Stamp-45-off-English

Haking with examples. Vulnerability, hacking, protection

Write a review
Old price: 20.15
11.08
You save: 9.07 (45%)
10 days
34967135
Отправка в течение 12-17 рабочих дней
+
Author:Yaroshenko A.A.
Cover:Soft
Category:Computer & Technology
ISBN:978-5-94387-700-1
Dimensions: 170x15x240cm
From this book you will not learn how to break banks - nothing illegal will be described here. We do not want our readers or anyone else to have some problems because of our book.
It will be told: about the basic principles of hacking sites (and so that the theory does not disperse with practice, a real example of hacking will be considered), a separate chapter will be devoted to theft of the mailbox (we will show how the mailbox is hacked - various methods will be considered).
You will find out: how anonymous communication on the network is arranged by e -mail and all kinds of instant messengers, how to visit sites anonymously, how to create an anonymous mailbox and which messenger allows you to register without linking to the phone number.
The most popular hackers tools will be considered - Kali Linux, which contains several hundred (more than 600) tools oriented to various information security tasks, and tools for finding vulnerabilities and breaking information systems - Metasploit.
A separate chapter is devoted to hacking passwords. Basically, we will break the Windows account password and consider how you can hack EFS encryption and the BitLocker encrypted disc. Also consider how the WiFi password is hacking.
For most tasks, no special knowledge is required, except for basic skills in working with a computer. And for those who want to master the techniques “more serious”, knowledge of the basics of programming will be required
Author:
Author:Yaroshenko A.A.
Cover:
Cover:Soft
Category:
  • Category:Computer & Technology
Publication language:
Publication Language:Russian
Age restrictions:
Age restrictions:12+
ISBN:
ISBN:978-5-94387-700-1

No reviews found