Ghi chú đến thành viên
Go Back   4vn.eu > Kiến thức > Tin học > Tủ sách Tin học
Gởi Ðề Tài Mới Trả lời
 
Ðiều Chỉnh
  #1  
Old 08-08-2008, 08:34 AM
rockdalat
Guest
 
Bài gởi: n/a
Thời gian online: 0 giây
Kho Ebook của Rockdalat: Tổng hợp các lots xxx ebooks.

Tổng hợp ebooks Hacking:

Các bạn cố tìm những quyển sách cần thiết để học tập nhé

Link đây nì:

http://www.hackerz.ir/e-books


Ebooks list:


Cuốn 1:
TCP/IP - Network Administration.
Tác giả: Craig Hunt.
Second Edition. 1997.

Cuốn 2:
Windows Undocumented File Formats.
Tác giả: Pete Davis and Mike Wallace.
R&D Books, Lawrence, KS 66046

Cuốn 3:
Writing Secure Code

Cuốn 4:
How To Keygens

Cuốn 5:
Complete_Linux_Loadable_Kernel_Modules

Cuốn 6:
Mcgraw-Hill Osborne Media.19 Deadly Sins of Software Security (Security One-off).chm

Cuốn 7:
011 xDash.pdf

Cuốn 8:
Natural Language Steganography

Cuốn 9:
013 The Art of Fingerprinting.pdf


0131482092.Prentice Hall Ptr.Solaris™ Internals- Solaris 10 and OpenSolaris Kernel Architecture (2nd Edition) (Solaris Series).chm
014 Feuriges Hacken.pdf
015 Sicherheit bei VoIP-Systemen.pdf
016 Phishing the Web.pdf
017 Next Generation Peer to Peer Systems.pdf
019 Verdeckte Netzwerkanalyse.pdf
0201549794.Addison-Wesley Professional.The Design and Implementation of the 4.4 BSD Operating System (Unix and Open Systems Series.).pdf
023 Ciphire Mail.pdf
026 SAP R3 Protocol Reverse Engineering.pdf
027 Biometrie in Ausweisdokumenten.pdf
029 Robocup.pdf
037 GNOME Anwendungsentwicklung.pdf
038 Free Software Usage in South America.pdf
039 Squeak and Croquet.pdf
040 Firewall Piercing.pdf
040622-Securing-Mac-OS-X.pdf
041 Einfuehrung in Kryptographische Methoden.pdf
042 Cored Programming.pdf
044 Machine Learning in Science and Engineering.pdf
045 Internet Censorship in China.pdf
046 Tollcollect.pdf
047 Datamining the NSA.pdf
049 Zufallszahlengeneratoren.pdf
051 Recent features to OpenBSD-ntpd and bgpd.pdf
052 Die Ueblichen Verdaechtigen.pdf
053 Enforcing the GNU GPL.pdf
055 CCC-Jahresrueckblick.pdf
056 LiberTOS.pdf
057 SUN Bloody Daft Solaris Mechanisms.pdf
058 The Blinking Suspects.pdf
059 Wikipedia Sociographics.pdf
060 Digital Prosthetics.pdf
062 Hacking EU funding for a FOSS project.pdf
063 Edit This Page.pdf
064 Trusted Computing.pdf
066 Bluetooth Hacking.pdf
067 Inside PDF.pdf
068 NOC Overview.pdf
070 Fnord-Jahresrueckblick.pdf
072 The Reality of Network Address Translators.pdf
077 Weird Programming 2.pdf
078 Aspects of Elliptic Curve Cryptography.pdf
079 AVG aint vector graphics.pdf
080 USB-Unbekannter Serieller Bus.pdf
081 Quantenmechanik fuer Nicht Physiker.pdf
083 Quanteninformationstheorie fuer Nicht Physiker.pdf
0849380340.AUERBACH.The Debugger's Handbook.pdf
095 Security Nightmares 2005.pdf
097 Das Literarische Code-Quartett.pdf
098 Portable Software-Installation with pkg source.pdf
099 GPL fuer Anfaenger.pdf
1-1_copy.txt
100 Anonymous communications.pdf
101 XMPP - Jabber.pdf
105 Honeypot Forensics.pdf
107 Embedded Devices as an attack vector.pdf
108 The Convergence of Anti-Counterfeiting and Computer Security.pdf
109 Anti-Honeypot Techniques.pdf
10threats.doc
110 Applied Data Mining.pdf
111 The Kernel Accelerator Device.pdf
113 Automated Hacking via Google.pdf
114 Der 2. Korb der Urheberrechtsnovelle.pdf
115 The Fiasco Kernel.pdf
117 Kampagne Fair Sharing.pdf
118 Verified Fiasco.pdf
120 Softwarepatente - Ruestzeug zur Debatte.pdf
121 Black Ops of DNS.pdf
122 Enforcement of Intellectual Property Rights under German Private Law.pdf
123 Gentoo Hardened.pdf
125 Old Skewl Hacking Infra Red.pdf
126 Apache Security.pdf
127 Security Frameworks.pdf
129 Die Propagandawueste des realen Krieges.pdf
12ways_privacy.html
130 Physical Security.pdf
131 Learning OpenPGP by Example.pdf
134 Secure Instant Messaging.pdf
135 Voting Machine Technology.pdf
136 Hacking Linux-Powered Devices.pdf
137-byte-Linux-shellcode.txt
140 A Fat Girls Intimate Perspective on Hacker Culture and Spaces.pdf
146 Mehr Sicherheit fuer HostAP-WLANs.pdf
147_Great_WinXP_Tips.rtf
151 Side Channel Analysis of Smart Cards.pdf
153 Suchmaschinenpolitik.pdf
158 How to find anything on the web.pdf
159 State of Emergent Democracy.pdf
163 SPAM Workshop.pdf
165 Softwarepatente - Der Tag danach.pdf
