<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1011926208076870651</id><updated>2024-09-12T04:03:38.120-07:00</updated><category term="eBooks"/><category term="Hacking Books"/><category term="Tips and Tricks"/><category term="Programming Books"/><category term="Penetration Testing"/><category term="Mobile Hacks"/><title type='text'>PC-ROM</title><subtitle type='html'>Request and download for free. . . </subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>24</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-7923234359870771680</id><published>2013-12-11T01:01:00.001-08:00</published><updated>2013-12-11T01:02:41.167-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Hacks"/><title type='text'>Some Nokia Secret Codes</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiynlicF86w1BMAnjchni8zad7UlV7-FZ-czK8or1I6N9VnRagLYVlSmGYiuHGSOHi-_rapvVQ0rdcj_f_sTbpK710AfqGrF3DXJzWhz5lgwSiYXy4xFK-mNrlUT8rh3hJtTjEumvu02CE/s1600/nokia.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;238&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiynlicF86w1BMAnjchni8zad7UlV7-FZ-czK8or1I6N9VnRagLYVlSmGYiuHGSOHi-_rapvVQ0rdcj_f_sTbpK710AfqGrF3DXJzWhz5lgwSiYXy4xFK-mNrlUT8rh3hJtTjEumvu02CE/s320/nokia.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Some Nokia Secret Hack Codes&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Hey friends, today i will share with you some Nokia hack codes. These codes provide some interesting and unique information to Nokia Phone users, some of these codes unlock hidden functions. Secret hacks code are mainly beneficial in knowing your device properly. What else you can do just from calling and messaging from your mobiles.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;h4&gt;
Universal Nokia Hack Codes:&amp;nbsp;&lt;/h4&gt;
&lt;div&gt;
These are called universal because these hack codes works on almost all Nokia mobile phones.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#06# &lt;/b&gt;&amp;nbsp; &amp;nbsp; &lt;i&gt;Displays the IMEI (Standard GSM command, works on all phones)&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Information you get from the IMEI-&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;XXXXXX &amp;nbsp;XX &amp;nbsp; XXXXXX &amp;nbsp; X&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&amp;nbsp; &amp;nbsp; TAC &amp;nbsp; &amp;nbsp; &amp;nbsp; FAC &amp;nbsp; &amp;nbsp; SNR &amp;nbsp; &amp;nbsp; &amp;nbsp;SP&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;*TAC = Type approval code&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;*FAC = Final assembly code&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;*SNR = Serial number&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;*SP &amp;nbsp; &amp;nbsp;= Spare&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#0000# &amp;nbsp; &lt;/b&gt;&amp;nbsp; &amp;nbsp;&lt;i&gt;Displays the firmware version and date&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Information you get from the Software revision-&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;V 6.1.0.5&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;18-12-10&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;NSE-3&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;*1ST Line &amp;nbsp;= Software revision&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;*2ND Line = The date of the software release&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;*3RD Line = Phone type&amp;nbsp;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#92702689# *#war0anty#&lt;/b&gt; &lt;i&gt;&amp;nbsp;Here you can view the S/N and the IMEI as well as the life timer (newer models). The date the phone left the factory and the date it was purchased. If your phone has been repaired the date of the repair is also visible. You will need to turn the phone off to exit this menu. Newer phones simply require you to press ok.&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h4&gt;
NOKIA 40 SERIES CODES&lt;/h4&gt;
&lt;div&gt;
The following codes are specific to older series Nokia(40 series) &amp;nbsp;Mobile phones:&lt;/div&gt;
&lt;div&gt;
Entering the following codes will restart the phone.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Note: If main code doesn&#39;t work try the alternate one given in brackets for each code. As on some devices standard code works and in some alternate only might work.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*4720# (*hra0#)&lt;/b&gt; &lt;i&gt;Activates Half Rate, Half Rate is 5.6kbit/s and uses half the bandwidth at the cost of call quality. Network operators often activate half rate on overloaded towers during peak times to save costs.&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;#4720# (#hra0#)&lt;/b&gt;&lt;i&gt; Deactivates Half Rate&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*3370# (*efr0#) &lt;/b&gt;&lt;i&gt;Activates Enhanced Full Rate, EFT attempts to match wire quality. The calls are 12.2kbit/s and are not supported by all operators. It is compatibale with the hightest AMR mode.&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;#3370# (#efr0#)&lt;/b&gt;&lt;i&gt; Deactivates Enhanced Full Rate&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#746085685# (*#sim0clock#)&lt;/b&gt; &lt;i&gt;Display the SIM clock status&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h4&gt;
SPECIFIC PHONE CODES&lt;/h4&gt;
&lt;div&gt;
The following codes are phone specific or phase related.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#7220# (*#pca0#)&lt;/b&gt; &lt;i&gt;Activate the GPRS PCCCH support (Packet Common Control Channel)&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#7230# (*#pcd0#)&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;i&gt;Deactivate the GPRS PCCCH support&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#7760# (*#ssn0#)&lt;/b&gt; &lt;i&gt;Display the manufacturing serial number&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: red;&quot;&gt;This only works on the 3310 and 3330:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#67705646# (*#opr0logo#)&lt;/b&gt;&lt;i&gt; Clear the operator logo, the logo will be reset to the default network operator logo.&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
NOKIA 60/80 SERIES CODES&lt;/h4&gt;
&lt;div&gt;
The following codes work on newer series 40 &amp;amp; series 60/80 phones:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#2820# (*#bta0#)&lt;/b&gt; Display the Bluetooth MAC address (Phone must have a built in bluetooth adapter)&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#7370925538# (*#res0wallet#)&lt;/b&gt; Reset the mobile wallet (Phone must have the mobile wallet feature)&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#7370# (*#res0#)&lt;/b&gt; Soft-format the memory (Symbian)&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;*#7780# (*#rst0#) &lt;/b&gt;Reset to factory defaults, confirmation required (also known has a Hard-format), all phone contents will be wiped clean including contacts and sms if they are stored on the phone.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;i style=&quot;background-color: white; color: #555555; font-family: Arial, Helvetica, sans-serif; font-size: 15px; line-height: 24px;&quot;&gt;&lt;span style=&quot;color: #cccccc;&quot;&gt;#From the hackingloops&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/7923234359870771680/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/12/some-nokia-secret-codes.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/7923234359870771680'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/7923234359870771680'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/12/some-nokia-secret-codes.html' title='Some Nokia Secret Codes'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/17981275385356467585</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiynlicF86w1BMAnjchni8zad7UlV7-FZ-czK8or1I6N9VnRagLYVlSmGYiuHGSOHi-_rapvVQ0rdcj_f_sTbpK710AfqGrF3DXJzWhz5lgwSiYXy4xFK-mNrlUT8rh3hJtTjEumvu02CE/s72-c/nokia.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-3594242529376102764</id><published>2013-12-10T16:02:00.001-08:00</published><updated>2013-12-10T16:05:10.098-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>How To Search On Google Like Elite Hackers</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD_sLgghHpxDeezKeuBEams4MLrcK985kDo1dpvnHVWTF7_nEvPs1ievcLycsSSF-529TlaySTELQvJEJDiWIZftkVULOXKZdtiHHoTmiV56RtWI40Mk4PpWiZ5fNJJNZt5MH1Vhpb7-M/s1600/How+To+Search+On+Google+Like+Elite+Hackers.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;208&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD_sLgghHpxDeezKeuBEams4MLrcK985kDo1dpvnHVWTF7_nEvPs1ievcLycsSSF-529TlaySTELQvJEJDiWIZftkVULOXKZdtiHHoTmiV56RtWI40Mk4PpWiZ5fNJJNZt5MH1Vhpb7-M/s320/How+To+Search+On+Google+Like+Elite+Hackers.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Learn To Use Google Like An Elite Hacker&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
People think Google&#39;s popularity is because its simple and fast searching interface but friends, its more popular because it has rich operators and query support that will make your searching experience even better.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Without wasting much time lets get started&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;Google operators:&lt;/u&gt;&lt;/div&gt;
&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Google operators are classified into two basic categories:&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
1. Basic Google Operators like and, or, not etc.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
2. Advanced google operators like inurl, intitle etc.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
I am also including bonus search queries that are extremely useful for hackers.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;Basic Google Operators:-&lt;/u&gt;&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;1) And (+)&lt;/b&gt; :- This operator is used to include multiple terms in a query which is to be searched in google.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
example:- if we type &quot;hacker+yahoo+science&quot; in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;2 ) OR (|)&lt;/b&gt; :- The OR operator, represented by symbol( | ) or simply the word OR in uppercase letters, instructs google to locate either one term or another term in a query.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;3) NOT &lt;/b&gt;:- It is opposite of AND operator, a NOT operator excludes a word from search.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
example:- If we want to search websites containing the terms google and hacking but not security then we enter the query like &quot;google+hacking&quot; NOT &quot;security&quot;.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;Advanced Operators:-&lt;/u&gt;&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;1) Intitle &lt;/b&gt;:- This operator searches within the title tags.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Description:- intitle:hacking returns all pages that have the string &quot;hacking&quot; in their title.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
intitle:&quot;index of&quot; returns all pages that have string &quot;index of&quot; in their title.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Similar operator:- &quot;allintitle&quot;.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;2) Inurl :&lt;/b&gt;- Returns all matches, where url of the pages contains given word.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Description:- inurl:admin returns all matches, where url of searched pages must contains the word &quot;admin&quot;.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Companion operator:- &quot;allinurl&quot;.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;3) Site &lt;/b&gt;:- This operator narrows search to specific website.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Description : It will search results only from given domain. Can be used to carry out information gathering on specific domain.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
example:- site:www.microsoft.com will find results only from the domain www.microsoft.com&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;4) Link&lt;/b&gt; :- This operator allows you to search for pages that links to given website.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
example:- link:www.microsoft.com&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Here, each of the searched result contains asp links to www.microsoft.com&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;5) Info &lt;/b&gt;:- This operator shows summary information for a site and provides links to other google searches that might pertain to that site.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
example:- info:www.yahoo.com&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;6) Define&lt;/b&gt; :- This operator shows definition for any term.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
example:- define:security&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
It gives various definitions for the word &quot;security&quot; in different manner from all over the world.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;7) Filetype&lt;/b&gt; :- This operator allows us to search specific files on the internet. The supported file types can be pdf, xls, ppt, doc, txt, asp, swf, rtf, etc..&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
example:- If you want to search for all text documents presented on domain www.microsoft.com then we enter the query something like following.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&quot;inurl:www.microsoft.com filetype:txt&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;i&gt;Other Popular Search Terms&lt;/i&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;For searching active webcams online:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In Google Search Box type :-&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: center;&quot;&gt;
&quot;Active Webcam Page&quot; inurl:8080&lt;/blockquote&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Description- Active WebCam is a shareware program for capturing and sharing the video streams from a lot of video devices. Known bugs: directory traversal and cross site scripting.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;For accessing the deleted messages on forums:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In Google Search Box type:-&amp;nbsp;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: center;&quot;&gt;
