Difference between revisions of "HackingLinuxExposed.com"

(Page Updated by AboutUsBot)
 
(migration import)
 

(2 intermediate revisions by 2 users not shown)



Line 1: Line 1:
 +
{{DISPLAYTITLE:HackingLinuxExposed.com - A comprehensive book about security, tools and hacking Linux}}
 
{{ Domain_Page |
 
{{ Domain_Page |
 
  reviews = <reviews></reviews> |
 
  reviews = <reviews></reviews> |
Line 18: Line 19:
 
[http://www.hackinglinuxexposed.com/about/ read more]
 
[http://www.hackinglinuxexposed.com/about/ read more]
  
 +
==Contact==
 +
{{WhoisProxyRegistration}}
 
==Logos==
 
==Logos==
 
[[Image:Logo-hackinglinuxexposed-com.gif]]
 
[[Image:Logo-hackinglinuxexposed-com.gif]]
Line 35: Line 38:
 
FoundationHouseChicago.com
 
FoundationHouseChicago.com
 
Avue.com
 
Avue.com
Amazon.com
 
 
BuildingLinuxVpNs.net
 
BuildingLinuxVpNs.net
 
ComputerBooksDirect.co.uk
 
ComputerBooksDirect.co.uk
Line 49: Line 51:
 
</WikiPages>
 
</WikiPages>
  
[[Category:Computers]]
+
 
[[Category:Software]]
+
__NOTOC__
[[Category:Operating Systems]]
+
[[Category:Attacks]]
[[Category:Linux]]
 
[[Category:Security]]
 
[[Category:Hacking Linux Exposed]]
 
[[Category:Hacking Exposed]]
 
[[Category:Hack]]
 
[[Category:Hacking]]
 
 
[[Category:Cracking]]
 
[[Category:Cracking]]
 
[[Category:Full Disclosure]]
 
[[Category:Full Disclosure]]
[[Category:Attacks]]
+
[[Category:Hacking Exposed]]
[[Category:Unix]]
+
[[Category:Full_Disclosure]]
[[Category:Root]]
+
[[Category:Hacking_Exposed]]
[[Category:Tools]]
 
[[Category:Exploits]]
 
[[Category:Vulnerabilities]]
 
[[Category:Bind]]
 
[[Category:Worm]]
 
[[Category:Trojan]]
 
 
 
__NOTOC__
 
 
 

Latest revision as of 10:49, 5 November 2013

Title

Hacking Linux Exposed

Description

Our goals for Hacking Linux Exposed, Second Edition were lofty: create a Second Edition that was still standalone, that covers the latest and greatest tools and abuses, and provides the groundwork to make it possible to understand vulnerabilities that will arive in the future. We didn't want a book that was simply a list of bugs in software packages - that would be out of date before it went to print. Instead Hacking Linux Exposed, Second Edition shows you how to understand vulnerabilities in software and configuration that can affect you at anytime, providing numerous explicit examples through both our discussions and functional code.

We've compressed, trimmed, tightened, or in some cases deleted old material to make room for almost 200 pages of new content and three new chapters. We've taken out some sections of the first edition and are making them available on our web page to make way for additional material without sacrificing quality. We have also done some significant rearranging of material. We've placed some of the more common threads of the book, such as buffer overflows and format string attacks earlier in the book. We now have an entire chapter covering Denial of Service attacks, and an entirely new section devoted to actions an attacker will take after compromising your machine. Of course we discuss all the new features available in newer editions of classic hacking tools, as well as coverage of new tools and attacks.

We can't list everything that we cover in Hacking Linux Exposed, Second Edition, but here's a pretty bulleted list to get you started:

read more

Contact

Whois information is public, but in response to some people wanting to keep their contact information private, many domain name Registrars offer a "privacy" or "proxy" service to mask the domain name owner. This domain is most likely using a proxy service.

Logos

Logo-hackinglinuxexposed-com.gif

Additional Information

Related Domains



Retrieved from "http://aboutus.com/index.php?title=HackingLinuxExposed.com&oldid=24737749"