168 Spampolitik.pdf
176 Passive covert channels in the Linux kernel.pdf
178 Humanoid Robots.pdf
183 Tor.pdf
187 Einfuehrung in die Rastersondenmikroskopie.pdf
1931769494.A-List Publishing.Hacker Web Exploitation Uncovered.chm
1931769508.A-List Publishing.Hacker Linux Uncovered.chm
20011009-passive-os-detection.html
207 Amateurfunk.pdf
208 GameCube Hacking.pdf
213 Haskell.pdf
214 Kryptographie in Theorie und Praxis.pdf
216 Hacking The Genome.pdf
218 Practical MacOS X Insecurities.pdf
21c3_Bluetooth_Hacking.pdf
232 Positionsbezogene Ad-hoc Kollaboration ueber WLAN.pdf
242 Weird Programming 1.pdf
244 High Speed Computing with FPGAs.pdf
246 RFID Technologie und Implikationen.pdf
250 Lightning Talk-NetBSD Status Report.pdf
253 Pixels want to be many.pdf
255 Pixels want to talk.pdf
2600.The.Hacker.Quarterly.Volume.22.Number.1.Sprin g.2005.pdf
271 Hidden Data in Internet Published Documents.pdf
272 Sicherheitsmanagement.pdf
273 Crashkurs Mathematik am Beispiel Biometrie.pdf
274 Praktische Anleitung zum Bau eines Radiosenders.pdf
277 Das Programmiersystem Forth.pdf
278 TKUeV-Das Ohr am Draht.pdf
289 Mixing VJing and Post-Production.pdf
301001ircfaq.html
301101BufferOverflow.txt
306 Ruby.pdf
308 MD5 To Be Considered Harmful Someday.pdf
310 Information-Wissen-Macht.pdf
313 Biometrie als datenschutzrechtliches Problem.pdf
31337_master1.htm
315 Fight for your Right to Fileshare.pdf
316 Bericht von den BigBrotherAwards.pdf
317 Unsicherheit von Personal Firewalls.pdf
55 Ways To Have Fun with GOOGLE.pdf
640801_sheet.doc
6_Managing Risk.pdf
802.11b Firmware-Level Attacks.pdf
95-98-local-hacking.txt
A Beginners Guide To Hacking Computer Systems.pdf
A Beginners Guide To Wireless Security.txt
A Complete Users Guide To Port Scanning.doc
A Novice's Guide To Hacking.txt
A Novice's Guide to Hacking 2004.txt
A Short HACKER SPEAK Glossary.txt
A simple TCP spoofing attack.txt
A-decompilation-of-the-Lovesan-MSBLAST-Worm.txt
A.LIST.Publishing.Hacker.Disassembling.Uncovered.e Book-LiB.chm
A.LIST.Publishing.Hacker.Disassembling.Uncovered.e Book-LiB.chm.1
AGPLNetFlowProbe.html
AIM-imageediting.txt
AIX_Security.pdf
ARTICLE ON DHS ASSESSMENT OF TERRORIST THREATS.doc
ASPzusammenfassung.html
ATTACK_BACK.txt
A_Buffer_Overflow_Study_-_Attacks_and_Defenses__2002_.pdf
A_Quick_Unix_Command_Reference_Guide.doc
Access-Users-Folders-xp-2k.txt
Accessing microsoft iis configurations remotely.pdf
Accessing the bindery files directly.txt
Accurate Real-Time Identification of IP Hijacking.pdf
Acts-tools.doc
Addison Wesley - **** I.T. Security Through Penetration Testing.chm
Addison.Wesley,.Advanced.Programming.in.the.UNIX.E nvironment.(2005),.2Ed.BBL.LotB.chm
Addison.Wesley,.Software.Security.Building.Securit y.In.(2006).BBL.chm
Addison.Wesley.Advanced.Programming.In.The.Unix.En vironment.(2005).2Ed.pdf
Addison.Wesley.Professional.Rootkits.Subverting.th e.Windows.Kernel.chm
Addison.Wesley.Pub.Exploiting.Software.How.to.Brea k.Code.eBook-kB.pdf
Advanced Buffer Overflow.txt
Advanced_Attacks_Against_PocketPC_Phones.pdf
Almost Everything You Ever Wanted To Know About Security (but.txt
An Architectural Overview of UNIX Network Security.htm
An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt
An Introduction to Denial of Service.txt
An Introduction to the Computer Underground.txt
Analysis of Vulnerabilities in Internet Firewalls.pdf
Analyzing 0day Hacker Tools.pdf
AnalyzingLargeDDoSAttacksUsingMultipleData.pdf
Anti-Cracking_Tips_V2.0.html
Art.of.Software.Security.Assessment.chm
Assembling_a_Computer.ppt
Assembly-Language-banshee.htm
Assigning-passwords-to-folders-in-win-98-and-2000.txt
Astalavista-Group-Security-Newsletter-2.txt
Async-Blockreport-v1-0.txt
Attack of the 50ft Botnet.pdf
Auditing-Web-Site-Authentication-Part-Two.htm
Auditing-Web-Site-Authentication.html
Auerbach.Publications,.The.Security.Risk.Assessmen t.Handbook.(2005).DDU.LotB.pdf
BB-PLAN_TXT.txt
BBS Crashing Techniques.txt
BYPASSING-BASIC-URL-FILTERS.txt
BackLogo_270202.txt
Basic Networking.txt
Basic Transposition Ciphers.txt
Basics of Overflows.txt
Basics_On_How_To_Identify_A_Firewall.doc
Basicsecurity-win98.txt
Begginers Guide to Linux.txt
Beginners Guide to recovering your FTP Password.doc
Beginners-Guide-To-Cracking.txt
Beginners-Security-Guide.htm
Benchmarking Terminology for Firewall Performance.txt
Blind Injection in MySQL Databases.txt
Bluetooth Hacking.pdf
Botnets Proactive System Defense.ppt
BotnetsVehicleForOnlineCrime.pdf
Brief_intro_to_cryptography.pdf
Buffer-Overflow-german.html
Building HP-UX11 Bastion Hosts.txt
Bypassing Corporate Email Filtering.pdf
CASR-ACAT-PHP-TopSites-Vulnerability.txt
CD-Writing-HOWTO.txt
CERT Statistics.xls
CERT® Coordination Center Reports.html
CGIExplained.doc
CISSP Risk Management.pdf
COVER-1_TXT.txt
COVER-2_TXT.txt
CRACKING-UNIX-PASSWORD-FILE.doc
CW.txt
Cable Modem Hacking How-to.pdf
CardersManaul.doc
Cellular Telephone Phreaking Phile Series VOL 1.txt
Ch 2-4 Microsoft Security Risk Management Guide.pdf
Changing-IP-Address---Astalavista-Group.htm
Characterization of P2P traffic in the Backbone.pdf
Cisco IOS Exploitation Techniques.pdf
Cisco wireless network security guide.pdf
Cisco.Press.Penetration.Testing.and.Network.Defens e.Nov.2005.FIXED.eBook-DDU.chm
Cisco_IOS_from_an_Attacker's_Point_of_View.pdf
Code_Complete.A_Practical_Handbook_of_Software_Con struction.2ndEditionDraft.McConnell.pdf
Columnists--Relax-It-Was-a-Honeypot.htm
CombatingSPAM.doc
Commercial Satellite Services and National Security .pdf
Compiling C and C++ in Linux systems.doc
CompleteGuideToComputers.txt
Compromise_Common_Hash_Algorithms.pdf
Computer Security Art And Science.chm
Computer_Vulnerability_March_9_2000_.pdf
Computercrime2002.txt
Conducting-a-Security-Audit-An-Introductory-Ov.htm
Copying-Copy-Protected-CDs.htm
Cplusplus-tutorial-banshee.htm
Cracking String Encryption in Java Obfuscated Bytecode.pdf
Cracking the Sam file.txt
Cracking the Universal Product Code.txt
Crackproof Your Software (2002).pdf
Cramsession CIW Security Professional.pdf
Cribbing_Perl_code.doc
Crypto Tutorial.rar
Cyber Security Database.xls
Cyber Security Matrix Computations.xls
Cyber Security Prediction Models[2].doc
Cyber-terrorism-overhyped.txt
CyberCash_Credit_Card_Protocol_Version_0.doc
CyberLaw 101 US Laws of Honeypot Deployments.pdf
Cyberwar_Strategy_and_Tactics.pdf
DEMYSTIFYING-REMOTE-HOST.doc
DHS Cyber Security Case.doc
DNS Amplification Attacks.pdf
DOM_Based_Cross_Site_Scripting.txt
DRDoS.pdf
Defeating IRC Bots on the Internal Network.pdf
Defeating Windows2k3 Stack Protection.pdf
Defeating microsoft windows 2003 stack protection.pdf
DefendingWifiAgainstDDoSAttacks.pdf
Demonstrating-ROI-for-Penetration-Testing-3.htm
Demonstrating-ROI-for-Penetration-Testing-Part-Two.htm
Demonstrating-ROI-for-Penetration-Testing-Part-one.htm
Demystifying Google Hacks.pdf
Demystifying Penetration Testing.pdf
Design For Building IPS Using Open Source Products.pdf
Detecting Peer-to-Peer Botnets.pdf
Detecting-SQL-Injection-in-Oracle.htm
DetectingMass-MailingWormInfectedHostsbyMiningDNSTrafficData.pdf
Dial-Out-Connection-in-FreeBSD.htm
Directory-URL.prediction.doc
Distributed Computing.pdf
DoD AntiTerrorism Standards for Buildings.pdf
DoS Information Document.pdf
DoS_attacks_by_NrAziz.txt
Drake's Phreaking Tutorial.txt
Dynamic-Honeypots.htm
Ebook - Tcpip Network Administration (O'Reilly).pdf
Ebook - Windows - Programming .NET Security.chm
Email-security-SSL3-1-TLS-1-0-deployment.html
EncryptionPrograms-C.txt
Enhancing IDS using Tiny Honeypot.pdf
Enhancing Web privacy and anonymity in the digital era.pdf
EthicsEssayAstalav.doc
Exploit _Stack_Overflows_-_Exploiting_default_seh_to_increase_stability.zip
Exploiting-Cisco-Systems.html
Exposing-the-Underground.html
Extended HTML Form Attack.pdf
FTPAttackCaseStudyPartI.html
FXPtutorial.txt
Fiber Optics Technicians Manual.pdf
Finding Vulnerabilities.txt
Fingerprinting Port 80 Attacks.txt
Fireall Analysis and Operation Methods.pdf
Fixingxp.txt
FootPrinting-Before-the-real-fun-begins.htm
Forensic-Log-Parsing-with-Microsofts-LogParser.htm
Forensically Unrecoverable HD Data Destruction.pdf
Forensics and SIM cards Overview.pdf
Formulating A Company Policy on Access to and Use and Disclos.txt
Free Speech in Cyberspace.txt
Free_Avs_password_pullermann.txt
GRE_sniffing.doc
Gary.Kasparov-Kasparov.Teaches.Chess.pdf
Gender Issues in Online Communications.txt
GettingAdmin.txt
Getting_started_with_SSH.html








Google Hacks.pdf
Government Computer Security Techniques.txt
Guatehack_ Hacking Windows Server 2003.doc
Guide to Hacking with sub7.doc
Guide-To-Using-Snort-For-Basic-Purposes.htm
****.txt
**** Attacks Revealed- A Complete Reference with Custom Security Hacking Toolkit (Wiley-2001).pdf
Hackeando-o-RPC-do-Windows-por-RMP.doc
Hacker Digest Spring 2002.pdf
Hacker Digest Winter 2002.pdf
Hacker Test.txt
Hackers Beware (NewRiders -2002).pdf
Hackers Survival Guide.rtf
Hackerz_n_hacking_inside_out.doc
Hacking Databases.pdf
Hacking Databases.txt
Hacking Directv - Dss - Satellite Access Card Programming.pdf
Hacking Exposed- Network Security Secrets and Solutions (MCGraw-Hill-2001).pdf
Hacking Exposed- Network Security Secrets and Solutions.pdf
Hacking Exposed- Web Applications.pdf
Hacking For Dummies - Access To Other Peoples Systems Made Simple.pdf
Hacking For Newbies.doc
Hacking Guide3.1.pdf
Hacking Into Computer Systems - Beginners.pdf
Hacking P2P Users Tutorial.txt
Hacking Password Protected Website's.doc
Hacking TRW.txt
Hacking TYMNET.txt
Hacking Unix System V's.txt
Hacking VoiceMail Systems.txt
Hacking Wal-Mart Computers.txt
Hacking Webpages.txt
Hacking a Website Or Its Member Section.txt
Hacking for Dummies 2.doc
Hacking for Dummies Volume 2.doc
Hacking for Dummies.pdf
Hacking for Newbies tutorial.txt
Hacking the Hacker.pdf
Hacking-your-CMOS-BIOS.txt
HackingCreatingaXDCCBot.txt
Hacking_Installing_and_Using_Pubs_Thru_IIS-E-man.txt
Hackproofing MySQL.pdf
Hardening-the-TCP-IP-stack-to-SYN-attacks.htm
Hearing on HR 285 regarding the creation of an Assistant Secretary for Cyber Security.doc
HijackinICQAccounts.txt
Honeynet-Recent-Attacks-Review.htm
Honeypots-Are-They-Illegal.htm
Honeypots-Simple-Cost-Effective-Detection.htm
Honeypots_Definitions-and-value-of-honeypots.html
Honeywalldetection.pdf
How BT phone cards works.txt
How NAT Works.pdf
How Phone Phreaks are Caught.txt
How To Display An IP With PHP.txt
How To **** Into PayPal Account!!!.txt
How To Read News Groups Semi-An.txt
How the Traditional Media Clasifications Fail to Protect in t.txt
How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt
How to **** UNIX System V.txt
How to Make Key Generators.rtf
How to build secure LANs with IPSec.pdf
How to crash AOL.txt
How to dial out of a UNIX System.txt
How to find Security Holes.txt
How to get a Shell in 24 hours.txt
How-ToNumber1.txt
HowTo-*****-By-+OCR-Lesson-4.txt
HowToUseWinmodemUnderLinux.txt
HowtoReadEmailHeader.txt
Hunting Down a DDoS Attack.pdf
ICQ Trojans.txt
ICQ-pw-stealing_031201.txt
IDS & IPS Placement for Network Protection.pdf
IE Javaprxy dll COM Object Vulnerability.txt
IF_You_Never_Understood_C_Language_ Part1.doc
IF_You_Never_Understood_C_Language__Part2.doc
IISEng.doc
IIS_Security_and_Programming_Countermeasures.pdf
INTERNETWORKING-MODELS.doc
INTRODUCTION-TO-DoS.doc
IP Tunneling via SSL.txt
IPC Explained.doc
IRC Basic Commands.txt
IRC For The Generally Incompetent.txt
IRC-Einfuehrung.txt
IRC-WAR.txt
IRC-for-the-Generally-Incompetent-by-MoTT.htm
IRC.txt
IRCTradingv1.1.txt
IRC_XDCC_BOTS.txt
IRIX.Login.Security.txt
ISO17799-6a.htm
ISO17799_News-Issue_8.html
ISS_Security_1.doc
IT_Essentials-Chapter_4.ppt
IT_Essentials_1_Chapter_5_I.ppt
Identifying Common Firewall Strategies.pdf
ImplicationsOfP2PNetworksOnWormAttacks&Defenses.pd f
In_depth_Guide_Too_Hacking_Windows_Using_NetBIOS.d oc
Increasing_Performance_NIDS.pdf
Infocus-Passive-Network-Traffic-Analysis-Understanding.htm
Infosec_glossary_mar03.pdf
InterceptingMobileCommunications.pdf
International Cybercrime Treaty.pdf
Internet Cyber Attack Model.doc
Internet Cyber Attack Model1.doc
Internet Cyber Attack Routing Process.vsd
Internet Download Manager 4 05 Input URL Stack Overflo.txt
Internet.pdf
Interview-with-Ed-Skoudis.doc
Interview-with-Judy-Novak.doc
Interview-with-Martin-Croome.doc
Interview-with-Rich-Bowen.doc
Introducing Stealth Malware Taxonomy.pdf
Introduction-of-IP-CHAINS.htm
Introduction-to-Simple-Oracle-Auditing.html
Intrusion-Detection-Terminology-Part-One.htm
Intrusion-detection-intro.htm
Issues in Risk Assessment.doc
JPG to EXE - E-man.txt
Java_applet_copy-protection.html
John The Ripper - Illustrated Guide.pdf
John Wiley & Sons - Hacking For Dummies.pdf
John.Wiley.and.Sons.The.Art.of.Intrusion.The.Real. Stories.Behind.the.Exploits.of.Hackers.Intruders.a nd.Deceivers.pdf
JustAnotherWayHotmailPasswords.txt
Kerberos.doc
Kernel-Rootkits-Explained.html
Kevin.Mitnick-The.Art.of.Intrusion.pdf
KevinMitnick.pdf
Keystroke Dynamics.pdf
Lame.txt
Languard_scanning_tutorial.txt
Layer 2 Sniffing.pdf
Learning-with-Honeyd.txt
LinkingRules_040202.doc
Linksys WLAN Router-Hacking.pdf
Looking for Vulnerabilites.txt
MEMORY1.PPT
MSIEs_Hidden_Files_in_WinXP_Pro-E-man.txt
MSN-messenger-tip.txt
MSNTutorialbyDeadBeat.html
MTS_Exploit.txt
Maintaining-System-Integrity-During-Forensics.htm
Managing DoS.pdf
Mandatory Access Control Tutorial.txt
Matrix-Hacking_A-Slice-of-Reality-in-a-World-of-Make-Believe.htm
Maximum Security - A Hacker's Guide to Protecting Your Inter.pdf
McGraw-Hill - Hacking Exposed, 3rd Ed - Hacking Exposed Win2K - Hacking Linux Exposed (Book Excerpts, 260 pages) - 2001 - (By Laxxuss).pdf
McGraw.Hill.HackNotes.Web.Security.Portable.Refere nce.eBook-DDU.pdf
McGraw.Hill.HackNotes.Windows.Security.Portable.Re ference.eBook-DDU.pdf
McGraw.Hill.Osborne.Media.XML.Security.eBook-TLFeBOOK.pdf
Microsoft.Press.Hunting.Security.Bugs.ebook-Spy.chm
Microsoft.Press.Improving.Web.Application.Security .Threats.and.Countermeasures.eBook-LiB.chm
Microsoft.Press.The.Security.Development.Lifecycle .Jun.2006.chm
Military Sat Communication.pdf
Modeling Botnet Propagation Using Time Zones.pdf
Mutual-Trust-Networks-Rise-of-a-Society.htm
N Korea IT policy & prospects.pdf
NT-for-newbies.txt
National Vulnerability Database Statistics.htm
National_Cyberspace_Strategy.pdf
National_Grid_transmission_critical_link.pdf
NetBIOSHackingbyStealthWasp.txt
NetBios Explained.doc
NetBios-axion.txt
Netcat_Tutorial.pdf
Network Covert Channels Subversive Secrecy.pdf
Network Security Points.pdf
Network-Firewall-Security.txt
Networking.pdf
New Attack Model Computations.xls
New Attack Model2.doc
New-tech-hacks-*****.txt
Next-GenerationWin32exploits.htm
NickServ.doc
No.Starch.Press.The.Art.Of.Assembly.Language.eBook -LiB.chm
O'Reilly - Information Architecture For The World Wide Web.pdf
ONLamp_com-Secure-Programming-Techniques-Part-1.htm
ONLamp_com-Secure-Programming-Techniques-Part-2.htm
ONLamp_com-Secure-Programming-Techniques-Part-3.htm
ONLamp_com-Secure-Programming-Techniques-Part-4.htm
OReilly - Oracle.Security.OReilly.1998.chm
OVAL report.doc
OVERFLOW_TXT.txt
ObtainingWin2KAccountPasswordsUsingAutologon.html
Offensive Use of IDS.pdf
OpeningFilesPCSecurity.doc
Optimization of Network Flight Recorder.pdf
Oreilly.Firefox.Hacks.eBook-LiB.chm
Oreilly.Security.Warrior.eBook-DDU.chm
P2P_Behaviour_Detection.pdf
PACKET-ATTACKS-VERSION1-1.htm
PHP-Security-Part-1.htm
PHP-Security-Part-2.htm
PHP_Hackers_paradise.rtf
PHPencoderv-1.0.txt
PaperECE723v39Format.pdf
Passive Application Mapping.pdf
PassiveMappingviaStimulus.pdf
Penetration Testing For Web Applications Part 1.pdf
Penetration Testing For Web Applications Part 2.pdf
Penetration-Testing-for-Web-Applications-Part3.htm
Placing-Backdoors-Through-Firewalls.htm
Pocket-Sized-Wireless-Detection.htm
PortScanning-BillReilly.doc
Portscanner.txt
Practical Linux Shellcode.pdf
Practices for Seizing Electronic Evidence.pdf
Prentice.Hall.PTR.Internet.Denial.of.Service.Attac k.and.Defense.Mechanisms.Dec.2004.eBook-DDU.chm
Privacy For RFID Through Trusted Computing.pdf
Privoxy-default-action-1-7default.action.txt
Problems-with-passwords.htm
Procedures for Seizing Computers.pdf
Proposal for the Development of Models of Cyber Security with Application to the Electric Grid.doc
Protecting Next Gen Firewalls.pdf
Public Key - Steganography.pdf
Puppetnets-Misusing Web Browsers as a Distributed Attack Infrastructure.pdf
REMOTE-OS-DETECTION.doc
REMOVING--BANNERS.doc
RE_I.txt
RE_II.txt
RFC 1459 - Internet Relay Chat Protocol.pdf
RIAA_****.html
RainbowTablesExplained.pdf
Rapidshare Trick No Waiting.txt
Recover Lost Windows Administrator Password.txt
Reducing-Human-Factor-Mistakes.htm

Remote Windows Kernel Exploitation.pdf
RemotePhysicalDeviceFingerprinting.pdf
Remotely Exploit Format String Bugs.txt
Revealing Botnet with DNSBL Counter-Intelligence.pdf
Ripping Flash Movies for Passwords.txt
Risc_vs_Cisc.htm
Router Security Guidance Activity.pdf
SMB-RSVP.txt
SOCKS.txt
SQL Injection Attack and Defense.pdf
SQL Injection White Paper.pdf
SQL-Injection-and-Oracle-Part-One.htm
SQL-Injection-and-Oracle-Part-Two.htm
SQL_Advanced_Injection.pdf
SQLbasic.txt
SSL And TLS.pdf
Sams - Covert Java Techniques for Decompiling, Patching,and Reverse Engineering.pdf
Sams.Inside.Network.Security.Assessment.Guarding.Y our.IT.Infrastructure.Nov.2005.chm
Sams.Maximum.Security.Fourth.Edition.chm
Secure Coding Principles and Practices.pdf
Secure Communication In Space.pdf
Secure.Linux.for.Newbies.v1.1.txt
SecureDeletionofDatafromMagneticandSolid-StateMemory.htm
Securing IIS 5.0 & 5.1.pdf
Securing-MySQL-step-by-step.htm
Securing-Windows-2000-and-IIS.doc
SecuringFiberOpticCommunicationAgainstTapping.pdf
SecurityFocus - Intelligence Gathering Watching a Honeypot a.htm
SecurityPatchManagement_ManageSoftWP.pdf
SeeMe.txt.txt
Self Deleting Batch.txt
Self-Learning System for P2P Traffic Classification.pdf
SetUp.txt
Sever-Status.txt
Shell Coding.txt
ShellCode.txt
SimpleFingerTutorial.txt
Simple_Computer_Jargon_Glossary.doc
Sniffing In A Switched Network.pdf
Socket_Programming_In_C-by polygrithm.doc
Socket_Programming_In_C_by_DigitalViper.doc
Socks Overview Paper.pdf
Software Vulnerability Analysis.pdf
Spies-at-Work.txt
Springer.Reverse.Engineering.of.Object.Oriented.Co de.Monographs.in.Computer.Science.eBook-kB.pdf
Spyware - A Hidden Threat.pdf
Stack Overflows Analysis And Exploiting Ways.PDF
Starting-from-Scratch-Formatting-and-Reinstalling.htm
Statistical-Based-Intrusion-Detection.html
Stealing Files From Sites.txt
Stealing The Network How To Own The Box.pdf
Stealth Syscall Redirection.txt
Stealth.doc
Steganalysis - Detecting Hidden Information.pdf
Steganography In Images.pdf
Steganography Primer.pdf
Steganography vs. Steganalysis.pdf
Steganograpy - The Right Way.pdf
Stopping Automated Attack Tools.pdf
Strengthening Network Security With Web-Based Vulnerability Assessment.pdf
Study Of Firewall Misconfiguration.pdf
Substitution Ciphers.txt
Sybex - Firewalls 24 Seven.pdf
Syngress - Buffer Overflow Attacks - Detect, Exploit and Prevent (http://www.hackerz.ir).zip
Syslog_Basics_Affordable_Centralized_logging.html
Syslog_Basics_Configuring_Logging_on_Linux.html
Systematic Methodology for Firewall Testing.doc
TCP Acknowledgement.txt
TCP IP over Satellite - Optimization vs Acceleration.pdf
TCP-IP-and-the-OSI-Stack.txt
TCP-IP-protocol-suite.txt
TDGTW-WarXing.htm
THE SHELLCODER'S HANDBOOK.pdf
THE-linuxconf-EXPLOIT.txt
TR-2004-71.doc
TUX.Magazine.Issue.3.June.2005.pdf
Ten Risks of Public Key Infrastructure.txt
The Art Of Computer Virus Research And Defense.chm
The Art of Deception by Kevin Mitnick.pdf
The Art of Deception.pdf
The Art of Disassembly.rar
The Art of Intrusion.pdf
The Art of Unspoofing.txt
The Database Hacker's Handbook - Defending Database Servers.chm
The Google Hackers Guide v1.0.pdf
The Google filesystem.pdf
The Hacker Crackdown.pdf
The Hacker's Dictionary.txt
The National Information Infrastructure-Agenda for Action.txt
The Newbies Handbook- ' How to beging in the World of Hacking.txt
The Newbies-User's Guide to Hacking.txt
The Only True Guide to Learning how to ****.txt
The Pre-History of Cyberspace.txt
The Price of Copyright Violation.txt
The REAL way to **** RemoteAccess.txt
The Secret Service, UUCP,and The Legion of Doom.txt
The role of intrusion detection systems.pdf
The-Basics-and-use-of-XOR.txt
The-Cable-Modem-Traffic-Jam.txt
The-Enemy-Within-Firewalls-and-Backdoors.htm
The-Risks-of-Vulnerabilities.htm
The-cyberwar-begins.htm
The.Art.of.Exploitation-FOS.chm
The.Ethical.****.A.Framework.for.Business.Value.Pe netration.Testing.eBook-EEn.pdf
The.International.Handbook.of.Computer.Security.eB ook-EEn.pdf
The.Oracle.Hackers.Handbook.Jan.2007.eBook-BBL.chm
TheForbiddenChapter.htm
The_ Assembly_ Programming_ Master_ Book.chm

The_8020_Rule_for_Web_Application_Security.txt
The_Art_of_Deception_by_Kevin_Mitnick.pdf
The_Art_of_Intrusion.pdf
The_Insecure_Indexing_Vulnerability.txt
ThroughputMonitorv2.0.txt
Tips_On_Web_Designing_1.0.txt
Tracing a Hacker.txt
Tracing an Email.pdf
Tricks Of The Internet Gurus.zip
Tricks to avoid detection.txt
TrillianPWdecCode.txt
Trojan_Whitepaper.pdf
Tutorial Buffer Overflow - Stack Hacking Hacken Cracken Deutsch Handbuch Computer Pc Security Wlan C Lan Dbase Access Command Remote.pdf
Tutorial, Adobe.txt
Tutorialaboutnetbios .txt
UNIXForBeginners_170102.txt
U_S_ Information-Security-Law-Part-1.htm
U_S_ Information-Security-Law-Part-2.htm
U_S_ Information-Security-Law-Part-3.htm
U_S_ Information-Security-Law-Part-Four.htm
Understanding TCPIP.pdf
Understanding Windows Shellcode.pdf
UnderstandingIPAddressing.txt
Understanding_NetBIOS.txt
Undocumented dos commands.pdf
Unlcok-Pc-Security-any-version.txt
Unlock Satelite Locked Password(Bell Express Vu Only).txt
Ural ****.txt
User profiling for intrusion detection.pdf
Using-AimSpy3.txt
VB-prevent-shuttingdown.txt
Virtual-evidence.htm
VirtualFileSystem-proc.html
Vulnerability_Assessment_Guide_-_NT.doc
W2K-Dictionary-Attacker-Active-Directory-pl.txt
WARwithGSMenhancements.txt
WIN_NT_Exploits.txt
Wargames, Wardialing Wardriving and the Market for Hacker.txt
Waveform Advances for Satellite Data Communications.pdf
Way to get passed website blocking on school system.txt
Web Tap - Detecting Covert Web Traffic.pdf
WebApplicationSecurity.html
What is the best C language.txt
What_Fuzz_Testing_Means_to_You .html
WideAreaHardwareAcceleratedIntrusionPreventionSyst em.pdf
Wiley - How Debuggers Work.djvu
Wiley - How Debuggers Work.djvu.1
Wiley Publishing - The Shellcoder'S Handbook Discovering And Exploiting Security Holes.pdf
Wiley, The Shellcoder's Handbook Discovering and Exploiting Security (2004) spy LotB.rar
Wiley.Reversing.Secrets.of.Reverse.Engineering.Apr .2005.eBook-DDU.pdf
Wiley.The.CISSP.Prep.Guide.Gold.Edition.eBook-kB.pdf
Win98-ME-Hacking.txt
WinME_170102.html
WinNT-HD-access-version1.rtf
WinRestict.txt
Windows IP_Security.doc
Windows Server 2003 Security Guide.pdf
Windows-Server-2003-Secure-by-Default.txt
WindowsXPSecurity.doc
Windows_Hacking_IIS_5.0_The_Complete_Guide.txt
Wired_Network_Security-Hospital_Best_Practices.pdf
Wireless-Network.htm
Wireless-securing-and-hacking.htm
Word Doc Steal.txt
XORs_Pratical_Wifi_Network_Coding.pdf
XP-EXPLAINED.doc
XP-url-download.asm.txt
YaOP-diff.txt
[eBook] Addison Wesley - Enterprise Java 2 Security Building Secure and Robust J2EE Applications (2004).chm
a_crash_course_in_back_doors.txt
a_crash_course_in_bash.txt
a_crash_course_in_bash_part2.txt
a_short_C_programming_tutorial_by_NrAziz.txt
aaous.txt
about_sbiffers_article.htm
about_sniffer.txt
access_041201.txt
active_perl.txt
adjacentoverwritebug.htm
admin.txt
administratorpasswd.html
agentsteal-fbi.txt
aia-handbook.pdf
aide-and-argus-ids.txt
alcatel-ex-c.txt
algorithms.html
alt-2600-****-faq.txt
altering-arp.html
an_intro_to_.htaccess_files.txt
anatomy of a wireless.htm
anony.txt
anonyme-french.txt
anonymity-faq_deadbeat.html
anonymity-german.txt
anonymity.html
anonymity_131201.html
anonymous-mailing-cgi.txt
antiaol_140102.txt
anticracking.html
antispam_solutions_and_security.htm
anwrapX.X.txt
aol-****-accounts.txt
aol-icq_010202.txt
aol-screen-names.txt
apache-tomcat-install.html
apachesec.html
applicationlayerfiltering.htm
applications.txt
arcpgpfq.txt
arp.doc
arpcheck.sh.txt
arphack.txt
art_of_brute_forcing.txt
article__following_the_journey_of_a_spoofed_packet .doc
article__iw__como_hacer_un_error_404_php.txt
article__iw__proxy_war_in_cyberspace.doc
article__military_applications_of_information_tech nolgies.doc
article__security__introduction_to_network_securit y.doc
asg1-1-1.c.txt
assembler.html
astalavistaCOM_newsletter1_jul03.txt
astalavista_newbie_guide.txt
astalavistaversion.rtf
atftpd.patch.txt
athena-2k-pl.txt
attack.pdf
attackscenarios.txt
....



