Anti-Hacker Tool Kit, Fourth Edition

Rating: 
Amazon Price: $50.00 $28.17 You save: $21.83 (44%). (as of August 18, 2017 07:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks.
Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR

Mission CybatiWorks(TM): ICS/SCADA/IoT CyberSecurity Education Platform

Rating: 
Amazon Price: $19.95 (as of August 18, 2017 07:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

Hello and welcome to CybatiWorksTM. Years of hands-on experience enabled the development of this platform to help cybersecure cyber-physical systems strategically, tactically and responsibly. This manual is designed to step you through constructing the CybatiWorksTM mini kit (as seen on Kickstarter) and several exploratory missions to identify your strengths and weaknesses. Enhance your skills and most of all have fun. We hope you enjoy CybatiWorks™! Matthew E. Luallen CYBATI Co-Founder The CybatiWorksTM scalable academic and professional control system cybersecurity platform enables educational institutions, industrial asset owners / operators and supporting entities to understand control system environments and cybersecurity risks. The portable and complete training platform has been validated by hundreds of industry practitioners and educators. The educational platform engages the participant in understanding, enumerating, exploiting and mitigating the engineering workstation, HMI, OPC, Historian, PLC/PAC/IED/R(M)TU and protocol communications. The educational platform is encompassed by three primary components • Virtualized operating systems serving as Historians, OPC Servers and HMIs; • Embedded devices such as the Raspberry PI platform and common off-the-shelf industrial components providing logic and physical I/O; • Low voltage, kinetic I/O models such as a traffic light, robotic arm, model train, water treatment, pipeline operations and assembly line

The Internet Of Garbage

Rating: 
Amazon Price: N/A (as of August 18, 2017 13:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Sarah Jeong, a journalist trained as a lawyer at Harvard Law School, discusses the problem of “online harassment,” with various accounts of harassment that have made their way into mainstream media, as well as lesser-known ones. The Internet of Garbage considers why and how to recalibrate this ongoing project of garbage-removal from content platforms and social media networks. It’s not as simple as policing offensive material and hitting the delete button online: Jeong tackles precarious issues like free speech, behavior vs. content, doxing and SPAM.

She writes, “Content platforms and social media networks do not have the power to restrain stalkers, end intimate partner violence, eliminate child abuse, or stop street harassment. But they can cultivate better interactions and better discourse, through thoughtful architecture, active moderation and community management.”
Continue reading “The Internet Of Garbage”

Le petit livre du hacker 2013 (French Edition)

Amazon Price: $20.00 $20.00 (as of August 17, 2017 22:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Ce qu'est un Hacker Contrairement à l'utilisation que les médias font de ce mot, un Hacker n'est pas un pirate informatique, mais une personne curieuse qui désire savoir comment tout ce qui l'entoure fonctionne. Inévitablement, à force de tout décortiquer, il est certain que des failles de logique ou des utilisations détournées vont émerger. Ensuite, tout dépendant de ce que cette personne fera avec ces découvertes, les signifier aux créateurs pour améliorer le produit ou abuser des problèmes, c'est selon ses actions qu'elle pourrait devenir pirate. Ce livre se veut éducatif pour comprendre le fonctionnement des ordinateurs et comment se protéger des failles existantes. Le but de ce livre Ayant commencé à programmer dès mon plus jeune âge sur un ordinateur ne possédant qu'une ligne de commande, j'ai par la suite grandi aux côtés de Windows 95 et Linux. Trouver de la documentation pour mieux comprendre la machine merveilleuse que j'avais entre les mains n'était pas très aisé puisque les champs d'applications sont nombreux et les informations sont dispersées. Trouver son chemin prend du temps et ceci est le livre que j'aurais aimé avoir entre les mains. Ce qui s'y trouve Au tout début, il y a l'ordinateur. Cette boîte métallique possède plusieurs pièces physiques qui ont chacune leur importance. Ensuite, il y a un logiciel qui gère l'orchestration harmonieuse de toutes ces composantes et qui s'appelle un système d'exploitation. Une fois notre machine explorée, nous voudrons la connecter aux autres en passant par le réseau mondial d'Internet avec tous ses services, ses vulnérabilités et sa sécurité. Durant l'exploration, plusieurs logiciels et techniques avancées, dont la cryptographie, sont étudiés. La sécurité et ses limites sont bien entendu toujours abordées puisque c'est un incontournable dans ce gigantesque monde d’un et de zéro. Ce livre est pour les gens de tous niveaux puisqu'il fait le tour en donnant plusieurs ressources externes pour aller plus en profondeur dans les sujets qui pourraient intéresser le lecteur. Allez-y a votre rythme et selon vos intérêts. Surtout, amusez-vous!

Hydra 680: La conexión entre Wikileaks, Edward Snowden, Obama y The Guardian (Spanish Edition)

Amazon Price: N/A (as of August 17, 2017 19:09 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Continuando con el ejemplo iniciado por Wikileaks, el 5 de Junio del 2013, el periódico The Guardian hizo la más importante desclasificación de información secreta de los Estados Unidos. Hydra 680 revive esta historia a través de las vidas de sus protagonistas: J. Assange, Edward Snowden, Ron Paul, Laura Poitras y Barack Obama.