You are here

security

Spycraft Locksmithing Lock-picking & Safe-cracking [pack]

SizeSeedsPeersCompleted
6.47 GiB102491
This torrent has no flags.


Spycraft Locksmithing Lock-picking & Safe-cracking [pack] Locksmithing is a growing field that can provide a fascinating career, a good income, job security, and self-fulfilment to anyone with a desire to work hard and succeed. The professional locksmith possesses highly specialized skills that few others have, so a skilled locksmith is always in demand. As a locksmith, you’ll do interesting work while you’re helping people. For this reason, a professional locksmith is always highly regarded in the community and commands the respect of friends and business associates. We designed this practical program to teach you all the basic skills you need to start working as a professional locksmith. You can start using your new skills right away so that you can get the most out of your investment in training. You’ll learn at your own pace (as fast or slow as you wish) through step-by-step instruction. The lessons include hands-on exercises with real locks and professional-quality locksmithing tools. You’ll get all the benefits of professional instruction and training with none of the hassles of the formal classroom. In addition, all the valuable tools that come with your program are yours to keep and to use when you start your professional career. Many professional locksmiths have started successful careers with much less information than you’ll get in this program. With a willingness to learn and a little hard work, you can soon establish yourself as a first-rate locksmith in your community. As you begin this program, you’ll see why there’s a growing need for locksmiths. You’ll discover all types of locks and security devices and you’ll learn how to repair and install all of them. You’ll learn what types of tools locksmiths use and how to set up a proper workbench the way the professionals do. Later in the program, you’ll learn about locksmithing specialties like auto work, safe work, and electronic security. We’ll even show you how to open your own business when you complete the program. Program Preview Just about everyone has thought about what it would be like to have their own business. When you own a business, you work for yourself—you’re the boss. Your creativity and good ideas won’t go to waste. You’re the most important person in the company and no one can fire you. All of the profits of the business are yours; you can feel that your hard work is really paying off. In this program, you’ll learn how you can start your own business and become self-employed, if you choose. You’ll also learn professional locksmithing methods that will save you time and maximise your profits. On the other hand, you may prefer to work for someone else. Perhaps you only want to work part-time, or even as a sub- contractor performing repairs only occasionally. Well, there are many excellent opportunities in locksmithing for you too! You may choose to work for an established locksmith, a security installation company, or even part-time in your own home. locks ebooks 1 Anti-Forensics - The Keys to the Farm.pdf Beating the BiLock.pdf CIA Lock Picking Field Operative Training Manual.pdf Disk Detainer Picking.pdf Easy Pickings A Self Teaching Manual in the Technique of Lock Picking.pdf ERA British Standard Mortice Locks.pdf Four Types of Lock by Deviant Ollam.pdf How to Make PLT Professional Lock Tools.pdf How to Pick a Lock.pdf Improvised Lock Picks.pdf Lock Picking Detail Overkill.pdf Lockpicking Forensics by datagram.pdf LSI Guide to Lock Picking.pdf Make Your Own Lock Picks.pdf MIT Guide to Lock Picking.pdf Mul-T-Lock Design and Security.pdf Ninja Book Room Entry Lock Picking Techniques.pdf Picking Car Locks.pdf Security Lock T-260.pdf The Complete Book of Locks and Locksmithing.pdf The Complete Guide to Lock Picking.pdf The Secret of Picking Locks.pdf Visual Guide to Lock Picking.pdf ebooks 2 CIA Field Expedient Key Casting Manual Paladin Press.pdf Homemade Snap Pick.pdf How Lock Picking Works.pdf How to Make Your Own Professional Lock Tools Eddie the Wire Vol 3.pdf How to Make Your Own Tubular Lockpick.pdf How to Open Locks.pdf How to Pick a Lock Using a Paperclip.pdf How to Pick a Lock.pdf Improvised Lock Picks.pdf Intro to Lockpicking and Key Bumping.pdf Jack MacLean Secrets of a Superthief.pdf Key Bumping.pdf Lock Picking Simplified 1974 Desert Pubs.pdf Lockpick Intro.pdf Lockpicking.pdf Locks Abloy Discs Make the Difference.pdf Magnetic Lockpick.pdf New 15 Bumpkey Template and Instructions.pdf Notes on Picking and Torque Tools For Pin Tumbler Locks.pdf Professional Locksmith Study Course 1189p.pdf Rekeying Manual.pdf Secrets of Lock Picking.pdf Ten Things Everyone Should Know About Lock Picking & Physical Security.pdf The Big Book of Secret Hiding Places Jack Luger.pdf The DEA Handbook (Hiding Keys).pdf ebooks 3 Alarm Bypass.pdf Easy Pickings - Mini Lock Picking Manual.pdf Forcible Entry Techniques.pdf How Safecracking Works.pdf Jack MacLean - Secrets of a Superthief.pdf LSI Guide to Lockpicking.pdf LSS+ Electronic Infobase Edition of Locks Safes and Security, Version 5_0.pdf Open in Thirty Seconds, Defcon 16.pdf Safecracking for the Computer Scientist - Matt Blaze.pdf Sargent and Greenleaf Mechanical Safe Lock Guide.pdf Techniques of Safe Cracking - Wayne Yeager, Loompanics.pdf The Illustrated Art of Lock-Picking, 1976.pdf The National Locksmith Guide to Manipulation.pdf Visual Guide to Lock Picking.pdf ebooks 4 American Lock Bitting Specifications.xlsx American Lock Build Date Code Tool.xlsx American Master Lock Codes.xlsx Axxess Keys Cross Reference.docx 90105D Signature Series low res.pdf 90107 KESO low res.pdf Abloy Locks Han Fey.pdf American Padlock Service Manual 2012.pdf Best Access Systems Cabinet Locks.pdf Best Access Systems Cylinders.pdf Best Access Systems Cylindrical Locks 2.pdf Best Access Systems Cylindrical Locks.pdf Best Access Systems Misc.pdf Best Access Systems Mortise Locksets.pdf Best Access Systems Padlocks.pdf Best Access Systems Tubular Deadbolts.pdf BEST Padlock Service Manual.pdf Decode Master Lock Combination Locks.pdf DOM IX Dimple System Han Fey.pdf H10 american lock.pdf Lockpicking Detail Overkill.pdf Medeco Catalog.pdf MIT Lock Guide.pdf Mul T Lock Catalog.pdf Mul T Lock Information Paper.pdf Obtaining Abus Plus Key Code.pdf Section 0 Introduction and Index.pdf Section 1 Vehicle Automotive.pdf Section 2 North American Cylinders.pdf Section 3 International Cylinders.pdf Section 