Maxim Levin Guide for hackers

Sold 0
Refunds 0
Good feedbacks 0
Bad feedbacks 0

Maxim Levin

L80 Manual for hackers. - M .: Beech Press,

2006. - 416 p.


Have you ever wondered how this "devil" hakeruudaetsya again and again appear in

system, despite the fact that you seemed to completely shut down access to it? If you want to

hacking in the future, this guide will provide you with invaluable assistance. It also will be useful

administrators, as even in 2000 there are a great many ways to illegally enter the

UNIX, Windows 2000, and, of course, Windows 98, as well as in any other system. In no case do not consider this book as a comprehensive work, in charge of all life situations.


CAUTION Author of this book has one goal - NATIONAL

EDUCATION! But if you are using this LABOUR, falls, the blame will be you

YOURSELF!


© Maxim Levin, 2006. Ideas, text, drawing, notes.

© AVP Virus Encyclopedia, 2006.

© Sir Hackalot, Simson Garfinkel, Mike Smith, 2006.

© Mikhail Achard, 2006.

© James Kobielus Vladimir Galatenko, Julie Bort, 2006.

© Anita Carve Alexander Avduevskii, Li Che, 2006.

© Cindy Cullen, Richard Power, 2006.


Contents

Part one. How to crack UNIX. . . . . . . . . . . . . . . . . . .2

Part two. The system Unix. . . . . . . . . . . . . . . . . . . . . . . . .23

Part Three. Protecting networks. . . . . . . . . . . . . . . . . . . . . . . . .42

Part Four. Viruses. . . . . . . . . . . . . . . . . . . . . . . . . . . .47

Part of the fifth. Scrap and protect the network. . . . . . . . . . . . .55

Part Six. WWW $ server - security and hacking. . . . . .88

Part Seven. We protect and attack Unix. . . . . . . . . . .99

Part Eight. "Emergency" network. . . . . . . . . . . . . . . . . . .107

Of the ninth. Money and hacking. . . . . . . . . . . . . . . . . . . . .115

Part of the tenth. How to protect and / or attack

Intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125

Part Eleven. Mail - defense and attack. . .138

Part of the twelfth. We protect and attack Linux. . . . .143

Part Thirteen. Breaking and protect

Windows 2000. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183

Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206

Contents