Maxim Levin Guide for hackers
Sold 0
Refunds 0
Good feedbacks 0
Bad feedbacks 0
Maxim Levin
L80 Manual for hackers. - M .: Beech Press,
2006. - 416 p.
Have you ever wondered how this "devil" hakeruudaetsya again and again appear in
system, despite the fact that you seemed to completely shut down access to it? If you want to
hacking in the future, this guide will provide you with invaluable assistance. It also will be useful
administrators, as even in 2000 there are a great many ways to illegally enter the
UNIX, Windows 2000, and, of course, Windows 98, as well as in any other system. In no case do not consider this book as a comprehensive work, in charge of all life situations.
CAUTION Author of this book has one goal - NATIONAL
EDUCATION! But if you are using this LABOUR, falls, the blame will be you
YOURSELF!
© Maxim Levin, 2006. Ideas, text, drawing, notes.
© AVP Virus Encyclopedia, 2006.
© Sir Hackalot, Simson Garfinkel, Mike Smith, 2006.
© Mikhail Achard, 2006.
© James Kobielus Vladimir Galatenko, Julie Bort, 2006.
© Anita Carve Alexander Avduevskii, Li Che, 2006.
© Cindy Cullen, Richard Power, 2006.
Contents
Part one. How to crack UNIX. . . . . . . . . . . . . . . . . . .2
Part two. The system Unix. . . . . . . . . . . . . . . . . . . . . . . . .23
Part Three. Protecting networks. . . . . . . . . . . . . . . . . . . . . . . . .42
Part Four. Viruses. . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Part of the fifth. Scrap and protect the network. . . . . . . . . . . . .55
Part Six. WWW $ server - security and hacking. . . . . .88
Part Seven. We protect and attack Unix. . . . . . . . . . .99
Part Eight. "Emergency" network. . . . . . . . . . . . . . . . . . .107
Of the ninth. Money and hacking. . . . . . . . . . . . . . . . . . . . .115
Part of the tenth. How to protect and / or attack
Intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125
Part Eleven. Mail - defense and attack. . .138
Part of the twelfth. We protect and attack Linux. . . . .143
Part Thirteen. Breaking and protect
Windows 2000. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183
Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206
Contents
L80 Manual for hackers. - M .: Beech Press,
2006. - 416 p.
Have you ever wondered how this "devil" hakeruudaetsya again and again appear in
system, despite the fact that you seemed to completely shut down access to it? If you want to
hacking in the future, this guide will provide you with invaluable assistance. It also will be useful
administrators, as even in 2000 there are a great many ways to illegally enter the
UNIX, Windows 2000, and, of course, Windows 98, as well as in any other system. In no case do not consider this book as a comprehensive work, in charge of all life situations.
CAUTION Author of this book has one goal - NATIONAL
EDUCATION! But if you are using this LABOUR, falls, the blame will be you
YOURSELF!
© Maxim Levin, 2006. Ideas, text, drawing, notes.
© AVP Virus Encyclopedia, 2006.
© Sir Hackalot, Simson Garfinkel, Mike Smith, 2006.
© Mikhail Achard, 2006.
© James Kobielus Vladimir Galatenko, Julie Bort, 2006.
© Anita Carve Alexander Avduevskii, Li Che, 2006.
© Cindy Cullen, Richard Power, 2006.
Contents
Part one. How to crack UNIX. . . . . . . . . . . . . . . . . . .2
Part two. The system Unix. . . . . . . . . . . . . . . . . . . . . . . . .23
Part Three. Protecting networks. . . . . . . . . . . . . . . . . . . . . . . . .42
Part Four. Viruses. . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Part of the fifth. Scrap and protect the network. . . . . . . . . . . . .55
Part Six. WWW $ server - security and hacking. . . . . .88
Part Seven. We protect and attack Unix. . . . . . . . . . .99
Part Eight. "Emergency" network. . . . . . . . . . . . . . . . . . .107
Of the ninth. Money and hacking. . . . . . . . . . . . . . . . . . . . .115
Part of the tenth. How to protect and / or attack
Intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125
Part Eleven. Mail - defense and attack. . .138
Part of the twelfth. We protect and attack Linux. . . . .143
Part Thirteen. Breaking and protect
Windows 2000. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .183
Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206
Contents