Security & Encryption
epub |eng | 2011-07-28 | Author:Kevin D. Mitnick

Chapter 11 Combining Technology and Social Engineering A social engineer lives by his ability to manipulate people into doing things that help him achieve his goal, but success often also ...
( Category: Networking & Cloud Computing September 4,2017 )
epub, mobi |eng | 2010-09-28 | Author:Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard

HANDLE hDupHandle; BOOL bStatus = FALSE; HANDLE hProc = OpenProcess(PROCESS_DUP_HANDLE, FALSE, dwPid); if (hProc != NULL) { if (DuplicateHandle(hProc, (HANDLE)dwHval, GetCurrentProcess(), &hDupHandle, 0, FALSE, DUPLICATE_SAME_ACCESS|DUPLICATE_CLOSE_SOURCE)) { if (CloseHandle(hDupHandle)) { bStatus ...
( Category: Security & Encryption September 4,2017 )
epub, pdf |eng | 2014-02-17 | Author:Adam Shostack

Social Security Numbers and Other National Identity Numbers This section reviews risks associated with the United States social security number (SSN). Over the last five to ten years, the use ...
( Category: Security & Encryption September 4,2017 )
epub, mobi |eng | 2014-11-03 | Author:Niels Ferguson & Bruce Schneier & Tadayoshi Kohno

The lemma is a statement of fact. The proof argues why the lemma is true. The little square box signals the end of the proof. Mathematicians love to use lots ...
( Category: Security & Encryption September 4,2017 )
epub |eng | 2014-07-01 | Author:Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters

Figure 14-4: WinLister on a live machine shows the IE window properties The next image in Figure 14-5 shows a similar situation, but this time the IE process is in ...
( Category: Security & Encryption September 4,2017 )
epub, azw3, mobi, pdf |eng | 2014-02-19 | Author:Dieterle, Daniel [Dieterle, Daniel]

Use “sessions -i” and the session number to connect to any of the sessions. Once connected, you can use any of the built in Meterpreter commands, or use Linux commands ...
( Category: Security & Encryption September 3,2017 )
epub |eng | 2013-09-02 | Author:Keith Barker & Scott Morris

* * * Verifying the Firewall You can verify the firewall from both the CCP and the command line. In the video bonus material included with this book, there is ...
( Category: Certification September 2,2017 )
epub, mobi |eng | | Author:2015

WPA cracking with Aircrack-ng In the previous section, we have mentioned that to crack a WPA key, we must first capture the four frames related to a WPA handshake between ...
( Category: Networking & Cloud Computing September 2,2017 )
epub |eng | 2015-03-14 | Author:Jennifer Golbeck

Figure 14.3 Malcom's Tumblr blog. Hashtags Hashtags are used very frequently within Tumblr. Figure 14.3 shows a couple on the photo Malcom has posted. Since photos are a very common ...
( Category: Internet & Social Media September 1,2017 )
epub |eng | 2013-10-03 | Author:Joe Kissell [Joe Kissell]

Software Licenses Many apps require a license key or serial number, and 1Password makes a great storage place for all those licenses (Figure 18). Even though they may not be ...
( Category: Security & Encryption September 1,2017 )
epub, mobi |eng | 2013-05-29 | Author:Joe Kissell [Joe Kissell]

So, my professional opinion: you have better things to worry about. Handle Security Questions Earlier, in Understanding Security Questions and Reset Procedures, I talked about the security questions you may ...
( Category: Security & Encryption September 1,2017 )
epub |eng | 2015-07-31 | Author:Cramer, Ronald & Damgård, Ivan Bjerre & Nielsen, Jesper Buus

( Category: Security & Encryption September 1,2017 )
epub |eng | 2015-07-01 | Author:Cordova, Aaron & Rinaldi, Billie & Wall, Michael

Secondary Indexing Applications that use a single table and employ a simple access pattern are among the most scalable, consistent, and fast. This type of design can serve in a ...
( Category: Security & Encryption September 1,2017 )
epub |eng | 2017-02-26 | Author:Joshua Cody [Cody, Joshua]

First Steps with TOR By this time, you have already opted for one option, either the TOR browser or the Mozilla add-on counterpart, to navigate anonymously. You also know the ...
( Category: Security & Encryption September 1,2017 )
mobi |eng | 2012-01-16 | Author:Kevin D. Freeman [Freeman, Kevin D.]

And indeed, in the lead-up to September 2008, there was intense and focused investment in the commodity markets both directly and via proxies coming from oil producers and sovereign wealth ...
( Category: Politics & Government August 31,2017 )