curarsi il mal di schiena
http://www.macrolibrarsi.it/libri/__come_sconfiggere_mal_di_schiena-dolori_reumatici_dvd_con_esercizi.php
hostess aereo sexy
http://www.youtube.com/watch?v=gAVwJqJheFw&feature=related
http://www.youtube.com/watch?v=w-08WO4RNgM&feature=related
alitalia volo parigi roma
http://www.youtube.com/watch?v=IJKXbWtowOg
attentato all alitalia
http://www.youtube.com/watch?v=g0t-otkw15M&feature=related
alitalia
http://www.youtube.com/watch?v=lao0c_HT88s&feature=related
psicologia del volo
http://www.youtube.com/watch?v=a-oBbShfEOE&feature=related
http://www.youtube.com/watch?v=EXPryiQ-GL4&feature=related
un informatica dell alitalia
http://www.youtube.com/watch?v=LiwshnGQ2BI&feature=related
http://www.youtube.com/watch?v=jd-tUUBn5hw&feature=related
alitalia guida
http://www.youtube.com/watch?v=Mt3nemSK9RE
roma bergamo maria il mio amore al microfono
http://www.youtube.com/results?search_query=alitalia+bergamo&search_type=&aq=f
http://www.youtube.com/watch?v=N3aVCK-IP2Q
era in chat col nick MARTINA45231
http://www.geocities.com/azafleet/dc7.html
http://www.geocities.com/azafleet/index.html
http://www.youtube.com/watch?v=R44_gGVV9SQ
arte dell hacking il punto del giorno
http://www.apogeonline.com/argomenti/Hacker%20e%20Hacking
http://www.apogeonline.com/libri/9788850326983/scheda
http://www.nostarch.com/download/booksrc.zip
http://it.wikipedia.org/wiki/SYN_flood
o l’esistenza di un DoS come naptha,
http://www.cert.org/advisories/CA-2000-21.html
esistente dal 2000, che
webserver
netstrike
pagine precedenti syn flood
http://www.niksula.hut.fi/~dforsber/synflood/result.html
pag 244 arte dell hacking
noto col nomignolo "the ping of death"
http://en.wikipedia.org/wiki/Ping_of_death
linux kernel archivie
http://www.ussg.iu.edu/hypermail/linux/kernel/0808.1/index.html
Mike Bremford
http://big.faceless.org/blog/aboutAuthor.action?user=mike
explained Mike Bremford, who is hosting a comprehensive site on the attack, called The Ping o’ Death Page.
http://news.cnet.com/Ping-of-Death-averted/2100-1023_3-250036.html?hhTest=1
http://www.iss.net/security_center/advice/Intrusions/2000012/default.htm
http://en.wikipedia.org/wiki/Ping_flood
un listato
http://insecure.org/sploits/ping-o-death.html
exploit
http://insecure.org/sploits_all.html
http://compnetworking.about.com/od/networksecurityprivacy/l/bldef_pingdeath.htm
http://blogs.msdn.com/larryosterman/archive/2007/10/16/larry-and-the-ping-of-death.aspx
http://insecure.org/sploits/USR.total.control.chassis.html
pag. 243
tcp randoom dal mit
http://dspace.mit.edu/handle/1721.1/30606
http://www.leave-me-alone.com/hackers_pingofdeath.htm
da http://www.altran.com/
finire come un hacker
http://www.aiea.it/pdf/sessioni%20di%20studio%20e%20di%20formazione/2008/Torino%2017%20gennaio%202008%20Finire%20com
e%20un%20hacker.pdf
Pag 261 analisi con GDB
Pag 263 attacco con bombe a mano
*********************************************************************************************
=============================================================================
TOPIC: invalidate caches before going into suspend
http://groups.google.com/group/fa.linux.kernel/browse_thread/thread/9c2e0e9ebc6c68f5?hl=en
================================================================================
1 of 7 ==
Date: Wed, Aug 13 2008 10:18 am From: Linus Torvalds On Wed, 13 Aug 2008, Mark Langsdorf wrote:
> > I don't think it's necessary. I can submit a delta patch later if you
> think it's really necessary.Why not at least move it to after the local_irq_disable()?
That local_irq_disable() will do tons of writes if you have lockdep enabled, it calls trace_hardirqs_off() etc.
Maybe they don't end up ever mattering, but wouldn't it make much more sense to just move the wbinvd
down to just before the while (1) halt();which is also likely to make sure that the compiler won't do anything
at all because everything is dead at that point with no function calls etc happening.
Linus--
To unsubscribe from this list:
send the line "unsubscribe linux-kernel" inthe body of a message
to majordomo@vger.kernel.orgMore majordomo info at
http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
*********************************************************************************************
r i a s s u n t o a r t e h a c k i n g *********************************************************************************************
……………………………………………………………………………………………..
Architettura del Kernel Linux
Cliccando sull’immagine è possibile navigare la mappa interattiva dell’
architettura del Kernel Linux. Cliccando successivamente su ogni
componente del kernel si verrà rediretti alla spiegazione funzionale del
singolo componente. Manna dal cielo per tutti gli sviluppatori che lavorano con il Kernel Linux.
Struttura 3 d in video del kernel
………………………………………………………………………………………………
Dear chiudix@autistici.org, Thank you for registering your account at directfileaccess.com.
Please use the link below to authenticate your account and continue.
If the link is not working, please copy and paste it into your browser.
For your convenience, we have enclosed your username and password below.
They are for your use only, please write them down and do not share them with anyone. Username:
Password: MBSD3T
Kind regards, DirectFileAccess.com Authentication Team
http://directfileaccess.com/fileaccess/download-PDF-Ebook-Guide-Hacking-The-Art-Of-Exploitation-2008-rar.php?id=1905035&aid=7041&files=c2VsZWN0IExpbmtzLiosICdQREYgRWJvb2sgR3VpZGUgSGFja2luZyBUaGUgQXJ0IE9mIEV4cGxvaXRhdGlvbiAyMDA4IHJhcicgYXMgRGVzY3JpcHRpb24gZnJvbSBMaW5rcyB3aGVyZSBtYXRjaChEZXNjcmlwdGlvbikgYWdhaW5zdCAoJ3h4eCcpIG9yZGVyIGJ5IFJBTkQoNjQ4NzYp&z=PDF+Ebook+Guide+Hacking+The+Art+Of+Exploitation+2008+rar&search=PDF%20Ebook%20Guide%20Hacking%20The%20Art%20Of%20Exploitation%202008%20rar
oppure cercrate cin emule o emule adunanza
The Art Exploitation 2008 rar
…………………………………………………………………………………….
~*~*~*~*~*~*~*The Art of Acking~*~*~*~*~*~*~*
…………………………………………………………………………………….
http://www.google.com/codesearch?q=package:libc+system pag 152
www.internic.net pag 199
programma tinyweb pag 205
foto in cartella ah pag 206
http://www.ritlabs.com/en/products/tinyweb/install.php
o install TinyWeb server just create a shortcut in Startup menu with the following properties:
Target |
c:wwwbintiny.exe c:wwwroot |
Start In |
c:wwwlog |
http://en.wikipedia.org/wiki/Tiny_web_servers
http://www.unusualresearch.com/tinytcp/tinytcp.htm
http://books.google.it/books?id=P8ijosP6ti4C&dq=erikson+hacking&pg=PP1&ots=6Q-3WtniJq&sig=32ZReV9IY8WPAb8tKCA31sNHp7s&hl=it&sa=X&oi=book_result&resnum=1&ct=resulthttp://en.wikipedia.org/wiki/Hacking:_The_Art_of_Exploitationhttp://en.wikipedia.org/wiki/Reality_hackinghttp://hackerforum.devil.it/viewtopic.php?t=31http://www.artofhacking.com/perlhttp://www.artofhacking.com/tucops/hack/linuxapp/live/aoh_hack0717.htm
*************************************************************************************************
2) JON ERIKSON ART HACKING
prima edizione
http://www.apogeonline.com/libri/88-503-2347-6/scheda
sfoglia il libro
http://books.google.com/books?vid=ISBN8850323476&printsec=toc&hl=it
http://www.nostarch.com/extras/hacking/index.html
http://books.google.com/books?vid=ISBN8850323476&printsec=toc&dq=isbn:8850323476&hl=it
dal 21 febbraio la seconda edizione
http://www.nostarch.com/frameset.php?startat=hacking2
http://www.apogeoeditore.com/
con link da www.nostarch.com zip libro scaricabile
http://www.apogeonline.com/libri/9788850326983/scheda
http://www.apogeonline.com/2008/libri/9788850326983/ebook/pdf/prefazione.pdf
http://www.apogeonline.com/2008/libri/9788850326983/ebook/pdf/indice.pdf
http://www.apogeonline.com/libri/9788850325948/scheda
http://hpp.recursiva.org/it/index.php
http://libri.html.it/recensioni/libro/145.html
pag 18 iniziamo a sporcarci le mani
source book hacking
http://www.apogeonline.com/libri/9788850326983/scheda
http://www.nostarch.com/download/booksrc.zip
http://www.tinker.tv/download/hacking2e_toc.pdf
http://www.tinker.tv/download/hacking2_sample.pdf
http://www.tinker.tv/download/hacking2_index.pdf
http://www.tinker.tv/download/hacking2_sample.pdf
tecniche hacking con link codice sorgente
http://www.autistici.org/index.php
ora scannerizzo le pagine della 2 edizione
in http://www.autistici.org/cybercinema cartella ah
esempio
http://www.autistici.org/cybercinema/ah/
da cui
http://www.autistici.org/cybercinema/ah/img001.jpg
questo lavoro come detto ai moderatori si unirà a immagini
di festival cinema in zone naturali irpine.
e mostro gli esercizi
preciso che questo è un esperimento che non ha nulla a che vedere
se non con liste libere tipo aha
i file della nuova edizione dell arte dell hacking
che ho messo facendo leggere la cartella in
http://www.autistici.org/cybercinema e cliccate su su booksrc
oppure andate in http://www.autistici.org/cybercinema/booksrc/
il sito è in lettura grazie a joomla che uso come usavo quando si chiamava mambo,
togliendo l home page in lettura in a.php.
Welcome to the LiveCD for Hacking : The Art of Exploitation
The source code is found in the ~/booksrc directory
-=[ Unix Basics (enough to get you started) ]=-
command | description | example
——–|—————————|———————
ls | lists files | ls -la
man | manual page help | man ls
pwd | print working directory | pwd
cat | dump file to console | cat unix_basics
cd | change directory | cd ~/booksrc
nano | simple text editor | nano firstprog.c
———————————————————-
To run a command as administrator (user "root"), use "sudo <command>".
See "man sudo_root" for details.
reader@hacking:~ $ sudo -s
root@hacking:~ # cd ~/booksrc
root@hacking:~/booksrc # ls -la
total 572
drwxr-xr-x 3 reader reader 2740 2008-06-14 12:35 .
drwxr-xr-x 15 reader reader 620 2008-06-14 10:38 ..
