Mostrando 181 - 200 Resultados de 36,031 Para Buscar 'HJCK~', tiempo de consulta: 1.79s Limitar resultados
  1. 181
    por Flickenger, Rob
    Publicado 2003
    Tabla de Contenidos: “…CVS: Adding and Removing Files and DirectoriesRemoving Files; Removing Directories; CVS: Branching Development; CVS: Watching and Locking Files; CVS: Keeping CVS Secure; Remote Repositories; Permissions; Developer Machines; CVS: Anonymous Repositories; Creating an Anonymous Repository; Installing pserver; Using a Remote pserver; Backups; Backing Up with tar over ssh; See also:; Using rsync over ssh; See also:; Archiving with Pax; Creating Archives; Expanding Archives; Interactive Restores; Recursively Copy a Directory; Incremental Backups; Skipping Files on Restore; See also…”
    Libro electrónico
  2. 182
    por Krikorian, Raffi
    Publicado 2003
    Tabla de Contenidos: “…TiVo Remote Control Hacks; 1.2. Remote Control Hacks; 1.3. Backdoor Hacks; 1. …”
    Libro electrónico
  3. 183
    por Sofield, Shannon
    Publicado 2004
    “…Hacks series…”
    Libro electrónico
  4. 184
    por Paul, Joshua
    Publicado 2005
    “…With digital video, the hacking possibilities are now limitless, for both amateurs and professional artists. …”
    Libro electrónico
  5. 185
    por Gralla, Preston
    Publicado 2005
    Tabla de Contenidos: “…Miscellaneous Startup and Shutdown Hacks; 1.7.2. Automatically Turn On Num Lock, Scroll Lock, and Caps Lock; 1.7.3. …”
    Libro electrónico
  6. 186
    Publicado 2011
    Tabla de Contenidos: “…Retro Gaming Hacks; A Note Regarding Supplemental Files; Foreword; Credits; About the Author; Contributors; Acknowledgements; Preface; Why Retro Gaming Hacks?…”
    Libro electrónico
  7. 187
    por Lockhart, Andrew
    Publicado 2007
    Tabla de Contenidos: “…Check for Passwords That Never Expire; Running the Hack; 3. …”
    Libro electrónico
  8. 188
    por Von Hagen, William
    Publicado 2005
    Tabla de Contenidos: “…Linux Server Hacks, Volume Two; Contributors; Acknowledgments; Preface; How to Use This Book; How This Book Is Organized; Conventions Used in This Book; Using Code Examples; How to Contact Us; Safari® Enabled; Got a Hack?…”
    Libro electrónico
  9. 189
    por Hale-Evans, Ron
    Publicado 2006
    Tabla de Contenidos: “…Scamper for Ideas; How It Works; In Real Life; End Notes; 23. Deck Yourself Out; The Creative Whack Pack; The Observation Deck; In Real Life; End Notes; See Also; 24. …”
    Libro electrónico
  10. 190
    por Gibson, Rich
    Publicado 2006
    Tabla de Contenidos: “…API tips and tricks -- Ch. 7. Extreme Google maps hacks…”
    Libro electrónico
  11. 191
    por Waingrow, Kirk
    Publicado 1999
    “…UNIX hints and hacks…”
    Libro electrónico
  12. 192
    Publicado 2009
    “…This book will teach you how to: Import your entire movie collection, sync with multiple computers, and save YouTube videos Remotely access your home network, audio, and video, and even control your desktop Develop native applications for the iPhone and iPod touch on Linux, Windows, or Mac Check email, receive MMS messages, use IRC, and record full-motion video Run any application in the iPhone's background, and mirror its display on a TV Make your iPhone emulate old-school video game platforms, and play classic console and arcade games Integrate your iPhone with your car stereo Build your own electronic bridges to connect keyboards, serial devices, and more to your iPhone without "jailbreaking" iPhone Hacks explains how to set up your iPhone the way you want it, and helps you give it capabilities that will rival your desktop computer. …”
    Libro electrónico
  13. 193
    por Dwivedi, Himanshu
    Publicado 2008
    Tabla de Contenidos: “…EncryptionSIP Security Attacks; Username Enumeration; SIP Password Retrieval; Man-in-the-Middle Attack; Registration Hijacking; Spoofing SIP Proxy Servers and Registrars; Denial of Service via BYE Message; Denial of Service via REGISTER; Denial of Service via Un-register; Fuzzing SIP; Summary; 3: Signaling: H.323 Security; H.323 Security Basics; Enumeration; Authentication; Authorization; H.323 Security Attacks; Username Enumeration (H.323 ID); H.323 Password Retrieval; H.323 Replay Attack; H.323 Endpoint Spoofing (E.164 Alias); E.164 Alias Enumeration; E.164 Hopping Attacks…”
    Libro electrónico
  14. 194
    Publicado 2008
    “…Hacks…”
    Libro electrónico
  15. 195
    por Shema, Mike
    Publicado 2012
    Libro electrónico
  16. 196
    por Cravens, Jesse
    Publicado 2012
    “…HTML 5 hacks…”
    Libro electrónico
  17. 197
    por Loewengart, Victoria
    Publicado 2012
    Tabla de Contenidos: “…Cover; Title; Copyright; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: Background; Chapter 2: Crimeware Products; "Zero Day" exploit toolkits; "Zeus"; "SpyEye"; "Darkness" DDoS botnet tool; Chapter 3: Unintentional Crimeware; SkyGrabber; Passware Kit; Maltego; Chapter 4: The Present and The Future; Chapter 5: Fighting Back; How to protect yourself from botnet infections; Active defense; Conclusion; Authoritative Sources Of Information; Bibliography; ITG Resources…”
    Libro electrónico
  18. 198
    Publicado 2013
    Tabla de Contenidos: “…The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit…”
    Libro electrónico
  19. 199
    por Cache, Johnny
    Publicado 2010
    “…Hacking exposed, wireless wireless security secrets and solutions…”
    Libro electrónico
  20. 200
    por Wiles, Jack
    Publicado 2012
    Tabla de Contenidos: “…Bomb threats in ChicagoCheck those phone closets; Remove a few door signs; Review video security logs; Consider adding motion-sensing lights; Subterranean vulnerabilities; Clean Out Your Elephant Burial Ground; Spot Check Those Drop Ceilings; Internal auditors are your friends; BONUS: Home Security Tips; Summary; Chapter 3: More about locks and ways to low tech hack them; A little more about locks and lock picking; What kinds of locks are the most popular?…”
    Libro electrónico