CyberWar

Si Vis Pacem, Para Bellum

By

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and DeceiversHacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world’s most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use “social engineering” to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick’s reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:

  • A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
  • Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
  • Two convicts who joined forces to become hackers inside a Texas prison
  • A “Robin Hood” hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access

With riveting “you are there” descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick’s own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Price: $16.95

Click here to buy from Amazon

By

Social Engineering: The Art of Human Hacking

Social Engineering: The Art of Human HackingThe first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats
  • Includes a direct URL to a free download of the world’s premiere penetration-testing distribution, BackTrack 4 SE Edition – geared towards Social Engineering Tools

Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

Price: $34.99

Click here to buy from Amazon

By

Metasploit: The Penetration Tester’s Guide

Metasploit - A Penetration Tester GuideThe Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network and system vulnerabilities. Metasploit: The Penetration Tester‘s Guide shows readers how to assess networks by using Metasploit to launch simulated attacks that expose weaknesses in their security. The book begins with the basics of information security and Metasploit, then proceeds to general and advanced techniques for penetration testing, including network reconnaissance and enumeration, server- and client-side attacks, devastating wireless attacks, and even targeted social engineering attacks. Whether readers are looking to secure their own networks or discover holes in others’, Metasploit is the definitive guide to penetration testing with this dynamic and flexible framework.

Price: $49.95

Click here to buy from Amazon

By

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and DeceiversHacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world’s most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use “social engineering” to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick’s reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:

  • A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines
  • Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems
  • Two convicts who joined forces to become hackers inside a Texas prison
  • A “Robin Hood” hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access

With riveting “you are there” descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick’s own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Price: $16.95

Click here to buy from Amazon

By

Green Dam Youth Escort – Internet Censorship in the People’s Republic of China

Internet Censorship in the People's Republic of China, Green Dam Youth EscortChapters: Internet Censorship in the People’s Republic of China, Green Dam Youth Escort (绿坝·花季护航), Blocking of Wikipedia by the People’s Republic of China, List of Websites Blocked in the People’s Republic of China, Golden Shield Project, War of Internet Addiction, List of Words Censored by Search Engines in the People’s Republic of China, History of Internet Censorship in the People’s Republic of China, Very Erotic Very Violent, 50 Cent Party, List of Internet Phenomena in the People’s Republic of China, Big Mama, Elgoog. Excerpt: 50 Cent Party (Chinese : ; pinyin : W máo D ng), also called 50 Cent Army , refers to paid astroturfing internet commentators working for the People’s Republic of China , whose role is posting comments favorable towards the government policies to skew the public opinion on various Internet message boards. They are named after the 50 Chinese cents, or 5 mao, they are paid per such post, other names are red vests , red vanguard and the Five Mao Party . Conservative estimates put the strength of the 50 Cents Army at tens of thousands while other estimates put their numbers as high as 280,000 300,000. Their activities were described by Chinese President Hu Jintao as “a new pattern of public-opinion guidance”. They operate primarily in Chinese, but English language posts appear as well. Their effect is most felt at the domestic Chinese-language websites, bulletin board systems , and chatrooms . Their role is to steer the discussion away from anti-party articulations, politically sensitive or “unacceptable” content and advance the party line of the Communist Party of China . It has been argued that it is not so much censorship but a public relations tactic. According to the Indian Daily News and Analysis , “to this day, anyone who posts a blatantly propagandist pro-Communist …

Price: $19.99

Click here to buy from Amazon

Related articles

/* */