Amazon Price: $11.37 $6.78 You save: $4.59 (40%). (as of September 23, 2017 14:54 –
You love your laptop, but its WiFi network adapter is on the fritz or you're stuck with an old and slow Wireless G or B card. You could try to get it upgraded or repaired, maybe plunk down a few hundred dollars for a new computer, but there's an easy, inexpensive option that will get you back on the network in no time: a USB-based WiFi adapter!
The Plugable USB-WIFINT wireless N adapter sticks out just a quarter inch when plugged into a USB slot. It offers 802.11n wireless N connectivity up to 150 Mbps in an incredibly small package.
Continue reading “Plugable USB 2.0 Wireless N 802.11n 150 Mbps Nano WiFi Network Adapter (Realtek RTL8188CUS Chipset) Plug & Play for Windows, Raspberry Pi and Pi2, Linux”
Amazon Price: $14.99 $7.99 You save: $7.00 (47%). (as of September 23, 2017 17:53 –
EDIMAX EW-7811Un IEEE 802.11b/g/n Wireless Mini Nano Size USB Adapter, Up to 150Mbps Data Rates, with 16 languages EZmax setup wizard for easy installation.System Requirements: Windows 7/Vista/XP, Mac OS, Linux.
Amazon Price: $29.99 $14.65 You save: $15.34 (51%). (as of September 24, 2017 01:24 –
The Plugable USB3-E1000 is an easy way to gain wired gigabit network speeds for faster HD video streaming, gaming, web browsing, network storage and more.
Common uses include adding wired gigabit network support to Macbooks, UltraBooks, or notebooks with no Ethernet connection, or replacing or upgrading network adapters in desktop PCs. USB network adapters can improve speeds vs. older 10/100 adapters and wireless networks. Also useful for adding network interfaces, and transferring files peer-to-peer over Ethernet. This product is NOT a solution for connecting a USB device like a printer to a network.
Continue reading “Plugable USB 3.0 to 10/100/1000 Gigabit Ethernet LAN Network Adapter (ASIX AX88179 chipset, Windows 10, 8.1, 8, 7, Vista, XP, Linux, OS X, Chrome OS)”
The much-anticipated second edition of the bestselling book that details network security through the hacker's eye
Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material.
In this fascinating new edition, you'll discover:
* The hacker's perspective on security holes in UNIX, Linux, and Windows networks
* Over 170 new vulnerabilities and exploits
* Advanced discovery techniques
* A crash course in C for compiling hacker tools and vulnerability scanners
* The top seventy-five hack attacks for UNIX and Windows
* Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more
* TigerSuite Professional 3.5 (full suite single license)
Click here to buy from Amazon
Amazon Price: $65.00 $42.22 You save: $22.78 (35%). (as of September 23, 2017 17:53 –
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions. Bonus materials include more than 20 real-world exercises, sample memory and code files, and even a formal presentation, syllabus, and test bank.