-
Posts
18725 -
Joined
-
Last visited
-
Days Won
706
Everything posted by Nytro
-
The effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cyber crime and the "dark side" of the Internet are likely to get badly burnt. This important new book highlights the key issues in online risk management, taking the premise that information security is no longer an issue confined to the IT department but is critical to all operational functions: finance, HR, marketing, production etc. Nor are its solutions purely technical. With two thirds of security breaches said to be caused by human error, management controls and processes are equally important. Download (0.6Mb): http://rapidshare.com/files/28872285/The_Secure_Online_Business_E.Commerce_It_Functionality_and_Business_Continuity.rar Mirror: http://www.megaupload.com/?d=YWFCOMCY Password: www.ebooksdb.com
-
A good defense starts with a thorough understanding of your opponent’s offense. Hackers Beware teaches you how hackers think, what tools they use, and the techniques they utilize to compromise a machine. Eric Cole, a leading expert in information security, shows you not only how to detect these attacks, but what you can do to protect yourself against them. When it comes to securing your site, knowledge is power. This book gives you the knowledge to build a proper defense against attackers. With so much going on in regard to network security (or the lack thereof), a book on this topic almost needs no introduction. Less than 10 years ago, most people didn’t even know what the Internet or email was. To take a further step back, most people did not even have computers at work or home, and some even questioned their usefulness. Things have really changed. As I am writing this, the Carousel of Progress ride at Disney World goes through my mind. Things that we considered science fiction a decade ago are not only a reality, but an engrained part of our life. Heck, if the dedicated line at my house goes down for more than 30 minutes, my wife is screaming at me to fix it. This is truly the age of computers. TABLE OF CONTENT: chapter 01. Introduction chapter 02. How and Why Hackers Do It chapter 03. Information Gathering chapter 04. Spoofing chapter 05. Session Hijacking chapter 06. Denial of Service Attacks chapter 07. Buffer Overflow Attacks chapter 08. Password Security chapter 09. MS NT Password Crackers chapter 10. UNIX Password Crackers chapter 11. Fundamentals of MS NT chapter 12. Specific Exploits for NT chapter 13. Fundamentals of UNIX chapter 14. Specific Exploits for UNIX chapter 15. Preserving Access chapter 16. Covering the Tracks chapter 17. Other Types of Attacks chapter 18. SANS Top 10 chapter 19. Putting It All Together chapter 20. Summary Download (4.3Mb): http://rapidshare.com/files/37516097/hackbeware.rar Mirror: http://www.megaupload.com/?d=YJCO8JAM Password: www.ebooksdb.com
-
An Introduction to Cryptography provides a solid mathematical treatment of cryptography for readers with little or no background in number theory. Although intended for undergraduate students, it contains enough optional, advanced material to challenge even the most informed reader and provides a solid basis for a second course on the subject. Throughout the book, the author incorporates nearly 300 problems, more than 80 examples, and over 60 diagrams, figures, and tables, as well as optional topics that go beyond the basics. An extensive index, appendices that review background material, and a list of symbols for easy reference complete this outstanding text. This edition presents the ideas behind cryptography and the applications of the subject. The first chapter provides a thorough treatment of the mathematics necessary to understand cryptography, including number theory and complexity, while the second chapter discusses cryptographic fundamentals, such as ciphers, linear feedback shift registers, modes of operation, and attacks. The next several chapters discuss DES, AES, public-key cryptography, primality testing, and various factoring methods, from classical to elliptical curves. The final chapters are comprised of issues pertaining to the Internet, such as pretty good privacy (PGP), protocol layers, firewalls, and cookies, as well as applications, including login and network security, viruses, smart cards, and biometrics. The book concludes with appendices on mathematical data, computer arithmetic, the Rijndael S-Box, knapsack ciphers, the Silver-Pohlig-Hellman algorithm, the SHA-1 algorithm, radix-64 encoding, and quantum cryptography. TABLE OF CONTENT: Chapter 01 - Mathematical Basics Chapter 02 - Cryptographic Basics Chapter 03 - DES and AES Chapter 04 - Public-Key Cryptography Chapter 05 - Primality Testing Chapter 06 - Factoring Chapter 07 - Electronic Mail and Internet Security Chapter 08 - Leading-Edge Applications Appendix A - Fundamental Facts Appendix B - Computer Arithmetic Appendix C - The Rijndael S-Box Appendix D - Knapsack Ciphers Appendix E - Silver-Pohlig-Hellman Algorithm Appendix F - SHA-1 Appendix G - Radix-64 Encoding Appendix H - Quantum Cryptography Download (2.3Mb): http://rapidshare.com/files/75449954/anintrotocrypt2nd.rar Mirror: http://www.megaupload.com/?d=YYSMWY2M Password: www.ebooksdb.com
-
With the arrival of IEEE 802.11b (a.k.a. WiFi) and other wireless networking technologies on the market comes a wave of stories about snoops intercepting sensitive LAN traffic from out in the company parking lot or across the concourse at the airport. Hack Proofing Your Wireless Network takes a look at strategies for defending wireless LANs–those based on Bluetooth and IEEE 802.11a as well as WiFi–against signal interception and other attacks peculiar to their wireless nature. Unfortunately, there's also a lot of background information on WiFi (as well as on security principles in general), and this is related to wireless network security only tangentially. Though this material represents unneeded padding, the bulk of the book is made up of useful information about security strategies and defensive configuration. There's also a fair bit of information about the security characteristics of some top-selling wireless networking products. In a section on choosing WiFi access points, the authors give a very explicit list of requirements (the ability to disable service-set identifier broadcasts, 128-bit Wired Equivalent Protocol–WEP–and so on), and list at least three real products (by make and model) that fit the specifications. They then proceed to show how to choose the most secure configuration options on each of the featured products, including the Cisco Systems Aironet and the Agere ORiNOCO. Configuration instructions are easy to follow and illustrated in detail. Information on the offensive side of the equation is shallower–the authors point out that it's possible to drive around, looking for unsecured wireless access points and that WEP has security flaws. Still, this book is one of the first on security for wireless networks, and it provides a lot of good information to the administrators of such networks Download (5.7Mb): http://rapidshare.com/files/20491988/Hac_Proof_Your_Wireless_Network.rar Mirror: http://www.filefactory.com/file/7f71bd/ Password: www.ebooksdb.com
-
Start planning to transition to IPv6 internetworking and find out all about the next-generation Internet—from its features and benefits to its packet structure and protocol processes. This book is a straightforward discussion of the concepts, principles, and processes of Internet Protocol version 6 (IPv6) and how IPv6 is supported by the Microsoft Windows .NET Server 2003 family of operating systems. It is primarily a discussion of protocols and processes rather than a discussion of planning, configuration, deployment, and management. It is also mostly about IPv6 rather than the specifics of the implementation for the Windows .NET Server 2003 family. Therefore, this book does not contain in-depth implementation details of the IPv6 protocol for the Windows .NET Server 2003 family, such as structures, tables, buffers, or coding logic. These details are highly guarded Microsoft intellectual property that is of interest only to a relative handful of software developers. The purpose of this book is to provide an educational vehicle that will enable one to learn IPv6 to a fair technical depth—the terms, the addresses, the protocols, and the processes. This is not intended to be a breezy marketing overview of IPv6 and how it "provides integrated and interoperable technologies to enable exciting new scenarios for personal and enterprise computing." I will leave that type of documentation to those who are much better at it than I am. The bottom line is that I am a protocols and processes person. My main concern and interest is how the protocols work and what one sees on the wire (what packets are exchanged), and these topics comprise the bulk of this book. Download (1.1Mb): http://rapidshare.com/files/25116985/Understanding_IPv6.rar Mirror: http://www.megaupload.com/?d=JQP6WHFG Password: www.ebooksdb.com
-
Tomorrow, all communications will happen over IP. In the past, telecom operators handled most communications, and the main business for them was voice communication. In reality, almost all last-mile communications today still happen over the conventional telecom infrastructure. The backbone of the Internet has been going through a fast transition to faster and faster fiber optics and digital data transfer. The era of analog communications has been over for some time already. Today, people speak of Voice over IP, but a better name for the Next Generation Networks is Everything over IP (EoIP). And all of that communication will be wireless. But what does that have to do with the topic of this book? It means the world has to finally wake up to the security of the communications networks. To be secure, you have to understand that wireless networks are always open. While in traditional telephone networks all the switches were kept behind locked doors and all the cabling was protected, in wireless technology there are no cables and everyone has access to wireless access points. One compromised infrastructure component, and the entire network is compromised. One virus-contaminated access device, and everyone in the network will be contaminated. This book is built around voice as the application to be secured, but the principles apply to any communications. Studying this book should be obligatory to all students in computer engineering and computer science, not only due to its content and deep understanding of VoIP security, but also to allow them to learn how to apply the best practices in other fields, no matter what their future field of study will be. The key to learning is not only studying things and memorizing the various topics, but learning how to apply the best practices of other fields in your own. Combining the best practices of traditional telecommunications, e-mail, and the web into new next-generation technologies is essential to be able to build reliable and usable communication technologies. Voice over IP is potentially the killer application, destroying conventional communication networks and creating a new IP-based communication infrastructure. TABLE OF CONTENT: Chapter 01 - Introduction Chapter 02 - VoIP Architectures and Protocols Chapter 03 - Threats and Attacks Chapter 04 - VoIP Vulnerabilities Chapter 05 - Signaling Protection Mechanisms Chapter 06 - Media Protection Mechanisms Chapter 07 - Key Management Mechanisms Chapter 08 - VoIP and Network Security Controls Chapter 09 - A Security Framework for Enterprise VoIP Networks Chapter 10 - Provider Architectures and Security Chapter 11 - Enterprise Architectures and Security Download (4,9Mb): http://rapidshare.com/files/77713998/secvoipnet.rar Mirror: http://www.megaupload.com/?d=Q1DEEN3X Password: www.ebooksdb.com
-
Your Guide to Easy and Secure Windows Vista Networking is a complete beginner’s guide to creating, configuring, administering, and using a small network using Windows Vista computers. Inside you’ll find comprehensive coverage of networking hardware, including Ethernet (wired) hardware (from NICs to cables to switches to routers) and wireless Hardware–from wireless NICs to access points to range extenders. We include handy ”buyer’s guides” that tell you how to make smart choices when purchasing network hardware. With hardware in hand, we then show you how to roll up your shirtsleeves and put everything together, including configuring a router, laying cable, and connecting the devices. Next, we then show you how to wrangle with Windows Vista’s networking features. These techniques include using the Network and Sharing Center, managing wired and wireless connections, accessing shared network resources, sharing local resources on the network, and working with network files offline. And if you are a music and video aficionado, we’ve got you covered with a special chapter that shows you just how to set up a networked Vista PC as your digital media hub! No networking book would be complete without extensive coverage of security issues that affect anyone connected to the Internet. We show you how to secure each computer, secure your global networking settings, and batten down your wireless connections. The last part of the book includes intermediate networking tasks such as making remote connections, monitoring the network, troubleshooting network problems, and setting up Vista’s built-in web server and FTP server. Download (16Mb): http://rapidshare.com/files/93721866/Networking_with_Microsoft_Windows_Vista.rar Mirror: http://www.megaupload.com/?d=KZYHP2CM Password: www.ebooksdb.com
