Monday 5 August 2013

Stedman's Electronic Medical Dictionary v7.0 by mahaar92


Stedman's Electronic Medical Dictionary v7.0


Stedman's Electronic Medical Dictionary v7.0
Stedman's Electronic Medical Dictionary v7.0 | 861 Mb

Medical terminology is defined and brought to life in STEDMAN'S™ most content-rich medical dictionary ever. You can read the definition of a term, hear it pronounced, see it illustrated, and watch it in motion. In short, this CD-ROM gives you the tools you need to understand and use medical terminology correctly in all your communications, written or verbal.
Definitions, Spelling, Pronunciation, and Much More:
* More than 107,000 terms, including 5,000 new terms, are defined by the most trusted name in medical references.
* 30 appendices include cancer classification systems and the Institute for Safe Medication Practices' List of Error-Prone Abbreviations, Symbols, and Dose Designations.
* Usage notes highlight common errors of usage, spelling, and pronunciation.
* Expanded definitions of more than 130 high-profile terms deepen your understanding of their meaning and usage.

Enhanced Multimedia Features:
* Click-on audio icons displayed alongside approximately 60,000 terms let you hear correct pronunciations.
* 1,800 images, most in full color, illustrate key medical terms and concepts—you can see them in context with the definition and then copy them for documentation and presentations.
* Live-action video from Acland's Video Atlas of Human Anatomy presents anatomy in motion.

Everything You Need, Accessible in an Instant:
* Browse the A-to-Z Index
* Refine your search using wildcards
* Bookmark sections you'll want to revisit
* Create your own customized dictionary!

Home Page - www.lww.com/stedmans



Monday 22 April 2013

Download Medical Books of 1st Profession MBBS by mahaar92




From the link below you can access  all downloadable books








Download Medical Books

Sunday 14 April 2013

All Human body muscles with innervation in-tabulated form by mahaar92

Sunday 7 April 2013

Clinical Anatomy Regions, 9th Edition Richard S. Snell




Clinical Anatomy Regions, 9th Edition Richard S. Snell
Lippincott Williams & Wilkins 2011-11-07 ISBN: 160913446X 768 Pages PDF 297 MB
Widely Praised For Its Clear And Consistent Organization, Abundant Illustrations, And Emphasis On Clinical Applications, Clinical Anatomy Regions Delivers The User-Friendly Features And Expert Perspectives That Have Made The Book One Of The Top Teaching And Learning Resources For Those Seeking Insights Into The Practical Application Of Anatomy.
Ideal For Medical, Dental, Allied Health, And Nursing Programs, This Book Guides Students Through The Fundamentals Of Human Anatomy, Explaining The How And Why Behind Each Structure, And Offering Readers The Hands-On Guidance They Need To Make Sound Clinical Choices.
Organized Body Region From Surface To Deep Structures, This New Edition Features:
Updated Design And Layout Allowing For A Shorter, More Focused
Enhanced Color Illustrations And Art Program To Facilitate Visual Learning
Basic Clinical Anatomy Sections With Essential Information On Gross Anatomic Structures Of Clinical Significance
Chapter Objectives That Focus Students On Material Most Important To Their Preparedness For The Patient Encounter
Clinical Notes Highlighting The Clinical Importance Of Anatomical Information
Embryologic Notes With Insight On Developmental Anatomy
Numerous Examples Of Clinical Images To Support The
Surface Anatomy Sections Explaining Surface Landmarks Of Important Structures



Download link below


HISTOLOGY: integument bone muscle digestive circulatory nervous labeled slides





TOP Bone Histology






TOP Muscle histology





Smooth muscle. Note the spindle-shaped cells.

 

TOP Digestive histology: general characteristics, esophagus, stomach, small intestine (duodenum & jejunum) large intestine

general characteristics

esophagus


stomach (transition with esophagus)


body of stomach


small intestine



large intestine
 

TOP circulatory

ARTERY
VEIN
a = tunica media of medium-sized vein
b = adventitia of same vein as in (a)
d = small artery
c and e = very small veins

TOP Nervous


cerebrum



cerebellum



spinal cord

"All Histo Slides Ist Year MBBS STUDENTS Simsonians


Here are most of the slides you will be using in class.

these are actual images taken while placed under compound microscope




Download at link below
https://www.box.com/s/uhoknmjl2pn243asczso

Thursday 4 April 2013

Linux distribution Xiaopan OS testify wireless network


Linux distribution for wireless hacking Xiaopan OS

Xiaopan OS is a small Tiny Core Linux based operating system specific for wireless penetration testing, it comes with the XFE desktop environment, a very lightweight graphical front end, the distribution can run as a live CD, from a USB thumbdrive with Unetbootin or used inside a virtual machine. Numerous wireless card controllers are supported, including Atheros and Broadcom, the most widely used chipsets. As a result of the distribution being based on Tiny Core Linux all of the .tcz precompiled packages available for Tiny Core can be installed in Xiopan using the TCL Appbrowser, non hacking utilities like games, media player, CD burner, VoIP software and Truecrypt can all be optionally added to Xiopan OS.
To crack WPA/WPA2 encryption keys a tool called Reaver-wps is used , the software attacks a router Wifi Protected Setup registrar PINs, this feature comes in many routers for easy set up and it has a hard coded Personal Identification Number tied to the device, by exploiting this Reaver can find out the WPA/WPA2 password, dictionary lists in multiple languages can be downloaded from Xiopan forums.
Wifi hacking Linux distribution Xiaopan
Wifi hacking Linux distribution Xiaopan
After first scanning for the target wireless access point and gathering information like SSID, encryption mode and channel you can launch Reaver brute force attack, the screen will show you real time cracking in progress, it can take up to ten hours to find out the wireless password, or much less depending on how complex encryption and password are, factors for hacking success will involve if your wireless network card supports injection and distance to the attacked Wifi access point, some routers are more vulnerable to injection than others. You can protect your network against brute force attacks with Mac filtering, however the distribution includes other hacking tools like Inflator, Mindiwep, Aircrack-ng and Feeding Bottle,  Mac spoofing is possible.
This Linux live CD is first class penetration testing tool to audit wireless access points security and replaces Beini, a very similar distribution no longer active. Xiaopan is easy to use for beginners thanks to its graphical interface, much lighter than Backtrack, the main problem you can come across with this distribution is that your wireless network card might not be recognised, if that happens it can help troubleshooting looking at what drivers are being loaded inside the tce and cde folders and knowing your network card chipset.
Xiaopan Linux WPA2 hacking
Xiaopan Linux WPA2 hacking
If you want to protect against Reaver attacks you should disable Wifi Protected Setup in your router, unfortunately many of them do not allow you to do this manually, the other option is to use an open source router firmware like DD-WRT, it does not support WPS and Reaver can do nothing against it.

Anonymous OS live CD released

A new live CD made up of Anonymous memorabilia (logos, graphics) and penetration testing tools, being marketed as “Anonymous OS” has been released to the community. The CD runs a customized Ubuntu Linux with the the Mate desktop (Linux Mint, Gnome like desktop) and comes packed with hacking tools like the Anonymous Low Orbit Ion Canon (LOIC) to launch a distributed denial of service against websites with a point and click, the Havij SQL injection utility, John The Ripper and Pyloris password crackers, anonymity tools like i2p, Vidalia, tor proxy and JonDo and packet sniffers like WireShark. The unknown developer says that the live CD is an education tool and should not be used for attacking websites, if you do it is your own responsibility.
There isn’t much on this distribution that would make you want to use it over other well established Linux distros for anonymous communications, like Tails, or well known penetration testing Linux distributions like BackTrack, Grml, Helix or DEFT.
Anonymous OS live CD
Anonymous OS live CD
The OS, which looks suspiciously close to BackTrack Linux, appears to be a marketing gimmick with someone having taken the time to put together already existing PEN testing tools with Anonymous mementos so that it looks cool, i.e. you get to see the anonymous logo during boot time instead of Ubuntu. The only tool not found in other similar Linux distributions is the Anonymous developed and branded own distributed denial of service tool (LOIC), the rest can be found elsewhere.
Like with all software from unknown sources there is the danger of getting backdoored by using it, the authors homepage claims that in Linux there are no viruses, this is inaccurate, it is very rare to find Linux malware, but it can be created, it is not impossible. I see no reason to use this OS over other more well known Linux distributions that do the same. Download at your own risk!
Anonymous OS system password is only given as md5:2ae66f90b7788ab8950e8f81b829c947  once decrypted it will give you the password: anon,you will need it to be root.
Visit Anonymous OS project homepage
UPDATE: SourceForge has decided to remove this project citing security concerns, misleading name and lack of transparency. I have now removed the link to Anonymous OS.

get control to a Remote Windows PC Through Backtrack 5 via SET


Hack a Remote Windows PC Through Backtrack 5 | via SET

4 COMMENTS

Hi folks...
Guys i already described some of the methods about remote PC hack. But today we are going to hack a remote PC using Backtrack. Backtrack is a live OS and much powerful tool for hacks and in it we are going to use SET toolkit. So first you have to know about SET.
What is Social Engineering Toolkit?
The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a penetration testers arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.

Step (1)
Change your work directory into /pentest/exploits/set/

Or Goto:

Step (2)
Open Social Engineering Toolkit(SET) ./set and then choose "Website Attack Vectors" because we will attack victim via internet browser. Also in this attack we will attack via website generated by Social Engineering Toolkit to open by victim, so choose "Website Attack Vectors" for this options.

Step (3)
Usually when user open a website, sometimes they don't think that they are opening suspicious website that including malicious script to harm their computer. In this option we will choose "The Metasploit BrowserExploit Method" because we will attack via victim browser.

Step (4)
The next step just choose "Web Templates", because we will use the most famous website around the world that already provided by this Social Engineering Toolkit tools.

Step (5)
There are 4 website templates Ready To Use for this attack methods, such as GMail, Google, Facebook, and Twitter. In this tutorial I will use Google, but if you think Facebook or Twitter more better because it's the most accessed website, just change into what do you want.


Step (6)
For the next step…because we didn't know what kind of vulnerability that successfully attack the victim and what type of browser, etc, in this option we just choose "Metasploit Browser Autopwn" to load all vulnerability Social Engineering Toolkit known. This tools will launch all exploit in Social Engineering Toolkit database.

Step (7)
For payload options selection I prefer the most use Windows Shell Reverse_TCP Meterpreter, but you also can choose the other payload that most comfortable for you.


Step (8)
The next step is set up the Connect back port to attacker computer. In this example I use port 4444, but you can change to 1234, 4321, etc


Step (9)
The next step just wait until all process completed and also wait until the server running.



Step (10)
When the link given to user, the victim will see looks-a-like Google(fake website). When the page loads it also load all malicious script to attack victim computer.

Step (11)
In attacker computer if there's any vulnerability in victim computer browser it will return sessions value that mean the exploit successfully attacking victim computer. In this case the exploit create new fake process named "Notepad.exe".


Step (12)
To view active sessions that already opened by the exploit type"sessions -l" for listing an active sessions. Take a look to the ID…we will use that ID to connect to victim computer.


Step (13)
To interract and connect to victim computer use command"sessions -i ID". ID is numerical value that given when you dosessions -l. For example you can see example in picture below.


Step (14)
Victim computer owned (Hacked). :)

Step (15)
Now you can do lots of stuffs with victim machine if u know the power of meterpreter.
If you have Any Queries Ask me in form Of Comments and don't forget to share and join this blog and like us on Facebook......

Saturday 16 March 2013

diFiore's Atlas of Histology with Functional Correlations, Eleventh Edition


Book Description

December 12, 2007  0781770572 Eleventh, North American Edition
diFiore's Atlas of Histology with Functional Correlations, Eleventh Edition, explains basic histology concepts through full-color, schematic illustrations. These illustrations are supplemented by more than 450 digitized full-color online photomicrographs of histological images. Part One explains tissues and their relationship to their systems; Part Two addresses organs in a similar way.
Targeting undergraduate, allied health and first and second year medical students, the Eleventh Edition includes new and enhanced images through redrawing and digitization to provide increased detail. This edition also features updated illustrations and information on the functions of cells, tissues, and organs of the body based on advances in research and expert recommendations.
The atlas' student-friendly "Functional Correlations" sections help students study structure and function together. Students also benefit from a "realistic" perspective as more than 70 micrographs appear adjacent to color illustrations.
A companion Website offers student and instructor versions of diFiore's Interactive Atlas with all of the images from the book.



link to download
 https://www.box.com/s/n3xshvhygm8iendmgwd3