hacking Windows Xp,and many more
heres a good book http://rapidshare.de/files/36295708/XHWP.rar.html
Author(s): Bruce Frey Publisher: O'Reilly Year: May 2006 ISBN: 0-596-10164-3 Language: English File type: CHM Pages: 356 Size (for download): 1.03 MB
Want to calculate the probability that an event will happen? Be able to spot fake data? Prove beyond doubt whether one thing causes another? Or learn to be a better gambler? You can do that and much more with 75 practical and fun hacks packed into Statistics Hacks. These cool tips, tricks, and mind-boggling solutions from the world of statistics, measurement, and research methods will not only amaze and entertain you, but will give you an advantage in several real-world situations-including business.
This book is ideal for anyone who likes puzzles, brainteasers, games, gambling, magic tricks, and those who want to apply math and science to everyday circumstances. Several hacks in the first chapter alone-such as the "central limit theorem,", which allows you to know everything by knowing just a little-serve as sound approaches for marketing and other business objectives. Using the tools of inferential statistics, you can understand the way probability works, discover relationships, predict events with uncanny accuracy, and even make a little money with a well-placed wager here and there.
Whether you're a statistics enthusiast who does calculations in your sleep or a civilian who is entertained by clever solutions to interesting problems, Statistics Hacks has tools to give you an edge over the world's slim odds.
This book is a collection of statistical tricks and tools. Statistics Hacks presents useful tools from statistics, of course, but also from the realms of educational and psychological measurement and experimental research design. It provides solutions to a variety of problems in the world of social science, but also in the worlds of business, games, and gambling.
If you are already a top scientist and do statistical calculations in your sleep, you'll enjoy this book and the creative applications it finds for those rusty old tools you know so well. If you just like the scientific approach to life and are entertained by cool ideas and clever solutions to interesting problems, don't worry. Statistics Hacks was written with the nonscientist in mind, too, so if that is you, you've come to the right place. It's written for the nonstatistician as well, so if this still describes you, you'll feel safe here.
If, on the other hand, you are taking a statistics course or have some interest in the academic nature of the topic, you might find this book a pleasant companion to the textbooks typically required for those sorts of courses. There won't be any contradictions between your textbook and this book, so hearing about real-world applications of statistical tools that seem only theoretical won't hurt your development. It's just that there are some pretty cool things that you can do with statistics that seem more like fun than like work. http://rapidshare.de/files/29410071/SH_May2006.rar.html
New World Hacker Dictionary Sep 2006[img] http://serv2.imagehigh.com/imgss/4097745_pre.jpg[/img] This book attempts to take a novel approach to the presentation and understanding of a controversialtopic in modern-day society: hacking versus cracking. The perception of this bi-modal activity is as controversial as the process itself–with many in society confusing the positive attributes of hackers with the criminal activities of crackers.This dictionary tries to balance the two sides of the equation:the White Hat or the positive side of hacking with the Black Hat or the negative side of cracking.This dictionary is written for general readers, students who want to learn about hackers and crackers,and business leaders who want to become more knowledgeable about the IT security field to keeptheir enterprises financially stable and to be proactive against intrusive cyber-attackers.
TYPE : PDF LANG : English PAGE : 419
Download
Code: http://rapidshare.de/files/35788968/WebstersWorld.Hacker.Dictionary.rar.html
Hacking Exposed - Network Security Secrets & Solutions, 2nd Edition
When a tree falls in the forest and no one is around to hear it, it certainly makes a sound. But if a computer network has a security vulnerability and no one knows about it, is it insecure? Only the most extreme Berkeleian idealist might argue against the former, but the latter is not nearly so obvious.
A network with a security vulnerability is insecure to those who know about the vulnerability.If noone knows about it–if it is literally a vulnerability that has not been discovered–then the network is secure. If one person knows about it, then the network is insecure to him but secure to everyone else. If the network equipment manufacturer knows about it…if security researchers know about it…if the hacking community knows about it the insecurity of the network increasesas news of the vulnerability gets out.
Or does it? The vulnerability exists, whether or not anyone knows about it.Publishing a vulnerability does not cause the network to be insecure. To claim that would be confusing knowledge about a thing with the thing itself. Publishing increases the likelihood that an attacker will use the vulnerability, but not the severity of the vulnerability. Publishing also increases the likelihood that people can defend against the vulnerability. Just as an attacker can’t exploit a vulnerability he does not know about, a defender can’t protect against a vulnerability he does not know about.
So if keeping vulnerabilities secret increases security, it does so in a fragile way. Keeping vulnerabilities secret only works as long as they remain secret–but everything about information works toward spreading information. Some people spread secrets accidentally; others spread them on purpose. Sometimes secrets are re-derived by someone else. And once a secret is out, it can never be put back.
TABLE OF CONTENT: Chapter 01 - Footprinting Chapter 02 - Scanning Chapter 03 - Enumeration Chapter 04 - Hacking Windows 95/98 and ME Chapter 05 - Hacking Windows NT Chapter 06 - Hacking Windows 2000 Chapter 07 - Novell NetWare Hacking Chapter 08 - Hacking UNIX Chapter 09 - Dial-Up, PBX, Voicemail, and VPN Hacking Chapter 10 - Network Devices Chapter 11 - Firewalls Chapter 12 - Denial of Service (DoS) Attacks Chapter 13 - Remote Control Insecurities Chapter 14 - Advanced Techniques Chapter 15 - Web Hacking Chapter 16 - Hacking the Internet User Appendix A - Ports Appendix B - Top 14 Security Vulnerabilities Appendix C - About the Companion Web Site
Download
OReilly Google Hacks 3rd Edition Aug 2006
Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them.