&quot;delete entries&quot; inurl:admin/delete.asp&lt;/blockquote&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Description- AspJar contains a flaw that may allow a malicious user to delete arbitrary messages. The issue is triggered when the authentication method is bypassed and /admin/delete.asp is accessed directly. It is possible that the flaw may allow a malicious user to delete messages resulting in a loss of integrity.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;For searching personal information of person:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In Google Search box type :-&amp;nbsp;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: center;&quot;&gt;
&quot;phone * * *&quot; &quot;address *&quot; &quot;e-mail&quot; intitle:&quot;curriculum vitae&quot;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Description- This search gives hundreds of existing curriculum vitae with names and address. An attacker could steal identity if there is an SSN in the document.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;For searching secret financial spread sheets:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In Google Search box type :-&amp;nbsp;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: center;&quot;&gt;
intitle:&quot;index of&quot; finance.xls&lt;/blockquote&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Description- Secret financial spreadsheets &#39;finance.xls&#39; or &#39;finances.xls&#39; of companies may revealed by this query.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;In Google Search box :-&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: center;&quot;&gt;
intitle:&quot;index.of&quot; robots.txt&lt;/blockquote&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Description- The robots.txt file contains &quot;rules&quot; about where web spiders are allowed (and NOT allowed) to look in a website&#39;s directory structure. Without over-complicating things, this means that the robots.txt file gives a mini-roadmap of what&#39;s somewhat public and what&#39;s considered more private on a web site. Have a look at the robots.txt file itself, it contains interesting stuff. However, don&#39;t forget to check out the other files in these directories since they are usually at the top directory level of the web server!&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;For locating admin directories of websites:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In Google Search box type :-&amp;nbsp;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: center;&quot;&gt;
intitle:index.of.admin&lt;/blockquote&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Description- Locate &quot;admin&quot; directories that are accessible from directory listings.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&lt;b&gt;For searching proxies online:&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In Google Search box type :-&amp;nbsp;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot; style=&quot;text-align: center;&quot;&gt;
inurl:&quot;nph-proxy.cgi&quot; &quot;start browsing&quot;&lt;/blockquote&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Description- Returns lots of proxy servers that protects your identity online.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/3594242529376102764/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/12/how-to-search-on-google-like-elite.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/3594242529376102764'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/3594242529376102764'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/12/how-to-search-on-google-like-elite.html' title='How To Search On Google Like Elite Hackers'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/17981275385356467585</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgD_sLgghHpxDeezKeuBEams4MLrcK985kDo1dpvnHVWTF7_nEvPs1ievcLycsSSF-529TlaySTELQvJEJDiWIZftkVULOXKZdtiHHoTmiV56RtWI40Mk4PpWiZ5fNJJNZt5MH1Vhpb7-M/s72-c/How+To+Search+On+Google+Like+Elite+Hackers.jpg" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-1195907193276848719</id><published>2013-12-10T15:18:00.002-08:00</published><updated>2013-12-10T15:19:49.951-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Some Ways To Hack Or Deface Websites Online</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinihwCIsrJWxbhy-MxCT7wIc-AXWCmqQUbp56lO9BWPA_k5rhGbjHQcIImbUXu110E1NzOnOTpNLjEn_cHm-GJoGBh0mmO3CnVc4uFxN6tIc4_mHqxl7C5BHpt6tNaGSqs6O-WMKVhxG8/s1600/Some+Ways+To+Hack+Or+Deface+Websites+Online.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;232&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinihwCIsrJWxbhy-MxCT7wIc-AXWCmqQUbp56lO9BWPA_k5rhGbjHQcIImbUXu110E1NzOnOTpNLjEn_cHm-GJoGBh0mmO3CnVc4uFxN6tIc4_mHqxl7C5BHpt6tNaGSqs6O-WMKVhxG8/s320/Some+Ways+To+Hack+Or+Deface+Websites+Online.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Six Ways To hack or Deface Websites Online&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;i&gt;What are basic things you should know before website hacking?&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
First of all everything is optional as i will start from very scratch. But you need atleast basic knowledge of following things..&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;1. Basics of HTML, SQL, PHP.&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;2. Basic knowledge of Javascript.&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;3. Basic knowledge of servers that how servers work&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;4. And most important&amp;nbsp;expertise&amp;nbsp;in removing traces otherwise you have to suffer consequences.&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
You can learn the basics of html, sql, php and javascript from a a good website like:&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.w3schools.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;W3SCHOOLS&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;And for the fourth point that, you should be expert in removing traces. It will be explained in future articles. So keep reading.. or simply subscribe to my posts..&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;As we know traces are very important. Please don&#39;t ignore them otherwise you can be in big trouble for simply doing nothing. so please take care of this step.&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;u&gt;METHODS OF HACKING WEBSITE:&lt;/u&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;1. SQL INJECTION&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;2. CROSS SITE SCRIPTING&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;3. REMOTE FILE INCLUSION&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;4. LOCAL FILE INCLUSION&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;5. DDOS ATTACK&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;6. EXPLOITING VULNERABILITY.&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;SQL INJECTION&lt;/b&gt;&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;First of all what is SQL injection?&lt;/i&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
SQL injection is a type of security exploit or loophole in which a attacker &quot;injects&quot; SQL code through a web form or manipulate the URL&#39;s based on SQL parameters. It exploits web applications that use client supplied SQL queries.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
The primary form of SQL injection consists of direct insertion of code into user-input variables that are concatenated with SQL commands and executed. A less direct attack injects malicious code into strings that are destined for storage in a table or as metadata. When the stored strings are subsequently concatenated into a dynamic SQL command, the malicious code is executed.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
CROSS SITE SCRIPTING&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Cross site scripting (XSS) occurs when a user inputs malicious data into a website, which causes the application to do something it wasn’t intended to do. XSS attacks are very popular and some of the biggest websites have been affected by them including the FBI, CNN, Ebay, Apple, Microsft, and AOL.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Some website features commonly vulnerable to XSS attacks are:&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Search Engines&lt;/li&gt;
&lt;li&gt;Login Forms&lt;/li&gt;
&lt;li&gt;Comment Fields&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Cross-site scripting holes are web application vulnerabilities that allow attackers to bypass client-side security mechanisms normally imposed on web content by modern browsers. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser on behalf of the user. Cross-site scripting attacks are therefore a special case of code injection.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
REMOTE FILE INCLUSION&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Remote file inclusion is the most often found vulnerability on the website.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Remote File Inclusion (RFI) occurs when a remote file, usually a shell (a graphical interface for browsing remote files and running your own code on a server), is included into a website which allows the hacker to execute server side commands as the current logged on user, and have access to files on the server. With this power the hacker can continue on to use localexploits to escalate his privileges and take over the whole system.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
RFI can lead to following serious things on website :&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Code execution on the web server&lt;/li&gt;
&lt;li&gt;Code execution on the client-side such as Javascript which can lead to other attacks such as cross site scripting (XSS).&lt;/li&gt;
&lt;li&gt;Denial of Service (DoS)&lt;/li&gt;
&lt;li&gt;Data Theft/Manipulation&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
LOCAL FILE INCLUSION&amp;nbsp;&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Local File Inclusion (LFI) is when you have the ability to browse through the server by means of directory transversal. One of the most common uses of LFI is to discover the /etc/passwd file. This file contains the user information of a Linux system. Hackers find sites vulnerable to LFI the same way I discussed for RFI’s.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Let’s say a hacker found a vulnerable site, www.target-site.com/index.php?p=about, by means of directory transversal he would try to browse to the /etc/passwd file:&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
www.target-site.com/index.php?p= ../../../../../../../etc/passwd&lt;/blockquote&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Will explain it in detail with practical websites example in later sequential classes on Website Hacking.&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
DDOS ATTACK&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Simply called distributed denial of service attack. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. In DDOS attack we consumes the bandwidth and resources of any website and make it unavailable to its legitimate users.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
EXPLOTING VULNERABILITY&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Its not a new category it comprises of above five categories but i mentioned it separately because there are several exploits which cannot be covered in the above five categories. So i will explain them individually with examples. The basic idea behind this is that find the vulnerability in the website and exploit it to get the admin or moderator privileges so that you can manipulate the things easily.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;Note : This Post is For Educational Purpose Only&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #cccccc;&quot;&gt;#From the hackingloops&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/1195907193276848719/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/12/some-ways-to-hack-or-deface-websites.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/1195907193276848719'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/1195907193276848719'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/12/some-ways-to-hack-or-deface-websites.html' title='Some Ways To Hack Or Deface Websites Online'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/17981275385356467585</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinihwCIsrJWxbhy-MxCT7wIc-AXWCmqQUbp56lO9BWPA_k5rhGbjHQcIImbUXu110E1NzOnOTpNLjEn_cHm-GJoGBh0mmO3CnVc4uFxN6tIc4_mHqxl7C5BHpt6tNaGSqs6O-WMKVhxG8/s72-c/Some+Ways+To+Hack+Or+Deface+Websites+Online.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-2203358746363975953</id><published>2013-12-05T00:20:00.000-08:00</published><updated>2013-12-05T00:21:36.872-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Tips To Help You Master Programming Faster (Part 2)</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjl-OmlYvWu7bVEIyChtLda6WTnKMW4QVFfOCXkXgxw6iifbm7n7kQGV4iBFFmcN2fFEVZZaWiAWZcRVP0l_uCOU-8PDiNDY6NCYrXPhvrRPdzfAZmmQQXAuw41UtNeR25QBdUkzLQDHEM/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;149&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjl-OmlYvWu7bVEIyChtLda6WTnKMW4QVFfOCXkXgxw6iifbm7n7kQGV4iBFFmcN2fFEVZZaWiAWZcRVP0l_uCOU-8PDiNDY6NCYrXPhvrRPdzfAZmmQQXAuw41UtNeR25QBdUkzLQDHEM/s200/images.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;/b&gt;&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Publish code : &lt;/b&gt;If you keep a private journal and write the sentence &quot;The car green is&quot;, you may keep writing that hundreds of times without realizing its bad grammar, until you happen to come upon the correct way of doing things. If you write that in an email, someone will instantly correct you and you probably won&#39;t make the mistake again. You can speed up your learning 1-2 orders of magnitude by sharing your work with others. Its embarrassing to make mistakes, but the only way to become great is to trudge through foul smelling swamp of embarrassment.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Use Github.:&lt;/b&gt; The term version control used to scare the hell out of me. Heck, it still can be pretty cryptic. But version control is crucial to becoming a great programmer. Every other developer uses it, and you can&#39;t become a great programmer by coding alone, so you&#39;ll have to start using it. Luckily, you&#39;re learning during an ideal time. Github has made learning and using version control much easier. Also, Dropbox is a great tool that your mom could use and yet that has some of the powerful sharing and version control features of something like git.