Flylib.com
Stealing the Network. How to Own a Continent
Stealing the Network. How to Own a Continent
ISBN: 1931836051
EAN: N/A
Year: 2004
Pages: 105
BUY ON AMAZON
Table of Contents
BackCover
Stealing the Network - How to Own a Continent
Foreword
Chapter 1: Control Yourself
Discipline
Shelter
Just Because You re Paranoid...
Day minus 300
Day Minus 200
Day Minus 100
Day Minus 50
The Beginning... The Man Appears
Chapter 2: The Lagos Creeper Box
NOC NOC, Who s There?
Doing the Meat Thing
Aftermath... The Last Diary Entry of Demetri Fernandez
Chapter 3: Product of Fate: The Evolution of a Hacker
Interest Piqued: The Fire Is Started
What? You ve Got To Be Kidding Me
You Want Me To Do What?
It Was Only Harmless Fun...
Reaping the Rewards: A Little Bit Goes a Long Way
Money - The Root of All Evil
Innocence Lured
Spreading the Net Wide
Making Plans
Plans Become Actions
Breaking the Code
Choosing the Equipment
Working with Friends
Stepping Way over the Line
Aftermath... Report of an Audit
Chapter 4: A Real Gullible Genius
Day 1: Thoughts and Recon
Day 2: Deploying the Rogue
Day 3: Accessing the Network
Day 4: Busting Root on the Apple
Day 5: Over 20,000 Social Security Numbers
Flir s Late Night
Later that Morning...
Retracting the Tendrils
Epilogue
Aftermath... Security - A People Problem
Chapter 5: For Whom Ma Bell Tolls
The Call
Maxim s
Shall We Play a Game?
The Booty
The Switch
The Drop
The Marketplace
Landline
Keys to the Kingdom
Inside the Golden Pyramid
Wiretap
Aftermath
Aftermath... The Investigation
Chapter 6: Return on Investment
Playing the Market
Information Leakage at the Packet Level
Corrupted by Greed
Revenge of the Nerd
A Lead from Las Vegas
The Call of Opportunity
Initial Reconnaissance
Shrax: The Ultimate Rootkit
Throwaway Account
Seeking the Prize
Hacking .MIL
Triumph and New Toys
Aftermath...The Investigation Continues
Chapter 7: h3X and The Big Picture
Exceptional Circumstances
Evolution and Lack Thereof
HyperText Target Protocol
Setup.exe
Hard Work
Working on Weekends
RD
Don t like Mondays
Aftermath... The Knuth Perspective
Chapter 8: The Story of Dex
A New Day - A New Dollar
The Hunt
The Real Fun Begins
Ralph Bechie
Robert Montague
Niklas Fleschier
Reality Comes Back
Aftermath... The Watchers
Chapter 9: Automatic Terror Machine
The Games Begin
An Army of One
Let s Get Physical
Of Greed and Girls
A Worm by Any Other Name
Human after All
Chapter 10: Get Out Quick
Day Plus 1
Time Zone Unknown
Appendix: The Making of STC
List of Figures
List of Code
Stealing the Network. How to Own a Continent
ISBN: 1931836051
EAN: N/A
Year: 2004
Pages: 105
BUY ON AMAZON
Java I/O
A Graphical User Interface for Output Streams
Data Streams
Compressing and Decompressing Streams
Sockets
Remote Devices
SQL Hacks
Hack 4. UPDATE the Database
Hack 19. Convert Strings to Dates
Hack 20. Uncover Trends in Your Data
Hack 83. Find the Top n in Each Group
Hack 95. Issue Automatic Updates
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Using Exponents in Formulas
Importing Data from Access Databases
Introduction
Exploring Exponential and Logarithmic Functions
Computing Present Value
Cisco Voice Gateways and Gatekeepers
Review Questions
SIP Pros and Cons
Assigning COR Lists with SRST
Review Questions
Appendix A. Answers to Chapter-Ending Review Questions
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Eight Creating Visions Biased to Your Solution
Chapter Eleven Gaining Access to People with Power
Chapter Fourteen Getting Started with the Process
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
Appendix A Value Justification Example
GDI+ Programming with C#
Summary
Colors, Fonts, and Text
Regions and Clipping
The PrintDocument and Print Events
Creating Owner-Drawn List Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies