EXPERTS AND PROFESSIONALS ONLY!


    Hacking Tools Download Section AIO

    Share

    zeusk
    Admin

    Posts : 144
    Join date : 2011-12-04

    Hacking Tools Download Section AIO

    Post  zeusk on Sun Nov 11, 2012 6:36 pm

    Welcome to the Hacking Download Section. Here you can download all programs presented in the course. You can find your program by pressingCTRL+F. Simply type the word to look for and press ENTER.
    Note: The programs are compressed in RAR file format. You need to download a file archiver software, like WinRar or 7-Zip, in order to open the files. You can download WinRar for free from here.


    Concept of Hacking


    1. Proxy Software

    GPass

    GPass is a highly advanced software that can encrypt your online data, hide your IP address, and sidestep content filtering and monitoring using a number of secure channels to connect to the Internet and break through the Internet blockade. GPass supports the online applications that you use the most, including Web browsers (e.g. Firefox), multimedia players, email, instant messengers, download managers, and so on.

    Hopster

    Bypass Firewall - Bypass Proxy - HTTP tunnel Chat with your friends using your favourite applications: MSN, AOL, Yahoo Messenger, ICQ, Miranda, Trillian, mIRC... Wherever your friends are, hopster will bypass a censoring firewall and take you right to your buddies.
    Browse, Surf, Download & Chat Anonymously Hide your real IP address and protect yourself from nosy people and wannabe-hackers. With hopster, there's no way anyone will know where or who you are.

    M Proxy

    This provides proxy solutions, with which you can access the blocked websites and protect your online privacy. You can also get free proxy lists.

    Proxy I

    A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.

    Tor

    Tor is free software and an open network that helps you defend against a form of networksurveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

    Code:
    Download Proxy Software : http://www.mediafire.com/?qnd7alwor1rjl8o
    2. Scanners

    GFI Lan Guard

    GFI LANguard™ scans your network and ports to detect, assess and correct security vulnerabilities with minimal administrative effort. As an administrator, you have to deal separately with problems related to vulnerability issues, patch management and network auditing, at times using multiple products. However, with GFI LANguard these three cornerstones of vulnerability management are addressed in one package. This gives you a complete picture of your network set-up and help you to maintain a secure network state faster and more effectively. Vulnerability Management Patch Management Network Auditing

    Nessus

    The Nessus® is a vulnerability scanner for active scanners, featuring high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.

    Net Tools

    Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields.

    NMAP

    Nmap ("Network Mapper") is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), and a utility for comparing scan results.

    Code:
    Download Scanners: http://www.mediafire.com/?7ay1u4934cu3v0c
    Email Attacks


    1. Email Server

    Email Tracker Pro

    eMailTrackerPro helps wipe out SPAM email from your inbox and can trace any email to its true geographical location.

    Neo Trace Pro

    NeoTrace shows you how packets get from your computer to another computer on the Internet by displaying all nodes between your computer and the trace target.

    Post Cast Server

    PostCast Server is an SMTP mail server program that completely replaces your ISP's SMTP server. By making one small change in your e-mail program, you can start sending messages directly from your computer. With the help of Post Cast Server you can turn your Computer into a Email Server.

    Surege Mail Server

    SurgeMail is an advanced secure easy to manage and install high performance email server using fast browser based administration tools. Surgemail includes user and domain self administration. Surgemail is scalable to an unlimited number of users or domains. Surgemail's efficiency mean tens of thousands of users can be supported even on very modest hardware.

    H Mail Server

    hMailServer is a free e-mail server for Microsoft Windows. It's used by Internet service providers, companies, governments, schools and enthusiasts in all parts of the world. It supports the common e-mail protocols (IMAP, SMTP and POP3) and can easily be integrated with many existing web mail systems. It has flexible score-based spam protection and can attach to your virus scanner to scan all incoming and outgoing email.

    Free SMTP

    Free SMTP Server is a SMTP server program for Windows that lets you send email messages directly from your computer. It's very simple but very useful for laptop users traveling around the world and connecting their PCs to different Internet Service Providers in different countries. You can use it instead of ISP's SMTP server to increase your security and privacy. The email program you already use for sending and receiving messages can be connected to the server in a very easy way - by using the word "localhost" instead of your current SMTP host. Having done so, you can send messages in a usual manner. Free SMTP Server is very fast, while sending; it establishes dozens of SMTP connections, and gets the most out of your Internet connection.

