Flylib.com
Stealing the Network. How to Own a Continent
Stealing the Network. How to Own a Continent
ISBN: 1931836051
EAN: N/A
Year: 2004
Pages: 105
BUY ON AMAZON
Table of Contents
BackCover
Stealing the Network - How to Own a Continent
Foreword
Chapter 1: Control Yourself
Discipline
Shelter
Just Because You re Paranoid...
Day minus 300
Day Minus 200
Day Minus 100
Day Minus 50
The Beginning... The Man Appears
Chapter 2: The Lagos Creeper Box
NOC NOC, Who s There?
Doing the Meat Thing
Aftermath... The Last Diary Entry of Demetri Fernandez
Chapter 3: Product of Fate: The Evolution of a Hacker
Interest Piqued: The Fire Is Started
What? You ve Got To Be Kidding Me
You Want Me To Do What?
It Was Only Harmless Fun...
Reaping the Rewards: A Little Bit Goes a Long Way
Money - The Root of All Evil
Innocence Lured
Spreading the Net Wide
Making Plans
Plans Become Actions
Breaking the Code
Choosing the Equipment
Working with Friends
Stepping Way over the Line
Aftermath... Report of an Audit
Chapter 4: A Real Gullible Genius
Day 1: Thoughts and Recon
Day 2: Deploying the Rogue
Day 3: Accessing the Network
Day 4: Busting Root on the Apple
Day 5: Over 20,000 Social Security Numbers
Flir s Late Night
Later that Morning...
Retracting the Tendrils
Epilogue
Aftermath... Security - A People Problem
Chapter 5: For Whom Ma Bell Tolls
The Call
Maxim s
Shall We Play a Game?
The Booty
The Switch
The Drop
The Marketplace
Landline
Keys to the Kingdom
Inside the Golden Pyramid
Wiretap
Aftermath
Aftermath... The Investigation
Chapter 6: Return on Investment
Playing the Market
Information Leakage at the Packet Level
Corrupted by Greed
Revenge of the Nerd
A Lead from Las Vegas
The Call of Opportunity
Initial Reconnaissance
Shrax: The Ultimate Rootkit
Throwaway Account
Seeking the Prize
Hacking .MIL
Triumph and New Toys
Aftermath...The Investigation Continues
Chapter 7: h3X and The Big Picture
Exceptional Circumstances
Evolution and Lack Thereof
HyperText Target Protocol
Setup.exe
Hard Work
Working on Weekends
RD
Don t like Mondays
Aftermath... The Knuth Perspective
Chapter 8: The Story of Dex
A New Day - A New Dollar
The Hunt
The Real Fun Begins
Ralph Bechie
Robert Montague
Niklas Fleschier
Reality Comes Back
Aftermath... The Watchers
Chapter 9: Automatic Terror Machine
The Games Begin
An Army of One
Let s Get Physical
Of Greed and Girls
A Worm by Any Other Name
Human after All
Chapter 10: Get Out Quick
Day Plus 1
Time Zone Unknown
Appendix: The Making of STC
List of Figures
List of Code
Stealing the Network. How to Own a Continent
ISBN: 1931836051
EAN: N/A
Year: 2004
Pages: 105
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Quantifying and Analyzing Activity Risks
Managing Activity Risks
Managing Project Risk
Conclusion
FileMaker Pro 8: The Missing Manual
Advanced Relationships
Containers in Calculations
The Let Function and Variables
Running Scripts
Sharing Your Database
Programming Microsoft ASP.NET 3.5
The Web Forms Model
Paging Through Data Sources
ASP.NET Mobile Controls
Configuration and Deployment
ASP.NET Security
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
The ROI of Lean Six Sigma for Services
Success Story #2 Bank One Bigger… Now Better
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Phase 4 Performance and Control
Raising the Stakes in Service Process Improvement
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Trim-Out Installation
Computer Network Basics
Troubleshooting a Home Network
Home Automation Controllers
Integrating the Connected Home
Comparing, Designing, and Deploying VPNs
VPN Devices
Advantages and Disadvantages of MPLS Layer 3 VPNs
IPsec: A Security Architecture for IP
Summary
Ensuring High Availability in an IPsec VPN
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies