Xem 1-20 trên 31 kết quả Software hacks
  • It’s fun to uncover something that you aren’t supposed to know about— many software applications and movies on DVD contain what are known as “easter eggs.” However, imagine finding something that you aren’t supposed to find that turns out to be useful and informative. In this chapter, we are going to hunt for GPS easter eggs, delving into the secrets that lie behind the standard menus on your GPS unit to find useful features and diagnostic screens that can give you information about your system and troubleshoot problems that you might have.

    pdf351p ltvtrinh 24-09-2012 49 23   Download

  • The majority of successful attacks on computer systems via the Internet can be traced to exploitation of security flaws in software and operating systems. These few software vulnerabilities account for the majority of successful attacks, simply because attackers are opportunistic – taking the easiest and most convenient route. They exploit the best-known flaws with the most effective and widely available attack tools.

    pdf74p vutrung 07-09-2009 139 51   Download

  • Trong đó / (root của filesystem) chứa các thư mục khác và trong các thư mục này chứa các loại software, công cụ, thông tin, cấu hình... cho cả một *nix system Hacking Security Sites part 17

    pdf6p alocanhsat113 16-09-2010 68 27   Download

  • You’ll learn how to • Generate stored-value fare cards • Reverse engineer magstripes • Hack RFID cards • Use software radio to sniff • Use FPGAs to brute force • Tap into the fare vending network • Social engineer • WARCART!

    pdf0p hidiefei 17-05-2012 84 6   Download

  • Web server can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver Web content that can be accessed through the Internet

    pdf0p doilan 25-01-2013 17 4   Download

  • Over the last couple of years, manufacturers have produced some incredibly sophisticated wireless networking equipment. Consumers’ ongoing demand for low-cost, high-speed, easy-to-use networking gear has forced hardware manufacturers to continually refine their designs. Engineers have produced tiny devices that use very little power to perform amazing feats of ingenuity, producing them on such a large scale that the cost is staggeringly low.

    pdf369p tailieuvip13 19-07-2012 582 231   Download

  • Ebook giới thiệu các công cụ và đồ nghề cần thiết cho việc Hack-Security. Ebook gồm có 1177 bài viết trong 28 chủ đề chính Phần 34: 10 part gồm Hacking Exposed 4th, Internet Hack.

    pdf6p daikagoogle 27-10-2010 133 62   Download

  • Khi người sử dụng cần truy cập các ứng dụng hoặc các file từ một vị trí ở xa thì bạn sẽ cài đặt 1 phần mềm hỗ trợ truy cập từ xa (remote control software) như PCAnywhere của Symantech , hoặc Reachout (hổng nhớ của hãng nào) or Laplink củaTraveling Software (không biết đúng không nữa) trên cả máy Desktop và Laptop của người này .

    doc3p ad_uit 09-01-2011 65 23   Download

  • - ECID (Exclusive Chip ID) là mã số con chip của iPhone 3GS/4. - Mỗi iPhone có ECID khác nhau, dùng để chứng thực khi iPhone kết nối với Server Apple (thông qua iTunes). - ECID không thể thay đổi được bằng Software, chỉ có thể thay đổi bằng cách thay chip khác

    ppt65p dangvietkhoi 27-09-2013 52 14   Download

  • If software is an art—and I think it is—then I must be the only artist in the world who advocates defacing his own work. But if ever there was a product designed for hacking, Firefox is it. Because Firefox is an open-source project, its lifeblood—its source code—is available to hackers the world over. And I do mean hackers. These guys ship software before they put on pants. What separates Firefox from other open-source projects is that it isn’t designed for a technical community.

    pdf459p conrepcon 13-04-2012 33 12   Download

  • Document Grinding and Database Digging • Chapter 4 131 Table 4.2 Log File Search Examples Query QueryProgram “ZoneAlarm Logging Client” +htpasswd WS_FTP.LOG filetype:log +intext:”webalizer” +intext: ”Total Usernames” +intext:”Usage Statistics for” ext:log “Software: Microsoft Internet Information Services *.*” ext:log password END_FILE filetype:cfg login “LoginServer=” filetype:log “PHP Parse error” | “PHP Warning” | “ filetype:log “See `ipsec —copyright” filetype:log access.log –CVS filetype:log cron.

    pdf10p yukogaru9 29-10-2010 51 11   Download

  • Sniffer may refer to: Packet analyzer (aka network analyzer, protocol analyzer or sniffer), computer software or hardware that can intercept and log traffic passing over a digital network

    pdf0p doilan 25-01-2013 32 7   Download

  • Ebook giới thiệu các công cụ và đồ nghề cần thiết cho việc Hack-Security. Ebook gồm có 1177 bài viết trong 28 chủ đề chính Phần 37: 10 part gồm Software Tips and Tricks, Learning Windows.

    pdf6p daikagoogle 27-10-2010 25 6   Download

  • Ebook giới thiệu các công cụ và đồ nghề cần thiết cho việc Hack-Security. Ebook gồm có 1177 bài viết trong 28 chủ đề chính Phần 35: 10 part gồm Software Tips and Tricks, Internet Hack.

    pdf6p daikagoogle 27-10-2010 18 5   Download

  • Ebook giới thiệu các công cụ và đồ nghề cần thiết cho việc Hack-Security. Ebook gồm có 1177 bài viết trong 28 chủ đề chính Phần 36: 10 part gồm Software Tips and Tricks.

    pdf6p daikagoogle 27-10-2010 26 5   Download

  • SQL injection is a technique often used to attack data driven applications [1]. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in an application's software. The vulnerability happens

    pdf0p doilan 25-01-2013 17 5   Download

  • The responses.properties and global.properties files are protected by access controls on the $VCLOUD _ HOME/etc folder and the files themselves. Do not change the permissions on the files or folder as it may either give too much access, reducing security, or restrict access too much, stopping the VMware vCloud Director software from working. In order for the access controls to properly work, physical and logical access to the VMware vCloud Director servers must be strictly limited to those with a need to log in and only with the minimal levels of access required.

    pdf0p cao_can 02-01-2013 20 4   Download

  • you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.

    pdf356p stingdau_123 26-01-2013 22 4   Download

  • Xuất hiện virus tống tiền người dùng .Hãng bảo mật Sunbelt Software Distribution cho biết đã phát hiện một phần mềm độc hại “bắt cóc tống tiền” mới vô cùng nguy hiểm có khả năng “bắt cóc” luôn cả PC. Khác với các loại mã độc “bắt cóc tống tiền” trước đây chỉ có khả năng “bắt cóc” dữ liệu, Trojan Delf.ctk được trang bị khả năng khoá cứng toàn bộ PC bị nhiễm.

    pdf6p yeurauxanh88 01-10-2012 26 3   Download

  • This book is intended for software developers, testers, and managers who work with .NET technology. This book assumes you have a basic familiarity with .NET programming but does not make any particular assumptions about your skill level. The examples in this book have been successfully used in seminars where the audience background has ranged from beginning application programmers to advanced systems programmers. The content in this book has also been used in teaching environments where it has proven highly effective as a platform for students who are learning intermediate level .

    pdf0p hotmoingay3 09-01-2013 25 3   Download

Đồng bộ tài khoản