Browse Results

Showing 25,276 through 25,300 of 61,781 results

Hacking Vim 7.2

by Kim Schulz

This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The minimum version of Vim required for each hack is clearly indicated. If you are a Vim user who wants to get more out of this legendary text editor, this book is for you. It focuses on making life easier for intermediate to experienced Vim users.

Hacking Vim: A Cookbook to get the Most out of the Latest Vim Editor

by Kim Schulz

This is a cookbook packed with ready-to-use hacks that give solutions for some of the commonest problems users of the Vim editor encounter during their daily use. Each recipe follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The reader can read any of the hacks in this book without having to read any of the other hacks "where necessary they include cross-references to other relevant hacks. The minimum version of Vim required for each hack is clearly indicated. This is a cookbook packed with ready-to-use hacks that give solutions for some of the commonest problems users of the Vim editor encounter during their daily use. Each recipe follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The reader can read any of the hacks in this book without having to read any of the other hacks "where necessary they include cross-references to other relevant hacks. The minimum version of Vim required for each hack is clearly indicated.

Hacking VoIP: Protocols, Attacks, and Countermeasures (No Starch Press Ser.)

by Himanshu Dwivedi

<P>Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. <P>Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. <P>Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to: <br>–Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing <br>–Audit VoIP network security <br>–Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage <br>–Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX <br>–Identify the many vulnerabilities in any VoIP network <P>Whether you’re setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

by Sudhanshu Chauhan Nutan Kumar Panda

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more. Provides a holistic approach to OSINT and Web recon, showing you how to fit all the data together into actionable intelligence Focuses on hands-on tools such as TOR, i2p, Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, FOCA, EXIF, Metagoofil, MAT, and many more Covers key technical topics such as metadata searching, advanced browsers and power searching, online anonymity, Darkweb / Deepweb, Social Network Analysis (SNA), and how to manage, analyze, and visualize the data you gather Includes hands-on technical examples and case studies, as well as a Python chapter that shows you how to create your own information-gathering tools and modify existing APIs

Hacking Windows Vista

by Steve Sinchak

Vista is the most radical revamping of Windows since 1995. However, along with all the fantastic improvements, there are a couple of things that likely drive you up the wall. Don't worry, though-just join forces with author Steve Sinchak and you'll end up feeling as though Microsoft designed Vista just for you! He shows you how to tweak logon screen settings, build custom Sidebar gadgets, personalize Aero Glass with themes and visual styles, turn your PC into an HDTV media center, fine-tune your firewall, and more.

Hacking Wireless Networks For Dummies

by Kevin Beaver Devin K. Akin Peter T. Davis

Become a cyber-hero - know the common wireless weaknesses"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) ProgramWireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.Discover how to:Perform ethical hacks without compromising a systemCombat denial of service and WEP attacksUnderstand how invaders thinkRecognize the effects of different hacksProtect against war drivers and rogue devices

Hacking With Kali Linux: A Step By Step Guide For You To Learn The Basics Of Cybersecurity And Hacking (Cybersecurity And Hacking)

by Ramon Nastase

This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do in order to protect yourself from all kind of hacking techniques.

Hacking and Data Privacy: How Exposed Are We? (Looking Forward)

by The New York Times Editorial Staff

Hackers can break into government websites, nuclear power plants, and the NSA. They can steal corporate secrets, top-secret security code, and credit card numbers. Through social media, they can plant ideas, manipulate public opinion, and influence elections. And there's precious little we can do to stop them. this book documents the dramatic increase in hacking and data mining incidents in recent years. The articles within it explore how these incidents affect world events, such as the United Kingdom's Brexit vote and the 2016 U.S. presidential election. Investigative articles reveal who is behind these incidents, why they happened, and how we can protect our data.

Hacking and Securing iOS Applications

by Jonathan Zdziarski

<p>Based on unique and previously undocumented research, this book by noted forensic expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where the exploitable flaws lie in their code, and in this book he will show you as well, in a clear, direct, and immediately applicable style.</p>

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It (Oreilly And Associate Ser.)

by Jonathan Zdziarski

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your appsLearn how attackers infect apps with malware through code injectionDiscover how attackers defeat iOS keychain and data-protection encryptionUse a debugger and custom code injection to manipulate the runtime Objective-C environmentPrevent attackers from hijacking SSL sessions and stealing trafficSecurely delete files and design your apps to prevent forensic data leakageAvoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

Hacking for Dummies (4th Edition)

by Kevin Beaver

Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices. Guides you through the techniques and tools you need to stop hackers before they hack you Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.