-rw-r–r– 1 reader reader 471 2008-06-14 12:35 addressof2.c
-rw-r–r– 1 reader reader 134 2008-06-14 12:35 addressof.c
-rw-r–r– 1 reader reader 426 2008-06-14 12:35 addr_struct.c
-rw-r–r– 1 reader reader 181 2008-06-14 12:35 aslr_demo.c
-rw-r–r– 1 reader reader 299 2008-06-14 12:35 aslr_execl.c
-rw-r–r– 1 reader reader 804 2008-06-14 12:35 aslr_execl_exploit.c
-rw-r–r– 1 reader reader 660 2008-06-14 12:35 auth_overflow2.c
-rw-r–r– 1 reader reader 660 2008-06-14 12:35 auth_overflow.c
-rw-r–r– 1 reader reader 867 2008-06-14 12:35 bind_port.c
-rw-r–r– 1 reader reader 1846 2008-06-14 12:35 bind_port.s
-rw-r–r– 1 reader reader 92 2008-06-14 12:35 bind_shell
-rw-r–r– 1 reader reader 101 2008-06-14 12:35 bind_shell_beta
-rw-r–r– 1 reader reader 2978 2008-06-14 12:35 bind_shell_beta.s
-rw-r–r– 1 reader reader 2872 2008-06-14 12:35 bind_shell.s
-rw-r–r– 1 reader reader 518 2008-06-14 12:35 bitwise.c
-rw-r–r– 1 reader reader 129 2008-06-14 12:35 char_array2.c
-rw-r–r– 1 reader reader 355 2008-06-14 12:35 char_array.c
-rw-r–r– 1 reader reader 224 2008-06-14 12:35 commandline.c
-rw-r–r– 1 reader reader 78 2008-06-14 12:35 connectback_shell
-rw-r–r– 1 reader reader 2718 2008-06-14 12:35 connectback_shell.s
-rw-r–r– 1 reader reader 513 2008-06-14 12:35 convert2.c
-rw-r–r– 1 reader reader 512 2008-06-14 12:35 convert.c
-rw-r–r– 1 reader reader 1275 2008-06-14 12:35 crypt_crack.c
-rw-r–r– 1 reader reader 335 2008-06-14 12:35 crypt_test.c
-rw-r–r– 1 reader reader 530 2008-06-14 12:35 datatype_sizes.c
-rw-r–r– 1 reader reader 3631 2008-06-14 12:35 decode_sniff.c
-rw-r–r– 1 reader reader 7797 2008-06-14 12:35 dissembler.c
-rw-r–r– 1 reader reader 274 2008-06-14 12:35 drop_privs.c
-rw-r–r– 1 reader reader 323 2008-06-14 12:35 dtors_sample.c
-rw-r–r– 1 reader reader 73 2008-06-14 12:35 encoded_socket_reuse_restore
-rw-r–r– 1 reader reader 71 2008-06-14 12:35 encoded_sockreuserestore
-rw-r–r– 1 reader reader 1695 2008-06-14 12:35 encoded_sockreuserestore_dbg.s
-rw-r–r– 1 reader reader 1697 2008-06-14 12:35 encoded_sockreuserestore.s
-rw-r–r– 1 reader reader 1815 2008-06-14 12:35 errorchecked_heap.c
-rw-r–r– 1 reader reader 100 2008-06-14 12:35 evil_name
-rw-r–r– 1 reader reader 36 2008-06-14 12:35 exec_shell
-rw-r–r– 1 reader reader 325 2008-06-14 12:35 exec_shell.c
-rw-r–r– 1 reader reader 736 2008-06-14 12:35 exec_shell.s
-rw-r–r– 1 reader reader 115 2008-06-14 12:35 exploit_buffer
-rw-r–r– 1 reader reader 961 2008-06-14 12:35 exploit_notesearch.c
-rw-r–r– 1 reader reader 586 2008-06-14 12:35 exploit_notesearch_env.c
-rw-r–r– 1 reader reader 1519 2008-06-14 12:35 fcntl_flags.c
-rw-r–r– 1 reader reader 239 2008-06-14 12:35 find_jmpesp.c
-rw-r–r– 1 reader reader 106 2008-06-14 12:35 firstprog.c
-rw-r–r– 1 reader reader 3147 2008-06-14 12:35 fms.c
-rw-r–r– 1 reader reader 566 2008-06-14 12:35 fmt_strings.c
-rw-r–r– 1 reader reader 498 2008-06-14 12:35 fmt_uncommon2.c
-rw-r–r– 1 reader reader 501 2008-06-14 12:35 fmt_uncommon.c
-rw-r–r– 1 reader reader 671 2008-06-14 12:35 fmt_vuln2.c
-rw-r–r– 1 reader reader 567 2008-06-14 12:35 fmt_vuln.c
-rw-r–r– 1 reader reader 498 2008-06-14 12:35 funcptr_example.c
-rw-r–r– 1 reader reader 15307 2008-06-14 12:35 game_of_chance.c
-rw-r–r– 1 reader reader 392 2008-06-14 12:35 getenvaddr.c
-rw-r–r– 1 reader reader 129 2008-06-14 12:35 getenv_example.c
-rw-r–r– 1 reader reader 1222 2008-06-14 12:35 hacking.h
-rw-r–r– 1 reader reader 3451 2008-06-14 12:35 hacking-network.h
-rw-r–r– 1 reader reader 1912 2008-06-14 12:35 heap_example.c
-rw-r–r– 1 reader reader 49 2008-06-14 12:35 helloworld1
-rw-r–r– 1 reader reader 648 2008-06-14 12:35 helloworld1.s
-rw-r–r– 1 reader reader 694 2008-06-14 12:35 helloworld2.s
-rw-r–r– 1 reader reader 40 2008-06-14 12:35 helloworld3
-rw-r–r– 1 reader reader 913 2008-06-14 12:35 helloworld3.s
-rw-r–r– 1 reader reader 720 2008-06-14 12:35 helloworld.asm
-rw-r–r– 1 reader reader 74 2008-06-14 12:35 helloworld.c
-rw-r–r– 1 reader reader 704 2008-06-14 12:35 helloworld.o
-rw-r–r– 1 reader reader 575 2008-06-14 12:35 host_lookup.c
-rw-r–r– 1 reader reader 263 2008-06-14 12:35 input.c
-rw-r–r– 1 reader reader 83 2008-06-14 12:35 loopback_shell
-rw-r–r– 1 reader reader 102 2008-06-14 12:35 loopback_shell_restore
-rw-r–r– 1 reader reader 3157 2008-06-14 12:35 loopback_shell_restore.s
-rw-r–r– 1 reader reader 2791 2008-06-14 12:35 loopback_shell.s
-rw-r–r– 1 reader reader 44 2008-06-14 12:35 mark
-rw-r–r– 1 reader reader 44 2008-06-14 12:35 mark_break
-rw-r–r– 1 reader reader 611 2008-06-14 12:35 mark_break.s
-rw-r–r– 1 reader reader 53 2008-06-14 12:35 mark_restore
-rw-r–r– 1 reader reader 701 2008-06-14 12:35 mark_restore.s
-rw-r–r– 1 reader reader 611 2008-06-14 12:35 mark.s
-rw-r–r– 1 reader reader 1103 2008-06-14 12:35 memory_segments.c
-rw-r–r– 1 reader reader 3451 2008-06-14 12:35 notesearch.c
-rw-r–r– 1 reader reader 1659 2008-06-14 12:35 notetaker.c
-rw-r–r– 1 reader reader 907 2008-06-14 12:35 overflow_example.c
-rw-r–r– 1 reader reader 754 2008-06-14 12:35 pcap_sniff.c
-rw-r–r– 1 reader reader 550 2008-06-14 12:35 pointer.c
-rw-r–r– 1 reader reader 767 2008-06-14 12:35 pointer_types2.c
-rw-r–r– 1 reader reader 791 2008-06-14 12:35 pointer_types3.c
-rw-r–r– 1 reader reader 754 2008-06-14 12:35 pointer_types4.c
-rw-r–r– 1 reader reader 804 2008-06-14 12:35 pointer_types5.c
-rw-r–r– 1 reader reader 693 2008-06-14 12:35 pointer_types.c
-rw-r–r– 1 reader reader 92 2008-06-14 12:35 portbinding_shellcode
-rw-r–r– 1 reader reader 7553 2008-06-14 12:35 ppm_crack.c
-rw-r–r– 1 reader reader 4410 2008-06-14 12:35 ppm_gen.c
-rw-r–r– 1 reader reader 2411 2008-06-14 12:35 printable_helper.c