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&amp;nbsp;Treat yourself : &lt;/b&gt;Build things you think are cool. Build stuff you want to use. Its more fun to work on something you are interested in. Programming is like cooking, you don&#39;t know if what you make is good until you taste it. If something you cook tastes like dog food, how will you know unless you taste it? Build things you are going to consume yourself and you&#39;ll be more interested in making it taste not like dog food.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&amp;nbsp;Write English : &lt;/b&gt;Code is surprisingly more like English than like math. Great code is easy to read. In great code functions, files, classes and variables are named well. Comments, when needed, are concise and helpful. In great code the language and vocabulary is not elitist: it is easy for the layman to understand.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Be prolific : &lt;/b&gt;You don&#39;t paint the Mona Lisa by spending 5 years working on 1 piece. You create the Mona Lisa by painting 1000 different works, one of them eventually happens to be the Mona Lisa. Write web apps, iPhone apps, Javascript apps, desktop apps, command line tools: as many things as you want. Start a small new project every week or even every day. You eventually have to strike a balance between quantity and quality, but when you are young the goal should be quantity. Quality will come in time.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Learn Linux : &lt;/b&gt;The command line is not user friendly. It will take time and lots of repetition to learn it. But again, its what the world uses, you&#39;ll need at least a basic grasp of the command line to become a great programmer. When you get good at the command line, its actually pretty damn cool. You&#39;ll appreciate how much of what we depend on today was written over the course of a few decades. And you&#39;ll be amazed at how much you can do from the command line. If you use Windows, get CYGWIN! I just found it a few months ago, and it is much easier and faster than running virtualized Linux instances.&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;br /&gt;That&#39;s it, go get started ! &lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/2203358746363975953/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/12/tips-to-help-you-master-programming.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/2203358746363975953'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/2203358746363975953'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/12/tips-to-help-you-master-programming.html' title='Tips To Help You Master Programming Faster (Part 2)'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjl-OmlYvWu7bVEIyChtLda6WTnKMW4QVFfOCXkXgxw6iifbm7n7kQGV4iBFFmcN2fFEVZZaWiAWZcRVP0l_uCOU-8PDiNDY6NCYrXPhvrRPdzfAZmmQQXAuw41UtNeR25QBdUkzLQDHEM/s72-c/images.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-9177977707513236556</id><published>2013-11-13T17:44:00.001-08:00</published><updated>2013-11-13T19:06:20.164-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming Books"/><title type='text'>Invent Your Own Computer Games with Python, 2nd Edition</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIRFmO457ESzoKKpT6QOwb7swDt02lVFkl0iplQ3z2pU7TmqeyEAGrA_akfDQbBfBgUEnVjFxyNFpU8mAtQac3vZ1mFpaySXTg5yblR6Z1mfYxy1NBWFqPGiOXAHwufS0o7G7mSGUpYrlK/s200/Invent+Your+Own+Computer+Games+with+Python,+2nd+Edition.jpg&quot; width=&quot;160&quot; /&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuzv3_gjYK7oOmnuTsvhvHLVGMiE3DMWIOFb4i69NGlN4T6XTShz_ydTBNl63sUV0Rqf0pCLwkPgMDn9H2AxhMkDoVs2XnA6Ghkrc_l0g0ByAAyXt7-LXygCCNpm_AN6MT1hEAyJj8C_a8/s200/Invent+Your+Own+Computer+Games+with+Python%252C+2nd+Edition+1.jpg&quot; width=&quot;160&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Learn to invent your own computer games with python&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&quot;Invent Your Own Computer Games with Python&quot; teaches you computer programming in the Python programming language. Each chapter gives you the complete source code for a new game and teaches the programming concepts from these examples. &quot;Invent with Python&quot; was written to be understandable by kids as young as 10 to 12 years old, although it is great for anyone of any age who has never programmed before. This second edition has revised and expanded content, including using the Pygame library to make games with graphics, animation, and sound.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;User Reviews&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;I would highly recommend this book to anyone who wants to learn to program and has no previous experience.&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;The structure of the book allows you to learn critical programming and pythonic concepts by creating fun games that keep you interested and wanting more.&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;For starters, each concept that is introduced is explained thoroughly and in a way that is easy to understand.&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
About the Author&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Albert Sweigart (but you can call him Al), is a software developer in San Francisco, California who enjoys bicycling, reading, volunteering, computer security, haunting coffee shops, and making useful software. He is originally from Houston, Texas. He finally put his University of Texas at Austin computer science degree in a frame. He is a friendly introvert, an atheist, a cat person, and fears that he is losing brain cells over time. He laughs out loud when watching park squirrels, which makes people think he&#39;s a simpleton. His childhood Nintendo habit led him into programming and all the joys that come of it.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://app.box.com/s/lb0093ke6dj247u9lvec&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1o4IqayW0W_am3xqMz2MyK_u1ZvPtEoy7ktM3KKMAiKXfyySSjJ2GOI_MgRy-nOkUuIw4nlmvt3faufV0B742kKYjBLVXaebGNkk2keQzmuVKAVHSqfE6WqHWaPh1uVXyf5crt3TOFekx/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/9177977707513236556/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/11/invent-your-own-computer-games-with_13.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/9177977707513236556'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/9177977707513236556'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/11/invent-your-own-computer-games-with_13.html' title='Invent Your Own Computer Games with Python, 2nd Edition'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIRFmO457ESzoKKpT6QOwb7swDt02lVFkl0iplQ3z2pU7TmqeyEAGrA_akfDQbBfBgUEnVjFxyNFpU8mAtQac3vZ1mFpaySXTg5yblR6Z1mfYxy1NBWFqPGiOXAHwufS0o7G7mSGUpYrlK/s72-c/Invent+Your+Own+Computer+Games+with+Python,+2nd+Edition.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-7075924419324181656</id><published>2013-11-13T17:32:00.000-08:00</published><updated>2013-11-13T17:32:35.628-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Tips To Help You Master Programming Faster</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhAS7slP0Ef2xTHJuDdrlvhRhYRGB7u51nmAvHZJoHxATbURW-_l9k89QDvCRXKAurTqN8F5b4rfuc_cgWUZ7cwPj6v7sHGc-HvgQiQkV0DY33GlZsZlxlxU2Oxa1I8vmInzFhQcw84yzv/s1600/Tips+To+Help+You+Master+Programming+Faster.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;131&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhAS7slP0Ef2xTHJuDdrlvhRhYRGB7u51nmAvHZJoHxATbURW-_l9k89QDvCRXKAurTqN8F5b4rfuc_cgWUZ7cwPj6v7sHGc-HvgQiQkV0DY33GlZsZlxlxU2Oxa1I8vmInzFhQcw84yzv/s200/Tips+To+Help+You+Master+Programming+Faster.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Master programming quickly and become an expert.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
A lot of you have passion for computers but not a thorough understanding for them, some of you also want to become great coders. I saw this post on the web and I&#39;d like to share it on my blog. I know it will be of great help to you. Let&#39;s get started:&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Saying 1 : &lt;i&gt;10,000 hours&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
There is a saying that it takes 10,000 hours of doing something to master it.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
So, to master programming, it might take you 10,000 hours of being actively coding or thinking about coding. That translates to a consistent effort spread out over a number of years.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Saying 2 : &lt;i&gt;No Speed Limit&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div&gt;
In that post, Derek Sivers claims that a talented and generous guy named Kimo Williams taught him 2 years worth of music theory in five lessons. You have been learning to program for 2 years, and despite the fact that you&#39;ve made great progress, your process might be slow and inefficient.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
You did not have a Kimo Williams. But now that I know a bit, I&#39;ll try and emulate him and help you learn faster by sharing this post.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
The Tips&lt;/h4&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Get Started :&amp;nbsp;&lt;/b&gt;Do not feel bad that you are not an expert programmer yet. In 10,000 hours, you will be. All you need to do is start. Dedicate some time each day or week to checking things off this list. You can take as long as you want or move as fast as you want. If you&#39;ve decided to become a great programmer, you&#39;ve already accomplished the hardest part (&lt;i&gt;planting the seed&lt;/i&gt;). Now you just have to add time and your skills will blossom.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Why Worry :&lt;/b&gt;&amp;nbsp;Do not be intimated by how much you don&#39;t understand. Computers are still largely magic. There are endless topics in computer science and endless terms that you won&#39;t understand. But if you stick with it, eventually almost everything will be demystified. So don&#39;t waste time or get stressed worrying about what you don&#39;t know. It will come, trust me. Remember, every great programmer at one time had &lt;b&gt;&lt;i&gt;no idea&lt;/i&gt;&lt;/b&gt; what assembly was, or a compiler, or a pointer, or a class, or a closure, or a transistor. Many of them still don&#39;t! That&#39;s part of the fun of this subject, you&#39;ll always be learning.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Read books :&lt;/b&gt; I spent a few hundred dollars on programming books. I bought like 20 of them because I had no idea where to begin. I felt guilty spending so much money on books back then. Looking back, it was worth it hundreds of times over. You will read and learn more from a good $30 paperback book than dozens of free blogs.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Get Mentors :&lt;/b&gt;&amp;nbsp;I create websites for small businesses. Sometimes my clients would want something I didn&#39;t know how to do, simple things back then like forms. I used to search Google for the answers, and if I couldn&#39;t find them, I&#39;d panic! Don&#39;t panic. When you get in over your head, ping mentors. They don&#39;t mind, trust me. Something that you&#39;ll spend 5 hours panicking to learn will take them 2 minutes to explain to you.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Object Oriented&lt;/b&gt;&amp;nbsp;: This is the &quot;&lt;i&gt;language&lt;/i&gt;&quot; the world codes in. Just as businessmen communicate primarily in English, coders communicate primarily in Object Oriented terms. Terms like classes and instances and inheritance. They were completely, completely, completely foreign and scary to everyone. They&#39;d make you sick to your stomach. Get and read a good book, and slowly practice the techniques, and see how you will totally get it. Soon, you can communicate and work with other programmers.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
Here are soon techniques to make your programming studies faster. Stay updated for the &lt;i&gt;Part 2&lt;/i&gt; of this post. Thank you and remember, you too can be a great coder.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/7075924419324181656/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/11/tips-to-help-you-master-programming.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/7075924419324181656'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/7075924419324181656'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/11/tips-to-help-you-master-programming.html' title='Tips To Help You Master Programming Faster'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhAS7slP0Ef2xTHJuDdrlvhRhYRGB7u51nmAvHZJoHxATbURW-_l9k89QDvCRXKAurTqN8F5b4rfuc_cgWUZ7cwPj6v7sHGc-HvgQiQkV0DY33GlZsZlxlxU2Oxa1I8vmInzFhQcw84yzv/s72-c/Tips+To+Help+You+Master+Programming+Faster.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-2762978507228680041</id><published>2013-11-09T19:08:00.001-08:00</published><updated>2013-11-09T19:10:02.067-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming Books"/><title type='text'>Making Games with Python &amp; Pygame</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSQRUayYazs6istn0OOnXZReJtd4iyYyaI6cem20V2Xp1WSC9j4bP5pvL2G3OBXrjgQueuRwxyBDp-GVsXeEyyy-GJi1e5L9NswRKfZvwK3owt8ZGyhxYBV_Wi85R_V7RG29iJwqxLu4SO/s1600/Making+Games+with+Python+&amp;amp;+Pygame.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSQRUayYazs6istn0OOnXZReJtd4iyYyaI6cem20V2Xp1WSC9j4bP5pvL2G3OBXrjgQueuRwxyBDp-GVsXeEyyy-GJi1e5L9NswRKfZvwK3owt8ZGyhxYBV_Wi85R_V7RG29iJwqxLu4SO/s200/Making+Games+with+Python+&amp;amp;+Pygame.jpg&quot; width=&quot;160&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6-SKVsm4U39jwT8uyV902FwxeZUD8ds4lKq5A6oeLjnVRSUzZ99qBd3eO3-_K17CVVWtQqNl7yfgGeRcpI4SDRWkfU6JIwFuV0VVWfCK0P3XdlrGbEN5BG3jgLO33Y2X3FXhgixc-hlp8/s1600/Making+Games+with+Python+%2526+Pygame+1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6-SKVsm4U39jwT8uyV902FwxeZUD8ds4lKq5A6oeLjnVRSUzZ99qBd3eO3-_K17CVVWtQqNl7yfgGeRcpI4SDRWkfU6JIwFuV0VVWfCK0P3XdlrGbEN5BG3jgLO33Y2X3FXhgixc-hlp8/s200/Making+Games+with+Python+%2526+Pygame+1.jpg&quot; width=&quot;160&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;Written to be understandable by kids as young as 10 to 12 years old.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Making Games with Python &amp;amp; Pygame is a programming book that covers the Pygame game library for the Python programming language. Each chapter gives you the complete source code for a new game and teaches the programming concepts from these examples. This book was written to be understandable by kids as young as 10 to 12 years old, although it is great for anyone of any age who has some familiarity with Python.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;User Review&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;The code in the book is very easy to understand and follow.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;All in all, &quot;Making Games with Python and Pygame&quot; is a great book for anyone wanting to begin making their own games.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #666666;&quot;&gt;I would highly recommend this book and have already recommended it to friends interested in programming.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
About the Author&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Albert Sweigart (but you can call him Al), is a software developer in San Francisco, California who enjoys bicycling, volunteering, haunting coffee shops, and making useful software. He is originally from Houston, Texas. He finally put his University of Texas at Austin computer science degree in a frame. He is an atheist, a cat person, and fears that he is losing brain cells over time. He laughs out loud when watching park squirrels, which makes people think he’s a simpleton.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://app.box.com/s/ojzv1lz665r2uokkjftw&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZcszBkA7iQmPcNIL2oGN3DEVJ5hvcGl0YiwFYmPrfSUNYtEd0YA8b3rPtMRp9zxMH_Oe05OEqJ6gXy15STttBHV5NGM9abhdXLSaX5Y0FfowV6sPkSfS8bUkuYf5Fkj2vV-xUL5qZo9e8/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/2762978507228680041/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/11/making-games-with-python-pygame.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/2762978507228680041'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/2762978507228680041'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/11/making-games-with-python-pygame.html' title='Making Games with Python &amp; Pygame'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSQRUayYazs6istn0OOnXZReJtd4iyYyaI6cem20V2Xp1WSC9j4bP5pvL2G3OBXrjgQueuRwxyBDp-GVsXeEyyy-GJi1e5L9NswRKfZvwK3owt8ZGyhxYBV_Wi85R_V7RG29iJwqxLu4SO/s72-c/Making+Games+with+Python+&amp;+Pygame.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-7924805456193322930</id><published>2013-11-09T18:35:00.002-08:00</published><updated>2013-11-09T18:35:36.402-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Books"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming Books"/><title type='text'>Hacking Secret Ciphers with Python</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf7vxZoTbwm159Kz2RjCa_C4_zzCVcTC9Y0jLLAuu4tvFrncdsOBbipHmPtWlQQ_tM6_9N9f8ivutlvXkSpvYFo-grliLHudYO18Ibn3wGmd5gcC9GChNErm2eeiduNQSJGhJj4F8Q-oib/s1600/hacking+secret+clipers.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf7vxZoTbwm159Kz2RjCa_C4_zzCVcTC9Y0jLLAuu4tvFrncdsOBbipHmPtWlQQ_tM6_9N9f8ivutlvXkSpvYFo-grliLHudYO18Ibn3wGmd5gcC9GChNErm2eeiduNQSJGhJj4F8Q-oib/s200/hacking+secret+clipers.jpg&quot; width=&quot;160&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxaDTMvQt6LM_N3896cfVCEnjVkmHOkp50-7zLePRZ01OSbPHxhxr52epudzrczY01pquykxTNpwzfn26pewuCkyeYPbZOpHyi_227Pa0nyksq9mS3SIymMY252Rebe4TGtvNqTqL8nQhf/s1600/hacking+secret+clipers+1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxaDTMvQt6LM_N3896cfVCEnjVkmHOkp50-7zLePRZ01OSbPHxhxr52epudzrczY01pquykxTNpwzfn26pewuCkyeYPbZOpHyi_227Pa0nyksq9mS3SIymMY252Rebe4TGtvNqTqL8nQhf/s200/hacking+secret+clipers+1.jpg&quot; width=&quot;160&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;A beginner&#39;s guide to cryptography and computer programming with Python&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that can break the encrypted messages from these ciphers. Unfortunately, the programs in this book won’t get the reader in trouble with the law (or rather, fortunately) but it is a guide on the basics of both cryptography and the Python programming language. Instead of presenting a dull laundry list of concepts, this book provides the source code to several fun programming projects for adults and young adults.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;User Review&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;This is an excellent Python book that teaches the language through fascinating cryptographic algorithms.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;This is a wonderful book both for learning Python and for some cryptography basics. I can&#39;t recommend this more. I would suggest this to anyone regardless of programming experience.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;I am learning Python and basic ciphers and this fit my needs to a tee.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
About the Author&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Albert Sweigart (but you can call him Al), is a software developer in San Francisco, California. He is originally from Houston, Texas. He laughs out loud when watching park squirrels, which makes people think he’s a simpleton. His previous books are &quot;Invent Your Own Computer Games with Python&quot; and &quot;Making Games with Python &amp;amp; Pygame&quot;.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://app.box.com/s/xsew56eudg6ylglic7lb&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6YEUDyv8qhkzMUbfijKUEKlsSKtQ4Wk2hQrpsNrYKgnrUIJXgMoDeKhflbaVEuwQ7TTho8B4qjqJUcnbZF2g9s1ERQsbgs_EzpPJSkamaOPNFt_H3WGu_bmITNfY4CtVx2yxqi4RxA80Y/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/7924805456193322930/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/11/hacking-secret-ciphers-with-python.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/7924805456193322930'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/7924805456193322930'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/11/hacking-secret-ciphers-with-python.html' title='Hacking Secret Ciphers with Python'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf7vxZoTbwm159Kz2RjCa_C4_zzCVcTC9Y0jLLAuu4tvFrncdsOBbipHmPtWlQQ_tM6_9N9f8ivutlvXkSpvYFo-grliLHudYO18Ibn3wGmd5gcC9GChNErm2eeiduNQSJGhJj4F8Q-oib/s72-c/hacking+secret+clipers.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-4228683923853717176</id><published>2013-11-08T17:56:00.000-08:00</published><updated>2013-11-09T18:34:00.734-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><title type='text'>19 Deadly Sins of Software Security</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrM4gJiDm9D0pdZC9bCP8yzij8VX8uq3ea5A24Ye1wDU5WkB0B6Z1_v0YnEW0xsYU_u4yxsZUmQtRmkRew1T8cAiZpCDU4A-r3sWsFyfghYJ9OCsPihcdlIS4qAscyuMg7CFow_p-YQGPt/s1600/19+deadly+sins+of+software+security+programming+flaws+and+how+to+fix+them.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrM4gJiDm9D0pdZC9bCP8yzij8VX8uq3ea5A24Ye1wDU5WkB0B6Z1_v0YnEW0xsYU_u4yxsZUmQtRmkRew1T8cAiZpCDU4A-r3sWsFyfghYJ9OCsPihcdlIS4qAscyuMg7CFow_p-YQGPt/s200/19+deadly+sins+of+software+security+programming+flaws+and+how+to+fix+them.jpg&quot; width=&quot;148&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Programming Flaws and How to Fix Them&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man who uncovered the 19 deadly programming sins to write this much-needed book.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Coverage includes:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Windows, UNIX, Linux, and Mac OS X&lt;/li&gt;
&lt;li&gt;C, C++, C#, Java, PHP, Perl, and Visual Basic&lt;/li&gt;
&lt;li&gt;Web, small client, and smart-client applications&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;User Review&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;I highly recommend this book to software developers and application support.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;What you read in these pages go into more detail about each of those issues, but in a very concise, practical, no-nonsense fashion.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;The book gives a great overview of software security issues yet at the same time provides granular examples and solutions that can be readily implemented.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
About the Authors&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Michael Howard&lt;/b&gt; is a senior security program manager in the security engineering group at Microsoft Corporation, and a co-author of the award-winning Writing Secure Code. He is a co-author of&lt;i&gt; Basic Training in IEEE Security and Privacy Magazine&lt;/i&gt; and a co-author of the &lt;i&gt;National Cyber Security Task Force “Processes to produce Secure Software”&lt;/i&gt; document for the Department of Homeland Security. As an author of the Security Development Life cycle, Michael spends most of his time is spent defining and enforcing security best practice and software development process improvements to deliver more secure software to normal humans.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;David LeBlanc, Ph.D&lt;/b&gt;., is currently Chief Software Architect for Webroot Software. Prior to joining Webroot, he served as security architect for Microsoft&#39;s Office division, was a founding member of the Trustworthy Computing Initiative, and worked as a white-hat hacker in Microsoft&#39;s network security group. David is also co-author of&lt;i&gt; Writing Secure Code&lt;/i&gt; and &lt;i&gt;Assessing Network Security&lt;/i&gt;, as well as numerous articles. On good days, he&#39;ll be found riding the trails on his horse with his wife, Jennifer.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;John Viega&lt;/b&gt; discovered the 19 deadly programming flaws that received such press and media attention, and this book is based on his discovery. He is the Founder and Chief Scientist of Secure Software (www.securesoftware.com), is a well-known security expert, and co-author of &lt;i&gt;Building Secure Software (Addison-Wesley)&lt;/i&gt;, &lt;i&gt;Network Security with&amp;nbsp;Open SSL&amp;nbsp;(O&#39;Reilly)&lt;/i&gt; an Adjunct Professor of Computer Science at Virginia Tech (Blacksburg, VA) and Senior Policy Researcher at the Cyberspace Policy Institute, and he serves on the Technical Advisory Board for the Open Web Applications Security Project. He also founded a Washington, D.C. area security interest group that conducts monthly lectures presented by leading experts in the field. John is responsible for numerous software security tools, and is the original author of Mailman, the GNU mailing list manager. He holds a B.A. and M.S. in Computer Science from the University of Virginia. He is the author or co-author of nearly 80 technical publications, including numerous referred research papers and trade articles. He is co-author of &lt;i&gt;Building Secure Software&lt;/i&gt;, &lt;i&gt;Network Security and Cryptography with&amp;nbsp;Open SSL&lt;/i&gt;&amp;nbsp;and &lt;i&gt;The Secure Programming Cookbook for C and C++.&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/9hlpzzioejl5&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsrNr-R5a4bd-RRDdp0aa3a21jFHQ9LA2Nh_hBXc_XGr0KOZKQwS-Ij5FxaiSPe4308pth_mhGvLEH-4blO_fcEcUKViimxPtH00yDTRI8FufkR5a-qAKDG1f4O-EPHkYIJHqDIuUwL2Px/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/4228683923853717176/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/19-deadly-sins-of-software-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/4228683923853717176'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/4228683923853717176'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/19-deadly-sins-of-software-security.html' title='19 Deadly Sins of Software Security'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrM4gJiDm9D0pdZC9bCP8yzij8VX8uq3ea5A24Ye1wDU5WkB0B6Z1_v0YnEW0xsYU_u4yxsZUmQtRmkRew1T8cAiZpCDU4A-r3sWsFyfghYJ9OCsPihcdlIS4qAscyuMg7CFow_p-YQGPt/s72-c/19+deadly+sins+of+software+security+programming+flaws+and+how+to+fix+them.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-5886535077968291596</id><published>2013-11-08T04:43:00.000-08:00</published><updated>2013-11-08T04:43:01.611-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>How To Crack or Reset BIOS Password.</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8Pz3hMUfZYTJERcUbekENlMoEYh4nRz28KiJyEMLDYCbEydHYiejM_E4-hH-l0RBT-bwos8EVsHuvKfVyIGVoIeTLn_nv2tWbGz_OtBOLrBAmpMNQnSBfF0QCSYlorKY9InszMog_O_dD/s1600/bios.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8Pz3hMUfZYTJERcUbekENlMoEYh4nRz28KiJyEMLDYCbEydHYiejM_E4-hH-l0RBT-bwos8EVsHuvKfVyIGVoIeTLn_nv2tWbGz_OtBOLrBAmpMNQnSBfF0QCSYlorKY9InszMog_O_dD/s200/bios.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
The BIOS software is built into the PC, and is the first code run by a PC when powered on (&#39;boot firmware&#39;). The primary function of the BIOS is to set up the hardware and load and start a boot loader. When the PC starts up, the first job for the BIOS is to initialize and identify system devices such as the video display card, keyboard and mouse, hard disk drive, optical disc drive and other hardware. The BIOS then locates software held on a peripheral device (designated as a &#39;boot device&#39;), such as a hard disk or a CD/DVD, and loads and executes that software, giving it control of the PC. This process is known as booting, or booting up, which is short for bootstrapping.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Bios password is usually used to protect the user&#39;s BIOS settings on the computer. If you want to reset the password on the BIOS does not need to bother to connect bateray CMOSnya, with a little trick on the Dos you can reset the BIOS password on it in 2 ways:&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;1. Clear CMOS&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
This way I consider the most ancient and most easy to break down the password on the BIOS. The steps are easy, first open the casing cover computer CPU. Then find the bios battery that looks something like the battery just a little more big clock. After the meet and consider the area around the battery there is usually a jumper with 3 pins, 2 pins and 1 pin not connected.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Suppose the three pins with the code 1 - 2 - 3. Connector that connects the initial position usually is 2-3. To reset the bios do I move the position of the plug that connects pins 2-3 to position 1-2 for about 5 seconds. Then plug it back into the starting position (2-3). Try restarting the computer back on, secured the bios password is gone.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
