Mostrando 201 - 220 Resultados de 440 Para Buscar '"USB"', tiempo de consulta: 0.08s Limitar resultados
  1. 201
    Publicado 2016
    Tabla de Contenidos: “…-- Understanding your role as a mobile app developer -- Brainstorming app ideas -- The Design Thinking process -- Empathize -- Define -- Ideate -- Prototype -- Test -- Computational thinking -- Best practices to design apps -- MIT App Inventor - purpose and potential -- Discovering the possibilities of MIT App Inventor -- MIT App Inventor examples -- Stopwatch and Timer -- Yahtzee -- BYJ3S -- Loops -- Quartet -- Brain Reaction Accelerator -- ConstHelp - Contractor Tools -- UMATI -- Ez School Bus Locator -- Youth Radio -- Rover 800 Remote -- Summary -- Chapter 2: Setting Up MIT App Inventor 2 -- The initial setup -- System requirements -- Signing up a Google account -- Logging in to MIT App Inventor -- Connectivity setup -- Downloading the AI2 Companion app -- Connecting your computer and Android device with WiFi -- Connecting the emulator or connecting using a USB cable -- Step 1 - installing the App Inventor setup software -- Step 2 - launch aiStarter -- Step 3 - opening a project and connecting to the emulator -- Step 4 - setting up your device with a USB cable -- Step 5 - connecting your computer and device (authenticating if necessary) -- Step 6 - testing the connection -- Summary -- Chapter 3: Navigating the App Inventor Platform -- The projects view -- Creating a new project -- The Designer -- Palette -- Viewer -- Components -- Properties -- Media -- Creating a game app -- Creating the UI in designer -- IDE -- The Blocks editor -- The Blocks drawer -- Types of Blocks -- Using Blocks to program Fling -- Summary -- Chapter 4: Fling App - Part 2 -- Adding a scoring feature -- Coding scoring blocks -- Updating the score label…”
    Libro electrónico
  2. 202
    Publicado 2014
    Tabla de Contenidos: “…6.2 Lateral Movement and Network Reconnaissance6.2.1 Information Reuse Attacks; 6.2.1.1 Credentials Dumping; 6.2.1.2 Pass-the-Hash Attack Model; 6.2.2 File Sharing Services (Shared Access); 6.2.3 Batch Scripting: Command Execution and Scheduling; 6.2.4 USB Spreading; References; 7 Why Targeted Cyber Attacks Are Easy to Conduct?…”
    Libro electrónico
  3. 203
  4. 204
    por Monk, Simon
    Publicado 2012
    “…To build Android/IOIO devices, you write the program on your computer, transfer it to your Android, and then communicate with the IOIO via a USB or Bluetooth connection. The IOIO board translates the program into action. …”
    Libro electrónico
  5. 205
    Publicado 2015
    Tabla de Contenidos: “…; Night vision; An illuminating experience; The Elaborate light switch re-visited; Is that a badger?; Using USB cameras; Installing the webcam; Taking a snap; Snap snap snap; The multicamera setup; The Slave driver; Summary; Chapter 7: Building a Web-Based Control Panel; Installing the web server; Testing the PHP5 installation; Being in control…”
    Libro electrónico
  6. 206
    Publicado 2021
