๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook

โœ Scribed by Stefano Novelli, Marco Stefano Doria, Marco Silvestri


Publisher
BW / Inforge
Year
2019
Tongue
English
Leaves
230
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Have you ever wished to become a hacker? If the answer is yes, this book is for you!Started as a crowdfunding project, Hacklog Volume 1: Anonymity is the first of a book collection dedicated to who wants to enter the world of Hacking and IT Security. Youโ€™ll learn how to use the tools real-life hackers leverage everyday to avoid controls, how to conceal your most hidden files (and also how to recover them!) and youโ€™ll get a deeper insight over the broad world of anonymity.Hacklog Volume 1: Anonymity was designed for who is not too familiar with IT Security, but is willing to learn! Furthermore, itโ€™s a good review opportunity for those who already know this fascinating world as well as industry experts: High Schools, Universities, Industry Professionals and other Bodies use Hacklog to get information and stay up-to-date about the techniques used by cyber criminals to avoid controls and stay completely anonymous in the broad world of the Web.Here are some of the themes covered by the first volume: Youโ€™ll learn how to use the Operating Systems used by hackers and industry experts, including Ubuntu, Kali Linux, Parrot Security OS and many others, based both on GNU/Linux and Windows and macOS. Youโ€™ll be able to identify the traces left on a computer during an attack or an IT inspection, like MAC Address, Hostnames usage, DNSs and the via-Proxy anonymizing IP Youโ€™ll be able to make secure communications through the VPNs, discovering the best service providers and the regulations about governmental takedowns Youโ€™ll learn the vast world of the Deep Web and the Dark Net, the TOR, I2P and Freenet anonymizing circuits, as well as the Combo Networks to stay safe through pyramidal communication tunnels Youโ€™ll be able to identify the local resources that can harm you, like Cookies, JavaScript, Flash, Java, ActiveX, WebRTC and you will learn how to fingerprint your browser Youโ€™ll learn how to protect your data, verifying it with checksums and encrypting it using techniques like PGP and GPG; furthermore, you will get information about how to encrypt a disk, steganography and how to backup your crucial data Youโ€™ll be able to recover data even after a disk wipe, and destroy it irreversibly, using the same techniques used by the law enforcement bodies around the world Youโ€™ll learn how to identify the vulnerabilities that expose your identity to the Web, and the best practice to prevent it* Youโ€™ll learn how to anonymously purchase from the Web, using the Dark Net circuits and crypto-currencies like the BitcoinHacklog, Volume 1: Anonymity is an open project, partially released under Italian Creative Commons 4.0 โ€“ Italy. You can find all licensing information at our official website: www.hacklog.net.

โœฆ Table of Contents


[5]......Page 221
[23]......Page 222
[41]......Page 223
[51]......Page 224

โœฆ Subjects


Hacking, Ethical Hacking, Anonymity


๐Ÿ“œ SIMILAR VOLUMES


Hacklog Volume 1 Anonymity: IT Security
โœ Novelli, Stefano;Silvestri, Marco;Doria, Marco(Translator) ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Inforge.net ๐ŸŒ English

Have you ever wished to become a hacker?If the answer is yes, this book is for you!Started as a crowdfunding project, Hacklog Volume 1: Anonymity is the first of a book collection dedicated to who wants to enter the world of Hacking and IT Security. Youโ€™ll learn how to use the tools real-life hacker

Ethical Hacking
โœ Daniel G. Graham ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› No Starch Press ๐ŸŒ English
Ethical Hacking
โœ Alana Maurushat ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› University Of Ottawa Press ๐ŸŒ English

The first part of the 21st Century will likely go down in history as the era when ethical hackers opened governments. The line of transparency is moving by force. The twitter page for Wikileaks demonstrates this ethos through its motto โ€œwe open governmentsโ€ and its location to be โ€œeverywhereโ€. Ethic