• Regeln für den Video-Bereich:

    In den Börsenbereich gehören nur Angebote die bereits den Allgemeinen Regeln entsprechen.

    Einteilung

    - Folgende Formate gehören in die angegeben Bereiche:
    - Filme: Encodierte Filme von BluRay, DVD, R5, TV, Screener sowie Telesyncs im Format DivX, XviD und x264.
    - DVD: Filme im Format DVD5, DVD9 und HD2DVD.
    - HD: Encodierte Filme mit der Auflösung 720p oder darüber von BluRay, DVD, R5, TV, Screener sowie Telesyncs im Format x264.
    - 3D: Encodierte Filme von BluRay, die in einem 3D Format vorliegen. Dies gilt auch für Dokus, Animation usw.
    - Serien: Cartoon/Zeichentrick, Anime, Tutorials, Dokumentationen, Konzerte/Musik, Sonstiges sind demnach in die entsprechenden Bereiche einzuordnen, auch wenn sie beispielsweise im High Definition-Format oder als DVD5/DVD9/HD2DVD vorliegen. Ausnahme 3D.
    - Bereich Englisch: Englische Releases gehören immer in diesen Bereich.
    - Bereich Talk: Der Bereich, in dem über die Releases diskutiert werden kann, darf, soll und erwünscht ist.


    Angebot/Beitrag erstellen

    - Ein Beitrag darf erst dann erstellt werden, wenn der Upload bei mindestens einem OCH komplett ist. Platzhalter sind untersagt.
    - Bei einem Scenerelease hat der Threadtitel ausschließlich aus dem originalen, unveränderten Releasenamen zu bestehen. Es dürfen keine Veränderungen wie z.B. Sterne, kleine Buchstaben o.ä. vorgenommen werden. Ausnahme Serienbörse:
    - Bei einem Sammelthread für eine Staffel entfällt aus dem Releasename natürlich der Name der Folge. Beispiel: Die Simpsons S21 German DVDRip XviD - ITG
    - Dementsprechend sind also u.a. verboten: Erweiterungen wie "Tipp", "empfehlenswert", "only", "reup", usw. / jegliche andere Zusatzinformation oder Ergänzung, welche nicht in obiger Beschreibung zu finden ist.

    Aufbau des Angebots und Threadtitel

    Der Titel nach folgendem Muster erstellt zu werden. <Name> [3D] [Staffel] [German] <Jahr> <Tonspur> [DL] [Auflösung] <Quelle> <Codec> - <Group>
    Beispiel: The Dark Knight German 2008 AC3 DVDRip XviD - iND
    Beispiel: The Dark Knight 2008 DTS DL BDRip x264 - iND
    Beispiel: The Dark Knight 2008 AC3 DL BDRip XviD - iND
    Beispiel: The Dark Knight German 2008 AC3 720p BluRay x264 iND
    Beispiel: The Dark Knight 2008 DTS DL 1080p BluRay x264 iND
    Beispiel: Die Simpsons S01 German AC3 DVDRip XviD iND
    Beispiel: Die Simpsons S20 German AC3 720p BluRay x264 iND
    Beispiel: Sword Art Online II Ger Sub 2014 AAC 1080p WEBRip x264 - peppermint
    Entsprechend sind also u.a. verboten: Sonderzeichen wie Klammern, Sterne, Ausrufezeichen, Unterstriche, Anführungszeichen / Erweiterungen wie "Tipp", "empfehlenswert", "only", "reup", usw. / jegliche andere Zusatzinformation oder Ergänzung, welche nicht in obiger Beschreibung zu finden ist
    Ausnahmen hiervon können in den Bereichen geregelt sein.

    Die Beiträge sollen wie folgt aufgebaut werden:
    Überschrift entspricht dem Threadtitel
    Cover
    kurze Inhaltsbeschreibung
    Format, Größe, Dauer sind gut lesbar für Downloader außerhalb des Spoilers zu vermerken
    Nfo sind immer Anzugeben und selbige immer im Spoiler in Textform.
    Sind keine Nfo vorhanden z.B. Eigenpublikationen, sind im Spoiler folgende Dateiinformationen zusätzlich anzugeben :
    Quelle
    Video (Auflösung und Bitrate)
    Ton (Sprache, Format und Bitrate der einzelnen Spuren)
    Untertitel (sofern vorhanden)
    Hosterangabe in Textform außerhalb eines Spoiler mit allen enthaltenen Hostern.
    Bei SD kann auf diese zusätzlichen Dateiinformationen verzichtet werden.

    Alle benötigten Passwörter sind, sofern vorhanden, in Textform im Angebot anzugeben.
    Spoiler im Spoiler mit Kommentaren :"Schon Bedankt?" sind unerwünscht.


    Releases

    - Sind Retail-Release verfügbar, sind alle anderen Variationen untersagt. Ausnahmen: Alle deutschen Retail-Release sind CUT, in diesem Fall sind dubbed UNCUT-Release zulässig.
    - Im Serien-Bereich gilt speziell: Wenn ein Retail vor Abschluss einer laufenden Staffel erscheint, darf diese Staffel noch zu Ende gebracht werden.62
    - Gleiche Releases sind unbedingt zusammenzufassen. Das bedeutet, es ist zwingend erforderlich, vor dem Erstellen eines Themas per Suchfunktion zu überprüfen, ob bereits ein Beitrag mit demselben Release besteht. Ist dies der Fall, ist der bereits vorhandene Beitrag zu verwenden.
    - P2P und Scene Releases dürfen nicht verändert oder gar unter einem iND Tag eingestellt werden.


    Support, Diskussionen und Suche

    - Supportanfragen sind entweder per PN oder im Bereich Talk zu stellen.
    - Diskussionen und Bewertungen sind im Talk Bereich zu führen. Fragen an die Uploader haben ausschließlich via PN zu erfolgen, und sind in den Angeboten untersagt.
    - Anfragen zu Upload-Wünschen sind nur im Bereich Suche Video erlaubt. Antworten dürfen nur auf Angebote von MyBoerse.bz verlinkt werden.


    Verbote

    - Untersagt sind mehrere Formate in einem einzigen Angebotsthread, wie beispielsweise das gleichzeitige Anbieten von DivX/XviD, 720p und 1080p in einem Thread. Pro Format, Release und Auflösung ist ein eigener Thread zu eröffnen.
    - Grundsätzlich ebenso verboten sind Dupes. Uploader haben sich an geeigneter Stelle darüber zu informieren, ob es sich bei einem Release um ein Dupe handelt.
    - Gefakte, nur teilweise lauffähige oder unvollständige Angebote sind untersagt. Dies gilt auch für eigene Publikationen, die augenscheinlich nicht selbst von z.B. einer DVD gerippt wurden. Laufende Serien, bei denen noch nicht alle Folgen verfügbar sind, dürfen erstellt und regelmäßig geupdatet werden.
    - Untersagt sind Angebote, welche nur und ausschließlich in einer anderen Sprache als deutsch oder englisch vorliegen. Ausnahmen sind VORHER mit den Moderatoren zu klären.


    Verstoß gegen die Regeln

    - Angebote oder Beiträge, die gegen die Forenregeln verstoßen, sind über den "Melden"-Button im Beitrag zu melden.
  • Bitte registriere dich zunächst um Beiträge zu verfassen und externe Links aufzurufen.




Englische Tutorials


7890459a4d5ac526260c7a63a76868a9.jpg


Docker Containers LiveLessons, Third Edition
MP4 | Video: AVC 1280x720 | Audio: AAC 48KHz 2ch | Duration: 5 Hours 48M | 14.6 GB
Genre: eLearning | Language: English

With cloud computing, applications need to move around efficiently and run almost anywhere. In this video, learn how you can create containerized applications with Docker that are lightweight and portable. First, Chris Negus shows you how to begin using Docker on Ubuntu, Red Hat Enterprise Linux, or Fedora systems (with options of Windows or (Mac OSX)). Then he shows you how to pull and push Docker container images from and to Docker registries. The next few lessons get you started running containers and investigating how they work. After that, you learn how to build your own Docker images. The video then examines orchestration tools, such as Kubernetes and Cockpit, and development tools, such as OpenShift, for deploying and managing containers. Finally, it provides some tips for developing your own Docker containers.




