Lesson 1 of the Free cainiao course-Explanation of doscommands and use [url] http://www.hackp.com/cnpx/1.rar#/url]
Tutorial 2 of the free black spin cainiao course-detailed instructions on the use of gray pigeons [url] http://www.hackp.com/cnpx/2.rar#/url]
Lesson 3 of the free black spin cainiao course-detailed explanation of the usage of the gray pigeon (online Inner Route ing) [url] http://www.hackp.com/cnpx/3.rar#/url]
Black spin free cainiao class fourth lesson-detailed explanation of the invasion of doscommands [different from the first lesson] http://bbs.hackp.com/cnpx/4ruqindos.rar
Lesson 5 of the free black spin cainiao course -- simple, fast, and no-killing of gray pigeons + fast chicken capturing [url] http://bbs.hackp.com/cnpx/5-gzzj.rar#/url]
Lesson 6 of the Free cainiao course-Overview of Common Intrusion techniques and website data types [url] http://bbs.hackp.com/cnpx/6ruqin.rar#/url]
Lesson 7 of the free black spin cainiao course-a brief summary of how to use the hacker [url] http://bbs.hackp.com/cnpx/07mxz.rar#/url]
Lesson 8 of the free black spin cainiao course -- use differential backup to obtain the WEBSEHLL [url] of a MYSQL-type database website http://bbs.hackp.com/cnpx/08mysql.rar#/url]
Lesson 9 of the free black spin cainiao course-Article 3389 on cainiao chicken capture [url] http://www.hackp.com/cnpx/3389.rar#/url]
Tutorial 10 of the free black spin cainiao course-Teaches beginners how to mount a trojan [url] http://www.hackp.com/cnpx/10xsgm.rar#/url]
Black spin free cainiao class 11th-BT chicken catch for cainiao [url] http://www.hackp.com/cnpx/11btzj.rar#/url]
Download the [url] http://www.skycn.com/soft/16491.html#/url]
Lesson 12th of the free black spin cainiao course -- building the ultimate security PC [url] http://www.hackp.com/cnpx/12dzaqdn.rar#/url]
Black spin free cainiao class 13th course -- gray pigeon no killer active defense [url] http://www.hackp.com/cnpx/hgzms.rar#/url]
Course 14th of the free black spin cainiao course-shell concept and two methods for getting rid of UPX Shells [url] http://www.hackp.com/down/#/url#shelling Lesson 1 .rar
Lesson 15th of the free black spin cainiao course -- simple ASPack shell removal method [url] http://twww.hackp.com/down/#/url#shelling Lesson 2 .rar
Lesson 16th of the free black spin cainiao course -- simple PEPack shell removal [url] http://www.hackp.com/down/#/url#shelling Lesson 3 .rar
========================================================== ==================================
New Century Network Security VIP shell removal tutorial (10 lessons in total) cracking shell removal free kill 1st lesson: UPX shell voice Animation
[Url] http://www.520hack.com/hackdh/dj10/tk/#/url#1lesson release upxshell voice animation .rar
Lesson 2nd: Basic UPX shelling Lesson 2nd
[Url] http://www.520hack.com/hackdh/dj10/tk/#/url?basic upxshelling class 2.rar
Lesson 3rd: Basic ASP shelling Lesson 3rd
[Url] http://www.520hack.com/hackdh/dj10/tk/#/url?basic aspshells class 3.rar
Lesson 4th: Basic ASP shelling Lesson 4th
[Url] http://www.520hack.com/hackdh/dj10/tk/#/url?basic aspshells class 4.rar
Lesson 5: Basic Beidou shelling Lesson 5th
[Url] http://www.520hack.com/hackdh/dj10/tk/tk5.rar#/url]
Lesson 6: Basic instance shelling Lesson 6th
[Url] http://www.520hack.com/hackdh/dj10/tk/tk6.rar#/url]
Lesson 7: Basic FSG case-removing Lesson 7th
[Url] http://www.520hack.com/hackdh/dj10/tk/tk7.rar#/url]
Lesson 8: Basic instance shelling Lesson 8th
[Url] http://www.520hack.com/hackdh/dj10/tk/tk8.rar#/url]
Lesson 9: Basic Beidou shelling Lesson 9th
[Url] http://www.520hack.com/hackdh/dj10/tk/tk9.rar#/url]
Lesson 10: Basic shelling Lesson 10th
[Url] http://www.520hack.com/hackdh/dj10/tk/tk10.rar#/url]
========================================================== ================================
VIP tutorials !!
Lesson 4 configure the most popular Web Servers
[Url] http://vip.hackant.com/vipsoft/vipteacher/iis1010.zip#/url]
Lesson 5 build a DNS and DHCP server
[Url] http://vip.hackant.com/vipsoft/vipteacher/dnsdhcp.zip#/url]
Lesson 6 simulate hacker attacks and security protection
[Url] http://vip.hackant.com/vipsoft/vipteacher/hacksec.zip#/url]
Lesson 7 Ultimate configuration of Personal Computer Security
[Url] http://vip.hackant.com/vipsoft/vipteacher/psec.zip#/url]
Lesson 8 How to kill Trojans
[Url] http://vip.hackant.com/vipsoft/vipteacher/muma1107.zip#/url]
Lesson 9 how to kill Trojans and use tools
[Url] http://vip.hackant.com/vipsoft/vipteacher/tools1107.zip#/url]
Lesson 10 preparations before intrusion
[Url] http://vip.hackant.com/vipsoft/vipteacher/ruqin.zip#/url]
Lesson 11th Network Address Translation NAT
[Url] http://vip.hackant.com/vipsoft/vipteacher/nat%2.zip#/url]
Lesson 12th create a virtual network VPN
[Url] http://vip.hackant.com/vipsoft/vipteacher/vpn.zip#/url]
13th vulnerability exploitation (1)
[Url] http://vip.hackant.com/vipsoft/vipteacher/iisexp.zip#/url]
14th configure hacker tools
[Url] http://vip.hackant.com/vipsoft/vipteacher/fantasyx.zip#/url]
15th MSSQL Server installation and configuration
[Url] http://vip.hackant.com/vipsoft/vipteacher/ SQL .zip#/url]
Course 1: Win2000 beginners to proficient (1)
[Url] http://vip.hackant.com/vipsoft/vipteacher/win2000.zip#/url]
Course 2: Win2000 beginners to proficient (2)
[Url] http://vip.hackant.com/vipsoft/vipteacher/w2kset.zip#/url]
Lesson 18th Windows 2000 Advanced Operations
[Url] http://vip.hackant.com/vipsoft/vipteacher/network.zip#/url]
Lesson 19th Win2000 soul (1)
[Url] http://vip.hackant.com/vipsoft/vipteacher/ad.zip#/url]
Lesson 20th Win2000 soul (II)
[Url] http://vip.hackant.com/vipsoft/vipteacher/winad.zip#/url]
21st Windows 2000 Security Configuration
[Url] http://vip.hackant.com/vipsoft/vipteacher/w2ksec.zip#/url]
22nd overflow intrusion tutorial
[Url] http://vip.hackant.com/vipsoft/vipteacher/mydoor.zip#/url]
How to Use the 23rd class Backdoor
[Url] http://vip.hackant.com/vipsoft/vipteacher/backdoor.zip#/url]
Vulnerability exploitation in Lesson 24th
[Url] http://vip.hackant.com/vipsoft/vipteacher/telne.zip#/url]
Build your own PHP forum in Lesson 25th
[Url] http://vip.hackant.com/vipsoft/vipteacher/php.zip#/url]
Lesson 1 dos System Basics
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040313.zip#/url]
27th Windows system process optimization and system security reinforcement
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040320winyh.zip#/url]
Lesson 1 clearing logs after intrusion (1)
[Url] http://vip.hackant.com/vipsoft/vipteacher/log.zip#/url]
29th log cleanup after intrusion (2)
[Url] http://vip.hackant.com/vipsoft/vipteacher/clearlog.zip#/url]
Lesson 30th black-based member Learning Method (required-very important)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040?fangfa.zip#/url]
Lesson 1 how to upload a backdoor after intrusion
[Url] http://vip.hackant.com/vipsoft/vipteacher/upl.zip#/url]
32nd course registry application tutorial
[Url] http://vip.hackant.com/vipsoft/vipteacher/reg.zip#/url]
Lesson 1 Proxy server technology study 1
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040508proxy.zip#/url]
Lesson 2 Proxy Server Technology Study II
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040515proxy2.zip#/url]
35th Windows Group Policy Configuration
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040522zcl.zip#/url]
Lesson 1 chat room construction and common attack and defense skills
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040529chat.zip#/url]
Lesson 2 personal computer and website server security
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040612pcserver.zip#/url]
Lesson 38th: allow computer virus protection against firewall rules setting + anti-virus software + QQ virus manual Analysis and Removal
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040619fsq.zip#/url]
39th unicode encoding vulnerability + backdoor hiding settings and Prevention
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040626unicode.zip#/url]
Lesson 40th DDoS attack security analysis and instance demonstration
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040703ddos.zip#/url]
