Privacy & Online Safety
epub, pdf |eng | 2013-06-20 | Author:Pauli, Josh [Pauli, Josh]
Bypassing Authentication We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no right to retrieve. We know we are dealing with ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2011-03-25 | Author:Martin L. Abbott & Michael T. Fisher
* * * Rule 28 has an ugly and slightly misleading and controversial title meant to provoke thought and discussion. Of course it makes sense to have a team responsible ...
( Category:
Programming
March 26,2014 )
epub |eng | 2013-07-22 | Author:Peter Loshin
Using Tails from a USB drive means: • As a writeable medium, if the USB device is large enough you can configure a persistent volume (a section of the device ...
( Category:
Network Security
March 26,2014 )
epub, pdf |eng | 2012-11-22 | Author:Derrick Rountree
3.2.1. Using OpenID The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, ...
( Category:
Network Security
March 26,2014 )
epub |eng, eng | 2012-08-22 | Author:Andy Greenberg
Hello, Scientology. We are Anonymous. Over the years, we have been watching you. Your campaigns of misinformation; suppression of dissent; your litigious nature, all of these things have caught our ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2013-03-03 | Author:Chris Seibold
cd /Users/cks/Desktop/feed/testpics Alternatively, you can type cd, then drag the folder into the Terminal window, and then hit Return to accomplish the same thing. Now that we’re in the proper ...
( Category:
Macs
March 26,2014 )
epub |eng | 2011-10-03 | Author:Misha Glenny [Glenny, Misha]
22 DUDE YOU FUCKED UP Baden-Württemberg, 2007 It was a pleasant evening in early May, although it didn’t feel much like springtime to Matrix001. The external world receded as his ...
( Category:
Hacking
March 26,2014 )
mobi, epub, pdf |eng | 2010-07-22 | Author:Jonathan Hassell
notrealm This option overrides the default action to proxy a user who logs on with a User-Name attribute that matches a defined realm. Using the clients.conf File In Chapter 5, ...
( Category:
Network Security
March 25,2014 )
mobi, epub | | 2009-12-26 | Author:Wallace Wang
USA/UPS ASSOCIATE MEMBERS AKWESASNE NOTES, Roosevelton, N.Y. 13683 .50/iss. ALESTLE, c/o Paul Gorden, 7404 Tower Lake, Apt. 1D, Edwardsville, Ill. 62025 ALLIANCE MAGAZINE, Box 229, Athens, Ohio 45701 ALL YOU ...
( Category:
Hacking
March 25,2014 )
mobi |eng | 0101-01-01 | Author:Kennedy, David & Jim O'Gorman & Devon Kearns & Mati Aharoni [Kennedy, David]
msf exploit(ms09_002_memory_corruption) > [*] Started reverse handler on 172.16.32.129:443 [*] Using URL: http://0.0.0.0:8080/ [*] Local IP: http://172.16.32.129:8080/ [*] Server started. To complete the attack setup, select the default reverse Meterpreter ...
( Category:
Hacking
March 25,2014 )
mobi, epub |eng | 2009-08-19 | Author:Michael Rash
IPT_AUTO_CHAIN1 DROP, src, filter, INPUT, 1, PSAD_BLOCK_INPUT, 1; IPT_AUTO_CHAIN2 DROP, dst, filter, OUTPUT, 1, PSAD_BLOCK_OUTPUT, 1; IPT_AUTO_CHAIN3 DROP, both, filter, FORWARD, 1, PSAD_BLOCK_FORWARD1, 1; * * * [45] 1 As ...
( Category:
Linux
March 25,2014 )
mobi | | 2009-08-28 | Author:Nitesh Dhanjani;Billy Rios;Brett Hardin
Ignoring the fact that the credentials could possibly be sent to a clear-text email account, one piece of the message is particularly interesting from a security standpoint. SalesForce.com not only ...
( Category:
Hacking
March 25,2014 )
mobi, epub, pdf |eng | 2011-12-09 | Author:Jeffrey Carr
Protecting against 0day exploits There is simply no specific defense against 0day exploits. Each 0day exploit is unique, and only the attacker knows the full details of the 0day vulnerability. ...
( Category:
Privacy & Online Safety
March 25,2014 )
Categories
Popular ebooks
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3035)Future Crimes by Marc Goodman(3009)
Mastering Python for Networking and Security by José Manuel Ortega(2967)
Blockchain Basics by Daniel Drescher(2899)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2535)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2523)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2488)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2383)
The Art Of Deception by Kevin Mitnick(2305)
The Code Book by Simon Singh(2222)
Machine Learning Security Principles by John Paul Mueller(2103)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(2088)
Solidity Programming Essentials by Ritesh Modi(1874)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1872)
Wireless Hacking 101 by Karina Astudillo(1854)
DarkMarket by Misha Glenny(1850)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1841)
Mobile Forensics Cookbook by Igor Mikhaylov(1817)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(1812)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(1771)