Hacking
epub |eng | 2015-03-15 | Author:Joshua Wright & Johnny Cache [Wright, Joshua]
* * * * * * Figure 9-8 SmartRF Packet Sniffer data A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer ...
( Category:
Internet, Groupware, & Telecommunications
April 22,2015 )
mobi, epub, pdf |eng | 2008-07-13 | Author:Paul Graham
where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category:
Internet, Groupware, & Telecommunications
March 12,2015 )
epub, mobi, pdf |eng | 2012-03-09 | Author:Rachel Andrew [Andrew, Rachel]
The new styles can be seen in Figure 6.5. Figure 6.5. The form, now with added style Discussion I’ve used CSS to add a border to the input elements in ...
( Category:
Hacking
March 10,2015 )
mobi |eng | 2014-03-13 | Author:Peter Kim
privilege::debug sekurlsa::logonPasswords full Figure 66 - Mimikatz Again, it doesn’t matter how long their password is and you don’t have to even worry about the hashes. You can now take ...
( Category:
Testing
March 3,2015 )
mobi |eng | 2008-10-13 | Author:McDowell, Gayle Laakmann [McDowell, Gayle Laakmann]
SOLUTION * * * Observation: Regardless of how we drop Egg1, Egg2 must do a linear search. i.e., if Egg1 breaks between floor 10 and 15, we have to check ...
( Category:
Software Development
March 3,2015 )
epub |eng | 2012-02-12 | Author:White, John & Conway, Drew [White, John]
Introducing Polynomial Regression With our earlier caveats in mind, let’s start working with polynomial regression in R, which is implemented in the poly function. The easiest way to see how ...
( Category:
Machine Theory
February 13,2015 )
epub, mobi |eng | 2014-10-07 | Author:Walter Isaacson [Isaacson, Walter]
Alan Kay (1940– ) at Xerox PARC in 1974. Kay’s 1972 sketch for a Dynabook. Lee Felsenstein (1945– ). The first issue, October 1972. By keeping children (of all ages) ...
( Category:
Hacking
February 2,2015 )
epub, pdf |eng | 2015-01-01 | Author:Srikanth Ramesh [Ramesh, Srikanth]
Figure 8. 17 Next, to load the dumped password hashes, click on "Load" button, select "PWDUMP file" option and load the hash.txt file obtained by running the PWDUMP tool on ...
( Category:
Hacking
January 20,2015 )
epub, azw3 |eng | 2014-12-12 | Author:Alicia Gibb [Gibb, Alicia]
Case Study: Open Source Consumer Electronic Products While Arduino has demonstrated that open source hardware can create a thriving ecosystem, it’s sobering to note that the vast majority of devices ...
( Category:
Hacking
January 20,2015 )
mobi | | | Author:Christopher Hadnagy
( Category:
Hacking
January 6,2015 )
mobi |eng | 2011-07-01 | Author:Kevin Mitnick
I did a directory listing to find out what files were on the computer, looking for the LocK-11 program and associated files and stumbled on something I found shocking: a ...
( Category:
Human-Computer Interaction
January 6,2015 )
mobi | | | Author:Nitesh Dhanjani
( Category:
Software Development
January 6,2015 )
mobi, pdf |eng | 2004-12-15 | Author:Paul Graham
where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category:
Hacking
December 31,2014 )
epub, mobi, pdf |eng | 2014-12-04 | Author:Justin Seitz [Seitz, Justin]
Kicking the Tires Click the Extender tab in Burp, click the Add button, and use the same procedure we used for our previous extensions to get the Wordlist extension working. ...
( Category:
Viruses
December 27,2014 )
epub |eng | 2015-01-09 | Author:Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel]
Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category:
Encryption
December 15,2014 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(12578)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6419)
Kotlin in Action by Dmitry Jemerov(5066)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3808)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3331)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3088)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
The Art Of Deception by Kevin Mitnick(2606)
Drugs Unlimited by Mike Power(2467)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2314)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2309)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2263)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2194)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2188)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2083)
Wireless Hacking 101 by Karina Astudillo(2078)
Full-Stack React Projects by Shama Hoque(1991)