Lesson 41st FTP server establishment configuration and security
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040711ftp.zip#/url]
Lesson 42nd training on how to crack software and create a registration Machine
[Url] http://vip.hackant.com/vipsoft/vipteacher/200407170pj.rar#/url]
Course 1 cracking expert-detailed tutorial on Shell shell shell cracking and registration machine cracking
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040801teach.rar#/url]
Lesson 45th how to use SQL injection to intrude into a website
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040807sqlzr.zip#/url]
46th Linux single operating system installation (Linux 1st)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040815linuxtest.zip#/url]
47th introduction to basic Linux (2nd)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040821linuxdiyi.zip#/url]
Lesson 2 VmwareGSX S2.5 Virtual Machine Installation and Use
[Url] http://vip.hackant.com/vipsoft/vipteacher/usevmware.zip#/url]
49th Linux character + graphical interface installation and configuration (Linux 3rd)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040828linuxsetup.zip#/url]
50th Linux and Windows dual-system installation (Linux 4th)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040904lw2.zip#/url]
51st Linux Desktop introduction and network access configuration (Linux 5th)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040911linuxzn.zip#/url]
52nd Linux File System (Linux 6th)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040918linuxfile.zip#/url]
Lesson 1 Common commands for Linux File Systems (Lesson 53rd in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040925linux#.zip#/url]
54th Linux directory file operation commands (Linux 8th)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20040926linuxdir.zip#/url]
Lesson 55th: a typical linux VI Editor (Lesson 9th in Linux)
[Url] http://vip.hackant.com/vipsoft/#/url]... 1016linuxviedit.rar
56th GRUB configuration in linux (10th in Linux)
[Url] http://vip.hackant.com/vipsoft/#/url]... linuxGRUBconfig.rar
57th tutorial on using compressed files in Linux (11th tutorial on Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20010829linuxrar.rar#/url]
58th Linux compressed package installation and use (Linux 12th)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20041106linuxrar.rar#/url]
Lesson 4 Vmware4.5 Virtual Machine Installation and Use
[Url] http://vip.hackant.com/vipsoft/bigsoft/vmware.zip#/url]
60th GRUB in Linux (13th in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20041113linux18.rar#/url]
61st detailed configuration of Linux User Management (Linux 14th)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20041114linux19.rar#/url]
62nd process management in Linux (15th in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20041120linux?rar=/url]
63rd. log files in Linux (16th in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20041127linux.rar#/url]
64th introduction to shell programming in Linux (17th in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20041205linux.rar#/url]
65th basic network configuration in Linux (18th in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/200437911inux18.rar#/url]
66th Linux DHCP server (Linux 19th)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20041217inux19.rar#/url]
67th samba server in Linux (20th in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20041225inux?rar=/url]
68th samba Server 2 in Linux (21st in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050101inux21.rar#/url]
Lesson 4 crack registration software video tutorial
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050102pojie.rar#/url]
70th explanation of DNS server settings in linux 1 (Linux 22nd)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050?inux22.rar#/url]
71st explanation of DNS server settings in linux 2 (Linux 23rd)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050115inux23.rar#/url]
72nd explanation of DNS server settings in linux 3 (Linux 24th)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050122inux24.rar#/url]
Lesson 73rd set up an apache server in linux (Lesson 25th in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050129inux25.rar#/url]
Lesson 2 set up an apache server in linux (Lesson 2 in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050205inux26.rar#/url]
