تبلیغات
Computer Book - مطالب ابر hacking

Network Hacking -52 video

نوشته شده در تاریخ : یکشنبه 25 دی 1390   10:55 ق.ظ

نوع مطلب :فیلم های آموزشی ،شبکه ،امنیت ،

52 Video Tutorials – Network  Hacking 
English | XVID | 640×480 | SWF, AVI, WMV | 15 fps 459 kbps | 750.64 MB
Genre: eLearning

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: hacking، network،

Hacking Windows Tools and Tranning

نوشته شده در تاریخ : چهارشنبه 6 مهر 1390   11:34 ق.ظ

نوع مطلب :فیلم های آموزشی ،امنیت ،

1dcee Hacking Windows Tools and Tranning

Hacking Windows Tools and Tranning
FLV | 805 MB
In this tutorial you going to learn more about RAT(s) and how they work. Well RAT(s) are usually used for hacking, and they are detected as backdoors.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: hacking،

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

نوشته شده در تاریخ : شنبه 15 مرداد 1390   03:57 ب.ظ

نوع مطلب :امنیت ،

1cd3e2 The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Publisher: S..y..n..gr,,es,,s 2011 | 180 Pages | ISBN: 1597496553 | PDF | 4 MB

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.Each chapter contains hands-on examples teach you how to interpret the results and utilize those results in later phases


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: hacking، Penetration،

Lifehacker, 3rd Edition

نوشته شده در تاریخ : جمعه 7 مرداد 1390   03:49 ب.ظ

نوع مطلب :امنیت ،تجارت ،

645682167119 Lifehacker, 3rd Edition

Book Description

A new edition, packed with even more clever tricks and methods that make everyday life easier

Lifehackers redefine personal productivity with creative and clever methods for making life easier and more enjoyable. This new edition of a perennial bestseller boasts new and exciting tips, tricks, and methods that strike a perfect balance between current technology and common sense solutions for getting things done. Exploring the many ways technology has changed since the previous edition, this new edition has been updated to reflect the latest and greatest in technological and personal productivity.

The new “hacks” run the gamut of working with the latest and Mac operating systems for both  and Apple, getting more done with smartphones and their operating systems, and dealing with the evolution of the . Even the most tried-and-true hacks have been updated to reflect the contemporary tech world and the tools it provides us.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: hacking،

CEH: Official Certified Ethical Hacker Review Guide (Exam 312-50)

نوشته شده در تاریخ : شنبه 1 مرداد 1390   12:58 ب.ظ

1639199973 CEH: Official Certified Ethical Hacker Review Guide (Exam 312 50)

Book Description

Prepare for the  certification exam with this official review guide and learn how to identify  risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you’ll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Security، hacking، CEH،