If the above looks complicated, is easy to clear cmos by unplugging the BIOS battery and then put it back. But with the consequences of removing the label is the warranty on the battery BIOS.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;2. Through DOS&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
First out of the windows with me restart your computer, start the computer in MS-DOS mode, use the option &quot;Command Prompt Only&quot;&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
At c: prompt, type: DEBUG&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
press enter. You will see the sign (-) at the DEBUG prompt, then type:&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
o 70 2e&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
at the DEBUG prompt will be displayed as-o 70 2e.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
press enter and type:&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
-O 71 ff&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
press enter, the last type:&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Q&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
hit enter, then you will get out of the DEBUG prompt and return to the C:&amp;gt; prompt.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Now restart your computer, and see the results.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/5886535077968291596/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/how-to-crack-or-reset-bios-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5886535077968291596'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5886535077968291596'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/how-to-crack-or-reset-bios-password.html' title='How To Crack or Reset BIOS Password.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8Pz3hMUfZYTJERcUbekENlMoEYh4nRz28KiJyEMLDYCbEydHYiejM_E4-hH-l0RBT-bwos8EVsHuvKfVyIGVoIeTLn_nv2tWbGz_OtBOLrBAmpMNQnSBfF0QCSYlorKY9InszMog_O_dD/s72-c/bios.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-1035670894715095658</id><published>2013-11-08T04:41:00.000-08:00</published><updated>2013-11-08T04:41:51.652-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Books"/><title type='text'>Metasploit</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj16pGW_Eu45Fhav4xbsOA1p73IgPGOmOg6MCCk7H4YeQexe4oIemFfT3cCnNhlrxQ9Q1urudKlz9UQfL7qtSRXoDP9JEE6pRTt9D74R43kqxLrDqBINU8N_jWYB6UT_oV1c_QP-evGH7yN/s1600/metasploit+1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj16pGW_Eu45Fhav4xbsOA1p73IgPGOmOg6MCCk7H4YeQexe4oIemFfT3cCnNhlrxQ9Q1urudKlz9UQfL7qtSRXoDP9JEE6pRTt9D74R43kqxLrDqBINU8N_jWYB6UT_oV1c_QP-evGH7yN/s200/metasploit+1.jpg&quot; width=&quot;151&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6kGEpPsxZ_ficyqd5G2v1xgqBKoiH2XIqzqgb8UGusuRuX5ts5i2i01jTCawrvxqxyfh8VmwjYztAvtFskc1qpOJjYaDioj8Hf0TtFRDWITS7puWJ05eVQsHBl0xPv9HuzEVe_jQwZ8Kh/s1600/metasploit+2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6kGEpPsxZ_ficyqd5G2v1xgqBKoiH2XIqzqgb8UGusuRuX5ts5i2i01jTCawrvxqxyfh8VmwjYztAvtFskc1qpOJjYaDioj8Hf0TtFRDWITS7puWJ05eVQsHBl0xPv9HuzEVe_jQwZ8Kh/s200/metasploit+2.jpg&quot; width=&quot;150&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;The Penetration Tester&#39;s Guide&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999; font-family: inherit;&quot;&gt;&lt;i&gt;User Review&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999; font-family: inherit;&quot;&gt;&quot;The best guide to the Metasploit Framework.&quot; &lt;b&gt;—HD Moore, Founder of the Metasploit Project&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester&#39;s Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Once you&#39;ve built your foundation for penetration testing, you&#39;ll learn the Framework&#39;s conventions, interfaces, and module system as you launch simulated attacks. You&#39;ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Learn how to:&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Find and exploit unmaintained, misconfigured, and unpatched systems&lt;/li&gt;
&lt;li&gt;Perform reconnaissance and find valuable information about your target&lt;/li&gt;
&lt;li&gt;Bypass anti-virus technologies and circumvent security controls&lt;/li&gt;
&lt;li&gt;Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery&lt;/li&gt;
&lt;li&gt;Use the Meterpreter shell to launch further attacks from inside the network&lt;/li&gt;
&lt;li&gt;Harness standalone Metasploit utilities, third-party tools, and plug-ins&lt;/li&gt;
&lt;li&gt;Learn how to write your own Meterpreter post exploitation modules and scripts&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
You&#39;ll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else&#39;s to the test, Metasploit: The Penetration Tester&#39;s Guide will take you there and beyond&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/r0lpjkllybbf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigp70UHTyPvGhcOgrnY113v6JYWoO1M7zm4N_k9WDHhWn4fOiNam9bi9E5ZMy-CiIHD51Yofwx0cS6P9HWJ8rZOtJbKHaw2dw0XPvFTqq8IXjamMxylyjFJ3HIQb9hf2XGaBW6MMXY0lfE/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/1035670894715095658/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/metasploit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/1035670894715095658'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/1035670894715095658'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/metasploit.html' title='Metasploit'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj16pGW_Eu45Fhav4xbsOA1p73IgPGOmOg6MCCk7H4YeQexe4oIemFfT3cCnNhlrxQ9Q1urudKlz9UQfL7qtSRXoDP9JEE6pRTt9D74R43kqxLrDqBINU8N_jWYB6UT_oV1c_QP-evGH7yN/s72-c/metasploit+1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-8617490448937514138</id><published>2013-09-26T19:03:00.000-07:00</published><updated>2013-11-08T04:39:06.016-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><title type='text'>Gray Hat Hacking &quot;The Ethical Hackers Handbook&quot;</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ_UqmAiti3ly1hRRq3hI1VqWvkwpo2dh2n0uynoQwiyg4clB6s5BUOIzAwozyEgNmeaj2nubxpn_LhRrjA-NZbMHQKPN-_oCRAsrRIHv7wcspjL-96VVNfRQ60pnCTPqi3GBhpLPj1xwr/s1600/Grey+Hat+Hacking.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ_UqmAiti3ly1hRRq3hI1VqWvkwpo2dh2n0uynoQwiyg4clB6s5BUOIzAwozyEgNmeaj2nubxpn_LhRrjA-NZbMHQKPN-_oCRAsrRIHv7wcspjL-96VVNfRQ60pnCTPqi3GBhpLPj1xwr/s200/Grey+Hat+Hacking.jpg&quot; width=&quot;160&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;The Ethical Hackers Handbook, 3rd Edition&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, &lt;i&gt;Gray Hat Hacking: The Ethical Hacker&#39;s Handbook&lt;/i&gt;, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&amp;nbsp;&lt;ul&gt;
&lt;li&gt;Develop and launch exploits using BackTrack and Metasploit&lt;/li&gt;
&lt;li&gt;Employ physical, social engineering, and insider attack techniques&lt;/li&gt;
&lt;li&gt;Build Perl, Python, and Ruby scripts that initiate stack buffer overflows&lt;/li&gt;
&lt;li&gt;Understand and prevent malicious content in Adobe, Office, and multimedia files&lt;/li&gt;
&lt;li&gt;Detect and block client-side, Web server, VoIP, and SCADA attacks&lt;/li&gt;
&lt;li&gt;Reverse engineer, fuzz, and decompile Windows and Linux software&lt;/li&gt;
&lt;li&gt;Develop SQL injection, cross-site scripting, and forgery exploits&lt;/li&gt;
&lt;li&gt;Trap malware and rootkits using honeypots and SandBoxes&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;User Review&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;This book was perfect for my class. I was able to find what I needed to help me through it.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;Let me start by saying that my background is in enterprise configuration, system configuration and trouble-shooting, and information security policy. With that said I would heartily recommend that anyone working in the IT field would benefit from the lessons and skills which can be learned from this epitome of concise writing. Thank you for a wonderful read full of things which can never be learned to well&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;About the Author&lt;/u&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Allen Harper&lt;/b&gt;, CISSP, a retired Marine Corps Major, is the president and founder of N2NetSecurity, Inc., and a faculty member for the Institute for Applied Network Security, He has worked as a security consultant for the Internal Revenue Service and for Logical Security, LLC.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Shon Harris&lt;/b&gt;, CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor, and a bestselling author. She was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Jonathan Ness&lt;/b&gt; is a software security engineer at Microsoft. He is a member of an Air National Guard unit where he leads network penetration tests against military facilities across the country and helps define the information warfare aggressor mission for the Air Force.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Chris Eagle &lt;/b&gt;is a senior lecturer in the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California. A computer engineer/scientist for 25 years, his research interests include computer network attack and defense, computer forensics, and reverse/anti-reverse engineering. He can often be found teaching at Black Hat or spending late nights working on capture the flag at Defcon&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Gideon J. Lenkey&lt;/b&gt;, CISSP co-founded Ra Security Systems, a network security monitoring and consultancy. He has provided advanced training to the FBI and is the sitting president of the FBI&#39;s InfraGard chapter in New Jersey.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Terron Williams&lt;/b&gt;, NSA IAM-IEM, CEH, CSSLP, works for Elster Electricity as a Senior Test Engineer with his primary focus on Smart Grid&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/3tvv6gteuv2s&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqdc4NfEb3yx-7QUaEnYidazCYlHRMl7iGIoFC-W99MLj-bwo43umo8c-SZz1MgxIIIf6abWIyp4lqejsYCAKhan9e-dEEarGd7rkFEI1SbNk2C2j8_EnfNJH581vAUySjIEc9ZN7DpZwG/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i style=&quot;background-color: rgba(242, 242, 242, 0.2); font-family: Verdana, Geneva, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 22px;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;Noitce :&lt;/b&gt;&amp;nbsp;&lt;/span&gt;Please leave a comment below telling us what you think about this book.&lt;/i&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/8617490448937514138/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/gray-hat-hacking-ethical-hackers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/8617490448937514138'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/8617490448937514138'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/gray-hat-hacking-ethical-hackers.html' title='Gray Hat Hacking &quot;The Ethical Hackers Handbook&quot;'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ_UqmAiti3ly1hRRq3hI1VqWvkwpo2dh2n0uynoQwiyg4clB6s5BUOIzAwozyEgNmeaj2nubxpn_LhRrjA-NZbMHQKPN-_oCRAsrRIHv7wcspjL-96VVNfRQ60pnCTPqi3GBhpLPj1xwr/s72-c/Grey+Hat+Hacking.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-2105125898511863765</id><published>2013-09-26T18:05:00.000-07:00</published><updated>2013-09-26T18:08:59.856-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming Books"/><title type='text'>Python Programming for the Absolute Beginner</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIxLZi50TJ3bTrGBWX0r10D0dPwdSH04u6uoQoQIIYZKrugu2PYnHiDtoPBhh2axaZ-4TtqDI8C73Ptv3cnp9sKykkvxXT1eg8-vi4PP7RHM6FsJyY458cT7E7gt-2gKpUm_g930LWENrO/s1600/Python+Programming+for+the+Absolute+Beginner,+3rd+Edition.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIxLZi50TJ3bTrGBWX0r10D0dPwdSH04u6uoQoQIIYZKrugu2PYnHiDtoPBhh2axaZ-4TtqDI8C73Ptv3cnp9sKykkvxXT1eg8-vi4PP7RHM6FsJyY458cT7E7gt-2gKpUm_g930LWENrO/s200/Python+Programming+for+the+Absolute+Beginner,+3rd+Edition.jpg&quot; width=&quot;161&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Python Programming for the Absolute Beginner, 3rd Edition&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
If you are new to programming with Python and are looking for a solid introduction, this is the book for you. Developed by computer science instructors, books in the &quot;for the absolute beginner&quot; series teach the principles of programming through simple game creation. You will acquire the skills that you need for practical Python programming applications and will learn how these skills can be put to use in real-world scenarios. Throughout the chapters, you will find code samples that illustrate concepts presented. At the end of each chapter, you will find a complete game that demonstrates the key ideas in the chapter, a summary of the chapter, and a set of challenges that tests your new found knowledge. By the time you finish this book, you&#39;ll be well versed in Python and be able to apply the basic programming principles you&#39;ve learned to the next programming language you tackle.&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;User Review&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;I HIGHLY recommend this book for anyone beginning to learn what programming is all about.&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Very easy read and very well written.&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Most of the code examples are focused on creating games, which makes it even more fun.&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;u&gt;About The Author&lt;/u&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Michael Dawson&lt;/b&gt; has worked as both a programmer and a computer game designer and producer. In addition to real world game industry experience, Mike earned his bachelor&#39;s degree in Computer Science from the University of Southern California. Currently, he teaches game programming in the Game Production Department of the Los Angeles Film School. Mike has also taught game programming to students through UCLA Extension and The Digital Media Academy at Stanford. He&#39;s the author of three other books: Beginning C++ through Game Programming, Guide to Programming with Python, and C++&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Projects:&lt;/b&gt; Programming with Text-Based Games. You can visit his website at www.programgames.com to learn more or to get support for any of his books.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/6eo01ig8fci2&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWYJENqMZ65qN0f2Xv8SWV52d7he7n_OKjTaSIZgdIxqnzSNCz6ofxDSJNCsgq5coI89Z8ovu2DRU0ckeGdxXeYIsrRf-BqgWx0ThKu89ROFZoy7pzjFGjf3ehyiIuGjhnnBhTFyXrC24j/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;Noitce :&lt;/b&gt; &lt;/span&gt;Please leave a comment below telling us what you think about this book.&lt;/i&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/2105125898511863765/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/python-programming-for-absolute-beginner.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/2105125898511863765'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/2105125898511863765'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/python-programming-for-absolute-beginner.html' title='Python Programming for the Absolute Beginner'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIxLZi50TJ3bTrGBWX0r10D0dPwdSH04u6uoQoQIIYZKrugu2PYnHiDtoPBhh2axaZ-4TtqDI8C73Ptv3cnp9sKykkvxXT1eg8-vi4PP7RHM6FsJyY458cT7E7gt-2gKpUm_g930LWENrO/s72-c/Python+Programming+for+the+Absolute+Beginner,+3rd+Edition.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-5982062857818896810</id><published>2013-09-25T14:15:00.001-07:00</published><updated>2013-09-26T19:01:18.007-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Books"/><title type='text'>Social Engineering: The Art of Human Hacking</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnLdlULplvPbdFOpQKEhZT654DORCFunEQdvsaok9c99TJSOSEl1iqQRKFkqNPPp9xLjcY4HQNPcO0rSHCWeUqPjm3Tx8dDtypr_y_xlyVX0LlhtFCxg5diSCtZdEs0BlRQD-PbU72t4gJ/s1600/Social+Engineering+The+Art+of+Human+Hacking.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnLdlULplvPbdFOpQKEhZT654DORCFunEQdvsaok9c99TJSOSEl1iqQRKFkqNPPp9xLjcY4HQNPcO0rSHCWeUqPjm3Tx8dDtypr_y_xlyVX0LlhtFCxg5diSCtZdEs0BlRQD-PbU72t4gJ/s200/Social+Engineering+The+Art+of+Human+Hacking.jpg&quot; width=&quot;133&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
