Internet & Social Media
epub, pdf |eng | 2012-11-28 | Author:Preston Gralla [Preston Gralla]

Note Note: Many routers ship with a default channel of 6, so if you’re using that channel, you’re most likely to run into interference from nearby Wi-Fi networks. How you ...
( Category: Microsoft Windows Registry March 26,2014 )
epub, pdf, mobi |eng | 2013-06-20 | Author:Pauli, Josh [Pauli, Josh]

Bypassing Authentication We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no right to retrieve. We know we are dealing with ...
( Category: Hacking March 26,2014 )
epub, mobi |eng | 2013-07-22 | Author:Peter Loshin

Using Tails from a USB drive means: • As a writeable medium, if the USB device is large enough you can configure a persistent volume (a section of the device ...
( Category: Network Security March 26,2014 )
epub, pdf |eng | 2012-08-27 | Author:Mike Shema

Protecting Information Compromising the information in a database is not the only goal of an attacker, but it surely exists as a major one. Many methods are available to protect ...
( Category: Hacking March 26,2014 )
epub, mobi, pdf |eng | 2012-11-19 | Author:Matthew Metheny

Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
( Category: Cloud Computing March 26,2014 )
epub, pdf |eng | 2010-05-17 | Author:Kimberly Graves

Because DoS attacks are so powerful and can cripple a production system or network, this chapter does not include any DoS tool exercises. If you want to test the tools ...
( Category: Internet & Social Media March 26,2014 )
epub |eng, eng | 2012-08-22 | Author:Andy Greenberg

Hello, Scientology. We are Anonymous. Over the years, we have been watching you. Your campaigns of misinformation; suppression of dissent; your litigious nature, all of these things have caught our ...
( Category: Hacking March 26,2014 )
epub, pdf |eng | 2010-08-24 | Author:Himanshu Dwivedi [Himanshu Dwivedi]

IAX.Brute performs the passive dictionary attack and, using these examples, identifies the password as 123voiptest. Active Dictionary Attack In addition to passive attacks, IAX is also vulnerable to pre-computed dictionary ...
( Category: Hacking March 26,2014 )
epub |eng | 2009-03-25 | Author:Morgan, George G.

Federal-Land States Records The Public Lands in the Federal-Land States were distributed in a variety of ways over different time periods. Others were auctioned or sold by lottery. Initial sales ...
( Category: Genealogy March 26,2014 )
epub |eng | | Author:Lori Andrews

Even if we specifically designate our social network pages as private, social network sites do a particularly bad job of protecting privacy. In 2011, Joanne Kuzma of the University of ...
( Category: Social Media March 26,2014 )
epub |eng | 2013-01-16 | Author:Evgeny Morozov

Against Technological Defeatism Viewed in the abstract, it may seem that the tides of digital preemption, situational crime prevention, and reputation-based controls are unstoppable and irreversible. Information is everywhere, and ...
( Category: Social Media March 26,2014 )
epub, pdf |eng | 2013-03-03 | Author:Chris Seibold

cd /Users/cks/Desktop/feed/testpics Alternatively, you can type cd, then drag the folder into the Terminal window, and then hit Return to accomplish the same thing. Now that we’re in the proper ...
( Category: Macs March 26,2014 )
epub |eng | | Author:Keir Thomas

Tip 178 Pool Printers for Quick Printing This is a tip for anybody who uses a Mac on a network and prints to network printers or perhaps has several printers ...
( Category: Hacking March 26,2014 )
epub |eng | 2012-01-26 | Author:Harlan Carvey

Figure 5.22 Values in RegIdleBackup key, via WRR. We can then use the GUID value to navigate to the TaskCache\Tasks key, and locate the subkey with the ID GUID as ...
( Category: Microsoft Windows Registry March 26,2014 )
epub |eng | 2011-05-26 | Author:Lynne Truss [Truss, Lynne]

Look at that sentence fly. Amazing. The way it stays up like that. Would anyone mind if I ate the last sandwich? Of course, nothing is straightforward in the world ...
( Category: Vocabulary March 26,2014 )

Popular ebooks
Deep Learning with Python by François Chollet(12595)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7792)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6427)
Kotlin in Action by Dmitry Jemerov(5076)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3863)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3338)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3093)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2615)
Drugs Unlimited by Mike Power(2475)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2370)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2281)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2268)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2141)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2083)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2009)