Follow an offbeat, non-technical investigation of what hackers do, how they do it, and how you can protect yourself in this sample chapter from Steal This Computer Book 4.0: What They Won't Tell You About the Internet. Learn where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside. Begin by getting into the mind of a hacker to explore why hackers choose their targets, then closely examine how hackers find a target. Chapter coverage includes: war dialing, port scanning, war driving, accessing a WiFi network, and probing sites by Google hacking, as well as steps you can take to defend your system against these methods.
here is the pdf
No comments:
Post a Comment