The Art of Human Hacking&lt;/div&gt;
&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
The first book to reveal and dissect the technical aspect of many social engineering maneuvers&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Kevin Mitnick&lt;/b&gt;—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Examines social engineering, the science of influencing a target to perform a desired task or divulge information&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Reveals vital steps for preventing social engineering threats&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;User Review&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;Security professionals: If you read only one book in 2011, make it Social Engineering: The Art of Human Hacking by Chris Hadnagy.&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;This book is excellent, well written and organized in a natural flow.&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;This book will help you get started!&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
From the Author: Defining Neuro-Linguistic Hacking (NLH)&amp;nbsp;&lt;/h4&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
NLH is a combination of the use of key parts of neuro-lingusitic programming, the functionality of microexpressions, body language, gestures and blend it all together to understand how to “hack” the human infrastructure. Let’s take a closer at each to see how it applies.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Neuro-Lingusitic Programming (NLP): NLP is a controversial approach to psychotherapy and organizational change based on &quot;a model of interpersonal communication chiefly concerned with the relationship between successful patterns of behavior and the subjective experiences underlying them&quot; and &quot;a system of alternative therapy based on this which seeks to educate people in self-awareness and effective communication, and to change their patterns of mental and emotional behavior&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Neuro: This points to our nervous system which we process our five senses:&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Visual&lt;/li&gt;
&lt;li&gt;Auditory&lt;/li&gt;
&lt;li&gt;Kinesthetic&lt;/li&gt;
&lt;li&gt;Smell&lt;/li&gt;
&lt;li&gt;Taste&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Linguistic: This points to how we use language and other nonverbal communication systems through which our neural representations are coded, ordered and given meaning. This can include things like:&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Pictures&lt;/li&gt;
&lt;li&gt;Sounds&lt;/li&gt;
&lt;li&gt;Feelings&lt;/li&gt;
&lt;li&gt;Tastes&lt;/li&gt;
&lt;li&gt;Smells&lt;/li&gt;
&lt;li&gt;Words&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Programming: This is our ability to discover and utilize the programs that we run in our neurological systems to achieve our specific and desired outcomes.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In short, NLP is how to use the language of the mind to consistently achieve, modify and alter our specific and desired outcomes (or that of a target).&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Microexpressions are the involuntary muscular reactions to emotions we feel. As the brain processes emotions it causes nerves to constrict certain muscle groups in the face. Those reactions can last from 1/25th of a second to 1 second and reveal a person’s true emotions.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Much study has been done on microexpressions as well as what is being labeled as subtle microexpressions. A subtle microexpression is an important part of NLH training as a social engineer as many people will display subtle hints of these expressions and give you clues as to their feelings.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/fjhj8rhohnci&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbSKRaZNCrEMmJTLW2aTwaGkeUlXtMvTJNign73EN-yHB3thyphenhyphen_oi6QUAm1o9EZogFqkDIiiqee6tnfoImn53fc2UqG5v65uXIKguLb8NopafBHlxGJGx9Agg-v5RGHbmc47WYTzrxrxuEO/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/5982062857818896810/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/social-engineering-art-of-human-hacking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5982062857818896810'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5982062857818896810'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/social-engineering-art-of-human-hacking.html' title='Social Engineering: The Art of Human Hacking'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnLdlULplvPbdFOpQKEhZT654DORCFunEQdvsaok9c99TJSOSEl1iqQRKFkqNPPp9xLjcY4HQNPcO0rSHCWeUqPjm3Tx8dDtypr_y_xlyVX0LlhtFCxg5diSCtZdEs0BlRQD-PbU72t4gJ/s72-c/Social+Engineering+The+Art+of+Human+Hacking.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-5945313519319707112</id><published>2013-09-23T18:23:00.000-07:00</published><updated>2013-09-26T19:01:02.705-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Penetration Testing"/><title type='text'>BackTrack 5 Wireless Penetration Testing Beginner&#39;s Guide</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieQYK1MhIpNHueKQbzbdPpXG6aAzp7a8v8w-TMPMCLzYkcmUl8NjKWa6eqXcbgK7jKHW1MqQrL_R3bWGQjKJsX3Smrtg22x1BRHj18rM5DifwBWxqESQdl6C3fj4JMV0YShz52fWYmQj8d/s1600/BackTrack+5+Wireless+Penetration+Testing+Beginner&#39;s+Guide.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieQYK1MhIpNHueKQbzbdPpXG6aAzp7a8v8w-TMPMCLzYkcmUl8NjKWa6eqXcbgK7jKHW1MqQrL_R3bWGQjKJsX3Smrtg22x1BRHj18rM5DifwBWxqESQdl6C3fj4JMV0YShz52fWYmQj8d/s200/BackTrack+5+Wireless+Penetration+Testing+Beginner&#39;s+Guide.jpg&quot; width=&quot;161&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Master bleeding edge wireless testing techniques with Backtrack 5&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Written in Packt&#39;s Beginner&#39;s Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks in your lab. Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;User Review&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;An amazing book. This one wastes no time with a long pre-amble or justifying why you&#39;d need to know how to pen-test; it just tells you what you need to know. You&#39;re sniffing wireless traffic right from the start, injecting packets by page 40 or so, and then you&#39;re off spoofing MAC&amp;nbsp;addresses&amp;nbsp; cracking WPA (even shared authentication), and doing man-in-the-middle attacks.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;The structure and build up of the book is very well laid out and easy to follow.&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;Very useful and highly recommended &quot;must have&quot; for anyone new to BT5.&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
About the Author&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;Vivek Ramachandran&lt;/b&gt; is a world renowned security researcher and evangelist. He is the discoverer of the wireless &quot;Caffe Latte Attack&quot; and has delivered presentations in world renowned Information Security conferences such as Defcon and Toorcon in the US. His discoveries and talks have been widely quoted by the International media including - BBC Online, Network World, The Register, Mac World, Computer Online and others.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In 2006, Microsoft declared Vivek as one of the winners of the Microsoft Security Shootout Contest held in India among an estimated 65,000 participants. In 2005, he was awarded a team achievement award by Cisco Systems for his work in the 802.1x and Port Security modules.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
He is well known in the hacking and security community as the founder of SecurityTube.net , a free video based computer security education portal which gets an estimated 100,000 monthly visitors.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Vivek is also an accomplished trainer and travels around the world conducting workshops and training sessions for corporates and students. He holds a degree in B.Tech from IIT Guwahati and acts as an adviser to the computer science department&#39;s Security Lab.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/ynvllmp2r2vb&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhApalUy36UtMDWq5-9nAjieupNm9y3GgxzDa34TikxYj_LBq6XaQZ61iy93-GQToHhYEbbEunz36UnCu1vslNizgWlZaXovkFF3ZlnenB_8EaMgLARWansUGZOde4iF3_Ve8tocVzG4Px8/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/5945313519319707112/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/backtrack-5-wireless-penetration.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5945313519319707112'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5945313519319707112'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/backtrack-5-wireless-penetration.html' title='BackTrack 5 Wireless Penetration Testing Beginner&#39;s Guide'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieQYK1MhIpNHueKQbzbdPpXG6aAzp7a8v8w-TMPMCLzYkcmUl8NjKWa6eqXcbgK7jKHW1MqQrL_R3bWGQjKJsX3Smrtg22x1BRHj18rM5DifwBWxqESQdl6C3fj4JMV0YShz52fWYmQj8d/s72-c/BackTrack+5+Wireless+Penetration+Testing+Beginner&#39;s+Guide.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-8674062377229359973</id><published>2013-09-23T09:25:00.000-07:00</published><updated>2013-09-23T09:28:18.795-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Post Facebook Status Upside Down</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8Y0FRZe8l_q5bmmH6vAiriBC6D073iEcWwp30-9NUQJZK0hbTROXsVr5mqOkY5CQmEeB3mrOY6aFvL45GpTsKmrSMDGWuvpsJNFX8VACDcIbBJC8YBAL27n89Ihp7w0nBdtCaXzb99NsA/s1600/post+facebook+status+upside+down.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8Y0FRZe8l_q5bmmH6vAiriBC6D073iEcWwp30-9NUQJZK0hbTROXsVr5mqOkY5CQmEeB3mrOY6aFvL45GpTsKmrSMDGWuvpsJNFX8VACDcIbBJC8YBAL27n89Ihp7w0nBdtCaXzb99NsA/s320/post+facebook+status+upside+down.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In this trick, I will share with you a simple facebook status trick. If you want to post something creative or something cool as your facebook status then this trick will let you post any facebook status upside down. Basically this is a website which allows you to flip your text. So lets get started.&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
How To Do ?&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ol&gt;
&lt;li&gt;&lt;i&gt;First go to FlipText website by &lt;a href=&quot;http://www.fliptext.org/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Clicking Here&lt;/a&gt;.&amp;nbsp;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Enter you message or text in text area and click on Flip.&amp;nbsp;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Copy the upside down text and paste it in your facebook status or where ever you want to use it.&amp;nbsp;&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;i&gt;Enjoy!&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/8674062377229359973/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/post-facebook-status-upside-down.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/8674062377229359973'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/8674062377229359973'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/post-facebook-status-upside-down.html' title='Post Facebook Status Upside Down'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8Y0FRZe8l_q5bmmH6vAiriBC6D073iEcWwp30-9NUQJZK0hbTROXsVr5mqOkY5CQmEeB3mrOY6aFvL45GpTsKmrSMDGWuvpsJNFX8VACDcIbBJC8YBAL27n89Ihp7w0nBdtCaXzb99NsA/s72-c/post+facebook+status+upside+down.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-5027375275186577580</id><published>2013-09-23T08:42:00.000-07:00</published><updated>2013-09-23T08:42:32.013-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Tricks"/><title type='text'>Hack and Edit Facebook Login Page Using Browser</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisy99WUsY62r5d7g1YCMi_fobDoeUa8mEIBXg61msJ7c4QRetBOOI91X3I6OSvPMZ49SBz8z0vwK8hZxCXNNansbCLP_06L_CeboK4mXBrUQlq0fRI0jUG5up4zcJDmLfYHH8kdr6qQGOB/s320/facebook+login+page.JPG&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In this post, I am going to teach you how to hack and edit the facebook ligin page using your browser.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;First, go to &lt;a href=&quot;http://www.facebook.com/&quot;&gt;Facebook&lt;/a&gt;.&amp;nbsp;It shows the usual login page of Facebook. Now, clear the address from the address bar. Copy and Paste the below code and in your address bar&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
javascript:document.body.contentEditable=&#39;true&#39;; document.designMode=&#39;on&#39;; void 0&lt;/blockquote&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Make sure that javascript: is present at the beginning of the code or else this trick will not work.&lt;/li&gt;