4 Lookalikes.pdf Section 5 Flat Steel Misc.pdf Section 6 Safe Deposit.pdf Section 7 Bit and Barrel Keys.pdf Section 9 Key Machines.pdf Section 10 Cross Reference.pdf SG 0881 Article.pdf SG 8077 Instructions.pdf SG Environmental Instructions.pdf Signature Series New.pdf Signature Series Old.pdf signature svc 2.pdf signature.pdf The Viro Cylindrical Padlock.pdf Which Lock Should I Buy? – BosnianBill's LockLab.pdf videos 1 bosnianbill - hardware (111) Review_ Peterson Phoenix Ultimate GSP Pick Set (Soon To Be Released) (480p).mp4 (375) Building Your First Lock Pick Kit (480p).mp4 (500) EVERYTHING About Tension Tools! (480p).mp4 (784) Review_ H&H 30-Piece Pick Set (480p).mp4 (813) Review_ Sparrows Vorax (480p).mp4 bosnianbill - Lock Picking for Beginners (24) How to _Rock_ Open a Lock in Seconds (480p).mp4 (36) Master Model 911 SPP'd (and Tension Tool Info) (480p).mp4 (62) How to Pick Sargent & Greenleaf Model 0881 Environmental Padlock (480p).mp4 (63) Rapid Entry Planning (Against Locking Devices) (480p).mp4 (69) The POWER of B_tch Picking (480p).mp4 (92) Train to Pick Locks Under STRESS! (480p).mp4 (168) How to Bypass Euro Thumb turn Cylinders (Protect Yourself!!!) (480p).mp4 (185) Improve Your Lock Picking Skills (for Beginners) (480p).mp4 (190) Lockpicking Fakery_ Don't Let Tricksters Steal Your Confidence!! (480p).mp4 (198) Abus 82_70 Picked Open (Mushroom Pins for Beginners) (480p).mp4 (225) How to Pick Dimple Locks (for Beginners) & an African Lion (480p).mp4 (245) Abus ZB Milled Open & Bypass Explained (480p).mp4 (247) The _Secret_ to Opening Evva Locks (480p).mp4 (253) How to Pick Cross (Zeiss) Locks (480p).mp4 (254) Picking & Bypassing Wafer Locks (480p).mp4 (260) Every Day Carry Lockpick Kit (Kerpeesh Picks!!) (480p).mp4 (269) How to Rake Open SFIC (Removeable Cores) (480p).mp4 (289) Shielded and Unshielded Padlocks (480p).mp4 (290) HEAVY Tension Technique (480p).mp4 (310) How to Open Russwin Locks (480p).mp4 (314) Picking Rukos (480p).mp4 (315) Picking the Assa SCD (480p).mp4 (348) _Tickle_ Dimple Locks Open - Fast! (480p).mp4 (361) SHIM those nasty locks open! (480p).mp4 (375) Building Your First Lock Pick Kit (480p).mp4 (404) Attacking Locks (For Beginners) (480p).mp4 (432) Beating Wafer Locks (for Beginners) (480p).mp4 (452) Finding the Right Tension (for Beginners) (480p).mp4 (459) Master's _Training Locks_ (480p).mp4 (464) How to Bump Locks Containing Security Pins (480p).mp4 (472) Kryptonite Padlock Opened & _Secret_ Explained (480p).mp4 (497) Core Shimming Opening Technique (480p).mp4 (500) EVERYTHING About Tension Tools! (480p).mp4 (540) Rake Open Medeco Locks_ YES! (480p).mp4 (553) Make Bump Keys the RIGHT way! (480p).mp4 (566) Lock Lab Tour (480p).mp4 (569) Chicago Cabinet Lock (Thanks Wayne!) (480p).mp4 (581) Lock Lab's Naughty Bucket (Padlocks) (480p).mp4 (582) Lock Lab's Naughty Bucket (Euro Profiles) (480p).mp4 (583) Lock Lab's Naughty Bucket (Mortises, etc) (480p).mp4 (587) Overlifting (Reverse Picking) Pin Tumbler Locks (480p).mp4 (588) How to (RE)Assemble Locks (480p).mp4 (603) Knog Padlock Picked Open (Thanks Vitaly!) (480p).mp4 (643) VL Combo - TOO Easy!! (480p).mp4 (678) Flywheel's Spool-a-thon (480p).mp4 (688) Kaba 8 - The EZPZ Way... (480p).mp4 (690) Papa Gleb's Bag-o-Locks (480p).mp4 (700) How to Pick Serrated Pins (480p).mp4 (701) Nick's Corbin Cabinet Lock (480p).mp4 (716) Toledo T070 _Pseudo_ Padlock (480p).mp4 (719) Matt's PRIORITY Yale Padlock (480p).mp4 (729) Scott's 100G PacLock (480p).mp4 (751) Using Comb Picks (480p).mp4 (752) Shimming Padlocks (480p).mp4 (757) Tips for Picking Dimple Locks (480p).mp4 (791) How to Pick Disc Detainer Locks (480p).mp4 (858) Southern Specialties LPH-12E Pick Kit (480p).mp4 (867) How to Impression a Key (480p).mp4 (898) 48-Hour SUMMER Giveaway! (480p).mp4 (935) Psychological Warfare #2 (480p).mp4 (936) Review_ Pro-Lok Follower Set (480p).mp4 (940) Andre's Brazilian Papaiz Cross Padlock (480p).mp4 Budget Training Locks (480p).mp4 Choosing a Vise (480p).mp4 How to Kinetic Attack (480p).mp4 How to Rake (480p).mp4 How to Rock (480p).mp4 How to SPP (480p).mp4 How to Zip (480p).mp4 Ultimate Challenge Lock (480p).mp4 How to make a pick gun How to make a pick (SNAP) gun homemade part 2 (480p).mp4 How to make a pick gun homemade part 1 (480p).mp4 How to open safe with lost combination How to open safe with lost combination, key, re-purpose repair reuse, part 1 of 3 safe cracking (480p).mp4 How to open safe with lost combination, key, re-purpose repair reuse, part 2 of 3 safe cracking (480p).mp4 How to open safe with lost combination, key, re-purpose repair reuse, part 3 of 3 safe cracking (480p).mp4 Schuyler Towne - Lockpicking Introduction videos 2 205 SafeCracking on a Budget Redux David Hunt and Zack Nagaich (480p).mp4 B and E; A to Z - How to Get in Anywhere, Anytime (360p).mp4 DEFCON 13 A Safecracking Double Feature Dial 'B' For BackDialing and Spike the Wonder Safe (360).mp4 DEFCON 14 - Eric Schmiedl Safecracking Without a Trace (480p).mp4 EEVblog #762 - How Secure Are Electronic Safe Locks (480p).mp4 Lockpicking, Safecracking, & More by Deviant Ollam & renderman at ShmooCon 3 (360).mp4 Pick a Lock in SECONDS with a Bump Key (480p).mp4 Six Ways to Escape from Handcuffs, Zip Ties & Duct Tape! (480p).mp4 Spies Next Door 3 Stories of Espionage and Counterintelligence in Arlington VA (480p).mp4 Superpicking, The Ultimate Lock Opening Video (480p).mp4 The Last HOPE Safe-Cracking (480p).mp4 videos 3 Cracking A Sentry Electronic Keypad Safe with Tubular Lock (480p).mp4 Diebold safecracking (480p).mp4 How A Safe Works (480p).mp4 How the Handcuffs work (480p).mp4 How to Assemble Cylinder lock Yale 6 pins (480p).mp4 How to Break Into ANY Modern Safe - 3 Attack Methods - HACK THE WORLD (480p).mp4 How to Escape from Handcuffs with secure (480p).mp4 How works a safelock (with coaxial wheels combination device) (480p).mp4 James Bond (Master Safe-Cracker) (480p).mp4 Jeff Sitar - Champion Safe Cracker (480p).mp4 Port St Lucie Locksmith, Safe Cracker (480p).mp4 Recovering the combination on a Sentry s0207 fire safe (480p).mp4 Safe Cracker Liberty Locksmiths (480p).mp4 Safe Cracking (How to open a safe) (480p).mp4 Safe Cracking with Feynman - Numberphile (480p).mp4 Uncrackable safe Cracked (480p).mp4 World Champion Safecracker Jeff Sitar Cracks Bank Vault in 5 Minutes by Touch (360).mp4 locks.jpg Torrent downloaded from concen.org.txt Torrent downloaded from www.DNoid.me - Demonoid.txt tags: locks, lockpicking, safes, safecracking, locksmithing, burglar, security, safety, survival

