Appendix B. What’s on the Steal This Computer Book 4.0 CD

This CD contains 648MB of freeware programs that you can copy, give away, and use to protect yourself against the latest threats on the Internet, including viruses, worms, Trojan horses, and spyware.

While the programmers who wrote these programs tried to do the best job possible, there’s still a chance that bugs could cause various problems with your computer. If in doubt, test these programs on a computer that you can afford to mess up before installing them on a machine that contains valuable data. Neither the author nor No Starch Press takes any responsibility for the way these programs may work or behave.

Note

All files on this CD are designed to run under Windows unless specifically labeled otherwise, such as (Mac OS X) or (Linux).

Uncompressing, Unzipping, Unstuffing, and So On

Many of these programs are compressed, as indicated by their extensions. You must expand or uncompress these programs before you can run them.

  • .zip files are Windows files which may be “unzipped” with StuffIt Expander or WinZip.

  • .exe files are program files; double-click them from within Windows to extract them and run the application.

  • .sit and .sitx files are Macintosh StuffIt files which may be “unstuffed” with StuffIt Expander.

  • .dmg files are Mac OS X disk image files that you can double-click to access their contents.

  • .gz and .tar are gzipped or tarred Linux files, which may be uncompressed with LinZip or tar.

Chapter 1—The Hacker Mentality

Beginner

Text file containing “The Beginner’s Guide to Hacking and Phreaking.”

Cracker

White paper from Network Security Solutions entitled “Techniques Adopted By ‘System Crackers’ When Attempting To Break Into Corporate or Sensitive Private Networks.”

Hacknov

Text file containing “A Novice’s Guide to Hacking.”

Chapter 2—The First Hackers: The Phone Phreakers

Att_ccg.zip

AT&T credit card calling number generator.

CA_setup

Cain & Abel password recovery program that can sniff a network for data and listen in on voice over Internet protocol (VoIP) phone calls.

Ccnum.zip

Credit card number generator, includes source code written in Pascal.

Cphreak.zip

Phone boxing program for Windows.

Hackvmb

Text file explaining how to hack voice mail systems.

Phonetag.zip

War dialer.

Phreakmaster.zip

Blue box program.

Pgpfone10b2.zip

Turns your computer into a secure, encrypted telephone.

Redpalm++.zip

Red box program for the Canadian telephone network, designed to run on Palm OS 3.0 handheld computer.

Shittalker.zip

Gag program that lets your computer make crank calls.

Switchboard.zip

Mimics different telephone color boxes.

Vmbhackr.zip

Program for hacking voice mail systems.

Vmbhaq

Text file explaining how to hack a voice mail system.

(Linux) Vomit-0.2c.tar

Converts an intercepted VoIP phone call into a WAV audio file.

Winphreak.zip

Telephone boxing program.

Chapter 3—Hacking People, Places, and Things

Artoflockpick

Text file explaining the basics of lock picking.

Basictrashing

Text file explaining the fine art of Dumpster diving to retrieve useful items or information.

Carlocks

Text file explaining how car locks work and how to pick them.

Combolocks

Text file explaining how to pick and open combination locks.

Hemp_for_victory_1942

Department of Agriculture documentary encouraging farmers to grow hemp to support the war effort.

jPodder-Setup

jPodder program for retrieving podcasts.

Juice22setup

Juice program for capturing and listening to iPod podcasts.

(Mac OS X) Juice_2.2_install.dmg.gz

Juice program for capturing and listening to iPod podcasts on a Macintosh.

Lockpicking

Another text file that explains how to pick combination locks.

Podifier_v2.1_setup

Program for creating your own podcasts.

(Mac OS X) Podifier_v2.1.hqx

Program for creating podcasts on a Macintosh.

Social

Text file explaining how to use social engineering.

Socialfaq

Text file that answers the most common questions regarding social engineering.

Sparks

BlogMatrix Sparks! Program for creating your own podcasts.

Trash

Another text file explaining how to dumpster dive.

Trashing

One more text file explaining how to dumpster dive.

Trashingguide

Yet another text file explaining dumpster diving. (By reading a variety of dumpster diving tutorials, you can learn which techniques work best for different problems.)

Chapter 4—ANSI Bombs and Viruses

Ansibomb

Text file explaining how ANSI bombs work.

Bombansi

Text file containing the source code to a sample ANSI bomb that will format your hard drive.

Chaos07

Text file explaining how to make ANSI bombs.

Clamwin-0.87.1-setup

Open-source Clam antivirus program.

(Mac OS X) ClamXav_1.0.1.dmg

Open-source Clam antivirus program for the Macintosh.

Darkangel

Text file explaining how to write viruses.

Removeit_pro

RemoveIT-Pro program for detecting and removing viruses.

Sdefendi

Script Defender protects against all forms of malicious code (such as macro viruses) that run scripting languages such as VBScript or JavaScript.

Strap

ScripTrap program for stopping viruses from running scripts.

Chapter 5—Trojan Horses and Worms

Asviewer.zip

Monitors all the programs that start and run automatically whenever you boot up Windows. Can be used to detect Trojan horses or spyware running in the background without your knowledge.

Comp_trojans

Text file explaining the different types of Trojan horses and how they can infect your computer.

Errsource.zip

Delphi source code for a simple Trojan horse that displays a Fatal Network Error message on the screen and then prompts the user to type a user name and password.

Fake_freeav.zip

Trojan horse that displays a fake AltaVista login screen that tricks people into typing their a valid user name and password.

HoneyPotv1.0-Download2.zip

HoneyPot program that watches out for hacker activity accessing ports on your computer.

Irclean

Stops worms from spreading through IRC chat rooms.

Jammer17f

Defensive program for guarding against the Back Orifice and NetBus remote access Trojans.

LameBus

Delphi source code for the LameBus program designed to stop the NetBus remote access Trojan.

Morris Internet worms source code.zip

C source code to the famous Internet worm that took down the Internet in 1988.

Netbuster 1.31.zip

NetBuster program for detecting and stopping the NetBus remote access Trojan.

Nps16.zip

NetBus Protection System to protect your computer from the NetBus remote access Trojan.

Remover

Detects and removes worms and Trojan horses.

Slap

Allows you to send messages back to any hackers trying to sneak through a port on your computer.

StartUpMonitor.zip

Monitors all programs that start up automatically. Useful for catching Trojan horses or spyware running without your knowledge.

(Mac OS X) Zebrascanner3.0.2.zip

Zebra Scanner for detecting Trojan horses.

Chapter 6—Warez (Software Piracy)

Kf141.zip

Key Finder program for recovering the Microsoft product keys from the Windows registry.

RockXP3

Retrieves product keys from all installed Microsoft products and saves the Windows XP product activation file.

Chapter 7—Where the Hackers Are

Hacker Sites

Web page listing different computer security and hacker websites.

Netirc

NetIRC program for participating in IRC chat rooms.

Virc200

Visual IRC program for communicating in IRC chat rooms.

Chapter 8—Stalking a Computer

(Mac OS X) CrackAirport01.dmg

Cracks WEP encryption to wireless networks.

(Linux) Cst1_41.tar

CUM Security Toolkit that includes a port scanner and a script scanner for foiling Intrusion Detection Systems (IDS).

eMmyIP20

Email My IP program that identifies a computer’s IP address and emails it to you.

Honeyd-0.5a-win32.zip

Honeyd program for creating “honeypots” on ports to detect and track hacker activity.

Iploc17.zip

Atelier Web IP Locator program for tracking down the physical location of an IP address.

(Mac OS X) IPLocator.wdgt.zip

Dashboard widget that can provide the physical location associated with an IP address or URL domain.

Ipscan

Angry IP scanner that can scan a range of IP addresses.

(Mac OS X) KisMACR65.zip

KisMAC program for sniffing data from wireless networks.

Lanspy.zip

Lets you remotely examine another computer on a local area network.

NBrute10

NetBrute program for scanning and detecting open ports and testing websites for password security.

Netscan

NetScan program to scan for open ports on another computer.

Netstumblerinstaller_0_4_0

NetStumbler program for detecting WiFi networks.

PCscanner

Scans a computer for open ports.

SimpleScan.zip

Visual Basic 5 source code to a simple port scanner.

Spade114

Sam Spade Internet tool that offers ping, nslookup, WHOIS, IP block, dig, traceroute, and finger commands.

Tjping.zip

Ping, traceroute, and lookup utility.

(Mac OS X) WAP_Map.dmg.gz

Wireless network mapping tool that locates access points in a wireless network.

(Mac OS X) whatPorts.dmg.sit

whatPorts program for scanning ports.

Wups

UDP port scanner for Windows.

Chapter 9—Cracking Passwords

Actualkeylogger

Actual Keylogger program for capturing keystrokes.

Creating a VB Keylogger

Text file explaining how to capture keystrokes using Visual Basic.

Freekgbkeylogger-193

Unique keystroke logger that can also capture foreign characters.

Freelogger

Free Key Logger program for capturing keystrokes.

Homekeylogger.zip

Home Keylogger for capturing keystrokes.

John-16w.zip

John the Ripper password cracker.

Kbhook.zip

Explains how to capture keystrokes using Visual C++ source code.

Keylogger.zip

Keystroke logging program.

Keylogger-king-free-13

Keylogger King program for capturing keystrokes.

Kreview.zip

Compares and lists information about different keystroke logging programs.

Logger.zip

Adiscon Logger keystroke capturer.

(Mac OS X) Logkext.dmg

Keylogger program for capturing keystrokes.

(Mac OS X) Mkrack.dmg

MacKrack password cracking program.

PeekaBoo

Retrieves a password hidden behind asterisks.

PWReveal10setup

Password Revealer that can “peek” behind passwords, masked by asterisks, and reveal the actual password hidden underneath.

RevelationV2.zip

Displays passwords hidden behind asterisks.

Screenlog.zip

ScreenLog Version 1 program that takes snapshots of the computer screen periodically to record what appeared there.

SnoopyPro-0.22.zip

Snoopy Pro program for sniffing data over a USB connection.

(Linux) Snort-2.4.3.tar.gz

Snort network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.

Tkey-setup.zip

Tiny Keylogger program. (Requires Microsoft .NET framework 1.1.)

Unmaskit.zip

Reveals any password hidden on-screen by asterisks.

Wssetup

Super WinSpy program for monitoring activity on your computer.

Chapter 10—Digging into a Computer with Rootkits

AriesRemoverInst

ARIES Rootkit Remover that gets rid of the rootkit developed by First4Internet and used on certain Sony CDs to hide its Digital Rights Management (DRM) software.

Fmbb_404

FileMap program for detecting when unknown files suddenly appear on your hard disk.

RootkitRevealer.zip

Scans the Windows registry for signs of kernel-mode rootkits lurking on your computer.

Chapter 11—Censoring Information

Anonymous Proxy Servers

Web page that lists several free sites that allow you to surf the Internet anonymously.

Bmppacker.zip

Hides data in BMP graphic files.

CameraShy.0.2.23.1

Camera/Shy tool for downloading steganography images off web pages automatically.

Cameleon.zip

French steganography program for hiding data in GIF files using AES encryption.

(Mac OS X) Ciphire-mail-01.1.015-osx-ppc.dmg

Ciphire Mail program for encrypting your email.

Dpt32

Data Privacy Tools encryption program that can hide data in graphic files.

GhostzillaCD-1.0.1-free-v1.zip

GhostZilla program that allows you to browse the Internet from within another program.

Handbook_bloggers_cyberdissidents-GB

PDF file of a blogging handbook with guidelines for sharing information without getting caught by government authorities.

How to bypass Internet censorship

Web page that explains different techniques for overcoming Internet censorship.

ImageHide.zip

ImageHide program for hiding data in graphic images.

Infostego3

Info Stego Personal 3.0 program for hiding data in BMP graphic files.

Kidlogger

KidLogger program for recording keystrokes, capturing websites visited, and storing chat room conversations. Includes Visual C++ source code.

MP3Stego_1_1_17.zip

MP3Stego program for hiding data in MP3 audio files, includes Visual C++ source code.

Netdogv1.1.10

NetDog Internet filter for blocking access to porn sites.

(Mac OS X) PictureSpy.sit

PictureSpy program for hiding data in graphic images.

(Mac OS X) Proxify.wdgt.zip

Dashboard widget for surfing anonymously using the Proxify proxy server.

S-tools4.zip

S-Tools steganography program for hiding data in graphic and audio files.

Setup_en

Naomi filtering program for blocking sites unfit for children.

Setupex

Gif-It-Up program for hiding data in GIF graphic files.

Stegdetect-0.4.zip

StegDetect for detecting hidden messages in graphic files.

Verdict_Shi_Tao

PDF file containing the criminal verdict of a journalist sentenced to 10 years in prison after Yahoo! revealed his email address to Chinese authorities.

Chapter 12—The Filesharing Networks

Binjet-107

BinJet program for retrieving large files (music, movies, software, etc.) off Usenet newsgroups.

Einstein10

Filesharing program designed for students to share homework, term papers, and tests.

File Sharing

Flash movie describing how a typical filesharing program works.

Grabit153b

GrabIt program for finding and retrieving audio, video, and program files off Usenet newsgroups.

IRC example

Flash movie that shows how to download files from an IRC chat room.

Ksr.zip

Deletes all spyware installed by the Kazaa filesharing program.

Newsgroups

Flash movie that shows how to download files from newsgroups.

(Mac OS X) PeerGuardian_1.2.zip

Macintosh Peer Guardian program for blocking IP addresses of the police and music labels who might try to see what type of files you’re sharing.

Pg2-050918-nt

Windows Peer Guardian program for blocking IP addresses of the police and music labels who might try to see what type of files you’re sharing.

Tribalweb_setup

TribalWeb program for creating your own private filesharing network with friends.

Web site example

Flash movie that shows how websites share files that people can download.

Chapter 13—The Internet Con Artists

CallingID

Uses up to 52 different verification tests to identify bogus phishing websites.

Megahack.zip

Program designed to subvert the online chain letter scam Mega$Nets. Includes Visual Basic 3.0 source code.

PhishGuard-1-2-186

Detects bogus phishing websites designed to trick you out of passwords, account numbers, or credit card numbers.

TrustToolbar

Internet Explorer add-in that can alert you when you’re visiting a suspected phishing website.

Chapter 14—Finding People on the Internet

Stalking Fact Sheet

PDF file of stalking facts and information produced by the Stalking Resource Center.

Stalking Investigation Guide

PDF file of a British guide that helps police investigate stalking crimes.

Chapter 15—Propaganda as News and Entertainment

Newspk21.zip

Newspeak program for translating ordinary text into politically correct language.

NewsraiderP.zip

NewsRaider program that yanks news articles from different newspapers and magazines and collects them for your viewing convenience.

NewzieSetup

Retrieves news from multiple sources.

Online News Sources

Web page listing worldwide news sources, including newspapers, magazines, and news services.

Search Engine List

Web page listing different search engines, including specialty and international search engines.

Chapter 16—Hacktivism: Online Activism

Pakistan Zindabad hack

Flash movie that shows a politically motivated website defacement.

September 12th

Flash movie that shows how the September 12th political activist video game works.

Ztps.zip

Zapatista Port Scanner.

Chapter 17—Hate Groups and Terrorists on the Internet

(Mac OS X) CostOfWar.wdgt.zip

Dashboard widget that estimates the current cost of the war in Iraq.

Fallout Meter

PDF file explaining how to create your own fallout meter for measuring radiation.

FBI Law Enforcement Bulletin

PDF file that describes the seven-stage model that characterizes hate groups.

Terrorism News Links

Web page containing links to different sites offering news about terrorism and hate crimes.

Threat-1.0.4.zip

Displays the color of the current terrorist threat level.

Chapter 18—Identity Theft and Spam

CoffeeSpamBlocker41R

Spam filter.

Ellafree_full

Ella for Spam Control program for filtering spam with Microsoft Outlook.

EmC817

EmC spam filter.

Extractor.zip

Email extractor program for ripping out email addresses stored in text files.

(Mac OS X) isafe.zip

The iSafe program for storing passwords, credit card contact information, and other valuable information in one convenient location.

MailWasherFree

Spam filter that can bounce spam back to the sender with an “address unknown” message.

Mbdisp2

Mail Box Dispatcher program for filtering spam.

Spamhilator_0_9_9_9

Spam filter.

SpamAware-Setup

Spam filter for Microsoft Outlook and Outlook Express.

SpamExperts Home Installer

SpamExperts spam filter.

(Mac OS X) Spam_UCE_1.0_scpt.zip

Works with the Mac OS X Mail program to forward spam automatically to the Federal Trade Commission and bounce it back to the sender.

SpoofMail v1-1-7.zip

SpoofMail program that shows how to forge email headers.

(Mac OS X) TheObfuscator.wdgt.zip

Dashboard widget that converts the text of an email address into its equivalent ASCII code representation.

Vengine

Verification Engine that examines websites and alerts you to fraudulent ones that may be phishing for your password or credit card number.

Chapter 19—Banner Ads, Pop-up Ads, and Search Engine Spamming

Ad.htm, Fileshare.jpg, Home.htm, and HTML.gif

Sample JavaScript code that shows how websites create pop-up ads.

PopUpStopperFree

Pop-Up Stopper program for blocking pop-up ads.

Seosurfsetup

SEOSurf program for helping you to optimize your website for the highest possible rankings on different search engines.

Sfg800c

SafeGuard Popup Blocker.

SmartPopupBlocker101

Smart Popup Blocker program that kills pop-up ads and protects your home page from being changed by spyware.

Chapter 20—Adware and Spyware

A2freesetup

Scans and removes worms, Trojan horses, and spyware.

A2hijackfree

Removes browser helpers (spyware) and monitors active programs to help detect spyware.

Aawsepersonal

Ad-Aware Standard Edition Personal spyware remover program.

Ashield_1_setup_314

Arovax Shield program that detects spyware that tries to change the Windows registry or install itself as a browser toolbar.

ASRSetup—Advanced Spyware Remover

Scans and removes spyware.

Assassin.zip

Wipes out spyware without having to reboot Windows into Safe Mode.

BHODemon20setup_2022

Browser Helper Object (BHO) Demon program for removing browser toolbars installed by spyware programs.

BHR4.1

Browser Hijack Retaliator program that warns you when spyware tries to change the home page setting of your browser.

Cwshredder

CoolWebShredder program for removing CoolWeb, one of the most insidious and difficult-to-remove spyware programs currently infecting computers.

D3tr

Runs the Internet traceroute command but displays the results in a colorful 3D graph.

DisspySetupLITE

Spyware removal program.

Enough

Enough is Enough! program for locking down Internet Explorer to prevent it from allowing spyware. Note: may also block IE from browsing valid sites.

Eulalyzersetup

EULAlyzer analyzes the end user license agreements (EULA) that come with programs for signs of spyware or adware.

HijackThis

Prevents spyware from redirecting your browser and taking over your home page.

Iespyad2

Locks down Internet Explorer to prevent spyware from sneaking onto your computer.

Regprot.zip

Monitors the Windows registry and notifies you when programs (such as Trojan horses or spyware) try to change it without your knowledge.

Spybotsd14

Spybot spyware remover.

Spywareblastersetup351

SpywareBlaster program that tries to prevent spyware from being installed on your computer in the first place.

Spywareguardsetup

Spyware Guard program that scans files for spyware.

StartupList

Lists all the programs that start automatically when Windows boots up. Useful for catching traces of spyware and Trojan horses.

Winmaid.zip

WinMaid program that detects spyware.

Wpsetup

WinPatrol program that detects suspicious programs (such as spyware) running without your knowledge.

Chapter 21—Computing on a Shoestring: Getting Stuff for (Almost) Free

(Mac OS X) Backup_Files.zip

Macintosh Backup & Restore program for backing up your data.

Computing on a Shoestring

Web page listing links to popular freeware programs, including Microsoft Office look-alikes and antivirus programs.

Framxpro.zip

Free RAM Pro program for optimizing and managing memory to make your computer run more efficiently.

Ntregopt-setup

Optimizes the Windows Registry to make your computer work faster.

SpeeDefrag.zip

Program for defragmenting your hard disk.

Chapter 22—Computer Forensics: The Art of Deleting and Retrieving Data

Bciview.zip

Browser Cache Index Viewer program that reads the contents of the Internet Explorer URL cache and tracks websites you’ve visited.

Ccsetup126

Crap Cleaner program that clears out your browser cache and Windows registry.

CoffeePrivacyCleaner20R

Wipes out all traces of what you’ve been looking at on the Internet.

Cryle

Cryptainer LE program that creates “vaults” where you can store files and folders that will get encrypted automatically.

Cshred110

CyberShredder program for overwriting and deleting data securely.

(Mac OS X) DashShredder.wdgt.zip

Dashboard widget for shredding files securely.

(Mac OS X) DashCrypt.wdgt.zip

Dashboard widget for encrypting files using the AES government standard.

