+ ; ( O \____
(__ +- .( -'.- <. \_____________ ` \ /
(_____ ._._: <_ - <- _- _ VVVVVVV VV V\ \/
. /./.+- . .- / +-- - . (--_AAAAAAA__A_/ |
(__ ' /x / x _/ ( \______________//_ \_______
, x / ( ' . / . / \___' \ /
/ / _/ / + | \ /
' (__/ / \/
/ \
NMAP IS A POWERFUL TOOL -- USE CAREFULLY AND RESPONSIBLY
Configuration complete. Type make (or gmake on some *BSD machines) to compile.


5.

Build Nmap (and the Zenmap GUI if its requirements are met): make

Note that GNU Make is required. On BSD-derived Unix systems, this is often installed as gmake. So if make returns a bunch of errors such as “Makefile, line 1: Need an operator”, try running gmake instead.
6.

Become a privileged user for system-wide install: su root

This step may be skipped if you only have an unprivileged shell account on the system. In that case, you will likely need to pass the --prefix option to configure in step four as described in the next section.
7.

Install Nmap, support files, docs, etc.: make install

Congratulations! Nmap is now installed as /usr/local/bin/nmap! Run it with no arguments for a quick help screen.

As you can see above, a simple source compilation and install consists of little more than running ./configure;make;make install as root. However, there are a number of options available to configure that affect the way Nmap is built.
Configure Directives

Most of the Unix build options are controlled by the configure script, as used in step number four above. There are dozens of command-line parameters and environmental variables which affect the way Nmap is built. Run ./configure --help for a huge list with brief descriptions. These are not applicable to building Nmap on Windows. Here are the options which are either specific to Nmap or particularly important:

--prefix=

This option, which is standard to the configure scripts of most software, determines where Nmap and its components are installed. By default, the prefix is /usr/local, meaning that nmap is installed in /usr/local/bin, the man page (nmap.1) is installed in /usr/local/man/man1, and the data files (nmap-os-db, nmap-services, nmap-service-probes, etc.) are installed under /usr/local/share/nmap. If you only wish to change the path of certain components, use the options --bindir, --datadir, and/or --mandir. An example usage of --prefix would be to install Nmap in my account as an unprivileged user. I would run ./configure --prefix=. Nmap creates subdirectories like /home/fyodor/man/man1 in the install stage if they do not already exist.
--without-zenmap

This option prevents the Zenmap graphical frontend from being installed. Normally the build system checks your system for requirements such as the Python scripting language and then installs Zenmap if they are all available.
--with-openssl=

The version detection system and Nmap Scripting Engine are able to probe SSL-encrypted services using the free OpenSSL libraries. Normally the Nmap build system looks for these libraries on your system and include this capability if they are found. If they are in a location your compiler does not search for by default, but you still want them to be used, specify --with-openssl=. Nmap then looks in /libs for the OpenSSL libraries themselves and /include for the necessary header files. Specify --without-openssl to disable SSL entirely.

Some distributions ship with user OpenSSL libraries that allow running programs, but not the developer files needed to compile them. Without these developer packages, Nmap will not have OpenSSL support. On Debian-based systems, install the libssl-dev package. On Red Hat–based systems, install openssl-devel.
--with-libpcap=

Nmap uses the Libpcap library for capturing raw IP packets. Nmap normally looks for an existing copy of Libpcap on your system and uses that if the version number and platform is appropriate. Otherwise Nmap includes its own recent copy of Libpcap, which has been modified for improved Linux functionality. The specific changes are described in libpcap/NMAP_MODIFICATIONS in the Nmap source directory. Because of these Linux-related changes, Nmap always uses its own Libpcap by default on that platform. If you wish to force Nmap to link with your own Libpcap, pass the option --with-libpcap= to configure. Nmap then expects the Libpcap library to be in /lib/libpcap.a and the include files to be in /include. Nmap will always use the version of Libpcap included in its tarball if you specify --with-libpcap=included.
--with-libpcre=

PCRE is a Perl-compatible regular expression library available from http://www.pcre.org. Nmap normally looks for a copy on your system, and then falls back to its own copy if that fails. If your PCRE library is not in your compiler's standard search path, Nmap probably will not find it. In that case you can tell Nmap where it can be found by specifying the option --with-libpcre= to configure. Nmap then expects the library files to be in /lib and the include files to be in /include. In some cases, you may wish to use the PCRE libraries included with Nmap in preference to those already on your system. In that case, specify --with-libpcre=included.
--with-libdnet=

Libdnet is an excellent networking library that Nmap uses for sending raw ethernet frames. The version in the Nmap tree is heavily modified (particularly the Windows code), so the default is to use that included version. If you wish to use a version already installed on your system instead, specify --with-libdnet=. Nmap then expects the library files to be in /lib and the include files to be in /include.
--with-localdirs

This simple option tells Nmap to look in /usr/local/lib and /usr/local/include for important library and header files. This should never be necessary, except that some people put such libraries in /usr/local without configuring their compiler to find them. If you are one of those people, use this option.

Environment Variables

The configure script is sensitive to several environment variables. These are some of those variables and their effects.

CFLAGS, CXXFLAGS, LDFLAGS

Extra options to pass to the C compiler, C++ compiler, and linker, respectively. Because parts of Nmap are written in C and others in C++, it's best to use both CFLAGS and CXXFLAGS if you're going to use one of them.
LINGUAS

By default, make install will install all the available translations of the Nmap man page in addition to the English one. The LINGUAS environment variable can control which translations are installed. Its value should be a space-separated list of ISO language codes. For example, to install only the French and German translations, you might run LINGUAS="fr de" make install. To disable the installation of all translations, run configure with the --disable-nls option or set LINGUAS to the empty string.

If You Encounter Compilation Problems

In an ideal world, software would always compile perfectly (and quickly) on every system. Unfortunately, society has not yet reached that state of nirvana. Despite all our efforts to make Nmap portable, compilation issues occasionally arise. Here are some suggestions in case the source distribution compilation fails.

Upgrade to the latest Nmap

Check http://nmap.org/download.html to make sure you are using the latest version of Nmap. The problem may have already been fixed.
Read the error message carefully

Scroll up in the output screen and examine the error messages given when commands fail. It is often best to find the first error message, as that often causes a cascade of further errors. Read the error message carefully, as it could indicate a system problem such as low disk space or a broken compiler. Users with programming skills may be able to resolve a wider range of problems themselves. If you make code changes to fix the problem, please send a patch (created with diff -uw ) and any details about your problem and platform to nmap-dev as described in the section called “Bugs”. Integrating the change into the base Nmap distribution allows many other users to benefit, and prevents you from having to make the changes with each new Nmap version.
Ask Google and other Internet resources

Try searching for the exact error message on Google or other search engines. You might also want to browse recent activity on the Nmap development (nmap-dev) list—archives and a search interface are available at http://seclists.org.
Ask nmap-dev

If none of your research leads to a solution, try sending a report to the Nmap development (nmap-dev) mailing list, as described in the section called “Bugs”.
Consider binary packages

Binary packages of Nmap are available on most platforms and are usually easy to install. The downsides are that they may not be as up-to-date and you lose some of the flexibility of self-compilation. Later sections of this chapter describe how to find binary packages on many platforms, and even more are available via Internet searching. Obviously you should only install binary packages from reputable sources.

Prev Up Next
Chapter 2. Obtaining, Compiling, Installing, and Removing Nmap Home Linux Distributions

Read more...

Networking Books

Chapter 2. Obtaining, Compiling, Installing, and Removing Nmap
Prev Next
Chapter 2. Obtaining, Compiling, Installing, and Removing Nmap

Table of Contents

Introduction

Testing Whether Nmap is Already Installed
Command-line and Graphical Interfaces
Downloading Nmap
Verifying the Integrity of Nmap Downloads
Obtaining Nmap from the Subversion (SVN) Repository

Unix Compilation and Installation from Source Code

Configure Directives
Environment Variables
If You Encounter Compilation Problems

Linux Distributions

RPM-based Distributions (Red Hat, Mandrake, SUSE, Fedora)
Updating Red Hat, Fedora, Mandrake, and Yellow Dog Linux with Yum
Debian Linux and Derivatives such as Ubuntu
Other Linux Distributions

Windows

Windows 2000 Dependencies
Windows Self-installer
Command-line Zip Binaries

Installing the Nmap zip binaries

Compile from Source Code
Executing Nmap on Windows

Sun Solaris
Apple Mac OS X

Executable Installer
Compile from Source Code

Compile Nmap from source code
Compile Zenmap from source code

Third-party Packages
Executing Nmap on Mac OS X

FreeBSD / OpenBSD / NetBSD

OpenBSD Binary Packages and Source Ports Instructions
FreeBSD Binary Package and Source Ports Instructions

Installation of the binary package
Installation using the source ports tree

NetBSD Binary Package Instructions

Amiga, HP-UX, IRIX, and Other Platforms
Removing Nmap

Introduction

Nmap can often be installed or upgraded with a single command, so don't let the length of this chapter scare you. Most readers will use the table of contents to skip directly to sections that concern them. This chapter describes how to install Nmap on many platforms, including both source code compilation and binary installation methods. Graphical and command-line versions of Nmap are described and contrasted. Nmap removal instructions are also provided in case you change your mind.
Testing Whether Nmap is Already Installed

The first step toward obtaining Nmap is to check whether you already have it. Many free operating system distributions (including most Linux and BSD systems) come with Nmap packages, although they may not be installed by default. On Unix systems, open a terminal window and try executing the command nmap --version. If Nmap exists and is in your PATH, you should see output similar to that in Example 2.1.

Example 2.1. Checking for Nmap and determining its version number

felix~>nmap --version

Nmap version 4.76 ( http://nmap.org )
felix~>


If Nmap does not exist on the system (or if your PATH is incorrectly set), an error message such as nmap: Command not found is reported. As the example above shows, Nmap responds to the command by printing its version number (here 4.76).

Even if your system already has a copy of Nmap, you should consider upgrading to the latest version available from http://nmap.org/download.html. Newer versions often run faster, fix important bugs, and feature updated operating system and service version detection databases. A list of changes since the version already on your system can be found at http://nmap.org/changelog.html.
Command-line and Graphical Interfaces

Nmap has traditionally been a command-line tool run from a Unix shell or (more recently) Windows command prompt. This allows experts to quickly execute a command that does exactly what they want without having to maneuver through a bunch of configuration panels and scattered option fields. This also makes Nmap easier to script and enables easy sharing of useful commands among the user community.

One downside of the command-line approach is that it can be intimidating for new and infrequent users. Nmap offers more than a hundred command-line options, although many are obscure features or debugging controls that most users can ignore. Many graphical frontends have been created for those users who prefer a GUI interface. Nmap has traditionally included a simple GUI for Unix named NmapFE, but that was replaced in 2007 by Zenmap, which we have been developing since 2005. Zenmap is far more powerful and effective than NmapFE, particularly in results viewing. Zenmap's tab-based interface lets you search and sort results, and also browse them in several ways (host details, raw Nmap output, and ports/hosts). It works on Linux, Windows, Mac OS X, and other platforms. Zenmap is covered in depth in Chapter 12, Zenmap GUI Users' Guide. The rest of this book focuses on command-line Nmap invocations. Once you understand how the command-line options work and can interpret the output, using Zenmap or the other available Nmap GUIs is easy. Nmap's options work the same way whether you choose them from radio buttons and menus or type them at a command-line.
Downloading Nmap

Nmap.Org is the official source for downloading Nmap source code and binaries for Nmap and Zenmap. Source code is distributed in bzip2 and gzip compressed tar files, and binaries are available for Linux (RPM format), Windows (NSIS executable installer) and Mac OS X (.dmg disk image). Find all of this at http://nmap.org/download.html.
Verifying the Integrity of Nmap Downloads

It often pays to be paranoid about the integrity of files downloaded from the Internet. Popular packages such as Sendmail (example), OpenSSH (example), tcpdump, Libpcap, BitchX, Fragrouter, and many others have been infected with malicious trojans. Software distributions sites at the Free Software Foundation, Debian, and SourceForge have also been successfully compromised. This has never happened to Nmap, but one should always be careful. To verify the authenticity of an Nmap release, consult the PGP detached signatures or cryptographic hashes (including SHA1 and MD5) posted for the release in the Nmap signatures directory at http://nmap.org/dist/sigs/?C=M&O=D.

The most secure verification mechanism is detached PGP signatures. As the signing key is never stored on production servers, even someone who successfully compromises the web server couldn't forge and properly sign a trojan release. While numerous applications are able to verify PGP signatures, I recommend GNU Privacy Guard (GPG).

Nmap releases are signed with a special Nmap Project Signing Key, which can be obtained from the major keyservers or http://nmap.org/data/nmap_gpgkeys.txt. My key is included in that file too. The keys can be imported with the command gpg --import nmap_gpgkeys.txt. You only need to do this once, then you can verify all future Nmap releases from that machine. Before trusting the keys, verify that the fingerprints match the values shown in Example 2.2.

Example 2.2. Verifying the Nmap and Fyodor PGP Key Fingerprints

flog~> gpg --fingerprint nmap fyodor
pub 1024D/33599B5F 2005-04-24
Key fingerprint = BB61 D057 C0D7 DCEF E730 996C 1AF6 EC50 3359 9B5F
uid Fyodor
sub 2048g/D3C2241C 2005-04-24

pub 1024D/6B9355D0 2005-04-24
Key fingerprint = 436D 66AB 9A79 8425 FDA0 E3F8 01AF 9F03 6B93 55D0
uid Nmap Project Signing Key (http://insecure.org/)
sub 2048g/A50A6A94 2005-04-24


For every Nmap package download file (e.g. nmap-4.76.tar.bz2 and nmap-4.76-win32.zip), there is a corresponding file in the sigs directory with .asc appended to the name (e.g. nmap-4.76.tar.bz2.asc). This is the detached signature file.

With the proper PGP key in your keyring and the detached signature file downloaded, verifying an Nmap release takes a single GPG command, as shown in Example 2.3. That example assumes that the verified file can be found in the same directory by simply removing “.asc” from the signature filename. When that isn't the case, simply pass the target filename as the final argument to GPG. If the file has been tampered with, the results will look like Example 2.4.

Example 2.3. Verifying PGP key fingerprints (Successful)

flog> gpg --verify nmap-4.76.tar.bz2.asc
gpg: Signature made Fri 12 Sep 2008 02:03:59 AM PDT using DSA key ID 6B9355D0
gpg: Good signature from "Nmap Project Signing Key (http://www.insecure.org/)"


Example 2.4. Detecting a bogus file

flog> gpg --verify nmap-4.76.tar.bz2.asc nmap-4.76-hacked.tar.bz2
gpg: Signature made Fri 12 Sep 2008 02:03:59 AM PDT using DSA key ID 6B9355D0
gpg: BAD signature from "Nmap Project Signing Key (http://www.insecure.org/)"


While PGP signatures are the recommended validation technique, SHA2, SHA1, and MD5 (among other) hashes are made available for more casual validation. An attacker who can manipulate your Internet traffic in real time (and is extremely skilled) or who compromises Nmap.Org and replaces both the distribution file and digest file, could defeat this test. However, it can be useful to check the authoritative Nmap.Org hashes if you obtain Nmap from a third party or feel it might have been accidentally corrupted. For every Nmap package download file, there is a corresponding file in the sigs directory with .digest.txt appended to the name (e.g. nmap-4.76.tar.bz2.digest.txt). An example is shown in Example 2.5. This is the detached signature file. The hashes from the digest file can be verified using common tools such as gpg, sha1sum, or md5sum, as shown in Example 2.6, “Verifying Nmap hashes”.