8bd07f27b6129e3dfcb92ea0f1909926.jpg







Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

9eb0894c27200e2c67d5366fe9c36393.jpg


Certified Scrum Master (CSM)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 615 MB
Genre: eLearning | Language: English

The ScrumMaster is the one who implements and facilitates the use of scrum by a team during a project. The ScrumMaster ensures that the scrum methodology is properly implemented. A Certified Scrum Master helps project teams properly use Scrum, increasing the likelihood of the project's overall success. CSMs understand Scrum values, practices, and applications and provide a level of knowledge and expertise above and beyond that of typical project managers.




fcb491e400cc5c5da6b09c08a5a01f1a.jpg





Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

be2c1943e3d6e954061037a2eba81de8.jpg


Social Engineering with the Social-Engineer Toolkit
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 518 MB
Genre: eLearning | Language: English

The Social-Engineer Toolkit (SET) is an open-source penetration testing framework designed for social engineering. You'll explore SET, which has a number of custom attack vectors that allow you to execute advanced social engineering tactics.

The Social-Engineer Toolkit (SET) is an open-source Python-driven tool aimed at penetration testing around social engineering. Vulnerability scanners will find the security issues in computer systems, but cannot find them in a human being. If you want a good tool then SET is there to help you assess your company security cavity. In this course, Social Engineering with the Social-Engineer Toolkit, you'll learn the social engineering attacks that SET supports. First, you'll discover how the spear phishing attack works in SET in combination with an e-mail attack. Next, you'll explore how to use the website attack vector, along with creating a payload and a listener. Then, you'll delve into the mighty PowerShell attacks and how to take advantage of this command line tool to bypass the security on the Windows operating system. After that, you'll explore the world of electronics to learn how to use the hardware-based module in SET. Finally, you'll learn about multiple ways to deal with the Social-Engineer Toolkit, such as the Wireless Access point attack, the QRCode generator, SMS spoofing, and the infectious media generator. By the end of this course, you'll have the fundamental knowledge to utilize the Social-Engineer Toolkit efficiently.


9d55549984f7488d55db59e20d2645d0.jpg







Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

095cbd1c7f9ec3280a5028cb800f34e4.jpg


Machine Learning for Data Science
MP4 | Video: AVC 1920x1080 | Audio: AAC 48KHz 2ch | Duration: 2 Hours 41M | 14.7 GB
Genre: eLearning | Language: English

Thank you all for the huge response to this emerging course! We are delighted to have over 2300 students in over 102 different countries and for the overwhelmingly positive and thoughtful reviews. It's such a privilege to share this important topic with everyday people in a clear and understandable way. Unlock the secrets of understanding Machine Learning for Data Science! In this introductory course, the "Backyard Data Scientist" will guide you through wilderness of Machine Learning for Data Science. Accessible to everyone, this introductory course not only explains Machine Learning, but where it fits in the "techno sphere around us", why it's important now, and how it will dramatically change our world today and for days to come. So I invite you to join me, the Backyard Data Scientist on an exquisite journey into unlocking the secrets of Machine Learning for Data Science.... for you know - everyday people... like you!




d0386f7e27138a4c5e53d6d451a9a9fc.jpg






Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

350472d73af0e69faed271191ce73c8d.jpg


Play by Play: Emerging Threats in IoT
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 441 MB
Genre: eLearning | Language: English

n this course, you'll learn why devices are being connected, the types of security flaws that are being introduced into them, and - most importantly - how we can better protect them from future malicious attacks.

n this course, you'll learn why devices are being connected, the types of security flaws that are being introduced into them, and - most importantly - how we can better protect them from future malicious attacks.

Play by Play is a series in which top technologists work through a problem in realtime, unrehearsed and unscripted. In this course, Play by Play: Emerging Threats in IoT, Troy Hunt and Lars Klint define the scope for IoT devices and look at some of the many examples of both humorous and practical implementations. Discover how these devices can influence your everyday and why you, as a developer and general IT professional, should be aware of the capabilities and integration points. By the end of this Play by Play, you'll have learned about multiple different approaches to layer security appropriately, industry patterns and best practices, how to secure your IoT device, and how to fix security vulnerabilities.



a717daddc013691dd468474c5860b6be.jpg







Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

b5835a3ac437caf448afabe710953d03.jpg


Intro to Engineering Models for Software & Web Developers
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 7 | 438 MB
Genre: eLearning | Language: English

A thorough knowledge of engineering models gives software and web developers a better way to design secure applications.

