enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Kali Linux - Wikipedia

    en.wikipedia.org/wiki/Kali_Linux

    Kali Linux is a Linux distribution designed for digital forensics and penetration testing. [4] It is maintained and funded by Offensive Security . [ 5 ] The software is based on the Debian Testing branch: most packages Kali uses are imported from the Debian repositories . [ 6 ]

  3. The Hacker's Handbook - Wikipedia

    en.wikipedia.org/wiki/The_Hacker's_Handbook

    One popular aspect of the book is the apparently salacious printouts of actual hacking attempts (although confidential details, such as passwords, are blacked out). [citation needed] The first edition, the version most easily available for download, was published in 1985.

  4. Hydra (software) - Wikipedia

    en.wikipedia.org/wiki/Hydra_(software)

    Hydra (or THC Hydra) is a parallelized network login cracker built into various operating systems like Kali Linux, Parrot and other major penetration testing environments. [2] It was created as a proof of concept tool, for security researchers to demonstrate how easy it can be to crack logins.

  5. Hacking: The Art of Exploitation - Wikipedia

    en.wikipedia.org/wiki/Hacking:_The_Art_of...

    "Hacking, The art of exploitation" Hacking: The Art of Exploitation (ISBN 1-59327-007-0) is a book by Jon "Smibbs" Erickson about computer security and network security. [1] It was published by No Starch Press in 2003, [2] [3] with a second edition in 2008. [4] [5] All the examples in the book were developed, compiled, and tested on Gentoo ...

  6. Category:Books about computer hacking - Wikipedia

    en.wikipedia.org/wiki/Category:Books_about...

    Download as PDF; Printable version; In other projects ... Pages in category "Books about computer hacking" The following 20 pages are in this category, out of 20 ...

  7. The Linux Programming Interface - Wikipedia

    en.wikipedia.org/wiki/The_Linux_Programming...

    It chronicles the history of Unix and how it led to the creation of Linux. The book provides samples of code written in C, and learning exercises at the end of chapters. The author is a former writer for the Linux Weekly News [1] and the current maintainer for the Linux man pages project. [2]

  8. The Art of Deception - Wikipedia

    en.wikipedia.org/wiki/The_Art_of_Deception

    The Art of Deception is a book by Kevin Mitnick that covers the art of social engineering. [1] [2] Part of the book is composed of real stories and examples of how social engineering can be combined with hacking. All, or nearly all, of the examples, are fictional but quite plausible.

  9. Hackers: Heroes of the Computer Revolution - Wikipedia

    en.wikipedia.org/wiki/Hackers:_Heroes_of_the...

    Hackers: Heroes of the Computer Revolution (ISBN 0-385-19195-2) is a book by Steven Levy about hacker culture. It was published in 1984 in Garden City , New York by Doubleday . Levy describes the people, the machines, and the events that defined the Hacker culture and the Hacker Ethic , from the early mainframe hackers at MIT , to the self-made ...