Example 2.5. A typical Nmap release digest file

flog> cat sigs/nmap-4.76.tgz.digest.txt
nmap-4.76.tgz: MD5 = 54 B5 C9 E3 F4 4C 1A DD E1 7D F6 81 70 EB 7C FE
nmap-4.76.tgz: SHA1 = 4374 CF9C A882 2C28 5DE9 D00E 8F67 06D0 BCFA A403
nmap-4.76.tgz: RMD160 = AE7B 80EF 4CE6 DBAA 6E65 76F9 CA38 4A22 3B89 BD3A
nmap-4.76.tgz: SHA224 = 524D479E 717D98D0 2FB0A42B 9A4E6E52 4027C9B6 1D843F95
D419F87F
nmap-4.76.tgz: SHA256 = 0E960E05 53EB7647 0C8517A0 038092A3 969DB65C BE23C03F
D6DAEF1A CDCC9658
nmap-4.76.tgz: SHA384 = D52917FD 9EE6EE62 F5F456BF E245675D B6EEEBC5 0A287B27
3CAA4F50 B171DC23 FE7808A8 C5E3A49A 4A78ACBE A5AEED33
nmap-4.76.tgz: SHA512 = 826CD89F 7930A765 C9FE9B41 1DAFD113 2C883857 2A3A9503
E4C1E690 20A37FC8 37564DC3 45FF0C97 EF45ABE6 6CEA49FF
E262B403 A52F4ECE C23333A0 48DEDA66


Example 2.6. Verifying Nmap hashes

flog> gpg --print-md sha256 nmap-4.76.tgz
nmap-4.76.tgz: 0E960E05 53EB7647 0C8517A0 038092A3 969DB65C BE23C03F D6DAEF1A
CDCC9658
flog> sha1sum nmap-4.76.tgz
4374cf9ca8822c285de9d00e8f6706d0bcfaa403 nmap-4.76.tgz
flog> md5sum nmap-4.76.tgz
54b5c9e3f44c1adde17df68170eb7cfe nmap-4.76.tgz


While releases from Nmap.Org are signed as described in this section, certain Nmap add-ons, interfaces, and platform-specific binaries are developed and distributed by other parties. They have different mechanisms for establishing the authenticity of their downloads.
Obtaining Nmap from the Subversion (SVN) Repository

In addition to regular stable and development releases, the latest Nmap source code is always available using the Subversion (SVN) revision control system. This delivers new features and version/OS detection database updates immediately as they are developed. The downside is that SVN head revisions aren't always as stable as official releases. So SVN is most useful for Nmap developers and users who need a fix which hasn't yet been formally released.

SVN write access is strictly limited to top Nmap developers, but everyone has read access to the repository. Check out the latest code using the command svn co --username guest --password "" svn://svn.insecure.org/nmap/. Then you can later update your source code by typing svn up in your working directory. The “guest” username is required due to an svnserve authorization bug.

While most users only follow the /nmap directory in svn (which pulls in /nbase, /nsock, and /zenmap on its own), there is one other interesting directory: /nmap-exp. This directory contains experimental Nmap branches which Nmap developers create when they wish to try new things without destabilizing Nmap proper. When developers feel that an experimental branch is ready for wider-scale testing, they will generally email the location to the nmap-dev mailing list.

Once Nmap is checked out, you can build it from source code just as you would with the Nmap tarball (described later in this chapter).

If you would like real-time (or digested) notification and diffs by email when any changes are made to Nmap, sign up for the nmap-svn mailing list at http://cgi.insecure.org/mailman/listinfo/nmap-svn.
Prev Next
The History and Future of Nmap Home Unix Compilation and Installation from Source Code

Read more...

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire.

Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.

Nmap's original author, Gordon “Fyodor” Lyon, wrote this book to share everything he has learned about network scanning during more than a decade of Nmap development. It was briefly the #1 selling computer book on Amazon (screenshot). The book is in English, though several translations are in the works.

Key facts: The ISBN is 978-0-9799587-1-7 (ISBN-10 is 0-9799587-1-7) and suggested retail prices are $49.95 in the U.S., £34.95 in the U.K., and €39.95 in Europe. Like most books, it costs less online (as little as $32.97 - see purchasing options). It is 468 pages long. The official release date was January 1, 2009, though Amazon managed to beat that by a couple weeks.

About half of the content is available in the free online edition. Chapters exclusive to the print edition include “Detecting and Subverting Firewalls and Intrusion Detection Systems”, “Optimizing Nmap Performance”, “Port Scanning Techniques and Algorithms”, “Host Discovery (Ping Scanning)”, and more. The solution selections which provide detailed instructions on the best way to solve common networking tasks are also exclusive to the printed book. The final table of contents and cover art are available.

Reviews

Reviews are posted here as they come in. Please let me know if you post a review to your blog or anywhere else.

* “If you are looking for the book on Nmap, the search is over: NNS is a winner”—Richard Bejtlich's detailed review. NNS also made Bejtlich's Top Books of 2008 list.

* “This is the ultimate Nmap reference guide” on “Nmap, the legendary network scanner”—Ben Rothke's Slashdot review.

* “Released for sale on Amazon on December 6th and already number 1 best seller in the Computer books category, this is the MUST-HAVE book on network scanning.”—David Heath's review for ITWire.

* “This is the most revealing technical book I've ever read about a security tool. Fyodor turns Nmap inside out to explain what it does, how it does it and why it was written that way. If you are looking for a definitive book on Nmap, this is it.”—Ethan Ten's 5-star Amazon UK review.

* “Some light reading”—Metasploit author HD Moore.

* Nmap Network Scanning “is required reading for anyone securing a network” and “should be front and center on your desk for months and years to come”—Wireshark University founder Laura Chappell's glowing review.

* NNS is “a must-have book to get the most out of NMAP”, filled with examples and analysis that are “like looking over an expert's shoulder”—Mike Fratto's glowing and informative Information Week review.

* “I am amazed that after all these years I still learn stuff about nmap. The book is good and you should buy it!”—David Maynor

* NNS will “quickly become required reading for network engineers, system administrators, and anyone working in the computer security arena....I have been using nmap for nearly a decade and there were still some great tips and tricks that I found for the first time in these pages.”—Eddie Block's 5-star Amazon review.

* “Nmap is simply a required tool in the IT toolbox. Similarly, this book is required reading for anyone in IT to get the most out of that tool.”—About.com network security expert Tony Bradley's detailed 5-star review.

* “The book goes into the detail you would expect with the sort of information that true afficianadoes lust after” while being “easy and fun to read with great examples along the way”—David Pybus's 5-star Amazon UK review.

* “I would recommend this as a must-have book for any network or security professional, as well as anyone wanting to learn more about TCP/IP”—JP Bourget's very detailed Ethical Hacker Network review.

* Fyodor does an outstanding job covering everything from the most basic use of nmap, through advanced topics, such as evading detection”—Jon R. Kibler's enthusiastic review on the pen-test list.

* “Fyodor's absolute, incredibly definitive guide on Nmap will imbue you with rock-solid scanning stratagems”—Josef Chamberlin's 5-star Amazon review.

* NNS is “The wealth of information contained in this book will have even hardcore nmap experts learning a thing or two about the preeminent network scanner.”—Brad Berkemier's review, which also calls NNS “engaging and informative” and “the ultimate nmap guide”.

* “Nmap Network Scanning is a masterpiece that teaches the reader the Art of Network Mapping and Scanning ... one of the best books I've read in years.”—Raul Siles' review.

* Foreign Coverage: Barrapunto (Spanish), Tecnozona (Spanish), Binary Zone (Arabic)

Purchase options

This page lists online and physical bookstores for purchasing Nmap Network Scanning. If the prices change, you find another good option, or you encounter bad service from any of these providers, please let me know.

* Amazon.Com sells the book for $32.97, which includes domestic shipping. It is also available from International Amazon sites such as Amazon.Co.UK, Amazon.CA, and Amazon.DE.
* Barnes & Noble stocks NNS at many of their U.S. stores. From their Nmap Network Scanning page, enter your zip code in the "pick me up" box on the right hand side for a list of nearby stores which carry it. You can also order it online from that page, though it is cheaper at Amazon.
* KIMBooks lists NNS for $29.97. Domestic (U.S.) shipping is $3.15, for a total price of $33.12.
* A1Books.Com lists the book for $30.32. Shipping is $3.95 to the US (total price: $34.27) or $8.99 international (total: $39.31). Save an additional 5% if you sign up with a .edu email address.
* Tower Books sells NNS for $35.99 with free domestic shipping.
* BookPool.Com sells NNS for $37.95 plus $3.11 domestic shipping, for a total cost of $41.06
* Germans can purchase the book online from Lehmanns or at their physical bookstores in Berlin and Hamburg (call first to ensure stocking).

Updates

Several people asked whether Nmap Network Scanning is still up to date, particularly after the release of Nmap 5.00. The good news is that virtually all of the content remains accurate. But we have added some new features and NSE scripts which aren't yet documented in NNS.

For a comprehensive and completely current view of Nmap, I recommend reading Nmap Network Scanning first, then read all the changelog entries we've produced since the book was finished. The book is completely up-to-date with Nmap 4.76. So after (or before) you're done reading Nmap Network Scanning, visit the Nmap changelog and search in the file for “Nmap 4.76”. Read each item upward from there (scrolling backward) until you get to the top.

Translations

We would love to make the Nmap book more accessible by working with foreign publishers who will translate and distribute it in their markets. If you are such a publisher or know a good one to suggest, please let me know. Here are the current or in-progress translations:

Nmap - Netzwerke scannen, analysieren und absichern is the German translation by Open Source Press, released in June 2009 at a list price of €39.90. Translation was performed expertly by Dinu Gherman. They have contributed back their Nmap Reference Guide German translation.

Exame de Redes con NMAP is the Brazilian Portuguese translation by Editora Ciência Moderna. Translation was done by Angico and release was August 26, 2009. You can buy it directly from the publisher for R$95.20.

The official Korean translation, entitled 엔맵 네트워크 스캐닝, has been created by Acorn Publishing Co. The release date is November 16, 2009 at a list price of KRW 35,000.
Current status

August 26: Many Barnes & Noble stores now stock NNS, as described in the purchasing section.

August 26: Editora Ciência Moderna released the Brazilian Portuguese translation. See translations.

July 31: Held a book signing at Defcon. All copies sold out in 3 hours.

July 17: Added Updates section.

July 16: Nmap 5.00 released!

June 11: The German translation from Open Source Press is now available. They also contributed back a German translation of the Nmap Reference Guide.

January 30: Today the Amazon price is back to $32.97 after several days at $37.96. I hope they keep it at this price!

January 23: Amazon has raised their prices, so I've added more purchase options, though the cheapest is still only about $4.50 less than Amazon when domestic shipping is taken into account.

January 21: NNS receives a glowing review from About.Com.

January 19: Translation contracts have been signed for Korean and Brazilian Portuguese editions of Nmap Network Scanning! See the new Translations section for details.

January 5: Acorn Publishing Co. will be publishing the official Korean translation of Nmap Network Scanning! Release is expected in August.

January 4: NNS is finally in stock at Amazon U.K. and Amazon Germany. Amazon Canada currently still has a 1-3 week backlog.

December 31, 2008: NNS makes Richard Bejtlich's TaoSecurity Top Books of 2008 list.

December 29, 2008: A new Information Week review is one of the best so far!

December 19, 2008: The book is back in stock on Amazon after a 10 day dry spell!