    Tabla de Contenidos: “…Reverse Shell -- Bind Shell -- Reverse Shell -- Reverse Shell Using SET -- Social Engineering with the USB Rubber Ducky -- A Practical Reverse Shell Using USB Rubber Ducky and PowerShell -- Generating a PowerShell Script -- Starting a Listener -- Hosting the PowerShell Script -- Running PowerShell -- Download and Execute the PS Script -- Reverse Shell -- Replicating the Attack Using the USB Rubber Ducky -- Summary -- Chapter 6 Advanced Enumeration Phase -- Transfer Protocols -- FTP (Port 21) -- Exploitation Scenarios for an FTP Server -- Enumeration Workflow -- Service Scan -- Advanced Scripting Scan with Nmap -- More Brute-Forcing Techniques -- SSH (Port 22) -- Exploitation Scenarios for an SSH Server -- Advanced Scripting Scan with Nmap -- Brute-Forcing SSH with Hydra -- Advanced Brute-Forcing Techniques -- Telnet (Port 23) -- Exploitation Scenarios for Telnet Server -- Enumeration Workflow -- Service Scan -- Advanced Scripting Scan -- Brute-Forcing with Hydra -- E-mail Protocols -- SMTP (Port 25) -- Nmap Basic Enumeration…”
    Libro electrónico
  7. 207
    por Buchanan, William
    Publicado 2000
    Tabla de Contenidos:
    Libro electrónico
  8. 208
    por Loshin, Peter
    Publicado 2013
    Tabla de Contenidos: “…; 2.5.3 Checking the Tor Log; 2.5.4 Reconfiguring Tor for Firewalls; 2.5.5 If Tor Still Won't Connect; 3 Using Tails; 3.1 What Is in Tails; 3.2 Setting Up for Tails; 3.2.1 Getting Tails; 3.2.2 Configuring the System to Boot Tails; 3.3 Using Tails; 3.3.1 Booting Tails; 3.3.2 Shutting Tails Down; 3.3.3 Installing Tails on a USB Drive; 3.3.4 Installing Tails to a USB Device, Manually; 3.3.5 Upgrading Tails ("Clone & Upgrade"); 3.3.6 Persistent Storage on Tails; 3.3.7 Configuring Persistence; 3.3.8 Whisperback…”
    Libro electrónico
  9. 209
    por Ebner, Jürgen
    Publicado 2023
    Tabla de Contenidos: “…5.4.4 Passwort-Attacken‌ -- 5.4.5 Clientseitige Angriffe -- 5.5 Zusammenfassung -- Kapitel 6: Kali Linux für Security Assessments vorbereiten -- 6.1 Kali-Pakete anpassen -- 6.1.1 Quellen finden -- 6.1.2 Build-Abhängigkeiten installieren -- 6.1.3 Änderungen durchführen‌ -- 6.1.4 Build erstellen -- 6.2 Linux-Kerne‌l kompilieren -- 6.2.1 Einführung und Voraussetzungen -- 6.2.2 Quellen finden -- 6.2.3 Kernel konfigurieren -- 6.2.4 Pakete kompilieren und erstellen -- 6.3 Erstellen eines individuellen Kali-Live-ISO-Image‌s -- 6.3.1 Voraussetzungen -- 6.3.2 Erstellen von Live-Images mit verschiedenen Desktop-Umgebungen -- 6.3.3 Ändern der Liste installierter Pakete -- 6.3.4 Verwenden von Hooks zum Optimieren des Live-Images -- 6.3.5 Hinzufügen von Dateien zum ISO-Image oder Live-Filesystem -- 6.4 Hinzufügen von Persistenz‌ auf einem USB-Stick -- 6.4.1 Erstellen einer unverschlüsselten Persistenz auf einem USB-Stick -- 6.4.2 Erstellen einer verschlüsselten Persistenz‌ auf einem USB-Stick -- 6.4.3 Verwenden von mehreren Persistenzspeichern -- 6.5 »Automatisierte« Installation -- 6.5.1 Antworten auf Installationsabfragen vorbereiten -- 6.5.2 Erstellen der Voreinstellungsdatei -- 6.6 Zusammenfassung -- 6.6.1 Kali-Pakete ändern -- 6.6.2 Linux-Kernel neu kompilieren -- 6.6.3 Benutzerdefinierte ISO-Images erstellen -- Kapitel 7: Ablauf eines Penetrationstests -- 7.1 Informationen sammeln‌ -- 7.1.1 Was nun? …”
    Libro electrónico
  10. 210
    Tabla de Contenidos: “…; Symptoms and Remedies; Resetting Permissions; Taking Back Ownership; System Restore; Summary; Chapter 9: Repairing the Windows File System Using a Portable OS; Accessing the Contents of the Windows install.wim File; Creating a Windows Installation on a USB Flash Drive; Repairing Windows Files Using a GNU/Linux Disk; So How Do You Know What to Repair?…”
    Libro electrónico
  11. 211
    por Lowe, Scott, 1970-
    Publicado 2010