&lt;/ul&gt;
&amp;nbsp;Now press Enter.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifjqYJAtSD456EpATep92UscQEtto69LrEsYTkgW4BY9yuc8YUr5fSBIeVb4ekwXu832vKKVhyphenhyphen_iReCp8gp72F1J2syM1pj4pJXntbHtj5RZ0THDC2Lokyzh8iDRmnsllq0VF3iaNPTWMU/s1600/facebook+javascript-pc-rom.PNG&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifjqYJAtSD456EpATep92UscQEtto69LrEsYTkgW4BY9yuc8YUr5fSBIeVb4ekwXu832vKKVhyphenhyphen_iReCp8gp72F1J2syM1pj4pJXntbHtj5RZ0THDC2Lokyzh8iDRmnsllq0VF3iaNPTWMU/s400/facebook+javascript-pc-rom.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;When you are done with the previous step, you should be able to edit all the content present on the page. You can Edit/Delete content and texts on the page now.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
Don&#39;t forget to leave a comment&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/5027375275186577580/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/hack-and-edit-facebook-login-page-using.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5027375275186577580'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5027375275186577580'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/hack-and-edit-facebook-login-page-using.html' title='Hack and Edit Facebook Login Page Using Browser'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisy99WUsY62r5d7g1YCMi_fobDoeUa8mEIBXg61msJ7c4QRetBOOI91X3I6OSvPMZ49SBz8z0vwK8hZxCXNNansbCLP_06L_CeboK4mXBrUQlq0fRI0jUG5up4zcJDmLfYHH8kdr6qQGOB/s72-c/facebook+login+page.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-8560987071915181681</id><published>2013-09-22T20:58:00.001-07:00</published><updated>2013-09-26T18:08:48.030-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Books"/><category scheme="http://www.blogger.com/atom/ns#" term="Programming Books"/><title type='text'>Violent Python</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhijgFToYd3SmDFaYpuZa_MJpoaSh9BhX5GWKQU5yyxY6JlYcFzel3Cx-Kjr67aFalIph4XVbKb65HrFK3XzCHQ8JmksnQ-_Jx-F-xESIHgVj5amNlO3fAj3rasEOEdmeCPKzLaYJx8fVHQ/s1600/Violent+python.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhijgFToYd3SmDFaYpuZa_MJpoaSh9BhX5GWKQU5yyxY6JlYcFzel3Cx-Kjr67aFalIph4XVbKb65HrFK3XzCHQ8JmksnQ-_Jx-F-xESIHgVj5amNlO3fAj3rasEOEdmeCPKzLaYJx8fVHQ/s200/Violent+python.jpg&quot; width=&quot;161&quot; /&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNxWdWOgQC2DAQcFAtMRxq_ZVRyH6RBvUSzjl7lOP8AWV6LWTyZjQA94H6pJUGHO_V4V1PbAj0q5rg-H-23BuqvnIWSkLwoA9w4xIMwymZDyMieV22Arksp7KjTmWseuZCcU7tXU3Gmi7r/s1600/Violent+python+1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNxWdWOgQC2DAQcFAtMRxq_ZVRyH6RBvUSzjl7lOP8AWV6LWTyZjQA94H6pJUGHO_V4V1PbAj0q5rg-H-23BuqvnIWSkLwoA9w4xIMwymZDyMieV22Arksp7KjTmWseuZCcU7tXU3Gmi7r/s200/Violent+python+1.jpg&quot; width=&quot;161&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker&#39;s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.&lt;/li&gt;
&lt;li&gt;Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.&lt;/li&gt;
&lt;li&gt;Data-mine popular social media websites and evade modern anti-virus.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;User Review&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;The subject is very fun and interesting and if you are just getting started with Python then what a great way to get started than with this book on grey hat hacking.&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;These modifications have helped me truly understand the topics presented rather than trying to knock out the book ASAP.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;It is well written, packed full of useful information, and presents material in an easy to read method.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
About the Author&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
TJ O&#39;Connor is a Department of Defence expert on information security and a US Army paratrooper. While assigned as an assistant professor at the US Military Academy, TJ taught undergraduate courses on forensics, exploitation and information assurance. He twice co-coached the winning team at the National Security Agency&#39;s annual Cyber Defence Exercise and won the National Defence University&#39;s first annual Cyber Challenge. He has served on multiple red teams, including twice on the North east Regional Team for the National Collegiate Cyber Defence Competition.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
TJ holds a Master of Science degree in Computer Science from North Carolina State, a Master of Science degree in Information Security Engineering from the SANS Technical Institute, and a Bachelor of Science degree in Computer Science from the US Military Academy. He has published technical research at USE-NIX workshops, ACM conferences, security conferences, the SANS Reading Room, the Internet Storm Center, the Army Magazine, and the Armed Forces Journal. He holds expert cyber security credentials, including the prestigious GIAC Security Expert (GSE) and Offensive Security Certified Expert (OSCE). TJ is a member of the elite SANS Red and Blue Team Cyber Guardians.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
TJ O&#39;Connor is an active duty Army Major and former faculty member at the United States Military Academy, where he taught courses on forensics, exploitation, and information assurance. He has published research at USE-NIX workshops, ACM Conferences, and spoken at various security conferences, including ShmooCon. He has participated in numerous cyber defence exercises, including winning the National Defence University Cyber Challenge, coaching the winning team at the National Security Agency&#39;s Cyber Defence Exercise and working as a red team member of the North east Regional Collegiate Cyber Defence Competition. He has earned the SANS Certifications GIAC Gold certifications in GCFA, GCIH, GSEC, GCIA, and holds other GIAC certifications.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/ylqaplmtapoa&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1n9v01DrWQCQfZsP-JEEDnTsAF8PA6AbgqWyMub-RL9XlgifXjCsXB23TKOmUGBkbJbJ1QY88-L0xcLAFeUw7fWWHmhRXxdZelgFGG05WgJLXMzsxFWMPq4vt9ii8lpLQefPN5yly14Qh/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/8560987071915181681/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/violent-python.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/8560987071915181681'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/8560987071915181681'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/violent-python.html' title='Violent Python'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhijgFToYd3SmDFaYpuZa_MJpoaSh9BhX5GWKQU5yyxY6JlYcFzel3Cx-Kjr67aFalIph4XVbKb65HrFK3XzCHQ8JmksnQ-_Jx-F-xESIHgVj5amNlO3fAj3rasEOEdmeCPKzLaYJx8fVHQ/s72-c/Violent+python.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-5609632804219582659</id><published>2013-09-21T20:44:00.000-07:00</published><updated>2013-09-26T18:07:16.440-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Books"/><title type='text'>The Mac Hacker&#39;s Handbook</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjop2zb8SGRTxhLw1ta5yPnJtDp8ETn0g0TmoeLd8SF9RiO781s8z2E4Od0a2EbV2hQrqlEzA0lrWhyphenhyphenQ-C2U-RcITby_lX_EBWBqAQ3s5RCvRjZEqvbT0_j7uS6m1je11QWjDfMjhN1XLxu/s200/The+Mac+Hacker%27s+Handbook.jpg&quot; width=&quot;158&quot; /&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;The Mac Hacker&#39;s Handbook by Charlie Miller&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defences, what attacks are, and how to best handle those weaknesses.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;i&gt;User Review&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;i&gt;The Mac Hacker&#39;s Handbook covers a lot of useful technical topics surrounding vulnerability analysis and exploit development for Mac OS X. That said, it doesn&#39;t so much teach you directly, as guide your learning. For example, it introduces the use of D Trace on OS X for dynamic analysis. It makes a very good case for D Trace&#39;s usefulness in reverse engineering, and for you to go out on your own and learn about it. Its&amp;nbsp;D Trace&amp;nbsp;examples aren&#39;t really&amp;nbsp;free standing&amp;nbsp; and require some background that you must get yourself. If the book were to give you the necessary background on every topic it introduces, it would be an enormous tome, and the authors probably would still be writing it.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;/i&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;i&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;The Mac Hacker&#39;s Handbook is the best reference for Mac-specific attack information that I have found. At 368 pages, it may appear small compared to the typical 750+ page security tome. That&#39;s because the authors have done a near-perfect job of sticking to the topic at hand, the Mac. The authors do not succumb to the usual temptation to try and teach assembly language or reverse engineering. Rather, they do an excellent job touching on those topics in an OS X context, and assume the reader has a little background in that area already, or can otherwise keep up. I have done some limited research into the areas of Mac malware and process injection in the past. This book has done a fantastic job of filling in many holes in my knowledge that I hadn&#39;t been able to take care of before. Plus, it introduced me to a number of Mac-specific security features I wasn&#39;t aware of before. Highly recommended for anyone interested in Mac security.&amp;nbsp;&lt;/i&gt;&lt;/div&gt;
&lt;/i&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;/span&gt;&lt;/i&gt;About the Author &lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
CharlIe Millerwon the second CanSecWest Pwn2Own contest in 2008 and was named one of the Top 10 Computer Hackers of 2008 by Popular Mechanics. Dino Dai Zovi won the first CanSecWest Pwn2Own contest in 2007 and was named one of the 15 Most Influential People in Security by eWEEK.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/u96mdquwkd94&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhovfhIZgxG_ERQJKRg6Oxtxd_F49itB7jY-e30vfSXyCUOgIeUYh31d-666b_L8s9bh_Q0apMP7BjuekqawhUdB0bMSiDcYtH1CmKnbnNKy4eNF1qDE5EzS21D-XXtF6j4Jh-McpjUPyvp/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/5609632804219582659/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/the-mac-hackers-handbook.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5609632804219582659'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5609632804219582659'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/the-mac-hackers-handbook.html' title='The Mac Hacker&#39;s Handbook'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjop2zb8SGRTxhLw1ta5yPnJtDp8ETn0g0TmoeLd8SF9RiO781s8z2E4Od0a2EbV2hQrqlEzA0lrWhyphenhyphenQ-C2U-RcITby_lX_EBWBqAQ3s5RCvRjZEqvbT0_j7uS6m1je11QWjDfMjhN1XLxu/s72-c/The+Mac+Hacker%27s+Handbook.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-7928380384368876540</id><published>2013-09-20T09:31:00.000-07:00</published><updated>2013-09-26T18:08:03.632-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Books"/><title type='text'>Hacking: The Art of Exploitation</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH50TYGoxHNSeR4pkNtH3u4FaUv3Dq89gacSLGGJUtaYqOgEbm37WS43FEwSooXElFHfdTr_h9y_XWr8h9JKlPCqJcoEx0DQXmth4mFw5SQ4kDSJT-zMEZTGYTsAoYVQGUVg7txtOM9Gbb/s200/hacking+the+act+of+exploitation.jpg&quot; width=&quot;150&quot; /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCGZUrzVN5wDkzIG11faqTwllz5gmSIYen3puI6QsHa2osfGrTkBQWFEhp1CB80B5ciUP3OEG06qzOHG8Y7PBXjffBcSG2I1bMB0WRa0A4MQdgHvwlJROe3AW6bavFv24E0rXvBQ-S2ClR/s200/hacking+the+act+of+exploitation+2.jpg&quot; width=&quot;150&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;The Art of Exploitation, Second Edition&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, Second Edition introduces the fundamentals of C programming from a hacker&#39;s perspective.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
The included Live CD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book&#39;s examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Program computers using C, assembly language, and shell scripts&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Corrupt system memory to run arbitrary code using buffer overflows and format strings&lt;/li&gt;
&lt;li&gt;Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening&lt;/li&gt;
&lt;li&gt;Outsmart common security measures like non-executable stacks and intrusion detection systems&lt;/li&gt;
&lt;li&gt;Gain access to a remote server using port-binding or connect-back shell code, and alter a server&#39;s logging behaviour to hide your presence&lt;/li&gt;
&lt;li&gt;Redirect network traffic, conceal open ports, and hijack TCP connections&lt;/li&gt;
&lt;li&gt;Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don&#39;t already know how to program, Hacking: The Art of Exploitation, Second Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;
&lt;i&gt;&lt;/i&gt;&lt;/span&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;i&gt;User Review&lt;/i&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;This is the second edition of a well known book about hacking and contains a lot about hacking. Jon Erickson has expanded the book from the first edition doubling the number of pages to 450 pages and a Linux based Live-CD is also included.&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;This book details the steps done to perform buffer overflows on Linux on the x86 architecture. So detailed that any computer science student can do it, and they should. Every computer science student or aspiring programmer should be forced to read this book along with another book called &lt;b&gt;&lt;a href=&quot;http://pc-rom.blogspot.com/2013/09/19-deadly-sins-of-software-security.html&quot; target=&quot;_blank&quot;&gt;19 deadly sins of software programming.&lt;/a&gt;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;About the Author&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world. He currently works as a cryptologist and security specialist in Northern California.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/i390g3oz8o6l&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp0eGc9hpDdztAUCgh5lzQnAC1ko3KJHb2R6PHGeaXBVi09QDeGLyDI4dm4RtAoqaUEhWemrZ66SaoNNyc65p5pAphszXpPTqw0xYyadNO14wbqmJd-LcQMadIVJHkW_Sk5CrlAbM690y_/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/7928380384368876540/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/hacking-art-of-exploitation.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/7928380384368876540'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/7928380384368876540'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/hacking-art-of-exploitation.html' title='Hacking: The Art of Exploitation'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH50TYGoxHNSeR4pkNtH3u4FaUv3Dq89gacSLGGJUtaYqOgEbm37WS43FEwSooXElFHfdTr_h9y_XWr8h9JKlPCqJcoEx0DQXmth4mFw5SQ4kDSJT-zMEZTGYTsAoYVQGUVg7txtOM9Gbb/s72-c/hacking+the+act+of+exploitation.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-3094060808251824817</id><published>2013-09-20T07:15:00.001-07:00</published><updated>2013-11-08T04:47:13.629-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Books"/><title type='text'>Hacking Exposed Web Applications</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtsmIyM8aARl_mpCMMCNXULtJ61HElA5BffYUk9iRhY8aBYnewdzWaFn9BnSUPr1OMAwkotdGmeHpjiAns_Z3lecdcn7HSOu9V6l56lgHyLp3OmWOtuOf-b7_44XEhN6ysUVSyCob_F3bT/s1600/hacking+wep.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtsmIyM8aARl_mpCMMCNXULtJ61HElA5BffYUk9iRhY8aBYnewdzWaFn9BnSUPr1OMAwkotdGmeHpjiAns_Z3lecdcn7HSOu9V6l56lgHyLp3OmWOtuOf-b7_44XEhN6ysUVSyCob_F3bT/s200/hacking+wep.jpg&quot; width=&quot;161&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;3rd Edition, Web Application Security Secrets &amp;amp; Solutions&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today&#39;s hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource &lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Get full details on the hacker&#39;s footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation&lt;/li&gt;
