Xem 1-20 trên 23 kết quả Security tricks
  • Mac Kung Fu: Second Edition will blow your mind with secret hacks never before made public and little-known tricks that will change the way you work forever. From big tasks through everyday jobs, this book will improve your productivity and refine your workflow. You'll customize and manage the OS X interface, boost the power of built-in apps, efficiently handle the filesystem, implement important security tricks, and much more.

    pdf461p bongbong_hong 11-12-2012 31 5   Download

  • Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing Evading detection Bouncing

    ppt76p muathu_102 28-01-2013 23 2   Download

  • Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing

    ppt55p muathu_102 28-01-2013 19 2   Download

  • You may be surprised, but the market is not as difficult to understand as you might think. By the time you finish reading this chapter, you should have enough knowledge of the market to allow you to sail through the rest of the book. The trick is to learn about the market in small steps, which is exactly how I present the information to you.

    pdf210p minhhuy 14-03-2009 188 72   Download

  • to defend company resources: not only passively by using firewalls, virtual private networks (VPNs), encryption techniques, and whatever other tricks, but also by deploying proactive tools and devices throughout the network = IDS.

    ppt34p vvnghi 05-05-2011 92 19   Download

  • A great resource covering Ubuntu from A to Z without all the extra fluff" -- Ryan Troy, administrator, Ubuntuforums.org. Read by over 500,000 people, Ubuntu Pocket Guide and Reference is the world's most popular Ubuntu book. Written by award-winning expert Keir Thomas, it will quickly transform you into a power user. In its clear and concise pages, you'll learn step-by-step about installation, the Ubuntu desktop, the tricks and techniques of efficient day-to-day usage, the command-line, software management, and, finally, system security.

    pdf170p trung254 22-07-2012 48 16   Download

  • Filter Input. Escape Output. You’re hearing an awful lot of this from me lately, and as one person noted, “It’s great that they’re rubbing this topic in.” Indeed. This month’s Tips & Tricks wraps up the recent focus on security with a discussion on escaping output, why it’s important, and how to do it.

    pdf60p vinhnghi 17-08-2009 96 10   Download

  • Also discussed is one of the most fundamental and important topics of concern to any systems administrator: what to do when a system will not boot. When the inevitable happens, knowing the right things to look for and having some tricks up your sleeve may possibly help you avoid a potential nightmare and a major loss of service for your users. Understanding these tools is fundamental to getting through the RHCE Debug exam.

    pdf42p mylinh 17-08-2009 43 8   Download

  • One of the great things about PHP is its vibrant and active community. Developers enjoy many online meeting points, including the SitePoint Forums, 1 where de­ velopers get together to help each other out with problems they face on a daily basis, from the basics of how PHP works, to solving design problems like “How do I val­ idate a form?”As a way to get help, these communities are excellent—they’re replete with all sorts of vital fragments you’ll need to make your projects successful.

    pdf207p namde04 04-05-2013 16 8   Download

  • The process of locating and fixing errors in your application is known as debugging. There are no magic tricks to debugging, and there is no fixed sequence of steps that works every time. Basically, debugging helps you understand what is happening when your application runs.

    pdf34p thuxuan 07-08-2009 64 6   Download

  • This article is a compilation of several interesting, unique command-line tricks that should help you squeeze more juice out of your system, improve your situational awareness of what goes on behind the curtains of the desktop, plus some rather unorthodox solutions that will melt the proverbial socks off your kernel.

    pdf0p doilan 25-01-2013 13 3   Download

  • Ebook giới thiệu các công cụ và đồ nghề cần thiết cho việc Hack-Security. Ebook gồm có 1177 bài viết trong 28 chủ đề chính Phần 34: 10 part gồm Hacking Exposed 4th, Internet Hack.

    pdf6p daikagoogle 27-10-2010 133 62   Download

  • I’ll give you an overview of Drupal. Details on how each part of the system works will be provided in later chapters. Here, we’ll cover the technology stack on which Drupal runs, the layout of the files that make up Drupal, and the various conceptual terms that Drupal uses, such as nodes, hooks, blocks, and themes.

    pdf706p soicon824 19-04-2011 124 59   Download

  • Welcome to Hacking For Dummies. This book outlines computer hacker tricks and techniques — in plain English — to assess the security of your own information systems, find security vulnerabilities, and fix the vulnerabilities before malicious and criminal hackers have an opportunity to take advantage of them. This hacking is the professional, aboveboard, and legal type of security testing — which I call ethical hacking throughout the book. Computer and network security is a complex subject and an evermoving target.

    pdf387p ptng13 16-05-2012 104 57   Download

  • Before jumping into Ethical hacking and hacking tips and tricks, it is direly needed to know what is ethical hacking all about and why do you need this and where you need this? You must know such aspects before you put yourselves into ethical hacking. Just assume that you are in need of accessing your own security parameters of your system, to fix several issues related to it. If you do this, it’s also a kind of ethical hacking because all you want to do is to ensure your own safety and security of your information systems no matter...

    pdf84p hoangtumayman 20-08-2012 52 23   Download

  • Data Security RFID systems are increasingly being used in high security applications, such as access systems and systems for making payments or issuing tickets. However, the use of RFID systems in these applications necessitates the use of security measures to protect against attempted attacks, in which people try to trick the RFID system in order to gain unauthorised access to buildings or avail themselves of services (tickets) without paying.

    pdf7p vaseline 30-08-2010 53 22   Download

  • Along with enhanced management, data access and security features, Windows 8 was designed to be intuitive. Even so, using a new OS inevitably means learning some new tricks. Whether you’re running Windows 8 on a touchscreen device, laptop or desktop, keep this free e-book in your pocket as a quick reference guide that’s there whenever you need it.

    pdf147p dangkhoa1612 30-12-2012 32 8   Download

  • Ebook giới thiệu các công cụ và đồ nghề cần thiết cho việc Hack-Security. Ebook gồm có 1177 bài viết trong 28 chủ đề chính Phần 37: 10 part gồm Software Tips and Tricks, Learning Windows.

    pdf6p daikagoogle 27-10-2010 26 6   Download

  • Ebook giới thiệu các công cụ và đồ nghề cần thiết cho việc Hack-Security. Ebook gồm có 1177 bài viết trong 28 chủ đề chính Phần 35: 10 part gồm Software Tips and Tricks, Internet Hack.

    pdf6p daikagoogle 27-10-2010 18 5   Download

  • Ebook giới thiệu các công cụ và đồ nghề cần thiết cho việc Hack-Security. Ebook gồm có 1177 bài viết trong 28 chủ đề chính Phần 36: 10 part gồm Software Tips and Tricks.

    pdf6p daikagoogle 27-10-2010 29 5   Download

Đồng bộ tài khoản