-
A description and analysis of the vulnerabilities caused by programming errors in Web applications, this book is written from both from the attacker's and security specialist's perspective. Covered is detecting, investigating, exploiting, and eliminating vulnerabilities in Web applications as well as errors such as PHP source code injection, SQL injection, and XSS. The most common vulnerabilities in PHP and Perl scripts and methods of exploiting these weaknesses are described, information on writing intersite scripts and secure systems for the hosted sites, creating secure authorization systems, and bypassing authorization. Uncovered is how attackers can benefit from the hosted target and why an apparently normal-working application might be vulnerable. Download (0.6Mb): http://rapidshare.com/files/25279097/Hacker.Web.Exploitation.Uncovered.rar Mirror: http://www.megaupload.com/?d=LSA5VKLX Password: www.ebooksdb.com
-
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise. The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system. The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates andorganizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection. Download (3.8Mb): http://rapidshare.com/files/98438320/A_Practical_Guide_to_Security_Engineering_and_Information_Assurance_.rar Mirror: http://www.megaupload.com/?d=7DP49KQR Password: www.ebooksdb.com
-
Contrary to popular belief, Ethernet switches are not inherently secure. Security vulnerabilities in Ethernet switches are multiple: from the switch implementation, to control plane protocols (Spanning Tree Protocol [sTP], Cisco® Discovery Protocol [CDP], and so on) and data plane protocols, such as Address Routing Protocol (ARP) or Dynamic Host Configuration Protocol (DHCP). LAN Switch Security explains all the vulnerabilities in a network infrastructure related to Ethernet switches. Further, this book shows you how to configure a switch to prevent or to mitigate attacks based on those vulnerabilities. This book also includes a section on how to use an Ethernet switch to increase the security of a network and prevent future attacks. Divided into four parts, LAN Switch Security provides you with steps you can take to ensure the integrity of both voice and data traffic traveling over Layer 2 devices. Part I covers vulnerabilities in Layer 2 protocols and how to configure switches to prevent attacks against those vulnerabilities. Part II addresses denial-of-service (DoS) attacks on an Ethernet switch and shows how those attacks can be mitigated. Part III shows how a switch can actually augment the security of a network through the utilization of wirespeed access control list (ACL) processing and IEEE 802.1x for user authentication and authorization. Part IV examines future developments from the LinkSec working group at the IEEE. For all parts, most of the content is vendor independent and is useful for all network architects deploying Ethernet switches. After reading this book, you will have an in-depth understanding of LAN security and be prepared to plug the security holes that exist in a great number of campus networks. Eric Vyncke has a master’s degree in computer science engineering from the University of Liège in Belgium. Since 1997, Eric has worked as a Distinguished Consulting Engineer for Cisco, where he is a technical consultant for security covering Europe. His area of expertise for 20 years has been mainly security from Layer 2 to applications. He is also guest professor at Belgian universities for security seminars. Download (2.7Mb): http://rapidshare.com/files/71033484/Cisco_Press_LAN_Switch_Security.rar Mirror: http://www.megaupload.com/?d=QE84UN9U Password: www.ebooksdb.com
-
Hacker Linux Uncovered - A-ListConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DSN server for mapping DNS names to IP addresses, and firewall for system protection is provided.Download (4.6Mb): Download: http://rapidshare.com/files/166600840/www.linkra.com_hackerlinuxuncovered_-_a.list.rar.html http://w18.easy-share.com/1702532147.html http://www.filefactory.com/file/adaa2b/n/www_linkra_com_hackerlinuxuncovered_-_a_list_rar Pass: www.ebooksdb.com
-
Hacker Highschool - Security Awareness For Teens Hacker Highschool - Complete Table Of Contents and Glossary Hacker Highschool - Lesson 01 - Being a Hacker Hacker Highschool - Lesson 02 - Windows and Linux Hacker Highschool - Lesson 03 - Ports and Protocols Hacker Highschool - Lesson 04 - Services and Connections Hacker Highschool - Lesson 05 - System Identification Hacker Highschool - Lesson 06 - Malware (Viruses, Trojans, etc.) Hacker Highschool - Lesson 07 - Attack Analysis Hacker Highschool - Lesson 08 - Digital Forensics Hacker Highschool - Lesson 09 - E-mail Security and Privacy Hacker Highschool - Lesson 10 - Web Security and Privacy Hacker Highschool - Lesson 11 - Passwords Hacker Highschool - Lesson 12 - Internet Legalities and Ethics Download: http://rapidshare.com/files/171574402/Hacker_Highschool_-_Complete_Table_Of_Contents_and_Glossary.rar http://rapidshare.com/files/171574399/Hacker_Highschool_-_Lesson_01_-_Being_a_Hacker.rar http://rapidshare.com/files/171575232/Hacker_Highschool_-_Lesson_02_-_Windows_and_Linux.rar http://rapidshare.com/files/171575251/Hacker_Highschool_-_Lesson_03_-_Ports_and_Protocols.rar http://rapidshare.com/files/171575987/Hacker_Highschool_-_Lesson_04_-_Services_and_Connections.rar http://rapidshare.com/files/171576161/Hacker_Highschool_-_Lesson_05_-_System_Identification.rar http://rapidshare.com/files/171576750/Hacker_Highschool_-_Lesson_06_-_Malware__Viruses__Trojans__etc._.rar http://rapidshare.com/files/171576917/Hacker_Highschool_-_Lesson_07_-_Attack_Analysis.rar http://rapidshare.com/files/171577561/Hacker_Highschool_-_Lesson_08_-_Digital_Forensics.rar http://rapidshare.com/files/171577592/Hacker_Highschool_-_Lesson_09_-_E-mail_Security_and_Privacy.rar http://rapidshare.com/files/171578566/Hacker_Highschool_-_Lesson_10_-_Web_Security_and_Privacy.rar http://rapidshare.com/files/171578573/Hacker_Highschool_-_Lesson_11_-_Passwords.rar http://rapidshare.com/files/171579362/Hacker_Highschool_-_Lesson_12_-_Internet_Legalities_and_Ethics.rar Full Book: http://rapidshare.com/files/171582414/Hacker_Highschool_-_Security_Awareness_For_Teens.rar
-
The Hacker Crackdown: Law and Disorder on the Electronic Frontier # Paperback: 292 pages # Publisher: IndyPublish.com (May 2002) # Language: English # ISBN-10: 1404306412 Bruce Sterling's classic work highlights the 1990 assault on hackers, when law-enforcement officials successfully arrested scores of suspected illicit hackers and other computer-based law-breakers. These raids became symbolic of the debate between fighting serious computer crime and protecting civil liberties. However, The Hacker Crackdown is about far more than a series of police sting operations. It's a lively tour of three cyberspace subcultures--the hacker underworld, the realm of the cybercops, and the idealistic culture of the cybercivil libertarians. Sterling begins his story at the birth of cyberspace: the invention of the telephone. We meet the first hackers--teenage boys hired as telephone operators--who used their technical mastery, low threshold for boredom, and love of pranks to wreak havoc across the phone lines. From phone-related hi-jinks, Sterling takes us into the broader world of hacking and introduces many of the culprits--some who are fighting for a cause, some who are in it for kicks, and some who are traditional criminals after a fast buck. Sterling then details the triumphs and frustrations of the people forced to deal with the illicit hackers and tells how they developed their own subculture as cybercops. Sterling raises the ethical and legal issues of online law enforcement by questioning what rights are given to suspects and to those who have private e-mail stored on suspects' computers. Additionally, Sterling shows how the online civil liberties movement rose from seemingly unlikely places, such as the counterculture surrounding the Grateful Dead. The Hacker Crackdown informs you of the issues surrounding computer crime and the people on all sides of those issues. Download: http://rapidshare.com/files/71568229/1404306412_IndyPublish_-_The.Hacker.Crackdown-Law.and.Disorder.on.the.Electronic.Frontier.May.2002.r Dupa ce descarcati, schimbati extensia in .rar.