I have been a software and web developer for decades and have always wanted to know how to design software and websites using engineering models. How do you design software with the same sort of precision used to build skyscrapers, bridges, aircraft, and submarines?

This desire to learn more about engineering and engineering models was one of the main drives I had to achieve CISSP and CEH certification, which are some of the top computer security certifications available. For security, the best type of model to use is a mathematical model of application logic and functionality. This type of model is called a formal model, and despite the strict-sounding name, formal models can be very lightweight and easy to use.

This class is the first class in a series that is meant to teach software and web developers of all skill levels and abilities everything I wish I knew about modeling software 20 years ago when I was making my first websites. This class is a very broad introduction, covering engineering and engineering models, as well as all the types of engineering models software and web developers can use for back-end and front-end development, databases, and project management. Engineering as a discipline is compared to architecture, design, art, and craftsmanship. Topics include structural models, behavioral models, managerial models, graphical models, simulations, prototypes, mock-ups, scale models, formal mathematical models, and more.

Although this is a class for introductory students as well as advanced practitioners, this class is very complex. This is NOT a class where I will read the slides to you - I don't like that style of class myself. I have tried to layer as much information as possible into the videos to make a class that students can watch and re-watch and find new bits of information each time.

This class contains lots of new information you will not find other places. Believe me, I tried for many years to find this information before realizing it just wasn't out there and that I needed to create it myself.

This class may prompt lots of questions for you and I will be there to answer them. I think that is what learning is about - asking questions and questioning the answers. This class may contradict a lot of what you've been taught in the past about software and website development however as someone who holds most of the top computer security certifications out there, I don't think the approach we've taken in the past as an industry has worked if you look at the long history of software security vulnerabilities and the data breaches they have allowed. The engineering models presented in this class can help you design better software in less time and with fewer flaws and security vulnerabilities.

These techniques are how you build security into software from the very beginning, rather than trying to tack on "security" at the end.




f2bd6ea2d74b824d12b4e98c624ae5c9.jpg







Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

09cd5b540dbf2fcc63e17b5471499f56.jpg


Learn By Example - Qlikview
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours 47M | 1.53 GB
Genre: eLearning | Language: English

Qlikview : One tool to Transform, Summarize and Visualize Data

A Qlikview app is like an in-memory database. The interactive nature of Qlikview allows you to explore and iterate very quickly to develop an intuitive feel for your data.

What's covered in this course are as follows - The Qlikview In-memory data model, Use List boxes, Table boxes and Chart boxes to query data, Load data into a QV app from CSV and Databases, avoiding Synthetic keys and Circular references, Transform and adding new fields in a Load script, Transform tables with Join, Keep, Effectively present your insights using elements like charts, drill downs, triggers, Nested aggregations in charts, Generic Loads, Mapping Loads, Crosstable.





d6624f253baf37ea3aeee2a25716a4be.jpg







Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

b7745c1e3bbb5ee6fffbbe6897af975f.jpg


Adobe Camera Raw and Lightroom for Lunch™ - Keywording Images in Bridge and Lightroom
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 27M | 126 MB
Genre: eLearning | Language: English

Adobe Camera Raw and Lightroom for Lunch™ is a series of short video courses you can study in bite size pieces such as at lunchtime. In this course you'll learn to keyword your images in Bridge (which is what you would use if you process images using Adobe Camera Raw) and in Lightroom. We'll look at why you would keyword your images, how many keywords to use and how to apply them to your images.


b4a19317bca0eb351a60a19a0715cdbf.jpg






Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

fea45e546a32416dddf7475dfb6075f8.jpg


Ultimate Beginner's Guide to Logic Pro
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 5 Hours | Lec: 22 | 942 MB
Genre: eLearning | Language: English

Learn how to go from a complete beginner to a fairly solid level of knowing Logic Pro

As a film composer, I had to learn Logic the hard way- thousands of hours of tutorials, years of trial/error, and more questions than I ever wanted to ask. So here, I've put together a super condensed version of what I have learned so far. It's 5 hours of some of the most packed material for a beginner of Logic pro. The first hour is probably the most important where I go over the most basic functions. After that I explain what the effects and such do and how they affect the sound.

