Site Network: Home | My Creation | Freedom 4 U |

 

Welcome and I hope you'll enjoy what I try to bring to you. If you are looking for toys,games, computer stuff and ebooks you came to the right place !!! ........ All IT ebooks cost only $6 US.......Our payment of method is by paypal.



The Purpose Driven® Life

What on Earth Am I Here For? by Rick Warren

The #1 international bestseller! This 40-day spiritual journey will help you understand why you are alive and God’s amazing plan for you both now and for eternity. Winner of the Gold Medallion Book Award and Christian Book of the Year Award. "Excellent for Homeschool Use"

The Purpose Driven Life (2002) is an advice book written by Christian author Rick Warren and published by Zondervan. The book has been on the New York Times Bestseller list for advice books for 174 weeks (as of May 2006). The book offers readers a 40-day personal spiritual journey, and presents what Warren says are God's five purposes for human life on Earth. As of November 2005, The Purpose Driven Life has been translated into 56 languages and was the bestselling book in the world for 2003, 2004, and 2005.

Our price : $5 US ( ebooks (pdf) )
$ 10 US ( ebooks ( pdf) + audio (mp3) )

For who need hardcover. The price is $18.90 US.
Pls click here.

Labels:

posted by inlink5 @ 1:21 AM, ,




Top Primary Schools Exam Papers P1-6! Yr 2005 - 2006

Each subjects! - SG $ 12 .

For P1, P2, purchase all 3 subjects costs only SG $36 SG $15.

For P3, P4, purchase all 4 subjects costs only SG $48 SG $25.

Subjects : English, Math, Chinese,Science.
Level and years available:

1) P1 exam papers ( year 2005 )
2) P3 exam papers ( year 2005 )
3) P2 exam papers ( year 2006 )
4) P4 exam papers ( year 2006 )

( Answers are provided! )

Schools :


Maha Bodhi
Methodist Girls
Rosyth
Catholic high
Kong Hwa
Nanyang
Red Swastika
Tao Nan
Ai Tong
Raffles Girls
ACS
SCGS
Temasek
Pei Chun













Click here to download sample. [ Exam paper ]

P.S. sample are without answer.


Here's how to order
To order and all enquires, please send an email to

exampaper.info@gmail.com

I will reply within 24 hours as i have not yet automated the system yet. Thank you.

Payment Method
All payment shall be made via POSB/DBS bank transfer or paypal.

Labels:

posted by inlink5 @ 8:24 PM, ,




What is an ebook ?



An e-book, or 'electronic book' is just what it says it is - something you read on screen instead of on paper.

You can load books onto small computers like PDAs to read while you're on the move.
So, next time before you get on the bus you can download that thriller or romance e-book rather than read the newspaper of the person next to you.


All IT eBook published at this blog cost only $8.00 $6 US. If you are interested to buy one pls email your request to me at inlink.info@yahoo.com. I will reply within 24 hours as i have not yet automated the system yet.

Below are some of the ebooks that i listed BUT there are so many more i have ( around 300+ ) that it take time to list it. i have complied a list in excel format. Pls go ahead and download it ..... HERE.

Make a search for the ebooks you want. i am sure you can find the one you want. Or you if can't find, email me and i will try my best to source it for you. Thank you!

Categories :

1) Google/Gmail
2) Hacker
3) Security
4) Wireless
5) Microsoft
6) Web



Pls come back again as i am still uploading more security and hacking ebooks.


































Name:






Email :






ebooks required























Labels:

posted by inlink5 @ 11:48 AM, ,




Add More Levels of Undo to Excel for Windows

We all are familiar with Excel's fabulous Undo feature, which enables a user to undo his mistakes. Unfortunately, the default level for this is a mere 16 changes. With the hack in this section, you can change the registry so that you can undo up to 100 mistakes.

When you use Excel's Undo feature, and you reach undo number 16, the first undo is replaced by the 17th, and so on. Also, as soon as you save your workbook, the Undo Stack is wiped out, and the Undo History is lost. This is because when you press Save, you're actually telling Excel that you are happy with the changes you made, so it decides for you that your Undo History is no longer required.

You might have discovered that at times having only your last 16 changes retained in the Undo Stack is not enough. Instead of living with this, you can change this by editing the registry, something that works only in Windows. To do this, begin by quitting Excel completely. Select Start -> Run, and in the Open box type Regedit.exe. Click OK. When regedit starts, expand the folder for HKEY_CURRENT_USER. Then expand the Software folder underneath it, then the Microsoft folder, the Office folder, and the 10.0 folder. (This last folder varies for different versions. 10.0 is for Excel 2002.) Expand the Excel folder, and finally, open the Options folder.