TheBlackPacket - Tech Info - Volume 2 - Hacking The System (ClownSEC)

SizeSeedsPeersCompleted
4.29 GiB000
FlagCount
Thanks given1
The Black Packet - Tech Info - Volume 2 - Hacking The System This torrent was created to introduce those in the truth community to various forms of hacking. Topics include, RFID, WIFI, picking locks, keeping yourself self secure, FOIA, Data Mining, Physical Weapons, hacking and protecting mobile devices, using game consoles as a hack station, satellite imagery, hacking the smart grid and parking meters, Sniffing keys through the power grid, picking electronic locks and more... See below for complete listing. Enjoy, and feel free to ask questions if you have them! **brainphreak** --------------------------------------------------------- DVD CONTENTS (most taken directly from Defcon's website) 00 - How It's Made - Microprocessors, Circuit Boards, Compact Discs, Computers, and more. - This is a collection of episodes from the show "How It's Made". These episode clips are all relating to computer technology and is very useful to understand how all this stuff is made. Ever wonder how those CD's are made? Your fiber optics? handheld devices? this goes through the complete manufacturing process. Geek out on the machines! 00 - Sonic Outlaws - Within days after the release of NegativlandÆs clever parody of U2 and Casey Kasem, recording industry giant Island Records descended upon the band with a battery of lawyers intent on erasing the piece from the history of rock music. Craig "Tribulation 99" Baldwin follows this and other intellectual property controversies across the contemporary arts scene. This is an excellent documentary covering the topic of Fair Use. 00 - In The Realm of the Hackers - Australian documentary directed by Kevin Anderson about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers who hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA. 01 - Thinking Machines - Creation of the Computer - Covers the history of the computer, and how the basics of computing works. This is a great introduction into the details of a computers past and present. Briefly covers how RAM and CPU's work, various machines built before the personal computer, government funding, punch cards, and how these physical machines became the PC's we use now. 02 - Triumph of the Nerds - Rise of Accidental Empires pt1 - The history of how computers and programming began. The first languages used to help users to easier program computers, how the silicon microchips are created, who invented them, and how they were introduced to the public. See how the first computer clubs were formed, manual programming concepts, how the first software was created, these were the first computer hackers. Includes interviews with Bill Gates, Steve Jobs and other key players. 03 - Warriors of the Net - How Internet Traffic Works - A great visual representation of how the internet works. Includes information regarding TCP,UDP, and ICMP packets. See how the data travels from when you click a link on the website, leaves your computer, enters the private lan, gets routed to other servers, switches, firewalls, and how this is all done to bring you the internet. 04 - Tactical Exploitation - A new method of gaining entry into computer systems. Tactics used to size up the system, the users, the processes, applications, and existing trust relationships. Target the people, expand the scope of your tests, and you WILL get in. Some examples of great utilities and tools used to break into networks or collect data about the systems and people. 05 - Dangerous Minds - The Art of Guerrilla Data Mining - This presentation explains how huge amounts of information collected in the wild such as GPS, emails, chat logs, search results, bank statements etc. can be looked at by a computer to gain intelligence. How does the government find increase chatter over a specific topic? How do they eliminate false positives like popular news stories, or current events which cause natural increases in chatter. Find out how they find criminal networks. 06 - Boomstick Fu - The Fundamentals of Physical Security - This covers defensive weapon ownership. How to stay within the law and keeping your hardware legal. Rules for keeping your guns safe, how to hold your gun, why you should own a gun, and preparing for the worst case. What kind of gun should you buy? Autoloading vs Pump? Shotgun vs Handgun? Ammo? Stun Guns? Tasers? Pepper Spray? 07 - Biometric and Token Based Access Control - Examples of various biometric systems and attacks. A demo showing how to attack the system. Complete diagrams of how these systems work and the various components. Cover mag stripe cards, proximity cards, concealed barcodes, smart cards, and other systems. Also covers eye scans, hand scans, fingerprint scans, and how they are defeated. 08 - Penetration Testing WIFI Networks - Aaron Peterson speak about WIFI networks and its inherent flaws. A full rundown on penetration testing and searching for security flaws, how wifi scanning works, the difficulties and common tools for breaking security. 09 - How To Be A WIFI Ninja - This presentation covers everything you need to know to become a WIFI ninja. How to go through obstacles, examples of devices using this technology, the frequencies used and technical details of the technology. This talk is mostly about setting up WIFI networks with great distance, and understanding the underlying technology. 