-rw-r–r– 1 reader reader 1841 2008-06-14 12:35 printable.s
-rw-r–r– 1 reader reader 37 2008-06-14 12:35 priv_shell
-rw-r–r– 1 reader reader 1011 2008-06-14 12:35 priv_shell.s
-rw-r–r– 1 reader reader 311 2008-06-14 12:35 rand_example.c
-rw-r–r– 1 reader reader 487 2008-06-14 12:35 raw_tcpsniff.c
-rw-r–r– 1 reader reader 4664 2008-06-14 12:35 rst_hijack.c
-rw-r–r– 1 reader reader 716 2008-06-14 12:35 scope2.c
-rw-r–r– 1 reader reader 1111 2008-06-14 12:35 scope3.c
-rw-r–r– 1 reader reader 472 2008-06-14 12:35 scope.c
-rw-r–r– 1 reader reader 35 2008-06-14 12:35 shellcode
-rw-r–r– 1 reader reader 35 2008-06-14 12:35 shellcode.bin
-rw-r–r– 1 reader reader 1033 2008-06-14 12:35 shellcode.s
-rw-r–r– 1 reader reader 5478 2008-06-14 12:35 shroud.c
-rw-r–r– 1 reader reader 2070 2008-06-14 12:35 signal_example.c
-rw-r–r– 1 reader reader 1872 2008-06-14 12:35 simplenote.c
-rw-r–r– 1 reader reader 1695 2008-06-14 12:35 simple_server.c
-rw-r–r– 1 reader reader 62 2008-06-14 12:35 socket_reuse_restore
-rw-r–r– 1 reader reader 1477 2008-06-14 12:35 socket_reuse_restore.s
-rw-r–r– 1 reader reader 168 2008-06-14 12:35 stack_example.c
-rw-r–r– 1 reader reader 665 2008-06-14 12:35 static2.c
-rw-r–r– 1 reader reader 617 2008-06-14 12:35 static.c
-rw-r–r– 1 reader reader 3324 2008-06-14 12:35 synflood.c
-rw-r–r– 1 reader reader 1414 2008-06-14 12:35 time_example2.c
-rw-r–r– 1 reader reader 754 2008-06-14 12:35 time_example.c
-rw-r–r– 1 reader reader 25 2008-06-14 12:35 tiny_shell
-rw-r–r– 1 reader reader 648 2008-06-14 12:35 tiny_shell.s
-rw-r–r– 1 reader reader 4987 2008-06-14 12:35 tinyweb.c
-rw-r–r– 1 reader reader 6590 2008-06-14 12:35 tinywebd.c
-rw-r–r– 1 reader reader 2005 2008-06-14 12:35 tinyweb_exploit2.c
-rw-r–r– 1 reader reader 1747 2008-06-14 12:35 tinyweb_exploit.c
-rw-r–r– 1 reader reader 316 2008-06-14 12:35 typecasting.c
-rw-r–r– 1 reader reader 119 2008-06-14 12:35 uid_demo.c
-rw-r–r– 1 reader reader 1532 2008-06-14 12:35 update_info.c
-rw-r–r– 1 reader reader 102 2008-06-14 12:35 vuln.c
drwxr-xr-x 2 reader reader 100 2008-06-14 12:35 webroot
-rw-r–r– 1 reader reader 1178 2008-06-14 12:35 webserver_id.c
-rwxr-xr-x 1 reader reader 771 2008-06-14 12:35 xtool_tinywebd_cback.sh
-rwxr-xr-x 1 reader reader 1115 2008-06-14 12:35 xtool_tinywebd_reuse.sh
-rwxr-xr-x 1 reader reader 586 2008-06-14 12:35 xtool_tinywebd.sh
-rwxr-xr-x 1 reader reader 1054 2008-06-14 12:35 xtool_tinywebd_silent.sh
-rwxr-xr-x 1 reader reader 997 2008-06-14 12:35 xtool_tinywebd_spoof.sh
-rwxr-xr-x 1 reader reader 781 2008-06-14 12:35 xtool_tinywebd_steath.sh
root@hacking:~/booksrc # prima di inziare gi esercizi hp epnsato che non tutti hanno una tastiera americana,
bash: prima: command not found
root@hacking:~/booksrc #
root@hacking:~/booksrc #
