- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
TÀI LIỆU THƯ VIỆN SỐ
Danh mục TaiLieu.VN
The hacker who say they are sticking up for WikiLeaks and Julian Assange continued to filx their digital muscles on Thursday, extending outages at Mastercard.com and Visa.com to a second day. And even as the group claiming responsibility for the attacks openly discussed big new targets like Amazon, Twitter, and Facebook, Twitter took unsuccessful steps to disperse the virtual mob. Meanwhile, published reports say a 16 year old was...
73 p dnulib 20/11/2012 373 1
Từ khóa: hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật, hacking Webservers
session hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an...
64 p dnulib 20/11/2012 331 1
Từ khóa: Session hijacking, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.Perpetrators of DoS...
65 p dnulib 20/11/2012 346 1
Từ khóa: denial of service, từ chối dịch vụ, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Social engineering là phương pháp phi kỹ thuật đột nhập vào hệ thống hoặc mạng công ty. Đó là quá trình đánh lừa người dùng của hệ thống, hoặc thuyết phục họ cung cấp thông tin có thể giúp chúng ta đánh bại bộ phận an ninh. Social engineering là rất quan trọng để tìm hiểu, bởi vì hacker có thể lợi dụng tấn công vào yếu tố con người và phá...
75 p dnulib 20/11/2012 387 1
Từ khóa: social Engineering, kỹ thuật xã hội, đột nhập hệ thống, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Packet analyzer (aka network analyzer, protocol analyzer or sniffer), computer software or hardware that can intercept and log traffic passing over a digital network According to a new study, your browsing history may be even less safe than the last time you heard about how your browsing history is not safe. Researchers at the University of California trolled through a wide range of popular websites to determine which ones were...
86 p dnulib 20/11/2012 363 1
Từ khóa: Sniffers, network analyzer, phân tích mạng, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Worm: A program that makes copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some sort. - Symantec Security Response Glossary Virus: A program or code that replicates; that is, infects another program, boot sector, partition sector, or...
82 p dnulib 20/11/2012 412 1
Từ khóa: Viruses and Worms, Virus và sâu máy, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Trojans and Backdoors are sorts of Bad-wares which their main purpose is to send and receive data and especially commands through a port to another system. This port can be even a well-known port such as 80 or an out of regular ports like 7777. The Trojans are most of the time defaced and shown as a legitimate and harmless application to encourage the user to execute them. The main characteristic of a Trojan is that first it should be...
98 p dnulib 20/11/2012 386 1
Từ khóa: trojans and backdoors, Bad-wares, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Objective Password cracking Password attacks Identifying various password cracking tools Formulating countermeasures for password cracking Escalating privileges Executing applications Keyloggers and Spywares Spywares and keyloggers countermeasures Hiding files Understanding rootkits The use of Steganography Covering tracks Offline Attacks Offline attacks are time consuming LM Hashes are much more vulnerable due to smaller key space and...
165 p dnulib 20/11/2012 404 2
Từ khóa: System Hacking, tấn công hệ thống, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
An enumerated type (also called enumeration or enum, or factor in the R programming language, and a categorical variable in statistics) is a data type consisting of a set of named values called elements, members or enumerators of the type. The enumerator names are usually identifiers that behave as constants in the language. A variable that has been declared as having an enumerated type can be assigned any of the enumerators as a value. In...
46 p dnulib 20/11/2012 380 1
Từ khóa: Enumeration, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Network Scanning is the process of examining the activity on a network, which can include monitoring data flow as well as monitoring the functioning of network devices. Network Scanning serves to promote both the security and performance of a network. Network Scanning may also be employed from outside a network in order to identify potential network vulnerabilities.
111 p dnulib 20/11/2012 294 1
Từ khóa: Scanning Networks, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Footprinting and Reconnaissance
Before jumping into Ethical hacking and hacking tips and tricks, it is direly needed to know what is ethical hacking all about and why do you need this and where you need this? You must know such aspects before you put yourselves into ethical hacking. Just assume that you are in need of accessing your own security parameters of your system, to fix several issues related to it. If you do this, it’s also a kind of ethical hacking because...
84 p dnulib 20/11/2012 311 1
Từ khóa: Reconnaissance, Footprinting, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Introduction to Ethical Hacking
"Patriotic hackers" backed by chinese authorities conducted extensive computer hacking on U.S.government agencies and companies, including computer networks of Google Inc, according to a report published by the New York Times An examination of 250000 diplomatic cables made public by WikiLeaks.org by the U.S.newspaper showed that high-level Chinese civilian and military offcials assisted succcessful hacking attacks aimed at retrieving a...
57 p dnulib 20/11/2012 371 1
Từ khóa: Introduction to Ethical Hacking, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Đăng nhập
Bộ sưu tập nổi bật
Tài liệu về Sư phạm Mầm non chọn lọc
24 23027
Bộ sưu tập Quản trị doanh nghiệp
11 11945
14 15833
Tin nhanh