Select Edit -> New -> DWORD Value, enter the word UndoHistory, and press Enter. Double-click the UndoHistory you just created, and enter a value greater than 16 and less than 100.

Hopefully, 100 undos will be enough for even the most demanding users, though the issue with save clearing the undo stack persists.

[extracted from 'EXCEL HACKS'] Download this ebook for only $8 US.

posted by inlink5 @ 1:36 AM, ,




Web

Ajax Hacks
This book “was written for people enjoy hacking web applications creatively, as well as for both experienced and new web-application developers.” The release goes onto offer a bullet list of take-aways that readers will get out of the book. They are as follows:

* Enhance HTML forms with Ajax capabilities, customizing them to fit user expectations
* Explore the Google Maps, Yahoo! Maps, and GeoURL APIs, and combine them
* Work with cookies in an Ajax environment Manage Browser History and the Back button
* Create Ajax applications using Direct Web Remoting for Java and Ruby on Rails
* Build applications on the Prototype, Rico, and script.aculo.us JavaScript libraries
* Manage network connections and web services


Amazon Hacks
Amazon Hacks is a collection of tips and tools for getting the most out of Amazon.com, whether you're an Amazon shopper, Amazon Associate developing your online storefront and honing your recommendations for better linking and more referral fees, a seller listing your own products for sale on Amazon.com, or even a programmer building your own application on the foundation provided by the rich Amazon Web Services API.





CSS Hacks & Filters

* Cascading Style Sheets (CSS) is a method of describing how a Web page should look in a Web browser, but a growing number of browsers do not support CSS in the same way, forcing developers to constantly play catch-up to keep their sites consistent

* Bestselling author Joe Lowery eases the pain for those Web developers who aren't feeling the CSS love-he guides readers through real-world workarounds that will help a CSS-based site look and work the way it was meant to

* Readers will grit their teeth, clench their fists, and roll their eyes for the last time once they learn how to craft fluid multi-column layouts, build interactive navigation, fix the Box Model, implement CSS hacks in Dreamweaver, and more cool tricks .


Hack Notes - Network Security
It show you how to guard against standard and uncommon network penetration methodologies and eliminate susceptibility to e-commerce hacking. Plus, learn to bolster Web application security and secure vulnerable hacking function areas.



Online Investing Hacks
ndividual investors have become more computer-literate and
technology-dependent than ever before. Whether you're looking for
suitable investments, studying alternatives, or managing your
portfolios, you need data. The Internet can be a goldmine of
financial data and research, but today's online investors also use
spreadsheets, databases, and financial applications to select,
study and manage investments. If your proficiency has grown to the
point where you crave industrial-strength tips and tools to turbo-
charge your efforts, Online Investing Hacks is the book for you.

Swing Hacks
Swing Hacks Tips & Tools for Building Killer GUIs O´Reilly Vlg. GmbH & Co. Marinacci, Joshua Adamson, Chris, "Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you´re a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O´Reilly is a reference to the cool stuff in Swing. It´s about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn´t know you could even do that with Swing!" "Swing Hacks will show you how to extend Swing´s rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows.

You´ll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. "Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn´t do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, "Swing Hacks isn´t just for the developer who wants to build a better user interface. It´s also ideally suited for client-side Javadevelopers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications.


TiVo Hacks - 100 Industrial - Strength Tips & Tools

PTSLUG has another title in the O'Reilly's "Hacks" series, a manual that lets you get the most out of your TiVo or other personal video recorder (PVR). This is one of those special interest book, perfect for anyone who has a TiVo video recorder. Armed with just a screwdriver and basic understanding of computer hardware (or willingness to learn), preeminent hackability awaits. First, TiVo Hacks covers tips for changing the order of recorded programs, activating the 30-second skip to blaze through commercials, and more, by using magical remote-control codes. Then, once you take the lid off your TiVo, you will learn how to gain even more fun and functionality. You can upgrade the hard drive for more hours of recording. Log in to the serial port for command-line access to programming data, log files, closed-captioning data, display graphics on the TiVo screen, and even play MP3s.

Readers who use advanced hacks to put TiVo on their home network via the serial port, Ethernet, USB, or wireless (with 802.11b WiFi) will watch a whole new world open up. By installing various open source software packages, you can use TiVo for mail, instant messaging, caller-ID, and more. It's also easy to run a web server on TiVo to schedule recordings, access lists of recorded shows, and even display them on a web site. While TiVo gives viewers personalized control of their TVs, TiVo Hacks gives users personalized control of TiVo. My rating: 4 stars for easy to read, thorough and well indexed.


Web Hacking:Attacks and defense

Intended for a course that is teaching students how and where web-based applications are particularly vulnerable. The authors explain the complete range of attacks, including buffer overflows—the most problematic of all attacks.

Features

* Keen analysis on how hackers infiltrate web commerce systems, including database servers and payment systems.
* Case studies are a unique feature, effectively communicating to students what they need to know.
* Complete methodologies show actual techniques and attacks and give the students a chance to learn by experiencing how the hacker actually works.

Web Site Measurement Hacks
In order to establish and then maintain a successful presence on the Web, designing a creative site is only half the battle. What good is an intricate Web infrastructure if you're unable to measure its effectiveness? That's why every business is desperate for feedback on their site's visitors: Who are they? Why do they visit? What information or service is most valuable to them?

Unfortunately, most common Web analytics software applications are long on functionality and short on documentation. Without clear guidance on how these applications should be integrated into the greater Web strategy, these often expensive investments go underused and underappreciated.

Enter Web Site Measurement Hacks, a guidebook that helps you understand your Web site visitors and how they contribute to your business's success. It helps organizations and individual operators alike make the most of their Web investment by providing tools, techniques, and strategies for measuring--and then improving--their site's usability, performance, and design. Among the many topics covered, you'll learn:

* definitions of commonly used terms, such as "key performance indicators" (KPIs)
* how to drive potential customers to action
* how to gather crucial marketing and customer data
* which features are useful and which are superfluous
* advanced techniques that senior Web site analysts use on a daily basis


XML Hacks
Like the other books in this series, 'XML Hacks' provides a wide range of Tips, Tricks, Techniques and other good things (not all of them beginning with T). Featuring a veritable who's who of well-known XML authors and experts, (including Micah Dubinko, Rick Jeliffe, Jason Hunter, Michael Smith as well as editor and lead author Michael Fitzgerald), this is a book that is grounded in day to day practice.

Organised into seven chapters, the book opens with a series of introductory hacks that look at dealing with XML documents, from how to look at an XML document in a browser to how to style a document with CSS to testing documents on-line and off-line. The final hack in this chapter shows how to use Java to process XML documents. No previous Java knowledge is assumed, and the hack walks through the process of how to install and configure Java so that jar files can be used from the command-line. This is an important step because Java offers many open-source tools for processing XML, using this hack makes these available even to those who know little, if anything, about it.

The next chapter looks at XML documentation creation. This includes a round-up of editors and tools, including , Emacs, Vim, MS Office and more. Other hacks in this section include converting documents from CSV or text files, converting from HTML to XHTML and so on.


Yahoo Hacks
I've been using Yahoo! for as long I've been using the web, somewhere around 10 years. Over the years, Yahoo! has become a part of my daily life. If I want to find a local business, I type yp.yahoo.com before I reach for the yellow pages in my kitchen, and then I type maps.yahoo.com to find my way to that business. I browse news, check stock prices, and get movie times with Yahoo! Even though I interact with Yahoo! technology on a regular basis, I've never thought of Yahoo! as a technology company.

Now that Yahoo! has released a Web Services interface, my perception of them is changing. Suddenly having programmatic access to a good portion of their data has me seeing Yahoo! through the eyes of a developer rather than a user. Reading through the documentation on their new site for Yahoo! developers, I've suddenly realized that there is some impressive technology behind the services I took for granted.

Yahoo! isn't the first big web company to give outside developers access to their data via web services. Google and Amazon kicked things off in 2002 with free web APIs. These two became the canonical examples I heard at conferences, and I've seen quite a few demo applications that pull in current book prices or Google search results. eBay released a for-pay API in 2003, giving paying developers access to their auction database. And now Yahoo!'s impressive entry into the web services fray is another sign that big web companies have embraced outside developers in a big way.

Labels:

posted by inlink5 @ 8:12 PM, ,




Microsoft

Active Directory Cookbook, 2nd edition
If you're among those looking for practical hands-on support, help is here with Active Directory Cookbook, Second Edition, a unique problem-solving guide that offers quick answers for Active Directory and updated for Window Server 2003 SP1 and R2 versions. This best selling book provides solutions to over 300 problems commonly encountered when deploying, administering, and automating Active Directory to manage users in Windows 2000 and Windows Server 2003.



Acess Hacks
With this valuable guide, experienced users of Microsoft Access can finally take their database skills to the next level. Access Hacks offers direct, hands-on tips and tools that help relieve the frustrations of users struggling to master the program's various complexities. Also ideal for beginners looking to grasp the fundamentals of this popular database management program.



Cleaning windows XP for dummies 2004
* This wide-ranging guide helps ordinary users fight back against Windows slowdowns, glitches, and annoyances
* Windows is the world’s dominant desktop operating system, with 93.8 percent of the market as of 2002
* Packed with savvy tips for decluttering a system, speeding up access to programs and data, customizing the interface, rooting out resource hogs, tuning up e-mail and Web browser performance, protecting against viruses, and more
* Focuses on Windows XP and covers the new Service Pack 2, but many techniques are applicable to older Windows versions


Excel Hacks
In this addition to the 'Hacks' series we get to look at '100 industrial-strength tips and tools' for Microsoft's Excel. As with the other books in the series, such as Google Hacks or Spidering Hacks, the individual items in the book range from the interesting to the 'so-what' to the brilliant.

Organised into eight chapters, which start with 'reducing workbook and worksheet frustration' and finish with 'connecting Excel to the outside world', by way of 'hacking Excel's built-in features', 'naming hacks', 'hacking pivot tables', 'charting hacks', 'hacking formulas and functions' and 'macro hacks'. As you would expect from that list, most aspects of using Excel get at least some coverage.


Windows Server Hacks
The tools, or hacks in this book reveal techniques that go well beyond basic management tasks found in most handbooks. Hacks range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, performance, security, and backup and recovery. No matter which Windows Server you use--NT, IIS, 2000, or 2003--Windows Server Hacks will put the knowledge and expertise of veteran system administrators to work for you.


Windows XP Hacks
With the "Hacks" series of books, the people at O'Reilly wanted to provide something that the was missing in the world of computer books. I'm talking about a collection of practical hacks (could also be called tips) that show the reader how to do something new or accomplish a task quicker. This is one of those books that can be read from cover to cover or you can just read specific parts as you need them.

This time I'm taking a look at some cool things that can be accomplished in Windows XP, probably the most popular operating system for home users at the moment.


Word Hacks
The book includes plenty of predictable but potentially highly useful power-user hacks for tweaking Word’s user interface, creating custom views of documents, managing bullets and numbering and styles, and working with custom dictionaries. It also includes an interesting administrative hack for reporting and reviewing Word’s options settings, and it even discusses a way to use Word as a Windows backup utility.

Some of the hacks make clever use of RTF and XML formats to accomplish tasks that are difficult or impossible to accomplish in any other way, such as stripping unneeded list templates and direct formatting from Word documents. Others demonstrate how to use Python, Perl, Ruby, and Google with Word, and how to create PDF files from Word without Adobe Acrobat.

Labels:

posted by inlink5 @ 7:37 PM, ,




Wireless

WI-FOO
why does this book exist and why did we name it so? To answer the first question - there are multiple white papers and books on wireless security (only two years ago you would hardly find any). Many of them, including this book, are centered around 802.11 standards. Most explain the in-built security features of 802.11 protocols, future 802.11 security standards development and requirements, list (and sometimes describe in details) known security weaknesses of 802.11 networks and the countermeasures that a wireless network manager or system administrator can take to reduce the risks presented by these flaws. However all books (except this one) do not describe how the "hackers" can successfully attack wireless networks and how system administrators can detect and defeat these attacks - step-by-step, as the actual attack takes place.

We believe that the market needs, above all else a hands-on, down-to-earth source on penetration testing of wireless networks. Such a source should come "from the field" and have to be based on the practical experience of penetrating a great deal of client and testing wireless nets - an experience that many in the underground and few in the information security community possess. As a core of the Arhont wireless security auditing team, the authors perform wireless penetration testing on nearly a daily basis and we hope that our experience will give you a good jump-start on practical wireless security assessment and further network hardening.


Wireless Hacking

Wherever You Go, There You Are!
Build, Deploy and Maintain a "Homebrew" Wi-Fi Network Create a
Low-Cost/High-Yield Development Roadmap for Wireless Enthusiasts,
Households, Small Businesses and Community Groups Customize
Wireless Operating Systems, Install Antennas, Build Solar-Powered
Access Points and More
A few years ago, wireless internet access was just a glint in the
eyes of the IT industry. Today, most notebook PCs ship with built-
in Wi-Fi capability, and Wi-Fi access points have become as
important as the espresso machines at the neighborhood Starbucks.
Wireless Hacking provides a low-cost/high-yield blueprint for
wireless enthusiasts, households, small businesses and communities.
After reading this book, you will be able to build, deploy and
maintain a "homebrew" Wi-Fi network. And if you just want some geek
fun, Wireless Hacking won't disappoint. You will be challenged!
Written by members of the pioneering SoCalFreeNet Wireless Users
Group, Wireless Hacking delivers a series of interrelated projects,
with full integration of both hardware and software hacks.
Some of the wireless hacks in this book include: Use existing
Ethernet cables to provide low-voltage power to Access Points with
no additional source of electricity. Install Linux and FreeBSD on
low-cost (under $150) Soekris single-board computers. Modify the
firmware of your Linksys WRT54g. Construct Solar Powered Access
Points and Repeaters for your Wi-Fi network. WarDrive for wireless
access points with tools like Kismet and NetStumbler. Install an
antenna without killing yourself or changing the earth's orbit.
Expand your Wi-Fi network beyond one box and 50 users with MESH
network topology.
...Many more hacks and modifications inside!


Wireless Hacks
The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.

Wireless technology changes not only the way we talk to our devices, but also what we ask them to do. With greater flexibility, broader range, and increased mobility, wireless networks let us live, work, and think differently. Wireless networks also open up a vast range of tasty new hack possibilities, from fine-tuning network frequencies to hot-rodding handhelds.











Wireless Network Hacks & Mods For Dummies
Provides specific, step-by-step instructions to troubleshoot common wireless headaches and enable readers to turn their wireless home network into a high-performance, whole-home wireless infrastructure capable of entertainment networking and even home automation.

The book will also tell readers how to find, buy and install the “latest and greatest” wireless equipment – informing them about the next-generation wireless gear that moves the wireless LAN beyond just the realm of computers and into telephony, entertainment, home automation/control, and even automotive networking.

Labels:

posted by inlink5 @ 7:18 PM, ,




security

Building Internet Firewalls, 2nd Edition
Building Internet Firewalls covers more than 100 Internet services and protocols, including email and News; Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo); file transfer and sharing services (e.g., NFS, Samba); remote access services (e.g., Telnet, the BSD "r" commands, SSH, BackOrifice 2000); real-time conferencing services (e.g., ICQ, talk); naming and directory services (e.g., DNS, NetBT, the Windows Browser); authentication and auditing services (e.g., PAM, Kerberos, RADIUS); administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics); intermediary protocols (e.g., RPC, SMB, CORBA, IIOP); and database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server).


Intrusion Prevention Fundamentals
Intended as an “in-depth technical book” for sophisticated readers, Intrusion Prevention Fundamentals generally fulfills this role, but readers should note that it is published by Cisco and generally focuses on that company’s products.This book should find a home in IT security departments that use Cisco products. For everyone else, including security generalists, better books are available.


IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks (Visits: 1403)
IPSec, the suite of protocols for securing any sort of traffic that moves over an Internet Protocol (IP) network, promises big things for online business. IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks catalogs the specifications that compose this suite and explain how they fit into intranets, virtual private networks (VPNs), and the Internet.




Managing security with snort and IDS tools
Written for network and security administrators running Linux/Unix networks, this book covers everything from simple packet sniffers to intrusion detection systems to GUI interfaces designed for managing IDS (Intrusion Detection Systems) applications.

It explains how to shut down and secure workstations, servers, firewalls, routers, sensors, and just about most every network device.



Mastering web services security
Quickly learn how to build a secure Web services system using available programming tools, models, and specifications

Web services promise to simplify business programming and to improve interoperability, but they won’t deliver on these promises without effective security. Written by the leading security experts in the field, this innovative book clearly shows how to build a real-world, secure Web services system. Using theory, examples, and practical advice, the authors examine each of the security technologies used for providing secure Web services, emphasizing how security works with XML and SOAP. And with the help of two case studies, you’ll also learn how to effectively plan and deploy a secure Web services system for both J2EE and .NET.