Hacking the Future: Privacy, Identity, and Anonymity on the Web

by Cole Stryker

Is anonymity a crucial safeguard—or a threat to society? &“One of the most well-informed examinations of the Internet available today&” (Kirkus Reviews). &“The author explores the rich history of anonymity in politics, literature and culture, while also debunking the notion that only troublemakers fear revealing their identities to the world. In relatively few pages, the author is able to get at the heart of identity itself . . . Stryker also introduces the uninitiated into the &‘Deep Web,&’ alternative currencies and even the nascent stages of a kind of parallel Web that exists beyond the power of governments to switch it off. Beyond even that is the fundamental question of whether or not absolute anonymity is even possible.&” —Kirkus Reviews &“Stryker explains how significant web anonymity is to those key companies who mine user data personal information of, for example, the millions of members on social networks. . . . An impassioned, rational defense of web anonymity and digital free expression.&” —Publishers Weekly

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

by Roger A. Grimes

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. Go deep into the world of white hat hacking to grasp just how critical cybersecurity is Read the stories of some of the world's most renowned computer security experts Learn how hackers do what they do—no technical expertise necessary Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted—yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Hacking the Human: Social Engineering Techniques and Security Countermeasures

by Ian Mann

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read.

Hacking with Kali: Practical Penetration Testing Techniques

by James Broad Andrew Bindner

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security. Provides detailed explanations of the complete penetration testing lifecycle Complete linkage of the Kali information, resources and distribution downloads Hands-on exercises reinforce topics

Hacking: The Art of Exploitation, 2nd Edition

by Jon Erickson

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:– Program computers using C, assembly language, and shell scripts– Corrupt system memory to run arbitrary code using buffer overflows and format strings– Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening– Outsmart common security measures like nonexecutable stacks and intrusion detection systems– Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence– Redirect network traffic, conceal open ports, and hijack TCP connections– Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrixHackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

Hacking: The Next Generation (Animal Guide)

by Nitesh Dhanjani Billy Rios Brett Hardin

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.Learn how "inside out" techniques can poke holes into protected networksUnderstand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate dataRecognize weaknesses in today's powerful cloud infrastructures and how they can be exploitedPrevent attacks against the mobile workforce and their devices containing valuable dataBe aware of attacks via social networking sites to obtain confidential information from executives and their assistantsGet case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations

Hacking: The Underground Guide To Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux And Penetration Testing

by Abraham White

This book will provide you with the best tools for hacking and also point out ways you can protect your systems. Step by Step instructions with command prompts are included.

Hacking: Ultimate Hacking for Beginners, How to Hack

by Andrew Mckinnon

<p>So you want to be a hacker? You want to know how to get into a system and look like a genius while you spot system vulnerabilities. In this world, you can either be a good hacker or a bad hacker. Whichever that is, totally depends on your choice. <p>This book teaches ethical hacking and guides anyone interested to an in-depth discussion about what hacking is all about. Also, this book provides the right hacking mindset that will turn you into a trustworthy hacker. <p>You will learn how to classify various kinds of hackers, and identify types of hacking attacks, how to hack an email password and many more! <p>You Can Check Out Further Discussions Including: <p> <li>Common Attacks and Viruses <li>Spoofing Techniques <li>Hacking Tools <li>Mobile Hacking <li>Penetration Testing <li>Tips for Ethical Hacking <li>General Tips of Computer Safety</li> </p>

Hacks for Minecrafters: Combat Edition

by Megan Miller

From the author of Hacks for Minecrafters and Hacks for Minecrafters: Master Builder comes the most encompassing guide ever to combat in the world of Minecraft!With more than 100 million registered Minecraft accounts and rights picked up by Warner Brothers for an action-adventure film in the style of The Lego Movie, Minecraft is on its way to becoming the next big children's brand. While there are several successful game guides on the market already, this book will be the first unofficial "hacker's" guide dedicated to combat and geared toward seven- to twelve-year-old Minecrafters.With Hacks for Minecrafters: Combat Edition, kids will learn how to defend their property and fight off hostile mobs and monsters like zombies, spiders, and skeletons! Other tips include:Updated enchanting for armor, weapons, and moreHow to deal with new behaviors for hostile mobsThe best ways to defeat new hostile mobs, such as killer bunnies, ocean-dwelling guardians, elder guardian mini-bosses, and the rare endermiteAnd much more!Packed with expert tips, cheats, and hacks on fighting all types of enemies and with over one hundred screenshots, Hacks for Minecrafters: Combat Edition shows exactly how the experts defend themselves and fight attackers, from cave spiders to creepers to zombie pigmen. In Minecraft, the risk of attack is ever-present, and players need to know how to build weapons, set traps, and escape to safety.

Hacks for Minecrafters: Command Blocks (An Unofficial Minecrafter's guide #3)

by Megan Miller

From the author of Hacks for Minecrafters comes the most encompassing guide ever to command blocks in the world of Minecraft! With Hacks for Minecrafters: Command Blocks, kids will learn everything they need to know about manipulating and programming command blocks within Minecraft. As well as clearly explaining the commands and how to use them, this book has tons of fun tricks and projects for making your own custom maps and mini-games. Hacks for Minecrafters: Command Blocks shows exactly how the experts wield command blocks and make fun modifications to the Minecraft world.

