Network tricks

Xem 1-20 trên 20 kết quả Network tricks
  • Network solutions shut down that nifty telnet thing on whois.intenic.net on the default telnet port (25), despite many protests. However, there is something fun you can do with telnet with whois.internic.net or any other cooperating domain name server

    pdf1p dauhutuongot 22-07-2010 63 14   Download

  • Are you looking for a quick and simple reference guide to help you navigate Red Hat® Linux™ systems? Look no further! Global Knowledge and Red Hat have assembled these 10 Tips and Tricks from Red Hat Certified Engineers® (RHCEs) to give you an edge on managing these systems. Have you ever needed to completely wipe out critical data from a hard drive? As we all know, mkfs doesn’t erase a lot. (You already knew this, right?) mkfs and its variants (e.g., mkfs.ext3 and mke2fs) only get rid of a few important data structures on the filesystem, but the data is...

    pdf9p huyhoang 06-08-2009 115 8   Download

  • The second edition of Teach Yourself TCP / IP in 14 days on the first extension is very popular version, put the information up-to-date and add new threads to complete coverage of TCP / IP. The book has been reorganized to reading and learning easier, as well as to provide a more rational approach to this subject. New materials in dealing with the installation version, configure, and test a TCP / IP network servers and clients. You will see how to easily set up UNIX, Linux, and Windows NT server services common to all TCP / IP, including Telnet, FTP, DNS, NIS, and NFS....

    pdf487p entrysky 10-10-2011 29 8   Download

  • Are you looking for a quick and simple reference guide to help you navigate Red Hat® LinuxTM systems? Look no further. Global Knowledge and Red Hat have assembled a second set of Tips and Tricks written by Red Hat Certified Engineers® (RHCEs) to give you an edge on managing these systems: 1. If a file has a link count greater than 1, is there a simpler way to find out what other file names are hard-linked to it? 2. Which interface is eth0? 3. Quick-and-dirty automounts 4. How can I make dd give me a progress report? 5. Tar vs. Star—The battle of xattrs 6. New default...

    pdf6p huyhoang 06-08-2009 30 3   Download

  • Welcome to Hacking For Dummies. This book outlines computer hacker tricks and techniques — in plain English — to assess the security of your own information systems, find security vulnerabilities, and fix the vulnerabilities before malicious and criminal hackers have an opportunity to take advantage of them. This hacking is the professional, aboveboard, and legal type of security testing — which I call ethical hacking throughout the book. Computer and network security is a complex subject and an evermoving target.

    pdf387p ptng13 16-05-2012 104 57   Download

  • Ever since Java programmers have downloaded their first virtual machine, their ears have been glued to the ground, constantly on the lookout for tips and tricks for using the latest Java APIs. After all, there's nothing quite as satisfying as grasping a new technique for solving a common programming problem. Remember the first time you learned the power of Model-View-Controller (MVC), or developed your first singleton class? It was clear that someone out there had thought through the same problems you were having and, best of all, developed a solution that worked....

    pdf314p vantrungtran 03-02-2010 125 28   Download

  • Before jumping into Ethical hacking and hacking tips and tricks, it is direly needed to know what is ethical hacking all about and why do you need this and where you need this? You must know such aspects before you put yourselves into ethical hacking. Just assume that you are in need of accessing your own security parameters of your system, to fix several issues related to it. If you do this, it’s also a kind of ethical hacking because all you want to do is to ensure your own safety and security of your information systems no matter...

    pdf84p hoangtumayman 20-08-2012 52 23   Download

  • to defend company resources: not only passively by using firewalls, virtual private networks (VPNs), encryption techniques, and whatever other tricks, but also by deploying proactive tools and devices throughout the network = IDS.

    ppt34p vvnghi 05-05-2011 92 19   Download

  • Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or drawing tool; even control yourcomputer over a network with it. And we haven't even gotten to theway-out stuff.

    pdf309p ken333 07-06-2012 45 11   Download

  • Hãy để sao chép hoặc phân phối lại báo cáo này theo ý thích. Chia sẻ nó với tất cả bạn bè của bạn. Nó phải, tuy nhiên, được chia sẻ trong toàn bộ, chưa được sửa đổi và không thay đổi gì trong bất kỳ cách nào từ định dạng ban đầu của nó, hoặc cho phép tái phân phối là vô hiệu và bản quyền có hiệu lực

    pdf22p jupyter 30-07-2010 42 10   Download

  • In this section you will learn about the core set of report development tools in the R/3 System. The material presented here will help you: Decide which report development tool best fits your needs Understand the nuts-and-bolts of core R/3 report development tools Discover “tips and tricks“ on getting the most out of the report development tools (for advanced developers) Know where to find more information on the tools

    pdf1p trungha 28-08-2009 28 4   Download

  • State-of-the-Art Antenna Technology: The 2008 Antenna Applications Symposium From: Vol. 52 | No. 1 | January 2009 | Page 24 by Daniel Schaubert, University of Massachusetts; Jennifer Bernhard, University of Illinois; Robert Mailloux, US Air Force Research Laboratory; W. Devereux Palmer, US Army Research Office The Antenna Applications Symposium and its predecessor, the Air Force Antenna Symposium, have for more than 50 years provided a unique forum for exchange of ideas and information about the practical aspects of antenna design, development and use in systems....

    pdf14p linhnh90 23-10-2012 19 4   Download

  • This article is a compilation of several interesting, unique command-line tricks that should help you squeeze more juice out of your system, improve your situational awareness of what goes on behind the curtains of the desktop, plus some rather unorthodox solutions that will melt the proverbial socks off your kernel.

    pdf0p doilan 25-01-2013 13 3   Download

  • Subnetting seems to be a battle of fighting bits, decimal numbers, and countless methods and processes to convert from one to the other. While the methods may be confusing, the mathematics behind them is the same for all. In this paper, you will learn some of the simpler ways to figure out many of the subnetting questions that you will find on the industry certification tests.

    pdf10p huyhoang 06-08-2009 18 2   Download

  • Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing Evading detection Bouncing

    ppt76p muathu_102 28-01-2013 23 2   Download

  • Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing

    ppt55p muathu_102 28-01-2013 19 2   Download

  • This is a book about the Intel 8051 microcontroller and its large family of descendants. It is intended to give you, the reader, some new techniques for optimizing your 8051 projects and the development process you user for those projects. It is not the purpose of this book to provide various recipes for diffirent types of embedded projects.

    pdf255p dee07_bk 17-07-2010 155 80   Download

  • Ebook giới thiệu các công cụ và đồ nghề cần thiết cho việc Hack-Security. Ebook gồm có 1177 bài viết trong 28 chủ đề chính Phần 34: 10 part gồm Hacking Exposed 4th, Internet Hack.

    pdf6p daikagoogle 27-10-2010 133 62   Download

  • The CommonDialog class represents a component that provides a standard interface for common functionality required by Windows Forms applications. This figure shows the complete set of Windows Forms classes derived from the System.Windows.Forms.Common- Dialog class.

    pdf754p ddanhthong 13-05-2010 76 20   Download

  • A new online book part of the TipOfTheWeek web site has been released: 100 Linux Tips and Tricks The book covers such things as installation, networking and software. It is available freely online at the following addresses:

    pdf116p mylan23 16-04-2013 20 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản