Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
14Activity
0 of .
Results for:
No results containing your search query
P. 1
Script Kiddie Cookbook

Script Kiddie Cookbook

Ratings: (0)|Views: 431|Likes:
Published by kktamang09

More info:

Published by: kktamang09 on May 20, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/24/2010

pdf

text

original

 
1
 The Script Kiddie Cookbook  Abstract:
Computer Security for Everyday Users
 Copyright 2005by Matthew J. Basham
 
2
The Script Kiddie Cookbook: Computer Security for Everyday Users
Matthew J. BashamCopyright ©2005Published by:Lulu Press (http://www.lulu.com)All rights reserved. No part of this book may be reproduced or transmitted in any form or  by any means electronic or mechanical, including photocopying, recording, or by anyinformation storage and retrieval system, without written permission from the publisher or the author, except for the inclusion of brief quotations in a review. Any reproductionsfor learning purposes should be reported to authors for accounting purposes(Basham.Matt@spcollege.edu
 
)Printed in the United States of America 1 2 3 4 5 6 7 8 9 0This manuscript was supplied camera-ready by the author.
 
3
Table of Contents of the Script Kiddie Cookbook available athttp://www.lulu.com 
Chapter 1 Introduction ……………………………………………… 5Unit I: Legal Stuff ……………………………………………………… 10Chapter 2: Legal system basics ……………………………………… 11Chapter 3: Cases of Interest ……………………………………… 42Chapter 4: Acceptable Use Policies ……………………………… 94Unit 2: Hacking History and Foundational Stuff ……………………… 105Chapter 5: History and Psychology of Hacking ……………………… 106Chapter 6: Networking Frameworks ……………………………… 115Chapter 7: Logic Problem Fundamentals/Cryptography Fundamentals 119Chapter 8: The “Anatomy of a Hack” ……………………………… 132Unit 3: Tools of the Trade ……………………………………………… 135Chapter 9: Downloading stuff from the web ……………………… 137Chapter 10: DOS ……………………………………………………147Chapter 11: Password Protection ……………………………………… 202Chapter 12: Protocol Inspectors ……………………………………… 215Chapter 13: Port Scanners ……………………………………… 235Chapter 14: Having fun on the Internet…or not ……………………… 252Chapter 15: E-mail and SPAM ……………………………………… 264Chapter 16: H4xor 5p34k ……………………………………………… 286Chapter 17: How to stop those frigging pop-up ads ……………… 289Chapter 18: Knoppix STD: an introduction ……………………… 296Unit 4: Putting it all together ……………………………………………… 335Chapter 19: Case Studies in Hacking ……………………………… 336Chapter 20: Prologue ……………………………………………… 341Cool email from “Phantom” ……………………………………………… 345

Activity (14)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Midhat Krilic liked this
moumou222 liked this
majban liked this
Artfair India liked this
nur syahidatul liked this
taibu100 liked this
liszt314 liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->