&lt;li&gt;Understand how attackers defeat commonly used Web authentication technologies&lt;/li&gt;
&lt;li&gt;See how real-world session attacks leak sensitive data and how to fortify your applications&lt;/li&gt;
&lt;li&gt;Learn the most devastating methods used in today&#39;s hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques&lt;/li&gt;
&lt;li&gt;Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments&lt;/li&gt;
&lt;li&gt;Safety deploy XML, social networking, cloud computing, and Web 2.0 services&lt;/li&gt;
&lt;li&gt;Defend against RIA, Ajax, UGC, and browser-based, client-side exploits&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;User Review&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;Gives good basic ideas how to test some applications-- Georgi - Goodreads&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/v61vgsf4ybbh&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfbnU6iaKezmgLkreF-nGl-1qJ4H6ZWqxYWlPmQIrW8kgcnhzqhaZLa-bXmx540HMxtabQpP0Pw4_hJT7Bgw-D3PhCcyQp4_ZYRtsKK89GDp3bQqsYPsFxDQdjjvf-ZnlvWDJXfG77xY8L/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/3094060808251824817/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/hacking-exposed-web-applications.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/3094060808251824817'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/3094060808251824817'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/hacking-exposed-web-applications.html' title='Hacking Exposed Web Applications'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtsmIyM8aARl_mpCMMCNXULtJ61HElA5BffYUk9iRhY8aBYnewdzWaFn9BnSUPr1OMAwkotdGmeHpjiAns_Z3lecdcn7HSOu9V6l56lgHyLp3OmWOtuOf-b7_44XEhN6ysUVSyCob_F3bT/s72-c/hacking+wep.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-6976932270995055925</id><published>2013-09-19T15:12:00.000-07:00</published><updated>2013-11-08T04:45:12.693-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><title type='text'>The Tangled Web</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghdoTE47AKf3fkZT2QrRQnHkA4r272Le0dyJSRtki0VzYXmdYMv7wuD2dMgYHG9I_TG3RfCimX0MHSFt-XizCUr1vQyVg4ymH1TleyFYTBpoyRvz2AMfNHMauWVpyOIvgVxBWT1SHMNYcl/s1600/The+Tangled+Web.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghdoTE47AKf3fkZT2QrRQnHkA4r272Le0dyJSRtki0VzYXmdYMv7wuD2dMgYHG9I_TG3RfCimX0MHSFt-XizCUr1vQyVg4ymH1TleyFYTBpoyRvz2AMfNHMauWVpyOIvgVxBWT1SHMNYcl/s200/The+Tangled+Web.jpeg&quot; width=&quot;151&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;A Guide to Securing Modern Web Applications&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.&lt;br /&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
In The Tangled Web, Michal Zalewski, one of the world&#39;s top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they&#39;re fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You&#39;ll learn how to:&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization&lt;/li&gt;
&lt;li&gt;Use mordern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing&lt;/li&gt;
&lt;li&gt;Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs&lt;/li&gt;
&lt;li&gt;Build mashups and embed gadgets without getting stung by the tricky frame navigation policy&lt;/li&gt;
&lt;li&gt;Embed or host user-supplied content without running into the trap of content sniffing&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
For quick reference, &quot;Security Engineering Cheat Sheets&quot; at the end of each chapter offer ready solutions to problems you&#39;re most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999; font-family: inherit;&quot;&gt;&lt;i&gt;User Review&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999; font-family: inherit;&quot;&gt;&lt;i&gt;&quot;Thorough and comprehensive coverage from one of the foremost experts in browser security.&quot;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999; font-family: inherit;&quot;&gt;&lt;i&gt;--Tavis Ormandy, Google Inc.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
About the Author&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Michal Zalewski is an internationally recognized information security expert with a long track record of delivering cutting-edge research. He is credited with discovering hundreds of notable security vulnerabilities and frequently appears on lists of the most influential security experts. He is the author of Silence on the Wire (No Starch Press), Google&#39;s &quot;Browser Security Handbook,&quot; and numerous important research papers.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;span id=&quot;goog_1911458858&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1911458859&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/tnfv7gxhgc8z&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI8VQlZlaKlcGFsd2MlODhNmwxDsl9xqWVUxff_LP9bEgjjQ8e1j-XfoFsKSnwEkk19xHCRbswoBAhM__8QRWKaX_ARqROa1cCUKRvv-NLJpx2uDVXiwolVphQ9rQxYQeh26nwj1fETdpM/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/6976932270995055925/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/the-tangled-web.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/6976932270995055925'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/6976932270995055925'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/the-tangled-web.html' title='The Tangled Web'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghdoTE47AKf3fkZT2QrRQnHkA4r272Le0dyJSRtki0VzYXmdYMv7wuD2dMgYHG9I_TG3RfCimX0MHSFt-XizCUr1vQyVg4ymH1TleyFYTBpoyRvz2AMfNHMauWVpyOIvgVxBWT1SHMNYcl/s72-c/The+Tangled+Web.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-5000387735583558199</id><published>2013-09-19T09:53:00.001-07:00</published><updated>2013-11-08T04:44:20.042-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Books"/><title type='text'>The Basics of Hacking and Penetration Testing</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibUYOIWMFCH5KcVstU5YxQuzNnpC9xcP2hzK4zDX8xqiqAGC6WGv2zHEzJDG4XVZCx1ux9wOUBX9IeYmxBn8aO6Cdf1DiL8lgAQYdIZwcXN0EHAj2V00mvCkSsxGmcSQRhbyIb2N8oy2Tz/s1600/The+Basics+of+Hacking+and+Penetration+Testing.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibUYOIWMFCH5KcVstU5YxQuzNnpC9xcP2hzK4zDX8xqiqAGC6WGv2zHEzJDG4XVZCx1ux9wOUBX9IeYmxBn8aO6Cdf1DiL8lgAQYdIZwcXN0EHAj2V00mvCkSsxGmcSQRhbyIb2N8oy2Tz/s200/The+Basics+of+Hacking+and+Penetration+Testing.jpg&quot; width=&quot;161&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&amp;nbsp;Second Edition: Ethical Hacking and Penetration Testing Made Easy&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
The Basics of Hacking and Penetration Testing Second Edition. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. &lt;br /&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
The book provides a simple and clean explanation of how to effectively utilize the tools and introduces a four-step methodology for conducting a penetration test or hack.  You will be provided with the know-how required to jump start your career or gain a better understanding of offensive security. The book walks through each of the steps and tools in a structured, orderly manner, allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases function and relate.&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
·&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;The second edition includes updated information covering Kali Linux as well as focusing on the seminal tools required to complete a penetration test&amp;nbsp;&lt;/li&gt;
&lt;li&gt;New tools added including the Social Engineer Toolkit, Meterpreter, w3af and more!&lt;/li&gt;
&lt;li&gt;Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i style=&quot;color: #999999;&quot;&gt;User Review&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;Although this book is ideal for beginners, most security professionals will have been involved with penetration testing during some point in their career. This book is thus an excellent refresher for those of us who fondly recall Nmap, Nessus and Netcat as being the tools of choice for both whitehat and blackhat hackers, but have long-since forgotten the full command-line syntax and would benefit from a refresh. Patrick Engebretson gets the reader involved in the art of hacking from page one and makes this book a fascinating and productive read.&quot;-&lt;b&gt;-Best Hacking and Pen Testing Books in InfoSecReviews Book Awards&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/m7931ru527kd&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLFDLSBww-1pbl7nPP9bGdeDpRlsX4ks3Q_VCngyns-0KJwjTHGm7P0v98BUaa4-d1xqOb7rWcKk1fLrQPZGJOFVMWTx7pnox1FW_vH7nqfM9g0nt7S0apKzlN86D1I-2A6FVSS-t4Z83J/s1600/download+1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/5000387735583558199/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/the-basics-of-hacking-and-penetration.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5000387735583558199'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/5000387735583558199'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/the-basics-of-hacking-and-penetration.html' title='The Basics of Hacking and Penetration Testing'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibUYOIWMFCH5KcVstU5YxQuzNnpC9xcP2hzK4zDX8xqiqAGC6WGv2zHEzJDG4XVZCx1ux9wOUBX9IeYmxBn8aO6Cdf1DiL8lgAQYdIZwcXN0EHAj2V00mvCkSsxGmcSQRhbyIb2N8oy2Tz/s72-c/The+Basics+of+Hacking+and+Penetration+Testing.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1011926208076870651.post-1319676478504888140</id><published>2013-09-19T08:13:00.002-07:00</published><updated>2013-11-08T04:41:12.437-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="eBooks"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Books"/><title type='text'>Hackers Underground Hanbook</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigPD7sMtMlsDlkFqVNcdzRqBQSIerXQVPqcnkgWIgbgFxlHhX6c1QkSN8rLtm1HGEjsd8EXNAuuPzNDvTCQjSSHXP-bmrPH6E01rC48t0UkRp3ocC6BuMlnSQECFl2eKnbrd0qXGGjojcB/s1600/Hackers+Underground+Handbook.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigPD7sMtMlsDlkFqVNcdzRqBQSIerXQVPqcnkgWIgbgFxlHhX6c1QkSN8rLtm1HGEjsd8EXNAuuPzNDvTCQjSSHXP-bmrPH6E01rC48t0UkRp3ocC6BuMlnSQECFl2eKnbrd0qXGGjojcB/s1600/Hackers+Underground+Handbook.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #333333; line-height: 18px; text-align: start;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit; font-size: x-small;&quot;&gt;Learn How to Hack and What It Takes to Crack Even the Most Secure Systems&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
The information given in this underground handbook will put you into a hacker&#39;s mindset and teach you all of the hacker&#39;s secret ways. The Hacker&#39;s Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows hacking, wireless hacking, web hacking and malware. Each topic is introduced with an easy to follow, real-world example. The book is written in simple language and assumes the reader is a complete beginner.&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;b&gt;User Review&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;&quot;Although this book is ideal for beginners, most security professionals will have been involved with penetration testing during some point in their career. This book is thus an excellent refresher for those of us who fondly recall Nmap, Nessus and Netcat as being the tools of choice for both whitehat and blackhat hackers, but have long-since forgotten the full command-line syntax and would benefit from a refresh. Patrick Engebretson gets the reader involved in the art of hacking from page one and makes this book a fascinating and productive read.&quot;--&lt;b&gt;Best Hacking and Pen Testing Books in InfoSecReviews Book Awards&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: Arial, sans-serif; font-size: 20px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;About The Author&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
David has been in the security/hacking scene for many years. He currently runs a hacking blog and podcast at http://www.MrCracker.com&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.filebox.com/xiq1o9h2mfmb&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;88&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjl14oNpxmNRM_f5wyMR3GbLCjmd-w6sBs4zy9n5dMujhPEnWOeAs6a5bWMg56HESukvAtWCkpt0WveiOK1ETc69KecONFgvqaHtEXztNAO2og7ZQEa5CavX-b8Y1w110CK-iHwUNGKS-TE/s320/download+1.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://pc-rom.blogspot.com/feeds/1319676478504888140/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pc-rom.blogspot.com/2013/09/hackers-underground-hanbook.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/1319676478504888140'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1011926208076870651/posts/default/1319676478504888140'/><link rel='alternate' type='text/html' href='http://pc-rom.blogspot.com/2013/09/hackers-underground-hanbook.html' title='Hackers Underground Hanbook'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/06519534507540469977</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigPD7sMtMlsDlkFqVNcdzRqBQSIerXQVPqcnkgWIgbgFxlHhX6c1QkSN8rLtm1HGEjsd8EXNAuuPzNDvTCQjSSHXP-bmrPH6E01rC48t0UkRp3ocC6BuMlnSQECFl2eKnbrd0qXGGjojcB/s72-c/Hackers+Underground+Handbook.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>