    Tabla de Contenidos: “…VMware vSphere 4 Administration Instant Reference; Acknowledgments; About the Authors; Contents; Introduction; What Is Covered in This Book; Who Should Buy This Book; How to Contact the Authors; Part I: Building a VMware vSphere Environment; Chapter 1: Introduction to vSphere; Understand the Legacy Features of vSphere; Understand the New Features of vSphere; Chapter 2: Installing and Configuring ESX and ESXi; Prepare for Installation; Install ESX and ESXi in Graphical Mode; Install ESX Text Mode; Perform a Scripted Installation Using a USB Device; Postinstallation Configurations…”
    Libro electrónico
  12. 212
    por Brahmbhatt, Samarth. author
    Publicado 2013
    Tabla de Contenidos: “…""GUI Track-Bars and Callback Functions""""Callback Functions""; ""ROIs: Cropping a Rectangular Portion out of an Image""; ""Region of Interest in an Image""; ""Accessing Individual Pixels of an Image""; ""Exercise""; ""Videos""; ""Displaying the Feed from Your Webcam or USB Camera/File""; ""Writing Videos to Disk""; ""Summary""; ""Part 2: Advanced Computer Vision Problems and Coding Them in OpenCV""; ""Chapter 5: Image Filtering""; ""Image Filters""; ""Blurring Images""; ""Resizing Imagesâ€?…”
    Libro electrónico
  13. 213
    Publicado 2015
    Tabla de Contenidos: “…""Insight: Daniel Porter""""Insight: John Storyk""; ""Chapter 4 Microphones""; ""Fundamentals of the Human Voice""; ""Microphone Design Types""; ""Polar Response""; ""Frequency Response""; ""Microphone Experiments""; ""Dynamic Microphones""; ""Condenser Microphones""; ""Digital Microphones""; ""USB Microphones""; ""Chapter 5 The Engineer""; ""The Role of the Engineer in Voice Recording""; ""Collaborationâ€?…”
    Libro electrónico
  14. 214
    por Purdum, Jack. author
    Publicado 2015
    Tabla de Contenidos: “…; Assumptions About You; What You Need; An Atmel-Based Microcontroller Card; Types of Memory; Flash Memory; SRAM; EEPROM; Making the Choice; Board Size; Input/Output (I/O) Pins; Breadboard; Miscellaneous Parts; Installing and Verifying the Software; Verifying the Hardware; Attaching the USB Cable; Selecting Your μc Board in the Integrated Development Environment; Port Selection…”
    Libro electrónico
  15. 215
    Tabla de Contenidos: “…Connecting to a Remote RegistryWindows PowerShell; Using Group Policy Preferences; Comparing Registries; Advanced Troubleshooting; Running RegEdit from Windows Installation Media; Booting into the Recovery Options in Vista and Windows 7; Booting into the Recovery Options in Windows 8 and Windows 8.1; Using RegEdit from the Recovery Environment; Repairing the Registry using a Portable OS; Creating a Portable Windows OS USB Flash Drive; Repair the Registry Without Booting Windows; Summary; Chapter 5: Securing the Registry; Physical Security-Locking the Door; Disable the Remote Registry Service…”
    Libro electrónico
  16. 216
    por Smith, Jan
    Publicado 2012
    Tabla de Contenidos: “…; GIMP Works on Windows, Mac, and GNU/Linux; System Requirements; GIMP Is Free Open Source Software; Windows: Downloading and Installing GIMP; Portable GIMP for Windows: Installing GIMP on a USB Drive, CD, or DVD; Mac: Downloading and Installing GIMP; Snow Leopard and Leopard (Mac OS X 10.6x, Mac 10.5x); Tiger: Downloading and Installing GIMP; GNU/Linux; Ubuntu; Extra Functionality in GIMP via Plugins; Summary; CHAPTER 2 Getting to Know the GIMP Workspace; In This Chapter; Is This Chapter for You?…”
    Libro electrónico
  17. 217
    Publicado 2015
    Tabla de Contenidos: “…OverclockingSetting up wireless cards; Setting up a 3G USB modem with Kali Linux; Setting up the SSH service; SSH default keys and management; Reverse shell through SSH; Stunnel; Installing a Stunnel client; Wrapping it up with an example; Summary; Chapter 3: Penetration Testing; Network scanning; Nmap; Wireless security; Cracking WPA/WPA2; Creating wordlists; Capturing traffic on the network; Tcpdump; Man-in-the-middle attacks; Getting data to the Pi; ARP spoofing; Ettercap; Ettercap command line; Driftnet; Tuning your network capture; Scripting tcpdump for future access; Wireshark…”
    Libro electrónico
  18. 218
    por Crawford, Sharon, 1942-
    Publicado 2000
    “…Windows 2000, the successor to NT, introduces many technologies that weren't available in NT, including Plug-and-Play, support for USB devices, power management features, and more. …”
    Libro electrónico
  19. 219
    Publicado 2016
    Tabla de Contenidos: “…Cover -- Titel -- Impressum -- Inhaltsverzeichnis -- Einleitung -- Kapitel 1: Der Raspberry Pi -- 1.1 Das Board -- 1.1.1 Der Prozessor -- 1.1.2 Die GPU (Graphics Processing Unit) -- 1.1.3 Audio -- 1.1.4 Netzwerk und USB -- 1.1.5 CSI (Camera Serial Interface) -- 1.1.6 DSI (Display Serial Interface) -- 1.1.7 Status-LEDs -- 1.1.8 Der Schacht für die SD-Karte -- 1.1.9 GPIO (General Purpose Input and Output) -- 1.2 Ein Gehäuse für den Raspberry Pi -- 1.3 Das richtige Netzteil -- 1.4 Tastatur, Maus und HDMI-Kabel -- 1.5 Die SD-Karte -- Kapitel 2: Booten und konfigurieren -- 2.1 Das Betriebssystem auf die SD-Karte laden -- 2.2 Booten -- 2.2.1 Reboot und richtig ausschalten -- 2.2.2 Mögliche Fehler -- 2.3 Der Raspberry Pi und das Netzwerk -- 2.4 Der Desktop -- 2.5 Den Raspberry Pi headless betreiben -- 2.6 Der Raspberry Pi und das WLAN -- 2.7 Ein Backup -- Kapitel 3: Linux auf dem Raspberry Pi -- 3.1 Verzeichnisse -- 3.2 Dateien -- 3.3 Suchen -- 3.4 Berechtigungen -- 3.5 Benutzer verwalten -- 3.6 Administrator werden -- 3.7 Dateien und Verzeichnisse packen -- 3.8 Softwarepakete verwalten -- 3.9 Netzwerk -- 3.10 Prozesse -- 3.11 Gemischtes -- Kapitel 4: Projektvorbereitung -- 4.1 BlueJ installieren -- 4.2 Pi4J installieren -- 4.3 Pi4J in BlueJ einbinden -- 4.4 Das Buchprojekt installieren -- 4.5 Ein Projekt anlegen und Pi4J testen -- 4.6 Ein Überblick über das Buchprojekt -- 4.7 Das Gertboard -- 4.7.1 Das Testprogramm -- 4.7.2 Die Klasse TestLED -- Kapitel 5: Datum und Zeit -- 5.1 Die Date-Klasse -- 5.1.1 Jede Zeitangabe gehört zu einer Zeitzone und einem Sprachraum -- 5.2 Die Klassen Calendar und GregorianCalendar -- 5.3 Datum und Zeit formatieren und parsen -- 5.4 An welchem Wochentag habe ich Geburtstag? …”
    Libro electrónico
  20. 220
    Publicado 2015
    Tabla de Contenidos: “…Aber sicher doch: Hard- und Software korrekt absichern -- Festplatte absichern per BitLocker -- Nach Windows-Updates suchen -- Passende Maßnahmen gegen Identitätsdiebstahl -- Schlau abgeblitzt: Malware effektiv blocken -- Computer sicher gegen Viren schützen -- 12 Wenn's brennt - ­System reparieren -- Gut gerüstet: Backup für den Notfall erstellen -- Alles auf einen Rutsch sichern per Systemabbild -- Für den Fall: bootfähigen USB-Systemreparatur-Stick erstellen -- Wenn der PC beim Arbeiten lahm wird: den Turbo-Modus aktivieren -- Schritt 1: Autostart aufräumen -- Schritt 2: Karteileichen entfernen -- Schritt 3: Vorherige Windows-Installation entfernen -- Die Wiederherstellungs-Umgebung aufrufen und nutzen -- Zurücksetzen von Windows 10 leicht gemacht -- Index…”
    Libro electrónico