Implementing and Administering Security in a Windows Server 2003 Network(Exam Cram™ 2 (Exam 70-299))
Thorough coverage—Covers every Microsoft Exam 70-299 objective, including security policies, patch management, network communications security, authentication, authorization, PKI, and much more.

* Offers students a single source for concise review of every topic they need to master in order to pass Microsoft's Exam 70-299.

Labels:

posted by inlink5 @ 8:38 PM, ,




Hacker


Hack Proofing Your Identity in the Information Age E-Book
If you're like most people, your day includes writing checks or using a debit card at stores, using credit cards at the gas station, or using an ATM terminal to get cash. If you're among the growing numbers of Internet users, you've probably also bought a thing or two online, and might even do your banking or trade stocks online.



Hacking secrets revealed
THE internet is ever growing and you and I are truly pebbles in a vast ocean of information. They say what you don’t know can’t hurt you. When it comes to the Internet believe quite the opposite. On the Internet there a millions and millions of computer users logging on and off on a daily basis.




Hackers beware
Eric Cole succeeds in explaining how hackers break into computers, steal information, and deny services to machines' legitimate users. An intended side effect of his documentary efforts is a feeling for how network-connected computers should be configured for maximum resistance to attack. Cole, who works with the attack-monitoring SANS Institute as an instructor and security consultant, conveys to his readers specific knowledge of offensive and defensive weaponry as well as general familiarity with attack strategies and good security practices. Hackers Beware is a good primer and really earns its price by going into enough detail to enable readers to actually do something to make their resources safer.




Hacker's Challenge
Find out if you have what it takes to keep the bad guys out of your network. This real-world resource contains 20+ hacking challenges for you to solve. Plus, you'll get in-depth solutions for each, all written by experienced security consultants.





Hacking: The Art of Exploitation
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b. This book is for both technical and non-technical people who are interested in computer security. If you're serious about hacking, this book is for you.



Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
the perfect gift for any computer geek in your life. Come to think of it, if you're contemplating setting up a small computer network at home connected to the Net via DSL or cable modem, make this a gift to yourself. The obviously well versed Anonymous cracker tells you all you need to know about how your system will be attacked, and how you can protect yourself.





The Art of Intrusion
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time.

Labels:

posted by inlink5 @ 1:47 AM, ,




google/Gmail hack

Hacking Gmail 2006
The first book to unlock the true power behind Gmail. Hacking Gmail will immediately appeal to Google and Gmail fans. This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog.





Hacking Google Maps and Google Earth 2006
This one-of-a-kind resource contains 500 pages of jaw-dropping
hacks, mods, and customizations. These include creating mashups
with data from other sources such as Flickr, building a space station tracker, hacking Maps with Firefox PiggyBank, and building a complete community site with Maps and Earth. Now you can map out locations, get driving directions, zoom into any point on the globe, display real time traffic, and much more.




Google hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as “Google Hacking.” This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious “Google hackers,” this book aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. The sophistication and functionality of Google searches has resulted in several publications boasting Google’s superiority to other search engines, providing tips, tricks and even hacks for novice, intermediate, and advanced Internet users. However few of these publications even mention security, and none are written with the IT professional’s security tasks in mind.

Google Hacks 2003
Since Google appeared online in 1998, it managed to cast a shadow over all other search engines and claim the throne of the most popular search engine. Google earned this position by providing surfers with great quality when searching. It was just a matter of time when someone decided to put together a book that will help users get the most out of Google.

If you're wondering why the name "Google Hacks", the answer is in the preface of the book where the authors explain that "hacks" here mean "quick-n-dirty" solutions to programming problems or interesting techniques for getting a task done. Sounds great, doesn't it?


Google Maps Hacks, 2006
The authors begin with a complete introduction to the "standard" features of Google Maps. The adventure continues with 60 useful and interesting mapping projects that demonstrate ways developers have added their own features to the maps. After that's given you ideas of your own, you learn to apply the techniques and tools to add your own data to customize and manipulate Google Maps. Even Google seems to be tacitly blessing what might be seen as unauthorized use, but maybe they just know a good thing when they see one.

With the tricks and techniques you'll learn from Google Maps Hacks, you'll be able to adapt Google's satellite map feature to create interactive maps for personal and commercial applications for businesses ranging from real estate to package delivery to home services, transportation and more.






Labels: ,

posted by inlink5 @ 10:32 PM, ,