This will really save you a ton of time if you go through it. It goes over the most used hotkeys and functions to help you create music, along with an overview of the instruments and effects including a few third party plugins like East/West orchestra. They're all videos, so just sit back, open up your Logic session and take good notes!




392cc2fcdf4ca91ad52900f4065259bf.jpg






Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

f3ed4a6ada178752fa409ebbb653b255.jpg


Firebase on Android: User Email Authentication and Verification
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour 13M | 506 MB
Genre: eLearning | Language: English

Firebase is an emerging technology that targets mobile development. This course features the Firebase Authentication tool where you'll learn to integrate the cloud-based user management system.

Firebase is an emerging technology that targets mobile development. This course features the Firebase Authentication tool where you'll learn to integrate the cloud-based user management system.

The Firebase Authentication tool is arguably the most useful of the Firebase tools because you find a use for it in almost every application you build. In this course, Firebase on Android: User Email Authentication and Verification, you'll learn foundational knowledge that will give you the ability to seamlessly integrate a cloud-based user management system into your Android applications. First, you will learn how to register new users, send verification emails and sign-in existing users. Next, you'll learn how to restrict app-access to only users who have been authenticated. Finally, you'll learn how to manage user account properties like display name, profile image, and email address. When you're finished this course, you will have the skills and knowledge of Firebase Authentication needed to build a user management system for your Android applications.




05a58046b8f30ebc5e1b6a9703e804d6.jpg






Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

17d3010e30d19af9b0e527ef048b1c55.jpg


Java from Beginner to Expert
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 8 Hours 44M | 1.89 GB
Genre: eLearning | Language: English

This Java course is designed for people who don't have any knowledge about programming. It doesn't matter if you have never written any programs or you have no idea about programming... After my course, all this will change. You will bust the myth that programming is a difficult thing only for the few!

Java is one of the most in demand & highest paying programming language. Java's slogan is: "Write once, work everywhere."

You can use Java to create Android applications, desktop applications, games and much more. One of the most popular games called Minecraft was created using Java.

After this course you will be able to use the advanced components of Java language.

Java is the basic language for developing Android apps. You have to learn Java for Android development. Save your precious time by buying this course. You will learn how to program in a fast and easy way!




27584f2556bf4aa7c806b36f33e094a6.jpg







Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 

9a44511bad84cdc689b4b5461537ed71.jpg


Retrieving Data from Oracle Database with SQL
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 4 Hours | Lec: 45 | 603 MB
Genre: eLearning | Language: English

Learn to use Oracle SQL

Oracle database is one of the top and most widely used relational database management systems in the world .
This beginners course will teach you how to retrieve data from an oracle database.

We will start off by downloading and installing oracle database 11g express which is free to use. Then we will install TOAD which is a tool we will be using to connect to the oracle database and retrieve data.

Topics we will cover in this course includes:

Retrieving Data
Using SELECT Statements
Using FROM clause
Using WHERE Clause for filtering data
Using NOT Operator
Using the LIKE Operator
Using IS NULL
Using ORDER BY Clause
Using DISTINCT
Using Describe
Using and creating views
Using Sub-Query
Restricting and Sorting Data
Using ORDER BY Clause
Using GROUP BY and HAVING Clause

Retrieving Data with Aggregate Functions
Introduction to aggregate functions
Using AVG function
Using COUNT function
Using MAX function
Using MIN function

Retrieving Data with Table Joins
Introduction to Table Joins
Using Equi Joins
Using Non Equi Joins
Using Cartesian Join
Using Outer Join
Using Self Join

Retrieving Data with Analytic Functions
Introduction to Analytic Functions
The Syntax
Partition By Clause
First and Last Function
Row number Functions
Dense Rank Function
Lag Function
LEAD Function
RANK Function

Retrieving Data with SET Operators
Using UNION ALL SET Operator
UNION SET Operator
Using INTERSECT Operator
Using Minus Operator

By the end of this course you will have enough skill to retrieve data from an oracle database.


e79901ae3b6f3a7e10e5b9728a47a085.jpg







Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
 
Zurück
Oben Unten