prima di inziare gi esercizi ho pensato che non tutti hanno una tastiera americana,
allora mi son preparato e ho cercato chi linka listati on line:
Chapter 0x200 Programming
overflow.c
vuln.c
exploit.c
vuln2.c
env_exploit.c
getenvaddr.c
heap.c
bss_game.c
fmt_example.c
fmt_vuln.c
dtors_sample.c
hello.asm
shell.asm
shellcode.asm_original
shellcode.asm_final
stackshell.asm
tinyshell.asm
print.asm
printable_exploit.c
print2.asm
only_print.c
cleared_stack.c
Chapter 0x300 Networking
arpredirect.pl
hijack_rst.sh
shroud.sh
shroud2.sh
Chapter 0x400 Cryptology
crack.pl
ppm_gen.c
ppm_crack.c
fms.c
il sito? http://tecalibri.altervista.org/E/ERICKSON-J_arte.htm#p004
che scopro essere i listati della prima edizione che si può leggere on line
http://books.google.com/books?vid=ISBN8850323476&printsec=toc&dq=isbn:8850323476&hl=it#PPP1,M1
poi ho scoperto che l autore del libro con cd rom ubuntu hacks contenente i listati
usa il pc fin da quando era bambino: join erickson
http://www.tinker.tv/download/hacking2e_toc.
http://www.oreillynet.com/pub/au/1648 art hacking http://www.gizmosforgeeks.com/2008/02/24/book-review-hacking-the-art-of-exploitation/
Hacking and Security – 70 books
Citazione: |
Addison-Wesley Professional.Honeypots- Tracking Hackers.pdf Wiley.The Database Hacker’s Handbook- Defending Database Servers.chm John Wiley & Sons.Hacking GMail (ExtremeTech).pdf Hacking.Guide.V3.1.pdf A-List Publishing.Hacker Linux Uncovered.chm Hacker’S.Delight.chm Hacker.Bibel.[278.kB_www.netz.ru].pdf HackerHighSchool.pdf Hacker’s Desk Reference.pdf Hackers Beware Defending Your Network From The Wiley Hacker.pdf Addison Wesley – Hackers Delight 2002.pdf addison wesley – web hacking – attacks and defense.chm Addison Wesley, The Outlook Answer Book Useful Tips Tricks And Hacks (2005) Bbl Lotb.chm Anti-Hacker ToolKit – McGraw Hill 2E 2004.chm Auerbach.Pub.The.Hackers.Handbook.The.Strategy.Behind.Breaking.into.and.Defending.Networks.Nov.2003.eBook-DDU.pdf ceh-official-certified-ethical-hacker-review-guide-exam-312-50.9780782144376.27422.pdf ebook.oreilly.-.windows.xp.hacks.sharereactor.chm For.Dummies.Hacking.for.Dummies.Apr.2004.eBook-DDU.pdf For.Dummies.Hacking.Wireless.Networks.For.Dummies.Sep.2005.eBook-DDU.pdf Hack_Attacks_Revealed_A_Complete_Reference_With_Custom_Security_Hacking_Toolkit.chm hacker-disassembling-uncovered.9781931769228.20035.chm Hacking Cisco Routers.pdf Hacking the Code – ASP.NET Web Application Security Cookbook (2004) .chm John.Wiley.and.Sons.Hacking.Windows.XP.Jul.2004.eBook.pdf John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real.Stories.Behind.the.Exploits.of.Hackers.Intruders.and.Deceivers.Feb.2005.ISBN0764569597.pdf Jon.Erickson.Hacking.The.Art.Of.Exploitation.No.Starch.Press.2003.chm Linux-Server.Hacks-OReilly.pdf McGraw Hill – Web Applications (Hacking