SynopsisIntended for beginning hackers and business managers interested in security, this guide explains how to break into the Windows operating system, network servers, e-mails, instant messages, and web sites. The 20-year-old author walks through input validation attacks, buffer overflows, social engineering techniques, password cracking, denial of servi, In an effort to create a secure computing platform, computer security has become increasingly important over the last several years. It is imperative to know the right tools and resources to use so that you can better protect your system from becoming the victim of attacks. Understanding the nature of things like file encryption, firewall, and viruses help you make your system more secure., Learn how to use good hacking to prevent your system from becoming the victim of attacks! "The Unofficial Guide to Ethical Hacking, Second Edition" defines the difference between hackers - those who crack a computer system for the sheer challenge of doing so - and crackers - an elusive class of computer criminals who break into systems, release viruses, and deface Web sites. Ethical hackers often help out system administrators by notifying them of loopholes in their systems before crackers can get to them and cause damage. More than just a guide to hacking, this book explores all aspects of computer security in a hands-on and easy-to-comprehend manner - a must-read for any computer user who wants to learn how a system is cracked and how you can better protect yourself. With helpful resources and clear, step-by-step instructions on various hacking techniques, this book features the most up-to-date and comprehensive information and methods, covering file encryption, firewalls, and viruses, as well as new topics such as instant messenger hacking, intellectual property thefts, identity attacks, and much more.
LC Classification NumberQA76.9.A25F33 2006