10 - Shifting the Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key - This lecture covers some more complex attacks on WIFI networks. While many people are still using WEP, this insecure protocol is slowly being replaced. This video explains some of the technologies and how they too can be attacked and the traffic 'sniffed'. Software tools are discussed and examples given to better understand. 11 - WiFish Finder - Who Will Bite The Bait - This is a very short presentation explaining the security problems in over 50% of all computers wifi. Live demonstrations are given showing hwo much info is obtained by members of the audience. Full encryption types, ESSID's, locations, and other information is immediately found as your computer sends this data to anyone looking. 12 - Attacks Against 2Wire Residential Gateway Routers - These are the most common routers on the market today for DSL users. This talk explains some of the ways that these systems can be hacked. Goes over the default passwords, default admin pages and settings, and other useful info. 13 - Hacking IRAQ - This presentation covers the security and infrastructure in IRAQ. Cellphone's, Internet, Land Lines, and other communications are covered. Also covers the IED devices, triggering systems, and how they are created or categorized. 14 - Picking Electronic Locks - A brief explanation of how electronic lock systems work and how they can be defeated. Covers various components and attack points in the system. How TCP sequence prediction and other 'old hacks' can be used in these new systems. 15 - Hacking with the iPod Touch/Iphone/Ipad - Complete guide to using a mobile 'i' device as a hacking platform. Learn how to hack your iphone first, then which software to install, and finally examples if scanning targets and running exploits on a victim machine. 16 - Is Your Phone PWNED? Auditing, Attacking, and Defending Mobile Devices. - This talk explains various methods of hacking mobile phones. Some real world examples and demonstrations are done to show it in action. Covers technologies like wifi and bluetooth which are standard in most new phones. 17 - Sniffing Keystrokes with Lasers and Voltmeters - What is tempest? Explanation of emissions and electro magnetic pulses utilized in keyboard, and display devices and how to read or use this information without detection. See what someone is typing in the room next to you by simply plugging into the electrical outlet and measuring the leakage into the power grid. 18 - Hacking the Smart Grid Power System - Full white paper and video explaining how the new SMART power grid system works and its weaknesses. This includes everything from privacy concerns, to leeching free power. This new system is flawed by design and now being implemented. 19 - Hacking the Smart Parking Meter - This talk explains the various hardware of 'smart' parking meters, ports for access, and the software. Various meters are covered mostly in use in the Bay Area of California. Understand how the security of these devices work, how money is collected, smart cards, and how to get your own meter to play with. This is a great example of how a hack is done from the ground up. Great blueprint/methodology for your own hardware hacking projects. 20 - The Science of Social Engineering - Hypnosis, NLP, and the science of persuasion. This talk has many examples of how the brain works and which choices they make when put into the situation. The power of influence from others, the power of trust etc. Great talk for aspiring social engineers, how the buffer overflow and other hacker tactics work on the brain. 21 - Satellite Imagery Analysis - What are the good and bad uses of satellite images? What things have been caught with imaging from google maps? How were the first aerial shots taken? Did you know UV and Heat can be viewed through satellite imaging? Also covers various ways to sample the images, design considerations for sensors, collecting data and putting it to use. 22 - Thinking Outside of the Console - How to use game console to gain access to a network. How these consoles can be hidden and attract little suspicion. The art of covert pentesting, performing security analysis on a network undetected using modified video game systems. Covers the various game consoles such as xbox, playstation, nintendo wii, and the internal hardware. 23 - RFID Mythbusting - The purpose of this lecture is to demonstrate the insecurity of RFID devices and cards. Chris shows his custom reading device built out of off the shelf components, explains how to build and obtain reader devices, the incredible distance at which these tags can be read, and other security problems with the encryption and protocols. 24 - High Insecurity - Locks, Lies, and Liability - Special talk relating to high security locks and how they work. Demonstrations of engineering problems and methods to bypass the locking mechanisms. Various security methods are analyzed such as drill proof locks, sawing, and pulling. Lots of info on this one as its nearly 2 hours long, some great footage breaking high security locks live. ----------- Painfully hand picked by **brainphreak** of www.theblackpacket.com for the good of the community! Enjoy!

TheBlackPacket - Tech Info - Volume 1 - Hacking Freedom and Safety (ClownSEC)

SizeSeedsPeersCompleted
4.36 GiB010
FlagCount
Thanks given2

The Black Packet - Tech Info - Volume 1 - Hacking Freedom and Safety

Bruce Schneier - NSA Surveillance and What to Do about It [study pack]

SizeSeedsPeersCompleted
3.68 GiB0053
This torrent has no flags.


Bruce Schneier - NSA Surveillance and What to Do about It [study pack]

Bruce Schneier - Applied Cryptography

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

Subscribe to RSS - security