Security & Encryption
mobi, azw3, epub, pdf |eng | 2015-03-02 | Author:Bruce Schneier

allowed academics to mine their data: Here are two examples. Lars Backstrom et al. (5 Jan 2012), “Four degrees of separation,” arXiv:1111.4570 [cs.SI], http://arxiv.org/abs/1111.4570. Russell B. Clayton (Jul 2014), “The ...
( Category: Computer & Internet Law March 5,2015 )
mobi |eng | 2015-02-11 | Author:Mohammad Tanvir Hossain

CHAPTER 6 Who Is A HACKER? A hacker is someone who finds out the weakness in the computer system or network. The activity of a hacker can be motivated by ...
epub |eng | 2014-07-24 | Author:Michael Gurnow [Gurnow, Michael]

Chapter 7 Black Rain “The immoral cannot be made moral through the use of secret law.” –Edward Snowden, public statement made during the G9 meeting, July 12, 20131 The fallout ...
( Category: National March 4,2015 )
mobi |eng | 2014-03-13 | Author:Peter Kim

privilege::debug sekurlsa::logonPasswords full Figure 66 - Mimikatz Again, it doesn’t matter how long their password is and you don’t have to even worry about the hashes. You can now take ...
( Category: Testing March 3,2015 )
epub, pdf |eng | 2011-04-18 | Author:Kristina Chodorow [Kristina Chodorow]

Figure 3-2. A B-tree, possibly for an index on a field with integer values. When your query includes x as part of the criteria, MongoDB will notice that it has ...
( Category: Object-Oriented Design February 15,2015 )
epub, pdf |eng | 2015-01-01 | Author:Srikanth Ramesh [Ramesh, Srikanth]

Figure 8. 17 Next, to load the dumped password hashes, click on "Load" button, select "PWDUMP file" option and load the hash.txt file obtained by running the PWDUMP tool on ...
( Category: Hacking January 20,2015 )
mobi | | | Author:Chey Cobb

( Category: Encryption January 6,2015 )
mobi | | | Author:Christopher Hadnagy

( Category: Hacking January 6,2015 )
mobi |eng | 2011-07-01 | Author:Kevin Mitnick

I did a directory listing to find out what files were on the computer, looking for the LocK-11 program and associated files and stumbled on something I found shocking: a ...
( Category: Human-Computer Interaction January 6,2015 )
mobi | | | Author:Nitesh Dhanjani

( Category: Software Development January 6,2015 )
epub |eng | 2013-03-20 | Author:Mohammed Al-Marhoon

9. Password Management Techniques You may think that creating strong, secure and unique passwords for each of your online accounts is impossible because it will be difficult to remember all ...
( Category: Security & Encryption January 6,2015 )
mobi, pdf |eng | 2004-12-15 | Author:Paul Graham

where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category: Hacking December 31,2014 )
epub, mobi, pdf |eng | 2014-12-04 | Author:Justin Seitz [Seitz, Justin]

Kicking the Tires Click the Extender tab in Burp, click the Add button, and use the same procedure we used for our previous extensions to get the Wordlist extension working. ...
( Category: Viruses December 27,2014 )
epub |eng | 2015-01-09 | Author:Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel]

Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category: Encryption December 15,2014 )
epub, azw3, mobi, pdf |eng | 2014-12-15 | Author:Tyler Wrightson [Wrightson, Tyler]

Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category: Hacking December 15,2014 )