Subcategories
11.11
And here we are in 2017, we decided to start it out with a few major changes. Some of those changes you might like, while others might not please you as much, but there always has to be a trade-off.

Let us begin with the good news. First of all, we would like to thank all the 100k visitors that come to us every day. Second, we would like to list all the changes that were recently made on our website:

  • The script of our website was completely rewritten and renewed, which made the website more stable and quick.

  • All ads were removed from our website. No more banners, pop-ups and pop-under ads.

  • The website is using SSL protocols as we care greatly about security.

  • The website is available through Tor network (The Onion Router) by using this link: http://avaxhome5lcpcok5.onion/ or via TOR proxy http://avaxhome5lcpcok5.onion.to/

Now, we’d like to mention some of the unpleasant changes that will befall our users. As you might have noticed, we are now using a new file hosting website - IcerBox.com. From this day forward, all files can be downloaded from premium accounts only.

Do you look at life seeing a half-full or a half-empty glass of water? What we’re getting at is that you can look at this change as a mandatory fee for downloading files or you can view it as a crowdfunding of your favorite project!

Cheers to everyone! We hope that you’ll be with us for years to come!

GET STARTED NOW!

Hacked: A Radical Approach to Hacker Culture and Crime

Posted By: ksveta6
Hacked: A Radical Approach to Hacker Culture and Crime

Hacked: A Radical Approach to Hacker Culture and Crime (Alternative Criminology) by Kevin F. Steinmetz
2016 | ISBN: 1479869716, 1479866105 | English | 288 pages | EPUB | 0.5 MB

Home Network Security Simplified [Repost]

Posted By: tanas.olesya
Home Network Security Simplified [Repost]

Home Network Security Simplified by Jim Doherty
English | 24 July 2006 | ISBN: 1587201631 | 224 Pages | CHM | 14 MB

Home Network Security Simplified is a straightforward, graphic-based home network security reference book for the everyday user.

SQL Hacks: Tips & Tools for Digging Into Your Data

Posted By: tarantoga
SQL Hacks: Tips & Tools for Digging Into Your Data

Andrew Cumming, Gordon Russell, "SQL Hacks: Tips & Tools for Digging Into Your Data"
ISBN: 0596527993 | 2006 | EPUB/AZW | 412 pages | 2 MB/3 MB

Best Internet Links

Posted By: Alex

La bibbia dell hacker di Angelo Vita [repost]

Posted By: naag
La bibbia dell hacker di Angelo Vita [repost]

La bibbia dell hacker di Angelo Vita
Italiano | 29 novembre 2016 | ASIN: B01N1MFY2M | 95 Pagine | AZW3/MOBI/EPUB/PDF (conv) | 99.75 MB

CompTIA Security+ All-in-One Exam Guide (repost)

Posted By: viserion
CompTIA Security+ All-in-One Exam Guide (repost)

Gregory White, Wm. Arthur Conklin, Dwayne Williams, Chuck Cothren, Roger L. Davis, "CompTIA Security+ All-in-One Exam Guide (Exam SY0-401), 4th Edition"
ISBN: 0071841245 | 2014 | PDF/EPUB | 704 pages | 21 MB/9 MB

Race & Crime

Posted By: tanas.olesya
Race & Crime

Race & Crime by Anthony Walsh
English | 2009 | ISBN: 1604566892 | 174 Pages | PDF | 1 MB

This book examines the incendiary issue of racial variation in crime rates in the United States and in many other countries using a variety of data sources.

Managing Major Fires [Repost]

Posted By: tanas.olesya
Managing Major Fires  [Repost]

Managing Major Fires by John F. "Skip" Coleman
English | 30 Jan. 2001 | ISBN: 0912212969 | 330 Pages | PDF | 234 MB

With 25 years of experience, Deputy Chief Coleman offers a common sense approach to handling larger, more unusual second and third alarm, or mutual-aid fires.

CompTIA Security+ - Fundamentals

Posted By: naag
CompTIA Security+ - Fundamentals

CompTIA Security+ - Fundamentals
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 10 | 313 MB
Genre: eLearning | Language: English

Learn the Basics Fundamentals of CompTIA Security+

Hands-On Incident Response Fundamentals

Posted By: naag
Hands-On Incident Response Fundamentals

Hands-On Incident Response Fundamentals
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3.5 Hours | 489 MB
Genre: eLearning | Language: English

Companies around the world are in dire need of qualified IR analysts. Whether you work in security now or intend to transition to the field, this course will teach you the fundamental skills you'll need to thrive in the world of hands-on security.

The Practical Guide To Mac Security

Posted By: AlenMiler
The Practical Guide To Mac Security

The Practical Guide to Mac Security: How to avoid malware, keep your online accounts safe, and protect yourself from other disasters. by Gary Rosenzweig
English | 11 May 2015 | ISBN: 1512174459 | 122 Pages | AZW3/MOBI/EPUB/PDF (conv) | 9.43 MB

Learn how to protect your Mac and yourself in an online world. The Practical Guide to Mac Security teaches you how to stay safe online. Learn how to create and use strong passwords to prevent your accounts from being hacked.

Microsoft Excel Your Way to a Better Job: #80 Tips to Improve Your Prospects and Get a Pay Rise

Posted By: AlenMiler
Microsoft Excel Your Way to a Better Job: #80 Tips to Improve Your Prospects and Get a Pay Rise

Microsoft Excel Your Way to a Better Job: #80 Tips to Improve Your Prospects and Get a Pay Rise (Learn Excel Visually Book 6) by Diane Griffiths
English | 16 Jan. 2017 | ASIN: B01N7T4WDI | 119 Pages | MOBI/EPUB/PDF (conv) | 15.43 MB

People don’t stay on the same path nowadays; they have many jobs and often a few careers. Corporate loyalty is disappearing as people feel uncertain about the stability of the company they belong to and actually, what they want to do.

Public Key Infrastructures, Services and Applications

Posted By: tanas.olesya
Public Key Infrastructures, Services and Applications

Public Key Infrastructures, Services and Applications (Security and Cryptology) by Sokratis Katsikas
English | 19 Jan. 2014 | ISBN: 3642539963 | 216 Pages | PDF | 5 MB

The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving,…

Penetration Testing: A Survival Guide

Posted By: AlenMiler
Penetration Testing: A Survival Guide

Penetration Testing: A Survival Guide by Wolf Halton
English | 18 Jan. 2017 | ASIN: B01N35OHY0 | ISBN-13: 9781787287839 | 1045 Pages | AZW3/MOBI/EPUB/PDF (conv) | 243.18 MB

A complete pentesting guide facilitating smooth backtracking for working hackers

Beginning Ethical Hacking with Python

Posted By: hill0
Beginning Ethical Hacking with Python

Beginning Ethical Hacking with Python by Sanjib Sinha
English | 12 Jan. 2017 | ISBN: 1484225406 | 224 Pages | PDF | 3.69 MB

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.

Global Initiatives to Secure Cyberspace: An Emerging Landscape (Repost)

Posted By: step778
Global Initiatives to Secure Cyberspace: An Emerging Landscape (Repost)

Michael Portnoy, Seymour Goodman, "Global Initiatives to Secure Cyberspace: An Emerging Landscape"
2008 | pages: 174 | ISBN: 0387097635 | PDF | 1,4 mb