Hacking
epub |eng | 2015-03-15 | Author:Joshua Wright & Johnny Cache [Wright, Joshua]

* * * * * * Figure 9-8 SmartRF Packet Sniffer data A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer ...
mobi, epub, pdf |eng | 2008-07-13 | Author:Paul Graham

where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
epub, mobi, pdf |eng | 2012-03-09 | Author:Rachel Andrew [Andrew, Rachel]

The new styles can be seen in Figure 6.5. Figure 6.5. The form, now with added style Discussion I’ve used CSS to add a border to the input elements in ...
( Category: Hacking March 10,2015 )
mobi |eng | 2014-03-13 | Author:Peter Kim

privilege::debug sekurlsa::logonPasswords full Figure 66 - Mimikatz Again, it doesn’t matter how long their password is and you don’t have to even worry about the hashes. You can now take ...
( Category: Testing March 3,2015 )
mobi |eng | 2008-10-13 | Author:McDowell, Gayle Laakmann [McDowell, Gayle Laakmann]

SOLUTION * * * Observation: Regardless of how we drop Egg1, Egg2 must do a linear search. i.e., if Egg1 breaks between floor 10 and 15, we have to check ...
( Category: Software Development March 3,2015 )
epub |eng | 2012-02-12 | Author:White, John & Conway, Drew [White, John]

Introducing Polynomial Regression With our earlier caveats in mind, let’s start working with polynomial regression in R, which is implemented in the poly function. The easiest way to see how ...
( Category: Machine Theory February 13,2015 )
epub, mobi |eng | 2014-10-07 | Author:Walter Isaacson [Isaacson, Walter]

Alan Kay (1940– ) at Xerox PARC in 1974. Kay’s 1972 sketch for a Dynabook. Lee Felsenstein (1945– ). The first issue, October 1972. By keeping children (of all ages) ...
( Category: Hacking February 2,2015 )
epub, pdf |eng | 2015-01-01 | Author:Srikanth Ramesh [Ramesh, Srikanth]

Figure 8. 17 Next, to load the dumped password hashes, click on "Load" button, select "PWDUMP file" option and load the hash.txt file obtained by running the PWDUMP tool on ...
( Category: Hacking January 20,2015 )
epub, azw3 |eng | 2014-12-12 | Author:Alicia Gibb [Gibb, Alicia]

Case Study: Open Source Consumer Electronic Products While Arduino has demonstrated that open source hardware can create a thriving ecosystem, it’s sobering to note that the vast majority of devices ...
( Category: Hacking January 20,2015 )
mobi | | | Author:Christopher Hadnagy

( Category: Hacking January 6,2015 )
mobi |eng | 2011-07-01 | Author:Kevin Mitnick

I did a directory listing to find out what files were on the computer, looking for the LocK-11 program and associated files and stumbled on something I found shocking: a ...
( Category: Human-Computer Interaction January 6,2015 )
mobi | | | Author:Nitesh Dhanjani

( Category: Software Development January 6,2015 )
mobi, pdf |eng | 2004-12-15 | Author:Paul Graham

where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category: Hacking December 31,2014 )
epub, mobi, pdf |eng | 2014-12-04 | Author:Justin Seitz [Seitz, Justin]

Kicking the Tires Click the Extender tab in Burp, click the Add button, and use the same procedure we used for our previous extensions to get the Wordlist extension working. ...
( Category: Viruses December 27,2014 )
epub |eng | 2015-01-09 | Author:Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel]

Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category: Encryption December 15,2014 )

Categories
Popular ebooks
Deep Learning with Python by François Chollet(12578)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6419)
Kotlin in Action by Dmitry Jemerov(5066)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3808)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3331)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3088)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
The Art Of Deception by Kevin Mitnick(2606)
Drugs Unlimited by Mike Power(2467)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2314)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2309)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2263)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2194)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2188)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2083)
Wireless Hacking 101 by Karina Astudillo(2078)
Full-Stack React Projects by Shama Hoque(1991)