Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Malware & Rootkits

Buy
Hacking Exposed Malware & Rootkits, 9780071591188 (0071591184), McGraw-Hill, 2009

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been true. I remember when I first started in information security in 1998, deploying my first honeypots. These allowed me to watch attackers break into and take over real computers. I learned firsthand their tools and techniques. Back in those days, attackers began their attack by manually scanning entire network blocks. Their goal was to build a list of IP addresses that they could access on the Internet. After spending days building this database, they would return, probing common ports on each computer they found, looking for known vulnerabilities such as vulnerable FTP servers or open Window file shares. Once these vulnerabilities were found, the attackers would return to exploit the system. This whole process of probing and exploiting could take anywhere from several hours to several weeks and required different tools for each stage in the process. Once exploited, the attacker would upload additional tools, each of which had a unique purpose and usually ran manually. For example, one tool would clear out the logs; another tool would secure the system; another tool would retrieve passwords or scan for other vulnerable systems. You could often judge just how advanced the attacker was by the number of mistakes he or she made in running different tools or executing system commands. It was a fun and interesting time, as you could watch and learn from attackers and identify them and their motivations. It almost felt as if you could make a personal connection with the very people breaking into your computers.

(HTML tags aren't allowed.)

Making Great Games: An Insider's Guide to Designing and Developing the World's Greatest Video Games
Making Great Games: An Insider's Guide to Designing and Developing the World's Greatest Video Games

Join videogame industry veteran Michael Thornton Wyman on a series of detailed, behind-the-scenes tours with the teams that have made some of the most popular and critically acclaimed videogames of the modern era. Drawing on insider's perspectives from a wide variety of teams, learn about the creation of a tiny, independent game project...

What's New in Adobe AIR 3
What's New in Adobe AIR 3
This book will detail the various enhancements, new functionalities, and general improvements available in this version of the Adobe AIR runtime. Each item is explained in detail, and when possible, a series of screen captures and a full code example will be provided, enabling you to both grasp the new feature in a visual way, and...
Working with jqTouch to Build Websites on Top of jQuery
Working with jqTouch to Build Websites on Top of jQuery

Using jqTouch, an open source solution, is a fast way for you to convert a static Web page into looking like a native iPhone or Android app. In this short ebook find out how you can use the Open Source jqTouch Library to extend the functionality built into jQuery to build Web sites that run on your iOS and Android phones but...


Extending Macromedia Flash MX 2004: Complete Guide and Reference to JavaScript Flash
Extending Macromedia Flash MX 2004: Complete Guide and Reference to JavaScript Flash

With the release of Flash MX 2004, Macromedia gave us a brand-new Extensibility architecture layer, which let us look under the hood of Flash and extend its functionality. With the extensibility tools, which include behaviors, custom-made tools and commands, the JavaScript API (or JSFL), and the XML-to-UI API, you can literally extend Flash...

Expert Indexing in Oracle Database 11g: Maximum Performance for your Database (Expert's Voice in Oracle)
Expert Indexing in Oracle Database 11g: Maximum Performance for your Database (Expert's Voice in Oracle)

Expert Indexing in Oracle Database 11g is about the one database structure at the heart of almost all performance concerns: the index. Database system performance is one of the top concerns in information technology today. Administrators struggle to keep up with the explosion of access and activity driven by the proliferation of...

vSphere Virtual Machine Management
vSphere Virtual Machine Management

This book follows a step-by-step tutorial approach with some real-world scenarios that vSphere businesses will be required to overcome every day. This book also discusses creating and configuring virtual machines and also covers monitoring virtual machine performance and resource allocation options.

This book is for VMware
...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy