Tampilkan postingan dengan label hacker. Tampilkan semua postingan
Hackers Challenge
Selasa, 04 Maret 2008
Mike Schiffman has hit upon a great formula for Hacker's Challenge. Rather than try to research, fully understand, and adequately explain attacks that have taken place on other people's networks--the approach taken by too many writers of books about computer security--Schiffman lets network administrators and security experts tell their stories first-hand. This is good. What's better is that Schiffman has edited each of their war stories into two sections: one that presents the observations the sysadmin or security consultant made at the time of the attack, and another (in a separate part of the book) that ties the clues together and explains exactly what was going on. The challenge in the title is for you to figure out what the bad guys were doing--and how best to stop them--before looking at the printed solution. Let's call this book what it is: an Encyclopedia Brown book for people with an interest in network security.
It doesn't really matter, from a value-for-money standpoint, whether your skills are up to the challenge or not. The accounts of intrusions--these are no-kidding, real-life attacks that you can probably learn from, by the way--are written like chapters from a novel (though log file listings, network diagrams, and performance graphs appear alongside the narrative text). Recall every time you've seen a movie or read a book with computer scenes so technically inaccurate they made you wish for a writer with a clue. Schiffman and Hacker's Challenge is what you wished for. --David Wall
Topics covered: The sorts of attacks that black-hat hackers (everyone from script kiddies to accomplished baddies) launch against Internet-linked computers and networks. Everything is presented from the perspective of the defenders--i.e., the network administrators--who have to look at log files and process activity to figure out what's going on.
Book Description
Find out if you have what it takes to keep the bad guys out of your network. This real-world resource contains 20+ hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants.
300 pages
Publisher: McGraw-Hill Osborne Media (October 18, 2001)
Language: English
ISBN-10: 0072193840
ISBN-13: 978-0072193848
Share Link
Posted in Ebook, hacker by M3ele3 | 0 comments
Hackers Black Book
Kamis, 27 Desember 2007
Hackers Black Book
This is the ultimate book you want to have.
It explains how to learn hacking and cracking multiple networks,
learn to decrypt data in a easy way and find passwords for systems, servers, routers, webmail, etc.
This is just a guide and NOT to (but you could) be used for other things than learning security.
Includes
-----------
- Hacking Into Computer Systems - Beginners
- Maximum Security - A Hacker's Guide to Protecting
- Hackers Survival Guide
- Hacking for Dummies 2
- How to Make Key Generators
Share Link
Posted in Ebook, hacker by M3ele3 | 0 comments
Anti Hacker Expert
Rabu, 28 November 2007
Anti Hacker Expert
Anti-Hacker Expert Trojan can scan and kill hacker program and trojans.
Actually Anti-Hacker Expert includes more than 12000 hacker program and trojan signatures.Use manifold scan,fast and reliable detects your computer.
Use the portscan to find open ports for hacker and trojan on your PC,and delete hacker program andtrojan.
The registry-scan is highspeed scan for autorun-entries. It scans the system registry by using known trojan filenames. If a trojan is identified by the registry-scan, it will be removed from disk.
The memory scan is scan all system process,if found hacker program and trojan,in a minute kill it and delete interrelated file. The diskscan also removes unwanted hacker program and trojan files from your harddisks.
This is the most important search method. You can select wheter you want to scan whole drives or specified folders. The Firewall can background-guard watches for active hacker program and trojans while you are working on your PC.
Share Link
Posted in Ebook, hacker by M3ele3 | 0 comments
Langganan:
Postingan (RSS)