We've The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within.
-
Search Google over IM with a Google Talk bot
-
Build a customized Google Map and add it to your own web site
-
Cover your searching tracks and take back your browsing privacy
-
Turn any Google query into an RSS feed that you can monitor in Google Reader or the newsreader of your choice
-
Keep tabs on blogs in new, useful ways
-
Turn Gmail into an external hard drive for Windows, Mac, or Linux
-
Beef up your web pages with search, ads, news feeds, and more
-
Program Google with the Google API and language of your choice
-
TITLE : Google Hacks: Tips & Tools for Finding and Using the World's
-
Information (Hacks) (Paperback)
-
AUTHOR : Rael Dornfest, Paul Bausch, Tara Calishain
-
PUBLISHER : O'Reilly Media
-
ISBN : 0596527063
-
EDITION : 3rd
-
PUB DATE : August 03, 2006
-
LANGUAGE : English
-
RLS DATE : 08/27/06
Download 5.5 MB
Code: http://rapidshare.de/files/31362531/OReilly_Google_Hacks_3rd_Edition_Aug_2006.rar
Hacking Firefox, More Than 150 Hacks Mods and Customizations
They dreamed of a better browser … and before you could say “explore no moreâ€, Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control.
Step-by-step instructions for these hacks and dozens more Settings, content, and extension hacks Hacking the interface and themes Performance boosters Anti-phishing and security hacks Toolbar and status bar tweaks Navigation, download, and search hacks Hacks for common plugins Extension and theme creation
Download:
Hack I.T. - Security Through Penetration Testing
Penetration testing is one of those odd jobs you typically hear little about–it is like a black art, and can come with not only smoke and mirrors but, for the pen tester, any number of trap doors and blind alleys. Bits and pieces of penetration testing have made it into the mainstream media, culminating in the classic hacker-fave film Sneakers, starring Robert Redford, Sidney Poitier, and a host of other stars. And while plenty seems to be written about hacking and gaining access to systems, there has been nothing written that really speaks to the art of penetration testing.
Like most other high tech jobs portrayed in the movies, pen testing is not as glamorous as most people think. Oh sure, there are exciting moments, such as when the first system belonging to the target is penetrated, but it is actually hard work. Comparatively, a typical intruder’s job is easy.
A regular electronic intruder has to find only one hole into an organization’s computers, but a pen tester has to find them all. This is not only somewhat tedious and even boring at times, it is very important. The intruder probably does not care about such things as accidentally damaging systems, or wiping log files to hide his presence. The pen tester is trying to keep from disrupting normal business, preserve records and logs, yet still trying to move about unnoticed. In other words, to be a pen tester you have to have not only all of the intruder techniques possible, but also understand system administration as well as corporate life in general. Not an easy task.
TABLE OF CONTENT: Chapter 01. Hacking Today Chapter 02. Defining the Hacker Chapter 03. Penetration for Hire Chapter 04. Where the Exposures Lie Chapter 05. Internet Penetration Chapter 06. Dial-In Penetration Chapter 07. Testing Internal Penetration Chapter 08. Social Engineering Chapter 09. UNIX Methods Chapter 10. The Tool Kit Chapter 11. Automated Vulnerability Scanners Chapter 12. Discovery Tools Chapter 13. Port Scanners Chapter 14. Sniffers Chapter 15. Password Crackers Chapter 16. Windows NT Tools Chapter 17. Web-Testing Tools Chapter 18. Remote Control Chapter 19. Intrusion Detection Systems Chapter 20. Firewalls Chapter 21. Denial-of-Service Attacks Chapter 22. Wrapping It Up Chapter 23. Future Trends Appendix A. CD-ROM Contents Appendix B. The Twenty Most Critical Internet Security Vulnerabilities–The Experts’ Consensus
Download
Code: http://rapidshare.de/files/33532212/HIT-_Security_Through_Penetration_Testing-G4r.rar.html
The Database Hacker's Handbook: Defending Database Servers by roberto on Friday, September 08 @ 20:40:58 CDT
Databases are the nerve center of our economy. Every piece of your personal information is stored there–medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling–and relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
- Identify and plug the new holes in Oracle and Microsoft SQL Server
- Learn the best defenses for IBM's DB2, PostgreSQL, Sybase ASE, and MySQL servers
- Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
- Recognize vulnerabilities peculiar to each database
- Find out what the attackers already know
Source Code files from the book are included
Download
Code: http://rapidshare.de/files/32698726/The_DBH_Handbook-G4r.rar
Well for one, the only poster in this thread other than you is Turbocharged_06. Secondly, that thread is from like a year ago, and he got banned less than a month ago…
…soon after this thread:
I don't know why he was banned exactly, but I think he already had a high warn level (like 99? :P).
So yeah, most likely it was totally unrelated to anything here ;).