Lesson 3 set up apache server in linux (Lesson 3 in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050219inux27.rar#/url]
Lesson 4 setting up an apache server in linux (Lesson 4 in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050226inux28.rar#/url]
77th Simple Network Security Configuration in linux (29th in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050305linux29.rar#/url]
Lesson 78th simple use of Iptables in linux (Lesson 30th in Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050306linux30.rar#/url]
79th program compilation in linux: A simple knowledge of the gcc compiler (Linux 31st)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050312linux31.rar#/url]
Lesson 1 kernel File kernel and summary of linux (Lesson 6 of Linux)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050319linux32.rar#/url]
Lesson 81st how to use webshell to install the radmin Backdoor
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050326webshell.rar#/url]
Lesson 82nd teach you how to create a picture-based hidden Trojan (using deception to intrude into the Trojan)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050402ycm.rar#/url]
Lesson 83rd how to use graphics to control machines with weak ports during intrusion
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050403txkz.rar#/url]
Lesson 84th exploitation of vulnerabilities-non-weak passwords to trick users into executing preset commands to escalate Permissions
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050409ipcr.rar#/url]
Lesson 85th hacker's essential network command net command practice
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050416net#.rar#/url]
Course 4: All functions in one-hacker tools a D network toolkit
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050422adi.rar#/url]
Lesson 1 What are the tools used by hackers to transmit files: tftpd, flashfxp, and FTP
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050423fileftp.rar#/url]
Lesson 88th intrusion: easily stealing other ADSL Internet accounts
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050?adsl.rar#/url]
Lesson 4 send emails as required-configure anonymous email sending tutorial
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050507mail.rar#/url]
90th basic simple network tutorial
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050514net1.rar#/url]
91st simple assembly tutorial 1
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050514asm1.rar#/url]
92nd simple assembly 2
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050514asm2.rar#/url]
93rd simple assembly 3
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050515asm3.rar#/url]
94th simple assembly tutorial 4
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050515asm4.rar#/url]
Lesson 95th using IPC Vulnerabilities
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050521ipc2.rar#/url]
Lesson 1 webpage Trojan summary (Part 1)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050521web1.rar#/url]
Lesson 1 webpage Trojan full strategy (Part 2)
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050522web2.rar#/url]
98th simple assembly tutorial 5
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050522asm5.rar#/url]
Lesson 6 simple assembly tutorial 6
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050522asm6.rar#/url]
100th use flashget to download member tutorials
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050525get.rar#/url]
Lesson 1 explanation of three hacker scanning tools on Network
[Url] http://vip.hackant.com/vipsoft/vipteacher/gongjv101.rar#/url]
Beginner in Lesson 102nd-comprehensive introduction to mongodws System
[Url] http://vip.hackant.com/vipsoft/vipteacher/2005529windows.rar#/url]
Lesson 2 installation and usage of Vmware in Chinese
[Url] http://vip.hackant.com/vipsoft/vipteacher/vmwaresetup.rar#/url]
104th simple assembly tutorial 7
[Url] http://vip.hackant.com/vipsoft/vipteacher/20050605asm7.rar#/url]
========================================================== ================================
The whole process of asp.net intrusion in Huaxia member zone (1-3 full)
[Url] http://hackant.4lzx.com/20060122/asp.net1.swf#/url]
[Url] http://hackant.4lzx.com/20060220/asp.net2.swf#/url]
[Url] http://hackant.4lzx.com/20060226/asp.net3.swf#/url]