Dban-1.0.6_i386.iso

Disk image of Darik’s Boot and Nuke program for wiping out data stored on a hard disk.

Dclean157_all.zip

Disk Cleaner program for securely deleting temporary files.

(Mac OS X) DestroyerX.dmg

DestroyerX program for securely deleting data.

(Mac OS X) DisApPeAr.zip

DisApPeAr program for selectively hiding files and folders.

Diskzapr.flp

Floppy disk image of the Disk Zapper program, which can wipe out and overwrite your hard disk with random data.

Diskzapr.iso

CD disk image of the Disk Zapper program, which can wipe out and overwrite your hard disk with random data.

Dskinv

Disk Investigator program for viewing and recovering previously deleted data.

Eraser57setup

File shredder program.

Free-hex-editor

Hex editor program for examining sectors on a disk.

Krlite

Kryptel Lite file encryption program.

Pci_filerecovery.exe

PC Inspector’s File Recovery program.

PrivateSurf

Clears out your browser cache so nobody can see which sites you’ve visited.

RawCopy.zip

Raw Copy program for copying disks by sector rather than by file.

Security-toolkit

Encrypts and securely deletes data from your hard disk and other removable media.

Sfs.zip

Simple File Shredder for securely deleting your files.

TracesViewer

Displays the contents of the Internet Explorer cache.

Unlocker1.7.6

Program that unlocks files and folders so you can access them.

Unstopcp.zip

Unstoppable Copier program for recovering data from scratched CDs or defective floppy disks.

Xcleaner_free

Free version of the X-Cleaner program that cleans your Internet cache.

Xvi32.zip

XVI32 hex editor.

Chapter 23—Locking Down Your Computer

Note

Although this CD includes several different firewalls, you only need to run one at a time. Installing two or more firewalls won’t make your computer any more secure, and multiple firewalls can confuse and conflict with each other.

AntiHookProSetup25.msi

AntiHook program that can prevent keystroke loggers, spyware, Trojan horses, and rootkits from intercepting operating system function calls.

Autopatcher_xp_dec_2005_lite_english

Automatically patches Windows XP based on Microsoft’s latest recommendations.

Dlpnpauditor.zip

Device Lock Plug and Play Auditor keeps track of any devices connected to your computer through USB ports.

(Mac OS X) Dtd-200.dmg

Deny Thumb Drivers program that prevents anyone from accessing your computer through a USB portable storage device.

English_Free_CompuSec.zip

CompuSec program that encrypts your hard disk and prevents others from logging on without your authorization.

Firewall

Firewall 2004 program.

Firewall_setup

SoftPerfect firewall program.

FileShield Encryption

Encrypts individual files or entire folders.

Ghostwall_setup

Ghost Wall firewall program.

Hardenit

Examines your network and shuts down vulnerabilities automatically.

(Mac OS X) Hide-Out! v2.1.sitx

Hide-Out program that conceals folders on your Mac OS X computer.

Ipig-setup

iPIG security program for protecting your computer on a Wi-Fi wireless network.

Jpfwall

Jetico firewall.

Patchwrk

PatchWork program checks for vulnerabilities identified by the FBI and, if any are found, points you to the Microsoft patches that can fix them.

Pcsecuritytest.zip

PC Security Test program that tests your computer’s defenses to determine how safe (or insecure) your computer may be against common types of hacker attacks.

Preview-setup

Preview program that analyzes and rates how secure your computer may be against hacker and malware threats.

Pshld100.zip

SnoopFree Privacy Shield detects keystroke loggers and other activity monitoring programs that may be spying on your computer.

Qpassgen

Quicky Password Generator that helps you create unique and difficult-to-guess passwords (which may also be difficult to remember).

Secretmakersetup

Secret Maker program for blocking pop-up ads, filtering spam, cleaning your Internet cache, and blocking banner ads.

Secure-It

Examines your Windows computer and shuts down vulnerabilities automatically.

Securepoint_pcfirewall_setup_3.6

SecurePoint firewall.

(Mac OS X) sunShield1.02.sit

SunShield program for configuring the built-in Mac OS X firewall.

Xp-AntiSpy_setup-english

Locks down Windows XP to prevent it from sending suspicious information back to Microsoft.

Xpy-0.9.4-bin.zip

Shuts down known vulnerabilities in Windows XP.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.29.13