๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Hacking Linux exposed: Linux security secrets & solutions

โœ Scribed by Brian Hatch


Book ID
127430493
Publisher
Osborne/McGraw-Hill
Year
2001
Tongue
English
Weight
8 MB
Series
Hacking Exposed
Edition
1st
Category
Library
City
New York
ISBN-13
9780072127737

No coin nor oath required. For personal study only.

โœฆ Synopsis


If you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box? How is he trying to keep me out? What stone has he left unturned? Woops: He has a bulletproof firewall but he left this one vulnerable cgi script in his httpd directory: HA! I'M IN! At that point the correct thing to do is to stop and notify the hackee. But once a hacker gets in, (especially if he is there without permission) the temptation to quietly mess around and cover his guilty tracks is usually overwhelming. Then it has gone from hacking to compromising someone else's box.


๐Ÿ“œ SIMILAR VOLUMES


Hacking Exposed: Network Security Secret
โœ Scambray, Joel;McClure, Stuart;Kurtz, George ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English โš– 6 MB

The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET

Hacking exposed, network security secret
โœ Stuart McClure, George Kurtz, Joel Scambray ๐Ÿ“‚ Library ๐Ÿ“… 2000 ๐Ÿ› McGraw-Hill/OsborneMedia ๐ŸŒ English โš– 8 MB

New material! Contains more than 200 new pages of what customers want - in depth insight into how hackers infiltrate networks, and strategies to stop them. Also, brand new forword written by a prominent security expert. Hot topic - computer security is a huge topic in today's super-connected all-dig

Hacking Exposed Web 2.0: Web 2.0 Securit
โœ Rich Cannings, Himanshu Dwivedi, Zane Lackey ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› McGraw-Hill ๐ŸŒ English โš– 6 MB

Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, FacebookProtec

Hacking exposed Cisco networks: Cisco se
โœ Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› McGraw-Hill/Osborne ๐ŸŒ English โš– 10 MB

Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers devi

Hacking Exposed Windows: Microsoft Windo
โœ McClure, Stuart;Scambray, Joel ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› McGraw-Hill Professional Publishing;McGraw-Hill Os ๐ŸŒ English โš– 8 MB

The latest Windows security attack and defense strategies"Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world mali