The Kite Runner Movie by IDWS

Posted by admin On 29 Aug 2010 0 comments

Directed by Marc Forster
Produced by William Horberg, Walter Parkes, Rebecca Yeldham, E. Bennett Walsh, Laurie Macdonald
Written by



Khaled Hosseini (novel), David Benioff (screenplay)
Starring Khalid Abdalla, Zekeria Ebrahimi, Homayoun Ershadi, Ahmad Mahmidzada
Music by Alberto Iglesias
Cinematography Roberto Schaefer
Editing by Matt Chesse
Distributed by DreamWorks, Paramount Vantage
Release date(s) 14 December 2007 (limited)
Running time 128 min.
Country United States
Language Persian / English
Budget $20 million
the kite runner download

cd 1
cd 2
Read more...

The Oracle Hacker's Handbook-Hacking and Defending Oracle Introduction

Table of Contents
Chapter 1-Overview of the Oracle RDBMS

  • Processes
  • The File System
  • The Network
  • Oracle Patching
  • Wrapping Up
Chapter 2-The Oracle Network Architecture
  • The TNS Protocol
  • Getting the Oracle Version
  • Wrapping Up
Chapter 3-Attacking the TNS Listener and Dispatchers
  • The Aurora GIOP Server
  • The XML Database
  • Wrapping Up
Chapter 4-Attacking the Authentication Process
  • Attacks Against the Crypto Aspects
  • Default Usernames and Passwords
  • Account Enumeration and Brute Force
  • Wrapping Up
Chapter 5-Oracle and PL/SQL
  • PL/SQL Execution Privileges
  • Wrapped PL/SQL
  • Working without the Source
  • PL/SQL Injection
  • Investigating Flaws
  • Direct SQL Execution Flaws
  • PL/SQL Race Conditions
  • Auditing PL/SQL Code
  • The DBMS_ASSERT Package
  • Some Real-World Examples
Chapter 6-Triggers
  • Examples of Exploiting Triggers
  • Wrapping Up
Chapter 7-Indirect Privilege Escalation
  • Wrapping Up
Chapter 8-Defeating Virtual Private Databases
  • Defeating VPDs with Raw File Access
  • General Privileges
  • Wrapping Up
Chapter 9-Attacking Oracle PL/SQL Web Applications
  • Recognizing the Oracle PL/SQL Gateway
  • Verifying the Existence of the Oracle PL/SQL Gateway
  • Attacking the PL/SQL Gateway
  • Wrapping Up
Chapter 10-Running Operating System Commands
  • Running OS Commands through Java
  • Running OS Commands Using DBMS_SCHEDULER
  • Running OS Commands Directly with the Job Scheduler
  • Running OS Commands Using ALTER SYSTEM
  • Wrapping Up
Chapter 11-Accessing the File System
  • Accessing the File System Using Java
  • Accessing Binary Files
  • Exploring Operating System Environment Variables
  • Wrapping Up
Chapter 12-Accessing the Network
  • Encrypting Data Prior to Exfiltrating
  • Attacking Other Systems on the Network
  • Java and the Network
  • Database Links
  • Wrapping Up

Appendix A-Default Usernames and Passwords Read more...