Shellcoder S Programming Uncovered Uncovered Series


Download Shellcoder S Programming Uncovered Uncovered Series PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Shellcoder S Programming Uncovered Uncovered Series book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Shellcoder's Programming Uncovered (Uncovered series)


Shellcoder's Programming Uncovered (Uncovered series)

Author: Kris Kaspersky

language: en

Publisher: БХВ-Петербург

Release Date: 2005


DOWNLOAD





How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are

Shellcoder's Programming Uncovered


Shellcoder's Programming Uncovered

Author: Kris Kaspersky

language: en

Publisher:

Release Date: 2005


DOWNLOAD





Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits


Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits

Author: Ivan Sklyarov

language: en

Publisher: БХВ-Петербург

Release Date: 2006


DOWNLOAD





Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoors, exploits (locals and remotes), scanners (CGI and port), smurf and fraggle attacks, and brute-force attacks. In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format-string errors and other less common errors, this guide includes the source code of all the described utilities on the accompanying CD-ROM.