-
Hacker Attack, Shield your computer from internet crime
Nytro posted a topic in Tutoriale in engleza
Hacker Attack, Shield your computer from internet crime Sybex Inc; (September 22, 2000) | English | ISBN-10: 0782128300 | 320 pages | PDF | 2.18 MB | RAR Hacker Attack is the only book about computer security that is at once entertaining, understandable, and practical. You’ll be fascinated as you read about hackers, crackers and whackers–people who spend their time trying to break into your computer, spreading computer viruses, or peeping (and recording what they see!) as you surf the Internet or send email. Best of all, this book provides simple but powerful solutions to all these security needs. It’s all on the book’s CD. Protect yourself right now with firewalls, anonymisers, and virus-guards. This is without doubt the most readable and interesting book about computer security ever written. You’ll enjoy reading it, and you’ll be safe after you’ve followed its advice. Download : http://uploading.com/files/AZB0LSMM/HaAtteBo.rar.html http://w13.easy-share.com/1903262460.html http://letitbit.net/download/2e7c74596303/HaAtteBo.rar.html -
Product Description Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine’s writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker’s perspective. Included are stories about the creation of the infamous tone dialer “red box” that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks. From the Back Cover 24 years of enduring exploits, creative controversy, and hackers who made history It's colorful, controversial, cutting-edge — and you can't wait to read the next issue. Since its birth in 1984, 2600: The Hacker Quarterly has published the discoveries and adventures of hackers worldwide. Now you can enjoy the best of them all in this entertaining, provocative collection. From the first curious and intrepid souls who discovered they could outwit Ma Bell to those who've hacked the Department of Defense and ParadisePoker.com, they're all here, telling their stories in their own words. Trailblazing tales from 2600 Hacking an election An American Express phone story The world vs. Kevin Mitnick How to track any UK GSM mobile phone Pirate radio primer Simplex locks — so simple to break A hacker in Iraq The saga of Bernie S All the details about DeCSS Hacking Google Adwords See all Editorial Reviews Product Details * Hardcover: 888 pages * Publisher: Wiley (July 21, 2008) * Language: English * ISBN-10: 0470294191 * ISBN-13: 978-0470294192 Download: http://rapidshare.com/files/147409820/The_Best_of_2600__0470294191.rar
-
Hardware-based Computer Security Techniques to Defeat Hackers From Biometrics to Quantum Cryptography Author: Roger R. Dube Hardcover: 256 pages Publisher: Wiley (August 25, 2008) Language: English ISBN-10: 0470193395 ISBN-13: 978-0470193396 Format: pdf Details: The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security technologies. It is an invaluable source for computer engineers, computer security specialists, electrical engineers, software engineers, IT professionals, and advanced undergraduate and graduate students in computer engineering and computer science. Download: http://rapidshare.com/files/186109001/Hw-b4s3d.Comp.Sec.Tchs.2.Def34t.H4ck3r5-virTuAlZin.rar
-
Book Description This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools. Download: http://rapidshare.com/files/87418096/0470170778.rar PDF: 770 de pagini
-
Secrets Of A Super Hacker Loompanics Unlimited | January 1994 | English | ISBN-10: 1559501065 | PDF | 205 Pages | 648 KB Overview: The Knightmare is the sort of Super Hacker who keeps security guards from sleeping at night. He's not motivated by money or malice. He's in it for the hack. If your computer has any link whatever to the outside world, there is not question. The Knightmare can break in; the only question is whether he wants to. Secrets of a Super Hacker is an extraordinary manual on the methods of hacking. Here are some of the techniques covered in this data-devouring dossier: - Brute Force Attacks: Hurling passwords at a system until it cracks. - Social Engineering and Reverse Social Engineering: Seducing legitimate users into revealing their passwords. - Spoofing: Designing dummy screens; Delivering fake e-mail. - Superuser Abuser: How to get system managers to do your dirty work for you. - Screening Stealing: How to secretly record every image that appears on a computer screen - Data Delivery: How to hide the information you've collected; How to e-mail it to your computer. - Stair Stepping: How to use a low-level account to gain ever-higher levels of access. - And Much More! Including a brief history of hacking lists of likely passwords, a summary of computer crime laws and a glossary. The Super Hacker reveals all his secrets: Trojan Horses, Viruses, Worms, Trap Doors and Dummy Accounts. The how-to text is highlighted with bare-knuckle tales of The Knightmare's hacks, including on-site hacking remote-access hacking and bulletin board busting. No system can withstand the ingenious, unrelenting assaults of The Knightmare. And no person concerned with computer security should miss this amazing manual of mayhem. PDF, are vreo 230 de pagini. Download: http://rapidshare.com/files/185519606/Secrets_of_a_super_hacker.rar De asemenea, cred ca e o prostie.