Exposed).pdf McGraw.Hill.HackNotes.Linux.and.Unix.Security.Portable.Reference.eBook-DDU.pdf McGraw.Hill.HackNotes.Network.Security.Portable.Reference.eBook-DDU.pdf McGraw.Hill.HackNotes.Web.Security.Portable.Reference.eBook-DDU.pdf McGraw.Hill.HackNotes.Windows.Security.Portable.Reference.eBook-DDU.pdf OReilly – Flickr Hacks Tips and Tools for Sharing Photos Online (Feb 2006).chm Oreilly Access Hacks Apr 2005.chm OReilly,.Digital.Video.Hacks.(2005).DDU.LotB.chm oreilly,.visual.studio.hacks.(2005).ddu.lotb.chm Oreilly.Amazon.Hacks.eBook.LiB.chm oreilly.firefox.hacks.ebook-lib.chm OReilly.Google.Hacks.2nd.Edition.Dec.2004.ISBN0596008570.chm OReilly.Google.Maps.Hacks.Jan.2006.chm Oreilly.Linux.Desktop.Hacks.Mar.2005.eBook-LiB.chm OReilly.Linux.Server.Hacks.Volume.Two.Dec.2005.chm OReilly.Network.Security.Hacks.chm OReilly.PayPal.Hacks.Sep.2004.eBook-DDU.chm OReilly.PC.Hacks.Oct.2004.eBook-DDU.chm OReilly.Perl.Hacks.Tips.and.Tools.for.Programming.Debugging.and.Surviving.May.2006.chm OReilly.Skype.Hacks.Tips.and.Tools.for.Cheap.Fun.Innovative.Phone.Service.Dec.2005.chm OReilly.Statistics.Hacks.May.2006.chm OReilly.Ubuntu.Hacks.Tips.and.Tools.for.Exploring.Using.and.Tuning.Linux.Jun.2006.chm OReilly.VoIP.Hacks.Tips.and.Tools.for.Internet.Telephony.Dec.2005.chm oreilly.windows.xp.hacks.2nd.edition.feb.2005.lib.chm OReilly.Word.Hacks.Oct.2004.eBook-DDU.chm prentice hall – pipkin – halting the hacker- a practical guide to computer security, 2nd edition.chm Que – UNIX Hints Hacks.chm Que.Certified.Ethical.Hacker.Exam.Prep.Apr.2006.chm Syngress – Hack Proofing Linux (2001).pdf Syngress – Hack Proofing Your Identity in the Information Age – 2002.pdf Syngress — Hack Proofing Your Wireless Network.pdf Syngress.Hacking.a.Terror.Network.Nov.2004.ISBN1928994989.pdf the-database-hackers-handbook-defending-database-servers.9780764578014.25524.chm Websters.New.World.Websters.New.World.Hacker.Dictionary.Sep.2006.pdf Wiley.Hacking.Firefox.More.Than.150.Hacks.Mods.and.Customizations.Jul.2005.eBook-DDU.pdf Wiley.Hacking.Google.Maps.and.Google.Earth.Jul.2006.pdf Wiley.Hacking.GPS.Mar.2005.ISBN0764598805.pdf Wiley.Lifehacker.Dec.2006.pdf |
Codice: |
http://hackingandsecurity.com/hacks/ |
hackish.altervista.org/forum/viewtopic.php?t=199 http://www.yyztech.ca/articles/view/review_hacking_the_art_of_exploitation
************************************************************************************************
djvù
http://it.wikipedia.org/wiki/DjVu
Sito Web:
http://www.djvu.org/
block notes salvare .txt oppure .html
Youtube http://www.youtube.com/
Scarica video
*********************************************************************************************
ho fatto l attore per anni ma le organizzatrici rimangono mediatiche e brumate
fortuna che a salvare al serata ci ha pensato la bionda