Hacks for Minecrafters: Master Builder

by Megan Miller

From the author of Hacks for Minecrafters comes the most encompassing guide ever to the many amazing builds you can create in Minecraft! With more than 100 million registered Minecraft accounts and rights picked up by Warner Brothers for an action-adventure film in the style of The LEGO Movie, Minecraft is on its way to becoming the next big children's brand. While there are several successful game guides on the market already, this book will be the first unofficial "hacker's" guide dedicated to building and geared toward seven- to twelve-year-old Minecrafters.With Hacks for Minecrafters: Master Builder, kids will learn how to build the coolest stuff, including an underwater house, a pirate ship, and a fortified castle! Other tips will help gamers:Find the best locationsChoose their favorite styleLearn how to get started with foundations and wallsBecome landscaping expertsLearn how to decorate their living roomAnd much more!Packed with expert tips, cheats, and hacks on planning all types of buildings and with over one hundred screenshots, Hacks for Minecrafters: Master Builder shows exactly how the experts bring their amazing structures to life, from designing realistic roofs and exteriors to planning crenellated castle battlements. Detailed step-by-step illustrated guides will let every kid follow along to build their very own awesome castles, bridges, and farms and add the decor and landscaping details that bring their creations to life.

Hacks for Minecrafters: Master Builder (Unofficial Minecrafters Hacks)

by Megan Miller

From the New York Times bestselling author of Hacks for Minecrafters comes the most encompassing guide ever to the many amazing builds you can create in Minecraft. Now in paperback for the first time and completely revised and updated! With more than 100 million registered players, Minecraft has taken control of gamers all over the world. With Hacks for Minecrafters: Master Builder, you'll be able to take back that control! Now you can craft your world exactly how you want it to look, all while discovering the hidden gems of the game. Now being released in paperback, Hacks for Minecrafters: Master Builder has been updated for Minecraft 1.12, the World of Color update that added new function and crafting systems, illusioners, parrots, and building materials like glazed terracotta and concrete. In Hacks for Minecrafters: Master Builder, readers will learn how to build the coolest stuff, including an underwater house, a pirate ship, and a fortified castle! Other tips will help gamers:Find the best locationsChoose their favorite styleLearn how to get started with foundations and wallsBecome landscaping expertsLearn how to decorate their living roomAnd much more!Packed with expert tips, cheats, and hacks on planning all types of buildings and with more than one hundred screenshots, Hacks for Minecrafters: Master Builder shows exactly how the experts bring their amazing structures to life, from designing realistic roofs and exteriors to planning crenellated castle battlements. Detailed step-by-step illustrated guides will let every kid follow along to build their very own awesome castles, bridges, and farms and add the decor and landscaping details that bring their creations to life.

Hacks for Minecrafters: Redstone (An Unofficial Minecrafter's Guide #5)

by Megan Miller

From the author of Hacks for Minecrafters comes the most encompassing guide ever to redstone in the world of Minecraft! With Hacks for Minecrafters: Redstone, kids will learn the basics of manipulating redstone to make amazing contraptions, with clear and illustrated explanations of redstone power and current, as well as how to build essential redstone logic gates, loops, and circuits. Hacks for Minecrafters: Redstone will also demonstrate exactly how to construct some classic and crazy contraptions and machines. Hacks for Minecrafters: Redstone shows exactly how the experts wield redstone power and build amazing contraptions. In Minecraft, the risk of attack is ever-present, and players need to utilize every resource available to them, especially redstone.

Hacks for Minecrafters: The Unofficial Guide to Tips and Tricks That Other Guides Won't Teach You

by Megan Miller

With more than 100 million registered players, Minecraft has taken control of gamers all over the world. With Hacks for Minecrafters, you'll be able to take back that control! Only with the help found in Hacks for Minecrafters will you be able to craft your world exactly how you want it to look, all while discovering the hidden gems of the game.In this hacker's guide, you'll find expertise on:Mining-including diamonds and rare minerals!Farming-growing tricks, seed hacks, and the best tree-replanting techniques!Battle-for the best weapons and armor!Magic-top crafting hacks and book modifiers!You will never be stuck again! With more than one hundred full-color screenshots of in-game footage, you'll be able to carefully follow every tip with precision. It doesn't matter if you're playing on a PC, mobile device, or home console; with Hacks for Minecrafters, you'll be beating the game in no time. Every block has been accounted for, all living entities have been taken into consideration, and all modes of game-play are covered!

Refine Search

Showing 25,276 through 25,300 of 61,781 results