-
Poate a blocat firewall-ul clientul care asculta pe un port. Dar trebuia sa apara sa dai Allow.
-
(CEH) - Certified Ethical Hacker Series Screenshot: Details: Certification for Ethical Hackers What is an ethical hacker and how can you become one? By Michael C. Gregg Ever had thoughts of becoming a hacker, an ethical one that is? The EC-Council has released a certification called Certified Ethical Hacker (CEH). Its goal is to certify security practitioners in the methodology of ethical hacking. This vendor neutral certification covers the standards and language involved in common exploits, vulnerabilities, and countermeasures. If you have been to a bookstore lately, you've most likely seen that there is an abundance of books on hacking and "how to hack." Until now, few organizations have worked toward quantifying ethical hacking, defining its legalities, or specifying its useful role in modern organizations. This is what the EC-Council is attempting to do with this certification. Keep reading if you want to learn more. Why Must We Have Ethical Hackers? Organizations must secure their IT infrastructure and networks. Just as corporations employ auditors to routinely examine financial records, so should corporations audit security policy. We have all seen the havoc that a lack of real financial audits can cause. Just as accountants perform bookkeeping audits, ethical hackers perform security audits. Without security audits and compliance controls, no real security exists. This is a big problem. There are plenty of individuals waiting to test and probe your organization's security stance. These individuals range from government and corporate spies, to hackers, crackers, script kiddies, or those who write and release malicious code into the wild. Their presence in your network in not a good thing! Who Are Ethical Hackers? An ethical hacker is most similar to a penetration tester. The ethical hacker is an individual who is employed or contracted to undertake an attempted penetration test. These individuals use the same methods employed by hackers. In case you were unsure; hacking is a felony in the United States. Ethical hackers have written authorization to probe a network. Only then is this attempted hack legal, as there is a contract between the ethical hacker and the organization. In 1995, long before today's more stringent guidelines, one individual received 3 felony counts, 5 years probation, 480 hours of community service, and a $68,000 legal bill for failing to insure proper authorization. Don't let this happen to you! Download: http://rapidshare.com/files/143976615/Ethical_HackingDer_Jager.part1.rar http://rapidshare.com/files/143977995/Ethical_HackingDer_Jager.part2.rar http://rapidshare.com/files/143979040/Ethical_HackingDer_Jager.part3.rar
-
I-am dat eu warn. E butonul ala cu cartonasele galben/rosu ca la fotbal de sub avatar.
-
Un mic tool pentru RST: Encoder/Decoder URL: http://rstcenter.com/index.php?pagina=encoder Are si functii de encrypt/decrypt, dar deocamdata nu sunt functionale, vor fi in curand. Encode: - 1337 - mIRC ( Beta ) - md5 - md4 - sha1 - sha256 - sha384 - sha512 - base64 - crypt - crc32 - crc32b - rot13 - uuencode - hex - binary - octal - ascii - reverse - ripemd128 - ripemd160 - whirlpool - snefru - gost - adler32 - urlencode - htmlentities - tiger128 - tiger192 - haval128 - haval256 Decode: - 1337 - mIRC - base64 - uudecode - hex - binary - octal - ascii - urldecode - htmlentities - rot13 - reverse In curand vor functiona si: - AES - DES - 3DES - Cast-128 - Cast-256 - Gost - Twofish - Loki97 - Rijndael-192 - Rijndael-256 - Saferplus - Blowfish - Blowfish-compat - Xtea - RC2 Asteptam sugestii.
-
Nu prea cred ca e FUD, e veche, dar mi-au placut optiunile.
-
[VB6] HackHound Crypter v4 Fixed Screenshot: Download: http://rapidshare.com/files/220029737/HackHound_Crypter_V.4__FIXED_SCR_.rar
-
Tovarase, daca nu ar fi comunisti ca mine aici, ar fi plin de "wow ce tare", "tnx", "LOL", "OMG" si "reupload"-uri. Nu are nimeni ce face cu numarul de posturi aici.