December 10, 2008: Amazon has now indexed this book as part of their “Search Inside” program. While Amazon intends this as a marketing tool for prospective buyers, it can be even more useful for folks who already own the book. While we're proud of our index, Search Inside can help find more obscure terms or combinations of them. You can try this out by visiting the Amazon NNS page, scrolling down to the Search Inside box, and typing in a term such as Trinity or Microsoft.

December 9, 2008: Sales were so high that Amazon ran out of stock in the US, UK, and Germany. They say it may take a week or more to ship. Amazon still offers a great price, but for those who can't wait, I've added a purchasing options section. It includes vendor such as A1Books and Barnes & Noble with NNS in stock now.

December 9, 2008: Nmap Network Scanning sales surge further to become #1 on Amazon's computer book best seller list! Since we can't keep that rank forever, I took a screenshot (larger version).

December 8, 2008: An excellent Slashdot review causes NNS to rocket into Amazon's top 10 computer books.

December 6, 2008: Amazon has fixed the price so it is now $33.71 rather than $49.95. NNS is in stock and shipping!

December 2, 2008: The book has an initial page on Amazon. You can pre-order it now, but Amazon is showing a pre-order price of $49.95. I expect the price to be about $33 when Amazon starts shipping it within a week or two. Amazon will probably refund the difference per their "Pre-order price guarantee", but it might be safer to wait. Book seller BOOKSPLUSMORESTUFF claims to have the book "in stock" on Amazon for $53.94 including shipping. That may or may not be true.

November 14, 2008: The book is finished and submitted to the printer! The official release date is January 1, 2009, though our goal is to make it available on Amazon and other retailers by mid-December. To be notified upon publication, join the low-traffic nmap-hackers announcement mailing list.

September 15, 2008: The Black Hat/Defcon pre-release was a huge success! All of the Defcon copies were snapped up as soon as the vendor room opened, and the Black Hat copies also sold out in the first morning of the conference. Thanks to Bill Pollock of No Starch Press and Dave Hemsath of BreakPoint Books for handling sales. My conference presentation video and audio have been posted online just in time for the Nmap 4.75 release which includes the new features discussed in that presentation.

July 25, 2008: Defcon Pre-Release announced! We have decided to launch the book with a limited pre-release version at Defcon 16.

July 1, 2008: After years of work, Nmap Network Scanning is nearing completion. You can browse the current table of contents to see what is coming. We recently conducted a test-printing of some prepublication copies:

Read more...

Networking Tools

After the tremendously successful 2000 and 2003 security tools surveys, Insecure.Org is delighted to release this 2006 survey. I (Fyodor) asked users from the nmap-hackers mailing list to share their favorite tools, and 3,243 people responded. This allowed me to expand the list to 100 tools, and even subdivide them into categories. Anyone in the security field would be well advised to go over the list and investigate tools they are unfamiliar with. I discovered several powerful new tools this way. I also point newbies to this site whenever they write me saying “I don't know where to start”.

Respondents were allowed to list open source or commercial tools on any platform. Commercial tools are noted as such in the list below. No votes for the Nmap Security Scanner were counted because the survey was taken on a Nmap mailing list. This audience also biases the list slightly toward “attack” hacking tools rather than defensive ones.

Each tool is described by one ore more attributes:
new Did not appear on the 2003 list
/ Popularity ranking rose / fell the given number since the 2003 survey
TITLE= Generally costs money. A free limited/demo/trial version may be available.
Linux Works natively on Linux
*BSD Works natively on OpenBSD, FreeBSD, Solaris, and/or other UNIX variants
OS X Works natively on Apple Mac OS X
Windows Works natively on Microsoft Windows
Command-line interface Features a command-line interface
GUI Interface Offers a GUI (point and click) interface
Source code Source code available for inspection.

Please send updates and suggestions (or better tool logos) to Fyodor. If your tool is featured or you think your site visitors might enjoy this list, you are welcome to use our link banners. Here is the list, starting with the most popular:

#1
TITLE=
Linux
*BSD
OS X
Windows
GUI Interface Nessus : Premier UNIX vulnerability assessment tool
Nessus was a popular free and open source vulnerability scanner until they closed the source code in 2005 and removed the free "registered feed" version in 2008. A limited “Home Feed” is still available, though it is only licensed for home network use. Some people avoid paying by violating the “Home Feed” license, or by avoiding feeds entirely and using just the plugins included with each release. But for most users, the cost has increased from free to $1200/year. Despite this, Nessus is still the best UNIX vulnerability scanner available and among the best to run on Windows. Nessus is constantly updated, with more than 20,000 plugins. Key features include remote and local (authenticated) security checks, a client/server architecture with a GTK graphical interface, and an embedded scripting language for writing your own plugins or understanding the existing ones.

See all vulnerability scanners
#2
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code Wireshark : Sniffing the glue that holds the Internet together
Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session. It also supports hundreds of protocols and media types. A tcpdump-like console version named tethereal is included. One word of caution is that Ethereal has suffered from dozens of remotely exploitable security holes, so stay up-to-date and be wary of running it on untrusted or hostile networks (such as security conferences).

See all packet sniffers
#3
TITLE=
Linux
*BSD
OS X
Windows
Command-line interface
Source code Snort : Everyone's favorite open source IDS
This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts.

Open source Snort works fine for many individuals, small businesses, and departments. Parent company SourceFire offers a complimentary product line with more enterprise-level features and real-time rule updates. They offer a free (with registration) 5-day-delayed rules feed, and you can also find many great free rules at Bleeding Edge Snort.

