Super Street Fighter 4 Arcade Edition

The project develops the ideas and principles Street Fighter IV - A brilliant fighting game, with delight received by journalists and fans of the genre worldwide.

Divinity 2: Ego Draconis

Blood of the Dragon returns players to World Rivellon. War, hurricane flying on his land, destroying many cities and killed many people. But disaster could happen again. An ancient demon appeared in Rivellon, and together they returned to the world the evil ...

Might and Magic: Heroes VI

The acclaimed RPG franchise returns with Might and Magic Heroes VI. This adventure begins 400 years before the events in Heroes V, showcasing a family of heroes in a thrilling, epic story where Angels plot to revive an unfinished war.

Pirates of Black Cove

Thegame takes place in the 16th century you can travel the waters of theCaribbean with his pirate crew and direct the fear and terr toeveryone around. The ultimate goal - to make sure that you call thePirate King (King of All Pirates).

StarGaze

We'll add more games every week, so keep update with us....Thanks :)

Showing posts with label Computer Networking. Show all posts
Showing posts with label Computer Networking. Show all posts

Wednesday, July 13, 2011

Posted by Bunseth Lik On 3:52 PM 0 comments

Configuring IPCop Firewalls: Closing Borders with Open Source


IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way.
This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they’re important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples.
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users.

Book Details

  • Paperback: 244 pages
  • Publisher: Packt Publishing (October 2006)
  • Language: English
  • ISBN-10: 1904811361
  • ISBN-13: 978-1904811367
  • File Size: 14.1 MiB

Filesonic
Depositfiles
Uploading
Wupload

Posted by Bunseth Lik On 1:05 PM 0 comments

Migrating Applications to IPv6


If IPv6 is to be adopted on a large scale, the applications running on desktop systems, laptops, and even mobile devices need to work just as well with this protocol as they do with IPv4. This concise book takes you beyond the network layer and helps you explore the issues you need to address if you are to successfully migrate your apps to IPv6. It’s ideal for application developers, system/network architects, product managers, and others involved in moving your network to IPv6.
  • Explore changes you need to make in your application’s user interface
  • Make sure your application is retrieving correct information from DNS
  • Evaluate your app’s ability to store and process both IPv6 and IPv4 addresses
  • Determine if your app exposes or consumes APIs where there are IP address format dependencies
  • Work with the network layer to ensure the transport of messages to and from your app
  • Incorporate IPv6 testing into your plans, and use the correct IPv6 addresses in your documentation

Book Details

  • Paperback: 50 pages
  • Publisher: O’Reilly Media (June 2011)
  • Language: English
  • ISBN-10: 1449307876
  • ISBN-13: 978-1449307875
  • File Size: 6.7 MiB
Filesonic
Fileserve
Download Migrating Applications to IPv6
Wupload
Download Migrating Applications to IPv6

Posted by Bunseth Lik On 12:58 PM 0 comments

Virtualization: A Manager’s Guide


What exactly is virtualization? As this concise book explains, virtualization is a smorgasbord of technologies that offer organizations many advantages, whether you’re managing extremely large stores of rapidly changing data, scaling out an application, or harnessing huge amounts of computational power. With this guide, you get an overview of the five main types of virtualization technology, along with information on security, management, and modern use cases.
Topics include:
  • Access virtualization—Allows access to any application from any device
  • Application virtualization—Enables applications to run on many different operating systems and hardware platforms
  • Processing virtualization—Makes one system seem like many, or many seem like one
  • Network virtualization—Presents an artificial view of the network that differs from the physical reality
  • Storage virtualization—Allows many systems to share the same storage devices, enables concealing the location of storage systems, and more

Book Details

  • Paperback: 72 pages
  • Publisher: O’Reilly Media (June 2011)
  • Language: English
  • ISBN-10: 1449306454
  • ISBN-13: 978-1449306458
  • File Size: 12.8 MiB
Filesonic
Fileserve
Download Virtualization: A Manager’s Guide
Wupload

Posted by Bunseth Lik On 12:32 PM 0 comments

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems


It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network?
With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis will teach you how to make sense of your PCAP data. You’ll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP network stack and you’re on your way to packet analysis proficiency.
Learn how to:
  • Use packet analysis to identify and resolve common network problems like loss of connectivity, DNS issues, sluggish speeds, and malware infections
  • Build customized capture and display filters
  • Monitor your network in real-time and tap live network communications
  • Graph traffic patterns to visualize the data flowing across your network
  • Use advanced Wireshark features to understand confusing captures
  • Build statistics and reports to help you better explain technical network information to non-techies
Practical Packet Analysis is a must for any network technician, administrator, or engineer. Stop guessing and start troubleshooting the problems on your network.

Book Details

  • Paperback: 280 pages
  • Publisher: No Starch Press; 2nd Edition (June 2011)
  • Language: English
  • ISBN-10: 1593272669
  • ISBN-13: 978-1593272661
  • File Size: 49.0 MiB

Filesonic
Wupload

Thursday, February 24, 2011

Posted by Bunseth Lik On 11:21 PM 0 comments

Tcl 8.5 Network Programming

Tcl 8.5 Network Programming
Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving language.
This book shows you how to create network-aware applications with Tcl language. Packed with practical examples, the book not only takes you through the implementation of network protocols in Tcl, but also key aspects of Tcl programming.
The book starts with the basic element of Tcl programming as we take a look at the syntax and fundamental commands of the language. To get us ready for network programming, we look at important Tcl features such as object-oriented programming, accessing files, packaging in TCL, event driven programming, and multithreaded applications. To create standalone single-file executable applications with Tcl we take a look at the Starpack technology, and ensure that we'll be able to create robust applications with a thorough coverage of troubleshooting and debugging Tcl applications.