Privacy & Online Safety
epub, azw3, mobi, pdf |eng | 2014-12-15 | Author:Tyler Wrightson [Wrightson, Tyler]

Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category: Hacking December 15,2014 )
mobi, epub |eng | 2014-08-22 | Author:Thomas P. Keenan

New York City was a pioneer in the Open Data arena. In October 2009, with considerable fanfare, they released a number of municipal data sets. The next day, they had ...
( Category: Canadian November 23,2014 )
epub, azw3 |eng | | Author:Shane Harris

Some of the FBI’s most important intelligence targets today are Chinese cyber spies stealing intellectual property. “We do a lot of collection on China’s victimizing US companies,” says a former ...
( Category: Privacy & Online Safety November 18,2014 )
epub |eng | | Author:Tanner, Adam [Tanner, Adam]

Kyle Prall at the state capitol in Austin, Texas, in front of portraits of state legislators. Source: Author photo. In late 2012 Prall traveled to Las Vegas. Like so many ...
( Category: Privacy & Surveillance October 27,2014 )
mobi |eng | 2014-03-19 | Author:Julia Angwin

12 THE HALL OF MIRRORS When Rayne Puertos started a new job at a computer retailer in Tampa, Florida, she was not trying to hide her sexual orientation, but neither ...
( Category: Consumer Behavior September 2,2014 )
epub, pdf |eng | 2013-12-25 | Author:Mike Shema

Usually, services only respond to a particular protocol handshake. So, the trigger for SSL shouldn’t elicit a response from a DNS service, and the DNS trigger shouldn’t elicit a response ...
( Category: Hacking August 28,2014 )
mobi, epub |eng | 2008-01-28 | Author:Jon Erickson

Example Internet Datagram Header Each element in the structure corresponds to the fields shown in the RFC header diagram. Since the first two fields, Version and IHL (Internet Header Length) ...
( Category: Privacy & Online Safety May 26,2014 )
azw3 |eng | 2005-04-14 | Author:Zalewski, Michal [Zalewski, Michal]

Customer Profiling and Privacy Invasion Many companies go to great lengths to gather and sell valuable information about people’s habits, preferences, and behavior. Although this information is usually used for ...
( Category: LAN May 26,2014 )
epub, pdf |eng | 2012-02-26 | Author:Michael Sikorski & Andrew Honig [Michael Sikorski]

Using Hashed Exported Names The algorithm just discussed has a weakness: It performs a strcmp against each export name until it finds the correct one. This requires that the full ...
( Category: Hacking April 5,2014 )
epub |eng | 2010-10-14 | Author:Fitzgerald, Michael [Michael Fitzgerald]

See Also For a more thorough introduction to SOAP, read the SOAP v1.2 primer (Part 0): http://www.w3.org/TR/soap12-part0/ SOAP v1.2 messaging framework (Part 1), including information on the SOAP processing model ...
( Category: Client-Server Systems March 31,2014 )
epub |eng | 2000-01-02 | Author:Chuck Musciano & Bill Kennedy [Musciano, Chuck & Kennedy, Bill]

9.2.2.1. The application/x-www-form-urlencoded encoding The standard encodingapplication/x-www-form-urlencodedconverts any spaces in the form values into a plus sign (+), nonalphanumeric characters into a percent sign (%) followed by two hexadecimal digits ...
( Category: Web Design March 31,2014 )
epub |eng | 2011-06-17 | Author:Pc User [User, Pc]

20 It is possible through a technique called cloaking, and for this reason, cloaking is possibly one of the best friends black hat SEO practitioners could ever have. In order ...
( Category: PCs March 26,2014 )
epub, pdf, mobi |eng | 2013-06-20 | Author:Pauli, Josh [Pauli, Josh]

Bypassing Authentication We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no right to retrieve. We know we are dealing with ...
( Category: Hacking March 26,2014 )
epub |eng | 2011-03-25 | Author:Martin L. Abbott & Michael T. Fisher

* * * Rule 28 has an ugly and slightly misleading and controversial title meant to provoke thought and discussion. Of course it makes sense to have a team responsible ...
( Category: Programming March 26,2014 )
epub, mobi |eng | 2013-07-22 | Author:Peter Loshin

Using Tails from a USB drive means: • As a writeable medium, if the USB device is large enough you can configure a persistent volume (a section of the device ...
( Category: Network Security March 26,2014 )

Categories