See all intrusion detection systems
#4
Linux
*BSD
OS X
Windows
Command-line interface
Source code Netcat : The network Swiss army knife
This simple utility reads and writes data across TCP or UDP network connections. It is designed to be a reliable back-end tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need, including port binding to accept incoming connections. The original Netcat was released by Hobbit in 1995, but it hasn't been maintained despite its immense popularity. It can sometimes even be hard to find nc110.tgz. The flexibility and usefulness of this tool have prompted people to write numerous other Netcat implementations - often with modern features not found in the original. One of the most interesting is Socat, which extends Netcat to support many other socket types, SSL encryption, SOCKS proxies, and more. It even made this list on its own merits. There is also Chris Gibson's Ncat, which offers even more features while remaining portable and compact. Other takes on Netcat include OpenBSD's nc, Cryptcat, Netcat6, PNetcat, SBD, and so-called GNU Netcat.

See all Netcats
#5
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code Metasploit Framework : Hack the Planet
Metasploit took the security world by storm when it was released in 2004. No other new tool even broke into the top 15 of this list, yet Metasploit comes in at #5, ahead of many well-loved tools that have been developed for more than a decade. It is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. It ships with hundreds of exploits, as you can see in their online exploit building demo. This makes writing your own exploits easier, and it certainly beats scouring the darkest corners of the Internet for illicit shellcode of dubious quality. Similar professional exploitation tools, such as Core Impact and Canvas already existed for wealthy users on all sides of the ethical spectrum. Metasploit simply brought this capability to the masses.

See all vulnerability exploitation tools
#6
Linux
*BSD
OS X
Windows
Command-line interface
Source code Hping2 : A network probing utility like ping on steroids
This handy little utility assembles and sends custom ICMP, UDP, or TCP packets and then displays any replies. It was inspired by the ping command, but offers far more control over the probes sent. It also has a handy traceroute mode and supports IP fragmentation. This tool is particularly useful when trying to traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities. This often allows you to map out firewall rulesets. It is also great for learning more about TCP/IP and experimenting with IP protocols.

See all packet crafting tools
#7
10
Linux
*BSD
OS X
Windows
Command-line interface
Source code Kismet : A powerful wireless sniffer
Kismet is an console (ncurses) based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use. It can automatically detect network IP blocks by sniffing TCP, UDP, ARP, and DHCP packets, log traffic in Wireshark/TCPDump compatible format, and even plot detected networks and estimated ranges on downloaded maps. As you might expect, this tool is commonly used for wardriving. Oh, and also warwalking, warflying, and warskating, ...

See all wireless tools, and packet sniffers
#8
3
Linux
*BSD
OS X
Windows
Command-line interface
Source code Tcpdump : The classic sniffer for network monitoring and data acquisition
Tcpdump is the IP sniffer we all used before Ethereal (Wireshark) came on the scene, and many of us continue to use it frequently. It may not have the bells and whistles (such as a pretty GUI or parsing logic for hundreds of application protocols) that Wireshark has, but it does the job well and with fewer security holes. It also requires fewer system resources. While it doesn't receive new features often, it is actively maintained to fix bugs and portability problems. It is great for tracking down network problems or monitoring activity. There is a separate Windows port named WinDump. TCPDump is the source of the Libpcap/WinPcap packet capture library, which is used by Nmap among many other tools.

See all packet sniffers
#9
23
Windows
GUI Interface Cain and Abel : The top password recovery tool for Windows
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented.

See all password crackers, and packet sniffers
#10
1
Linux
*BSD
OS X
Windows
Command-line interface
Source code John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here, here, or here.

See all password crackers
#11
2
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code Ettercap : In case you still thought switched LANs provide much extra security
Ettercap is a terminal-based network sniffer/interceptor/logger for ethernet LANs. It supports active and passive dissection of many protocols (even ciphered ones, like ssh and https). Data injection in an established connection and filtering on the fly is also possible, keeping the connection synchronized. Many sniffing modes were implemented to give you a powerful and complete sniffing suite. Plugins are supported. It has the ability to check whether you are in a switched LAN or not, and to use OS fingerprints (active or passive) to let you know the geometry of the LAN.

See all packet sniffers
#12
4
Linux
*BSD
OS X
Windows
Command-line interface
Source code Nikto : A more comprehensive web scanner
Nikto is an open source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired). It uses Whisker/libwhisker for much of its underlying functionality. It is a great tool, but the value is limited by its infrequent updates. The newest and most critical vulnerabilities are often not detected.

See all web vulnerability scanners
#13
Linux
*BSD
OS X
Windows
Command-line interface
Source code Ping/telnet/dig/traceroute/whois/netstat : The basics
While there are many whiz-bang high-tech tools out there to assist in security auditing, don't forget about the basics! Everyone should be very familiar with these tools as they come with most operating systems (except that Windows omits whois and uses the name tracert). They can be very handy in a pinch, although for more advanced usage you may be better off with Hping2 and Netcat.
#14
2
Linux
*BSD
OS X
Windows
Command-line interface
Source code OpenSSH / PuTTY / SSH : A secure way to access remote computers
SSH (Secure Shell) is the now ubiquitous program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network, replacing the hideously insecure telnet/rlogin/rsh alternatives. Most UNIX users run the open source OpenSSH server and client. Windows users often prefer the free PuTTY client, which is also available for many mobile devices. Other Windows users prefer the nice terminal-based port of OpenSSH that comes with Cygwin. Dozens of other free and proprietary clients exist. You can explore them here or here.
#15
35
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code THC Hydra : A Fast network authentication cracker which supports many different services
When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC.