Các chủ đề khác cùng chuyên mục này:

Tài sản của rockdalat


Last edited by Adamsmith; 11-08-2008 at 08:25 AM.
Trả Lời Với Trích Dẫn
  #2  
Old 08-08-2008, 09:30 AM
Torin Torin is offline
Nhập Môn Tu Luyện
 
Tham gia: Apr 2008
Bài gởi: 2
Thời gian online: 2 tuần 6 ngày 13 giờ
Xu: 0
Thanks: 160
Thanked 0 Times in 0 Posts
Rock ơi, không download cái nào được hết, Connection time out
Tài sản của Torin

Trả Lời Với Trích Dẫn
  #3  
Old 08-08-2008, 12:34 PM
rockdalat
Guest
 
Bài gởi: n/a
Thời gian online: 0 giây
ko thấy cái link trên đầu á. còn các cái khác là list thoi
Tài sản của rockdalat

Trả Lời Với Trích Dẫn
  #4  
Old 08-08-2008, 10:04 PM
Torin Torin is offline
Nhập Môn Tu Luyện
 
Tham gia: Apr 2008
Bài gởi: 2
Thời gian online: 2 tuần 6 ngày 13 giờ
Xu: 0
Thanks: 160
Thanked 0 Times in 0 Posts
Hix, hổng hiểu ý mình rồi. Mình vào cái link này h**p://www.hackerz.ir/e-books/ khi download thì nó báo connection time out.
Tài sản của Torin

Trả Lời Với Trích Dẫn
  #5  
Old 09-08-2008, 12:32 AM
rockdalat
Guest
 
Bài gởi: n/a
Thời gian online: 0 giây
Trích:
Nguyên văn bởi Torin View Post
Hix, hổng hiểu ý mình rồi. Mình vào cái link này h**p://www.hackerz.ir/e-books/ khi download thì nó báo connection time out.
vây lão kiểm tra lại máy và ip của mình.
ta vẫn load và lấy tài liệu từ đó. host của ta mà sao ta ko biết dc.
Tài sản của rockdalat

Trả Lời Với Trích Dẫn
Trả lời

Từ khóa được google tìm thấy
, kho acc xxx, kho ebook .txt, kho ebook cua 4vn, kho ebook xxx, kho ibook xxx, tong hop truyen chm xxx, truyen xxx .pdf, xxx ebook

Ðiều Chỉnh


©2008 - 2014. Bản quyền thuộc về hệ thống vui chơi giải trí 4vn.eu™
Diễn đàn phát triển dựa trên sự đóng góp của tất cả các thành viên
Tất cả các bài viết tại 4vn.eu thuộc quyền sở hữu của người đăng bài
Vui lòng ghi rõ nguồn gốc khi các bạn sử dụng thông tin tại 4vn.eu™