========================================================== ================================
Another one in the black-based DELPHI tutorial! Download after repair
Lecture 1 on Database opening in section 25th
[Url] ftp: // fmoshoujiajia1@57333.com/25.rar[/url]
Section 1 configure ODBC Data sources
[Url] ftp: // fmoshoujiajia1@57333.com/24.rar[/url]
Lesson 2 Delphi mouse event operations
[Url] ftp: // A fmoshoujiajia1@57333.com/23.rar[/url]
Section 1 Delphi link or embed an OLE object
[Url] ftp: // fmoshoujiajia1@57333.com/22.rar[/url]
Section 2 Design of graphic image compiling in Delphi
[Url] ftp: // fmoshoujiajia1@57333.com/21.rar[/url]
20th Lesson Delphi full-featured Media Player Design 03
[Url] ftp: // fmoshoujiajia1@57333.com/javasrar[/url]
Lesson 2 Delphi full-featured Media Player Design 02
[Url] ftp: // fmoshoujiajia1@57333.com/19.rar[/url]
18th Lesson Delphi full-featured Media Player Design 01
[Url] ftp: // f5icrack1@57333.com/18.rar[/url]
Example of getting the current mouse coordinate in section 17th
[Url] ftp: // f5icrack1@57333.com/17.rar[/url]
Create the resource manager and progress bar of section 16th
[Url] ftp: // f5icrack1@57333.com/16.rar[/url]
The creation of a special window + transparent window without code in Lesson 15th
[Url] ftp: // f5icrack1@57333.com/15.rar[/url]
14th detailed explanation of the scroll bar component
[Url] ftp: // f5icrack1@57333.com/14.rar[/url]
Application of timer components in section 13th
[Url] ftp: // f5icrack1@57333.com/13.rar[/url]
Create a realplay player in Lesson 12th
[Url] ftp: // f5icrack1@57333.com/12.rar[/url]
Build your own player in Lesson 11th
[Url] ftp: // f5icrack1@57333.com/11.rar[/url]
Lesson 10: basic exercises compiled by Delphi
[Url] ftp: // f5icrack1@57333.com/10.rar[/url]
Section 9 Delphi programming basics-conditional statements
[Url] ftp: // f5icrack1@57333.com/09.rar[/url]
Section 8 Delphi data types and circular statements
[Url] ftp: // f5icrack1@57333.com/08.rar[/url]
Section 7 basics of Delphi programming-Explanation of common functions
[Url] ftp: // f5icra [/url] Select a category
Section 6 attributes of common delphi components (3) Functions and boxes of dialog boxes (message boxes...
[Url] ftp: // f5icrack1@57333.com/06.rar[/url]
Section 5 attributes of common Delphi components (2) Basic knowledge
[Url] ftp: // f5icrack1@57333.com/05.rar[/url]
Section 4 details about attributes of common Delphi components (1) Basic knowledge
[Url] ftp: // f5icrack1@57333.com/04.rar[/url]
Third, develop windo
[Url] ftp: // f5icrack1@57333.com/03.rar[/url]
In the second lesson, develop a windows notepad by yourself
[Url] ftp: // f5icrack1@57333.com/02.rar[/url]
Basic Programming in the first lesson-simulate and create a plug-in for the bubble shop coupon (Free Download)
[Url] http://vip.hackant.net/txsoft/txdelphi/delphi1.zip#/url];
========================================================== ================================
More than 120 script intrusion animations by Russian hackers
: [Url] http://www.hack5#net/soft/hack/ru&hack.rar#/url]
The password is hack520! @#
========================================================== ================================
In this tutorial
Privilege Escalation under DB_owner
[Url] http://hackant.4lzx.com/20050619/webshell.swf#/url]
Use Alexa to query top-ranking website intrusions
[Url] http://hackant.4lzx.com/20050515/jiaoben8.swf#/url]
Super BackDoor-configuration and usage of hacker guard
[Url] http://hackant.4lzx.com/20050#/hxdef100.swf#/url]
Script Trojan Privilege Escalation Series 1
[Url] http://hackant.4lzx.com/20050123/2005jiao-5-2.swf#/url]
Network Security Course-Review
[Url] http://hackant.4lzx.com/20050413/b9-1.swf#/url]
Topic: Introduction to common tools-trojan detection and removal
[Url] http://hackant.4lzx.com/20050102/muma/muma.swf#/url]
MSSQL Server Security Configuration
[Url] http://hackant.4lzx.com/20041201/wlaq4-25-2.rm#/url]
Script Security Basics
[Url] http://hackant.4lzx.com/20041124/wlaq4-25-1.rm#/url]
MSSQL injection and use of tools in Huaxia member Zone
[Url] http://hackant.4lzx.com/20050422/jiaoben4.swf#/url];
Hacker programming examples: non-security magazine
The hacker programming example explains the good stuff of the non-security magazine. Learning programming is very useful!