See all password crackers
#16
new
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code Paros proxy : A web application vulnerability assessment proxy
A Java based web proxy for assessing web application vulnerability. It supports editing/viewing HTTP/HTTPS messages on-the-fly to change items such as cookies and form fields. It includes a web traffic recorder, web spider, hash calculator, and a scanner for testing common web application attacks such as SQL injection and cross-site scripting.

See all web vulnerability scanners
#17
10
Linux
*BSD
OS X
Windows
Command-line interface
Source code Dsniff : A suite of powerful network auditing and penetration-testing tools
This popular and well-engineered suite by Dug Song includes many tools. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected ssh and https sessions by exploiting weak bindings in ad-hoc PKI. A separately maintained partial Windows port is available here. Overall, this is a great toolset. It handles pretty much all of your password sniffing needs.

See all packet sniffers
#18
7
Windows
GUI Interface NetStumbler : Free Windows 802.11 Sniffer
Netstumbler is the best known Windows tool for finding open wireless access points ("wardriving"). They also distribute a WinCE version for PDAs and such named Ministumbler. The tool is currently free but Windows-only and no source code is provided. It uses a more active approach to finding WAPs than passive sniffers such as Kismet or KisMAC.

See all wireless tools, and packet sniffers
#19
18
Linux
*BSD
OS X
Windows
Command-line interface
Source code THC Amap : An application fingerprinting scanner
Amap is a great tool for determining what application is listening on a given port. Their database isn't as large as what Nmap uses for its version detection feature, but it is definitely worth trying for a 2nd opinion or if Nmap fails to detect a service. Amap even knows how to parse Nmap output files. This is yet another valuable tool from the great guys at THC.

See all application-specific scanners
#20
12
TITLE=
Windows
GUI Interface GFI LANguard : A commercial network security scanner for Windows
GFI LANguard scans IP networks to detect what machines are running. Then it tries to discern the host OS and what applications are running. I also tries to collect Windows machine's service pack level, missing security patches, wireless access points, USB devices, open shares, open ports, services/applications active on the computer, key registry entries, weak passwords, users and groups, and more. Scan results are saved to an HTML report, which can be customized/queried. It also includes a patch manager which detects and installs missing patches. A free trial version is available, though it only works for up to 30 days.

See all vulnerability scanners
#21
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code Aircrack : The fastest available WEP/WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

See all wireless tools, and password crackers
#22
4
Windows
GUI Interface Superscan : A Windows-only port scanner, pinger, and resolver
SuperScan is a free Windows-only closed-source TCP/UDP port scanner by Foundstone. It includes a variety of additional networking tools such as ping, traceroute, http head, and whois.

See all port scanners
#23
2
Linux
Command-line interface
Source code Netfilter : The current Linux kernel packet filter/firewall
Netfilter is a powerful packet filter implemented in the standard Linux kernel. The userspace iptables tool is used for configuration. It now supports packet filtering (stateless or stateful), all kinds of network address and port translation (NAT/NAPT), and multiple API layers for 3rd party extensions. It includes many different modules for handling unruly protocols such as FTP. For other UNIX platforms, see Openbsd PF (OpenBSD specific), or IP Filter. Many personal firewalls are available for Windows (Tiny,Zone Alarm, Norton, Kerio, ...), though none made this list. Microsoft included a very basic firewall in Windows XP SP2, and will nag you incessantly until you install it.

See all firewalls
#24
new
Windows
Command-line interface
GUI Interface Sysinternals : An extensive collection of powerful windows utilities
Sysinternals provides many small windows utilities that are quite useful for low-level windows hacking. Some are free of cost and/or include source code, while others are proprietary. Survey respondents were most enamored with:

* ProcessExplorer for keeping an eye on the files and directories open by any process (like LSoF on UNIX).
* PsTools for managing (executing, suspending, killing, detailing) local and remote processes.
* Autoruns for discovering what executables are set to run during system boot up or login.
* RootkitRevealer for detecting registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit.
* TCPView, for viewing TCP and UDP traffic endpoints used by each process (like Netstat on UNIX).

Update: Microsoft acquired Sysinternals in July 2006, promising that “Customers will be able to continue building on Sysinternals' advanced utilities, technical information and source code”. Less than four months later, Microsoft removed most of that source code. Future product direction is uncertain.

See all rootkit detectors

Read more...

Here Speedy Ads if u want to Join Clix at ad for Free Joinging

Sign Up Free and make Money through Friends

Making money is easy here at Ptcbiz.com. Using only your computer and an internet connection, you can join our site and start earning real cash money for simple actions like clicking links and referring your friends. There is no obligation and it takes only a couple minutes to create a free account. What are you waiting for? Join For Free Right Now! Basic Benefits * $0.01 per ptc link click * 50% direct referral earnings * $10 minimum withdraw * Absolutely free to join! Premium Benefits * 200% direct referral earnings * No withdraw fees * Many Premium-Only ads daily * Premium memberships starting at $19.95 Join our 11,324 members who have been paid a total of $485.54! You are probably skeptical of joining a site claiming that you can make money so easily--as you should be! However, you can feel at ease with ptcbiz.com. We do not require you to pay us anything in order to start earning. It is completely free! All you have to do is create an account and click our advertised links everyday. For each link you click, you must view our advertiser's website for 30 seconds, click a specified number for confirmation, and then the money will be instantly added to your account. Once you have reached $10, you can request your account balance and it will be transferred to your Paypal or Alertpay.

loveguru2056,earnyet

About This Blog

  © Blogger template The Professional Template II by Ourblogtemplates.com 2009

Back to TOP