Wayne Dyer 1976-2010 Audiobooks

Wayne Dyer 1976-2010 Audiobooks
English | Size: 4.64 GB
Category: Tutorial


Dr. Wayne W. Dyer was the bestselling author of 20 books and had a doctorate in counseling psychology. He lectured across the country to groups numbering in the thousands and appeared regularly on radio and television. He passed away in August of 2015.

PluralSight – Social Engineering with the Social-Engineer Toolkit

PluralSight – Social Engineering with the Social-Engineer Toolkit-iNKiSO
English | Size: 469.01 MB
Category: Tutorial


The Social-Engineer Toolkit (SET) is an open-source Python-driven tool aimed at penetration testing around social engineering. Vulnerability scanners will find the security issues in computer systems, but cannot find them in a human being. If you want a good tool then SET is there to help you assess your company security cavity. In this course, Social Engineering with the Social-Engineer Toolkit, you’ll learn the social engineering attacks that SET supports. First, you’ll discover how the spear phishing attack works in SET in combination with an e-mail attack. Next, you’ll explore how to use the website attack vector, along with creating a payload and a listener. Then, you’ll delve into the mighty PowerShell attacks and how to take advantage of this command line tool to bypass the security on the Windows operating system. After that you’ll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you’ll learn about multiple ways to deal with the Social-Engineer Toolkit, such as the Wireless Access point attack, the QRCode generator, SMS spoofing, and the infectious media generator. By the end of this course, you’ll have the fundamental knowledge to utilize the Social-Engineer Toolkit efficiently

The Hunger Games Complete Series (New and old narrators)

The Hunger Games Complete Series (New and old narrators) (M4B)
English | Size: 2.39 GB
Category: eBook


16-year-old Katniss Everdeen lives in the poorest sector of Panem-its coal producer, District 12. Along with her younger sister, Prim, Katniss awaits the yearly lottery to see who will participate in the Hunger Games, a nationally televised battle where contestants-one boy and one girl, ages 12 to 18, from each of Panem’s 12 districts-fight to the death. But when 12-year-old Prim is chosen as that year’s “tribute,” Katniss spares her sister’s life by volunteering to take her place. Katniss is shipped off to the Capitol-and certain death-along with her fellow District 12 Tribute, the peaceful Peeta Mellark. The pair’s mentor, an arena survivor named Haymitch, comes up with a ploy to pass the two off as star-crossed lovers to gain public sympathy. Katniss and Peeta play for the camera and attempt to avoid a terrible death at the hands of their arena competitors. With the help of her hunting skills and sharp instincts, Katniss gradually becomes a symbol of hope for Panem’s oppressed citizens-and a pawn in a rebellion. Throughout the series, Katniss struggles with her place in the spotlight; her feelings for Peeta and another young fighter from District 12, Gale Hawthorne; and her purpose as a warrior.

PluralSight – Implementing And Managing Microsoft Azure Multi Factor Authentication

PluralSight – Implementing And Managing Microsoft Azure Multi Factor Authentication-REBAR
English | Size: 837.73 MB
Category: Tutorial


Username and password authentication is susceptible to many forms of attack, and multi-factor authentication offers a way to mitigate this threat. Azure multi-factor authentication is a global service that allows you to add a second factor of authentication to your on-premises and cloud based systems using a hardware device already in the hands of your users and customers – their mobile phone. In this course, Implementing and Managing Microsoft Azure Multi-factor Authentication, you’ll learn how to configure Azure MFA in the cloud and on-premises. First, you’ll discover the self-service options available to users and business administrators, and how to integrate Azure MFA with a variety of technologies and applications. Next, you’ll explore the configuration options to integrate Azure MFA with your existing systems. Finally, you’ll see how to protect cloud-based applications with MFA and Conditional Access Policies. By the end of this course, you’ll know how to deploy, configure, and monitor Azure MFA, in the cloud and on-premises.