Privacy & Online Safety
epub |eng | 2013-07-22 | Author:Peter Loshin
Using Tails from a USB drive means: • As a writeable medium, if the USB device is large enough you can configure a persistent volume (a section of the device ...
( Category:
Network Security
March 26,2014 )
epub, pdf |eng | 2012-11-22 | Author:Derrick Rountree
3.2.1. Using OpenID The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, ...
( Category:
Network Security
March 26,2014 )
epub |eng, eng | 2012-08-22 | Author:Andy Greenberg
Hello, Scientology. We are Anonymous. Over the years, we have been watching you. Your campaigns of misinformation; suppression of dissent; your litigious nature, all of these things have caught our ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2013-03-03 | Author:Chris Seibold
cd /Users/cks/Desktop/feed/testpics Alternatively, you can type cd, then drag the folder into the Terminal window, and then hit Return to accomplish the same thing. Now that we’re in the proper ...
( Category:
Macs
March 26,2014 )
epub |eng | 2011-10-03 | Author:Misha Glenny [Glenny, Misha]
22 DUDE YOU FUCKED UP Baden-Württemberg, 2007 It was a pleasant evening in early May, although it didn’t feel much like springtime to Matrix001. The external world receded as his ...
( Category:
Hacking
March 26,2014 )
mobi, epub, pdf |eng | 2010-07-22 | Author:Jonathan Hassell
notrealm This option overrides the default action to proxy a user who logs on with a User-Name attribute that matches a defined realm. Using the clients.conf File In Chapter 5, ...
( Category:
Network Security
March 25,2014 )
mobi, epub | | 2009-12-26 | Author:Wallace Wang
USA/UPS ASSOCIATE MEMBERS AKWESASNE NOTES, Roosevelton, N.Y. 13683 .50/iss. ALESTLE, c/o Paul Gorden, 7404 Tower Lake, Apt. 1D, Edwardsville, Ill. 62025 ALLIANCE MAGAZINE, Box 229, Athens, Ohio 45701 ALL YOU ...
( Category:
Hacking
March 25,2014 )
mobi |eng | 0101-01-01 | Author:Kennedy, David & Jim O'Gorman & Devon Kearns & Mati Aharoni [Kennedy, David]
msf exploit(ms09_002_memory_corruption) > [*] Started reverse handler on 172.16.32.129:443 [*] Using URL: http://0.0.0.0:8080/ [*] Local IP: http://172.16.32.129:8080/ [*] Server started. To complete the attack setup, select the default reverse Meterpreter ...
( Category:
Hacking
March 25,2014 )
mobi, epub |eng | 2009-08-19 | Author:Michael Rash
IPT_AUTO_CHAIN1 DROP, src, filter, INPUT, 1, PSAD_BLOCK_INPUT, 1; IPT_AUTO_CHAIN2 DROP, dst, filter, OUTPUT, 1, PSAD_BLOCK_OUTPUT, 1; IPT_AUTO_CHAIN3 DROP, both, filter, FORWARD, 1, PSAD_BLOCK_FORWARD1, 1; * * * [45] 1 As ...
( Category:
Linux
March 25,2014 )
mobi | | 2009-08-28 | Author:Nitesh Dhanjani;Billy Rios;Brett Hardin
Ignoring the fact that the credentials could possibly be sent to a clear-text email account, one piece of the message is particularly interesting from a security standpoint. SalesForce.com not only ...
( Category:
Hacking
March 25,2014 )
mobi, epub, pdf |eng | 2011-12-09 | Author:Jeffrey Carr
Protecting against 0day exploits There is simply no specific defense against 0day exploits. Each 0day exploit is unique, and only the attacker knows the full details of the 0day vulnerability. ...
( Category:
Privacy & Online Safety
March 25,2014 )
Categories
Popular ebooks
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(3966)Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(3806)
Machine Learning Security Principles by John Paul Mueller(3535)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(3524)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(3209)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(3186)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3101)
Future Crimes by Marc Goodman(3093)
Mastering Python for Networking and Security by José Manuel Ortega(3089)
Blockchain Basics by Daniel Drescher(2997)
Mobile App Reverse Engineering by Abhinav Mishra(2683)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(2644)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2611)
Solidity Programming Essentials by Ritesh Modi(2570)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2562)
The Art Of Deception by Kevin Mitnick(2385)
The Code Book by Simon Singh(2359)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(2211)
Incident Response with Threat Intelligence by Roberto Martínez(2160)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1990)