    Code:
    Download Email Servers: http://www.mediafire.com/?d5a2glc35ta73vi

    2. Scripts

    PHP Phishing Demo Script

    This Script can be used for PHISHING and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.

    PHP Fake Mail Script

    This Script can be used for Sending Fake Mail and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.

    PHP Email Bombing Script

    This Script can be used for Sending Numerous Mails on a Single Click and must solely be used for Educational Purpose only. For using this script, you will have to upload it on some Website.

    Code:
    Download Scripts: http://www.mediafire.com/?jimi3bnl24xeyr7
    3. Tracing Tools

    Email Tracker Pro

    eMailTrackerPro helps wipe out SPAM email from your inbox and can trace any email to its true geographical location.

    Neo Trace Pro

    NeoTrace shows you how packets get from your computer to another computer on the Internet by displaying all nodes between your computer and the trace target.

    Post Cast Server

    PostCast Server is an SMTP mail server program that completely replaces your ISP's SMTP server. By making one small change in your e-mail program, you can start sending messages directly from your computer. With the help of Post Cast Server you can turn your Computer into a Email Server.

    Surege Mail Server

    SurgeMail is an advanced secure easy to manage and install high performance email server using fast browser based administration tools. Surgemail includes user and domain self administration. Surgemail is scalable to an unlimited number of users or domains. Surgemail's efficiency mean tens of thousands of users can be supported even on very modest hardware.

    H Mail Server

    hMailServer is a free e-mail server for Microsoft Windows. It's used by Internet service providers, companies, governments, schools and enthusiasts in all parts of the world. It supports the common e-mail protocols (IMAP, SMTP and POP3) and can easily be integrated with many existing web mail systems. It has flexible score-based spam protection and can attach to your virus scanner to scan all incoming and outgoing email.

    Free SMTP

    Free SMTP Server is a SMTP server program for Windows that lets you send email messages directly from your computer. It's very simple but very useful for laptop users traveling around the world and connecting their PCs to different Internet Service Providers in different countries. You can use it instead of ISP's SMTP server to increase your security and privacy. The email program you already use for sending and receiving messages can be connected to the server in a very easy way - by using the word "localhost" instead of your current SMTP host. Having done so, you can send messages in a usual manner. Free SMTP Server is very fast, while sending; it establishes dozens of SMTP connections, and gets the most out of your Internet connection.

    Code:
    Download Tracing Tools : http://www.mediafire.com/?bwcg7flqdqkcync

    System Hacking


    1. Admin Password Cracker

    Active Password Changer

    Active Password Changer is designed for resetting local administrator and user passwords on Windows XP / VISTA / 2008 / 2003 / 2000 & Windows 7 systems in case an Administrator's password is forgotten or lost. You do not need to re-install and re-configure the operating system. Other Windows login security restrictions like 'Account is disabled', 'Password never expires', 'Disable Force Smart Card Login', 'Account is locked out ', 'User Must Change Password at Next Logon' and 'Logon Hours' can be changed or reset. With Active Password Changer you can log in as a particular user with a blank password.

    Cain & Abel

    Cain and Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. Its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.

    Hiren’s Multi Boot Disk

    Hiren's Multi BootCD is one of the most popular Boot CD-s. It contains dozens of diagnostic tools that would be useful to everyone in different situations. Contains a collection ofsoftware programs to work with partitions on the hard disk, making back up, measuring the productivity of your machine, for testing of memory, hard disk and other hardware, antivirus software with the latest virus definitions and dozens of others

    Offline Password Cracker

    Offline Password Cracker is an amazing password recovery tool but instead of actually recovering your Windows password like OPH Crack and similar tools do, it deletes it. Without a password, you're allowed unrestricted access to your Windows operating system.

    OPH Crack

    Ophcrack is a free Windows password cracker based on Rainbow Tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.

    Sam Inside

    SAMInside is designated for the recovery of Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7 user passwords.

    Code:
    Download Admin Password Crackers : http://www.mediafire.com/?yz3n114g806i7xs
    2. Data Recovery Tools

    Active Disk Image

    Active@ Disk Image is software that makes an exact copy of any PC disks (HDD, SSD, USB, CD, DVD, Blu-ray etc.) and stores it into a folder. The disk images may be used for backups, PC upgrades or disk duplication purposes. In case of computer failure, a backup image may be used to recover your computer system or find & restore any necessary files from within an image.

    B4win Backup

    Easy to use Backup Freeware. Many features including spanned and Huge backups. KISS - Keeping It So Simple. This backup utility is reliable, and simple. Powerful arrangement of backup size - spanning disks, predefined disk size to suit CDR CDRW media etc. Can restore from a disk which has lost the directory reference (most ZIP programs cannot do this).

    Easy Recovery Pro

    EasyRecovery™ software products offer home users or businesses complete solutions for their data recovery, file repair and disk diagnostic needs.

    Eraser

    Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.

    Restoration

    Restoration is an easy to use and straight forward tool to undelete files that were removed from the recycle bin or directly deleted from within Windows, and we were also able to recover photos from a Flash card that had been formatted. Upon start, you can scan for all files that may be recovered and also limit the results by entering a search term or extension. In addition, it also provides the option to wipe the found files beyond simple recovery. The program is small and standalone, it does not require installation and can also run from a Floppy disk. Restoration works with FAT and NTFS as well as digital cameras cards.

    Win Backup

    Win Backup Software makes it easier than ever before to secure your data by making regular backups. Not only will the Backup Software help you organize your backups and schedule automatic backups, it will also protect your data using the latest encryption techniques, compress data to save space, create detailed logs of all backup operations and more. Win Backup Software also features one of the most intuitive user interfaces you have ever seen, making even the most advanced features easily accessible to beginners and professionals alike.

    Code:
    Download Data Recovery Tools : http://www.mediafire.com/?4q0uvnjgqug19mj
    3. Encryptors

    StegoMagic

    StegoMagic brings you a feature-based steganalytic method for music files, text files and images. StegoMagic can hide a message or file in many formats, such as WAV, TEXT, BMP 24 bit and BMP 256 colour files. There will be no change in file size of the carrier medium except when text file is the carrier medium. There will not be any perceptible distortion in the carrier file after hiding. Your file will seem exactly as the original, so it's almost impossible to detect hidden data. Your data is encrypted with a password using D.E.S. (for additional protection) and hidden in the carrier medium. The data to be hidden must be approximately 1/8th of carrier file size or less. No file size restriction for text file carrier files.

    Encryptor

    Encryptor is a password protected utility that allows you to send and receive encrypted emails to your friends and business acquaintances. Encrypt and send mail directly from the program. Saves email address's for quick responding. File size has been kept to a minimum (75 Kb) so you can easily send the program along with your encrypted message as an attachment to the recipient. Easy one button encrypt/decrypt process.

    Image Hide

    Hide your sensitive data in image files. This is great Stenography software, Now with better encryption (RC_4) and SHA hashed passwords, image file versioning, auto image create (fractals), save files to BMP or PNG format, Load in many different image formats.

    PC Security

    PC Security™ is the ultimate in computer security, offering multiple locking systems for the windows environment and internet. Lock files, monitor programs activities, even detect intruders! PC Security offers flexible and complete password protection, "Drag and Drop" support, plus many other handy features. All together, an incredible security package.

    True Crypt

    Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux. Handle this tool very carefully else why you may loss your data.

    Code:
    Download Encryptors : http://www.mediafire.com/?8ck74a4moniigdn
    4. Keyloggers

    Actual Spy Keylogger

    Actual Spy - is a keylogger which allows you to find out what other users do on your computer in your absence. It is designed for the hidden computer monitoring and the monitoring of the computer activity. Keylogger Actual Spy is capable of catching all keystrokes, capturing the screen, logging the programs being run and closed, monitoring the clipboard contents.

    Ardamax Keylogger

    Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.

    Ghost Keylogger

    Ghost Keylogger invisibly captures all keystrokes to a logfile or optionally sends them to a predefined email address.

    Golden Keylogger

    If you have teenage son or daughter (some of us have both), then you know how crazy they are about chatting and instant messaging. We know that it's not all that innocent. TV news are packed with stories when strangers tried to take advantage of innocent children by using internet chats and IM (instant messaging). The problem is so big that FBI has a task force that works 24 hours a day 365 days a year. Another problem that recently got a lot of publicity is bullying and name-calling with instant messengers. While your kids may not be honest with you about who they are chatting with and what they discuss, you have the way to know exactly what's going on without invading your kids' privacy. How? Golden Keylogger!

    Home Keylogger

    Home Keylogger is intended for interception and recording in a file of everything that is entered from the keyboard. The program is able to work in the hidden mode and to emerge on pressing a combination of keys. Home Keylogger is able to present the recorded data in a neat way that is easy to read but at the same time fixing exactly every event that has been done. By constantly using this program you will save your time by preventing accidental data damage and loss that is frequently caused by the use of Internet. You can immediately restore the text which was typed yesterday, the day before yesterday, or one week ago. Home Keylogger will also help to recollect passwords that you have forgotten or to recover lost e-mail.

    Invisible Keylogger

    Invisible is a full featured pc and Internet activity monitoring software that enables you to record everything on your pc. This product is extremely stealth and packs a big punch.

    KGB Keylogger

    Imagine you are writing an e-mail message. Then you click a wrong button or your e-mail client hangs and you have to write the same text from scratch. Sounds familiar? With KGB Free Keylogger, you will never lose any of your text, whether it was typed in an e-mail client, a text editor, an on-line form or anywhere else. This free program logs everything you type. Get your passwords, registration keys and other info safely logged.

    Invisible Keylogger

    Software has enhanced feature to record keystroke activities in encrypted log file with option to mail the log report at your specified email address. Helps to provide full control on your PC and act as powerful surveillance utility for Home and Office usage.

    Remote Keylogger

    Powerful and easy to use Computer Keylogger is a Stealth Keylogger to monitor your PC being hidden while maintaining absolute secrecy in your absence.

    Soft Central Keylogger

    SC-KeyLog PRO is a powerful digital surveillance monitor that logs computer activity for later review. Our spy program allows you to secretly record computer user activities such as e-mails, chat conversations, visited web sites, clipboard usage and more in a protected logfile. SC-KeyLog PRO even captures Windows user logon passwords!

    Stealth Keylogger

    Keylogger Software efficiently monitors the entire typed keystrokes activities of external user performed on your PC or Laptops. Easy to use utility records each keyboard entries including composed emails, chat records, typed web url’s, passwords, text etc. Software has enhanced feature to record keystroke activities in encrypted log file with option to mail the log report at your specified email address. Helps to provide full control on your PC and act as powerful surveillance utility for Home and Office usage.

    Winvestigator Keylogger

    Winvestigator™ is a user monitoring program that starts on boot, and runs undetectable in Windows. It even takes pictures so you can really see what is going on! Although powerful, this program was designed to be easy to use. Offering a web page style interface and a thorough help resource. Winvestigator can send the log over email so you can monitor a computer without having to physically access it.

    Code:
    Download Keyloggers : http://www.mediafire.com/?mvl58ao6iyxybax
    5. Password Recovery Tools

    Asterisk Password Recovery

    Reveals passwords hidden under password dialog boxes and web pages asterisks.

    Chrome Password Recovery

    It is a small password recovery tool that allows you to view the user names and passwords stored by Google Chrome Web browser. For each password entry, the following information is displayed: Origin URL, Action URL, User Name Field, Password Field, User Name, Password, and Created Time. You can select one or more items and then save them into text/html/xml file or copy them to the clipboard.

    Dial Up Password Recovery

    This utility enumerates all Dial-Up entries on your computer and reveals their logon details: User Name, Password and Domain. It works perfectly in the following operating systems: Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, and Windows XP. In Windows 2000 and Windows XP, the Dialupass utility can reveal the Dial-Up passwords only if you are logged on with administrator privileges.

    E-mail Password Recovery

    You've forgotten your Outlook PST password or Mail account passwords? Probably you have lost a note, where your password was written? Password Recovery Engine for Outlook can help you immediately. One click and you get your lost password back.

    Firefox Password Recovery

    Firefox Password Recovery presents itself as a handy tool enabling you to restore any cached passwords for such popular web browsers as Mozilla and Mozilla Firefox. The program will provide you with the list of website passwords straight after you start it. Firefox Password Recovery is very convenient as it provides all the passwords instantly, regardless to their length and complexity. You will certainly appreciate that the utility can both recover passwords typed in any language and easily restore multilingual passwords. Using this helpful utility you can immediately restore passwords for websites, requiring access passwords and even decrypt passwords protected with the User Master Password. The program interface is pretty simple and comes with such useful features as copying of the retrieved data to clipboard and saving it in a formatted text file, so you won’t lose it again. If you want to be sure that no one else uses Firefox Password Recovery while you are away you can set an access password and prevent any unauthorized program start.

    Internet Explorer Password Recovery

    Internet Explorer Password Recovery is a comprehensive solution for recovering all types of Internet Explorer saved passwords: cached credentials, FTP passwords, Internet Explorer AutoForm and AutoComplete fields, AutoComplete passwords, synchronization passwords, Identities, Content Advisor password. It's the first program in the world that can decrypt Internet Explorer passwords manually from registry binary files.

    Messenger Password Recovery

    Messenger Password Recovery is a password recovery tool that reveals the passwords of the instant messenger applications.

    Network Password Recovery

    When you connect to a network share on your LAN or to your .NET Passport account, Windows allows you to save your password in order to use it in each time that you connect the remote server. This utility recovers all network passwords stored on your system for the current logged-on user. It can also recover the passwords stored in Credentials file of external drive, as long as you know the last log-on password.

    Powerpoint Password Recovery

    PowerPoint Password Recovery is a program that allows recovery of lost or forgotten passwords required to open or modify password-protected Microsoft PowerPoint presentations. The program supports all versions of Microsoft PowerPoint, including 2007.

    RAR, DOC, EXCEL, PDF Password Recovery

    These are the programs those recover lost or forgotten passwords for Microsoft Word documents, Microsoft Excel Sheets, WinRar Archives, Adobe PDF Files. The program recovers all types of passwords, including instant recovery of document and template protection and passwords to modify. These programs instantly recover passwords for the read only permissions, editing and formatting restrictions, including instant recovery of passwords to open if weak encryption was used. The interface is simple and easy to understand, yet the functionality and the set of features are truly immense.

    Remote Desktop Password Recovery

    Remote Desktop Connections passwords are stored in *.rdp files, which are normally located in current user's 'My Documents' folder. When you select the manual mode, NPRW will automatically scan your disk searching for these files. If the program was unable to find a *.rdp file automatically, you can try locating it manually and entering path to it by hand.

    VNC Password Recovery

    VNC Password Recovery is a small Windows utility that recover the passwords stored by the VNC tool. It can recover 2 of passwords: password stored for the current logged-on user (HKEY_CURRENT_USER in the Registry), and password stored for the all users.

    Wireless Password Recovery

    Wireless Password Recovery recovers all wireless network security keys/passwords (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP and by the 'WLAN AutoConfig' service of Windows Vista. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard.

    Code:
    Download Password Recovery Tools : http://www.mediafire.com/?y20ddh94lk85u87

    6. Sticky Keys Backup

    Sethc_Windows7

    Sethc_Vista

    Sethc_XP

    Sethc is a process associated with Windows NT High Contrast Invocation and is part of Microsoft® Windows® Operating System. With default Windows settings, this process is run when the shift is pressed 5 times in sequence, to invoke the StickyKeys configuration window.

    Code:
    Download Sticky Keys Backup: http://www.mediafire.com/?mqq829oki4acxw7

    7. System Utilities

    Ava Find

    Search without delay. Sophisticated ranking shows what you want near the top. Scout Bot finds newly downloaded files automatically. You don't even have to enter a search!
    Clean up Your Hard Drive Ava Find can show you all your files and folders by size, instantly. Ava Find takes the guesswork out of finding the biggest file or folder on your computer.

    Registry Tweak

    Registry Tweaker is a powerful and fully automated application for tweaking your Windows Registry. This tweaker is different from other tweakers, becouse you actually see which keys are modified, you can even add your own tweaks in database.

    Resource Hacker

    Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.

    Code:
    Download System Utilities: http://www.mediafire.com/?c1eae6yiypnu23q
    8. Virtual Machine

    Virtual Box

    VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL).

    VMware Workstation

    VMware Workstation is optimized for maximum performance when running on 32-bit and 64- bit Windows 7 PCs. Supports Flip 3D and Aero Peek to show live thumbnails of your virtual machines. Run legacy application with 3D graphics, faster performance, and tighter desktop integration better than Windows XP Mode. Get shared folders and drag and drop convenience.
    Code:
    Download Virtual Machine: http://www.mediafire.com/?ixro7l2eoz68n48

    26kgaze

    Posts : 1
    Join date : 2013-01-29

    Re: Hacking Tools Download Section AIO

    Post  26kgaze on Wed Jan 30, 2013 6:37 pm

    links are dead Sad

      Current date/time is Mon Dec 05, 2016 2:36 pm