[Url] http://download.army6.cn/jing#/nohack3.rar#/url]
========================================================== ================================
Introduction to Huaxia member comprehensive tools (Beginner's entry-level tools)
Lesson 1
[Url] http://hackant.4lzx.com/box1/box1.swf#/url]
Lesson 2
[Url] http://hackant.4lzx.com/jia2/jia2.swf#/url]
Lesson 3
[Url] http://hackant.4lzx.com/jia3/jia3.swf#/url]
Lesson 4
[Url] http://hackant.4lzx.com/jia4/jia4.swf#/url]
Black anti-VIP series shelling animation black anti VIP series shelling animation Lesson 1
[Url] http://vipsoft1.hacker.com.cn/vip1-down/yuyin/tuoke/tuoke1.rar#/url]
Lesson 2 of the black anti-VIP series shelling Animation
[Url] http://vipsoft1.hacker.com.cn/vip1-down/yuyin/tuoke/tuoke2.rar#/url]
Lesson 3 of the black anti-VIP series shelling Animation
[Url] http://vipsoft1.hacker.com.cn/vip1-down/yuyin/tuoke/tuoke3.rar#/url]
Lesson 4 anti-Black VIP series shelling Animation
[Url] http://vipsoft1.hacker.com.cn/vip1-down/yuyin/tuoke/tuoke4.rar#/url]
Lesson 5 of the black anti-VIP series shelling Animation
[Url] http://vipsoft1.hacker.com.cn/vip1-down/yuyin/tuoke/tuoke5.rar#/url]
Lesson 6 of the black anti-VIP series shelling Animation
[Url] http://vipsoft1.hacker.com.cn/vip1-down/yuyin/tuoke/tuoke6.rar#/url]
Lesson 7 anti-Black VIP series shelling animation added in April 5
[Url] http://vipsoft1.hacker.com.cn/vip1-down/yuyin/tuoke/tuoke7.rar#/url]
Download a batch of internal VIP tutorials
========================================================== ================================
What is the real hacker Station of the China-based hawks Alliance
Phase 1:
[Url] http://radio.neteasy.cn/rmdemo/2005/ceus20050127.rm#/url]
Phase II:
[Url] http://radio.neteasy.cn/rmdemo/2005/ceus20050202.rm#/url]
Phase III:
[Url] http://radio.neteasy.cn/rmdemo/2005/ceus20050317.rm#/url]
Stage 4:
[Url] http://radio.neteasy.cn/rmdemo/2005/ceus20050331.rm#/url]
Phase 5:
[Url] http://radio.neteasy.cn/rmdemo/2005/ceus20050512.rm#/url]
Phase 6:
[Url] http://radio.neteasy.cn/rmdemo/2005/ceus20051106.rm#/url]
Stage 7:
[Url] http://radio.neteasy.cn/rmdemo/2005/ceus200?rm=/url]
Stage 8:
[Url] http://radio.neteasy.cn/rmdemo/2005/ceus20051204.rm#/url]
Phase 9:
[Url] http://radio.neteasy.cn/rmdemo/2005/ceus20051218.rm#/url]
Phase 10:
[Url] http://radio.neteasy.cn/rmdemo/2005/ceus20060101.rm#/url]
This article is from 51CTO. COM technical blog