Location:
Search - Hacking
Search list
Description: This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。-This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks o f hacking so you can think like a hacker. write your own hacks or thwart potential system attacks. translated as : "the art of hacking," as well as friends from the sun which could, Layer previously visited broadly, is a rare good information.
Platform: |
Size: 1457146 |
Author: xiaomi |
Hits:
Description: Hacking Vim
关于Vim详细使用的英文电子书
Platform: |
Size: 2680097 |
Author: xupan |
Hits:
Description: The Oracle Hacker s Handbook: Hacking and Defending Oracle
Platform: |
Size: 489841 |
Author: Sergey |
Hits:
Description: 黑客教程,攻防兼备-Hacking tutorial, both defensive and offensive
Platform: |
Size: 543744 |
Author: 张江 |
Hits:
Description: 黑客工具FindPass2003的源代码-hacking tools FindPass2003 source code
Platform: |
Size: 2048 |
Author: 王宁 |
Hits:
Description: 一台服务器可能打开了多个端口,到底哪些端口打开了的呢,而且对系统管理员来说,端口扫描对于黑客入侵具有重要的意义。-a server may open a number of ports, which in the end of the port to open it, but also for system administrators, port scanning for hacking has important significance.
Platform: |
Size: 52224 |
Author: lili |
Hits:
Description: 这是个黑客工具,可以进行。。。。。。。。。。。。网上攻击的哦-This a hacking tool that can be. . . . . . . . . . . . Oh, the cyber-attacks. .
Platform: |
Size: 4806656 |
Author: 李华柳 |
Hits:
Description: 一个游戏外挂,全用win32汇编写的,而破解的游戏就是windows下的小游戏蜘蛛纸牌,这个破解软件可以翻看任意牌,可以换牌。-a game pieces, all written using win32 compilation, and the crack of the game is the small windows Spider Solitaire games, the hacking software can look up any unlicensed, and for licensing.
Platform: |
Size: 44032 |
Author: |
Hits:
Description: Database Hackers Handbook (Chapter 10, 11, 12): Hacking Informix 欲了解Informix安全结构的必要参考。-Database Hackers Handbook (Chapter 10, 11, 12) : Hacking Informix For Informix security structures necessary reference.
Platform: |
Size: 4409344 |
Author: 王宇 |
Hits:
Description: 黑客攻击技术一整套,很好地讲述了黑客攻击的技术,很值得细细学习。-A complete set of hacking techniques, well about the technology of hacker attacks, is worthy of careful study.
Platform: |
Size: 5794816 |
Author: shudong |
Hits:
Description: google hacking其实并算不上什么新东西,在早几年在一些国外站点上就有过相关的介绍,但是由于当时并没有重视这种技术,认为最多就只是用来找找未改名的mdb或者别人留下的webshell什么的,并无太大实际用途.但是前段时间仔细啃了些资料才猛然发觉google hacking其实并非如此简单-actually not really nothing new, in the past few years in some foreign sites have all relevant, but I did not pay attention to this technology, on the view that the maximum not only to find out the name of mdb or others left a burst of what, little practical purpose. However, carefully avoiding the earlier information before suddenly found Google hacking This is not so simple
Platform: |
Size: 201728 |
Author: 陈淑明 |
Hits:
Description: 黑客技术与网络安全,,,,值得一看,,是一般不错的电子书籍-hacking technology and network security,, an eye-catcher, is generally good e-books
Platform: |
Size: 1111040 |
Author: simaxuan |
Hits:
Description: Wireless Hacking: 无线网络基本原理和应用实践的书籍-Wireless Hacking : wireless networks and the basic principles of the application of books
Platform: |
Size: 288768 |
Author: 熊光安 |
Hits:
Description: 黑客入侵口令集合
个人不错的书
黑客入侵口令集合
个人不错的书-hacking personal password set good book set password hacking personal good book
Platform: |
Size: 258048 |
Author: wuxin911 |
Hits:
Description: This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。-This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks o f hacking so you can think like a hacker. write your own hacks or thwart potential system attacks. translated as : "the art of hacking," as well as friends from the sun which could, Layer previously visited broadly, is a rare good information.
Platform: |
Size: 1457152 |
Author: xiaomi |
Hits:
Description: The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ever written. Leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company to fight cyber-crime.
Platform: |
Size: 9222144 |
Author: holahola |
Hits:
Description: This document is from my school and it has a real good introduction to hacking by a prof who has extensive experience in this area.This is kind of a first step for any one who wants to hack or even debug kernel
Platform: |
Size: 100352 |
Author: prem |
Hits:
Description: 一个黑客成长为安全专家的传记,里面有大量实际操作的教程,黑客成长日记-A hacker security experts biography growth, which has a large number of practical tutorials, hacking growth diary
Platform: |
Size: 31626240 |
Author: 赵翔 |
Hits:
Description: different tricks of hacking
Platform: |
Size: 2490368 |
Author: engrsaleem
|
Hits:
Description: Hacking Exposed Mobile Hacking
Platform: |
Size: 4976640 |
Author: white_bob
|
Hits:
« 12
3
4
5
6
7
8
9
10
...
34
»