JANGKUNG

Learn Every Where

THE ART OF INTRUSION

artofintrusion

The Art of Intrusion – A Hack e-book ( 291 pages )

Read contents below for a basic idea on what the book covers

Contents
Chapter 1 Hacking the Casinos for a Million Bucks . . . . . . . . . . . . . . . .1
Chapter 2 When Terrorists Come Calling . . . . . . . . . . . . . . . . . . . . . . .23
Chapter 3 The Texas Prison Hack . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
Chapter 4 Cops and Robbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Chapter 5 The Robin Hood Hacker . . . . . . . . . . . . . . . . . . . . . . . . . .91
Chapter 6 The Wisdom and Folly of Penetration Testing . . . . . . . . . . .115
Chapter 7 Of Course Your Bank Is Secure — Right? . . . . . . . . . . . . . .139
Chapter 8 Your Intellectual Property Isn’t Safe . . . . . . . . . . . . . . . . . .153
Chapter 9 On the Continent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195
Chapter 10 Social Engineers — How They Work
and How to Stop Them . . . . . . . . . . . . . . . . . . . . . . . . . . .221
Chapter 11 Short Takes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .247
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .261

Download RapidShare

Password : http://www.ddlportal.org/forum

Advertisements

5 November 2008 Posted by | E Book, Hacking | , , | Leave a comment

Hack Proofing Your Web Applications

Hack Proofing

Ryan Russell,”Hack Proofing Your Web Applications”
Syngress|ISBN-10: 1928994318|608 pages | 2001-06-18 | PDF | 14 Mb|English|English

As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security�attempt to break into it by finding some hole that you may have unintentionally left in.

Download DepositFile
Download EasyShare

5 November 2008 Posted by | E Book, Hacking | , , | Leave a comment

Hack School for Beginners : 12 Lessons

hackfo10
Hack school for beginners
PDF | English | 12 Lessons | 4 MB

Lesson 1: Being A hacker
Lesson 2: Basic Commands in Linux And Windows
Lesson 3: Ports and Protocols
Lesson 4: Services And Connections
Lesson 5: system Identifications
Lesson 6: Malware
Lesson 7: Attack Analysis
Lesson 8: Digital Forensics
Lesson 9: E-mail Security
Lesson 10: Web Security And Privacy
Lesson 11: Passwords
Lesson 12: Internet Legalities And Ethics
Download from Rapidshare

Password: fdl4all.com
Download

5 November 2008 Posted by | E Book, Hacking | , , , , | 2 Comments

Free Website Hosting

5 November 2008 Posted by | 3 Dimesion, Adobe, C/C++/C#, Databases/SQL/MySQL, Dot Net, E Book, Fotography, Hacking, Internet, Java/PHP, Komputer, Magazines, Ms Office, Network, Other, Perl, Personality, PhotoShop, Science, Software, Uncategorize, Visual Basic, WallPaper, Windows | , , , , , , , , | 1 Comment

Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier

Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier is a 1997 book by Suelette Dreyfus. It describes the exploits of a group of Australian, American, and British black hat hackers during the late 1980s and early 1990s.
* Craig Bowen (nickname), administrator of two important Australian BBS (Pacific Island and Zen)
* The Parmaster, an American hacker who avoided capture by the United States Secret Service from July 1989 to November 1991
* Phoenix, Electron and Nom, who were convicted in the first major Australian trial for computer crimes
* Pad and Gandalf, the British founders of the notorious 8lgm group
* the Australian Mendax and Prime Suspect, who managed to penetrate the DDN, NIC and the Nortel internal network, and the phreaker Trax
* Anthrax, another Australian hacker and phreaker

The book also mentions other hackers who had contacts with the protagonists, among them Erik Bloodaxe of the Legion of Doom and Corrupt of the Masters of Deception.

Download

4 November 2008 Posted by | E Book, Hacking, Komputer | , , , | Leave a comment