Matches in Harvard for { <http://id.lib.harvard.edu/aleph/005757191/catalog> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- catalog abstract ""The Knightmare is the sort of Super Hacker who keeps security guards from sleeping at night. He's not motivated by money or malice. He's in it for the hack. If your computer has any link whatsoever to the outside world, there is no question The Knightmare can break in; the only question is whether he wants to." "The Super Hacker reveals all his secrets: Trojan Horses, Viruses, Worms, Trap Doors and Dummy Accounts. The how-to text is highlighted with bare-knuckle tales of The Knightmare's hacks, including on-site hacking, remote-access hacking and bulletin board busting." "No system can withstand the ingenious, unrelenting assaults of The Knightmare. And no person concerned with computer security should miss this amazing manual of mayhem. Book jacket."--Jacket.".
- catalog contributor b8098215.
- catalog created "c1994.".
- catalog date "1994".
- catalog date "c1994.".
- catalog dateCopyrighted "c1994.".
- catalog description ""The Knightmare is the sort of Super Hacker who keeps security guards from sleeping at night. He's not motivated by money or malice. He's in it for the hack. If your computer has any link whatsoever to the outside world, there is no question The Knightmare can break in; the only question is whether he wants to." "The Super Hacker reveals all his secrets: Trojan Horses, Viruses, Worms, Trap Doors and Dummy Accounts. The how-to text is highlighted with bare-knuckle tales of The Knightmare's hacks, including on-site hacking, remote-access hacking and bulletin board busting." "No system can withstand the ingenious, unrelenting assaults of The Knightmare. And no person concerned with computer security should miss this amazing manual of mayhem. Book jacket."--Jacket.".
- catalog description "Includes bibliographical references (p. 169-171).".
- catalog description "Introduction. Hackers: Heroes or Villains? / Gareth Branwyn -- Part 1. Before Hack -- Chapter 1. The Basics -- Reading vs. Doing -- Opening Remarks -- Equipment -- Modems And Speed -- Communications Software -- Handy Features -- Data Capture -- Past and Future -- Days of Yore Live On -- Computer Crime -- Stealing Money -- Sabotage -- Various Thieveries -- The Seventh Crime -- Hacker Motivations -- Chapter 2. The History Of Hacking -- First Came Hardware -- YIPL and TAP -- Computer Crime -- 2600 -- WarGames and Phrack -- Shadow Hawk -- The Electronic Frontier Foundation -- Chapter 3. Researching The Hack -- Targeting -- Collecting Information -- Some Unusual Research Methods -- On-line Computer Simulators and Tutorials -- Sorting Through Trash -- GIRK -- Found Disk Analysis -- Check Up -- Damage to One Side -- Rips and Tears -- Imperfections -- Examining Screenshots -- Snooping -- Chapter 4. Passwords And Access Control -- Passwords -- Passwords Supplied by the User -- Possible Password Investigation -- Password Studies -- Password Restraints -- Computer Generated Passwords: Fakery and Analysis of Machine-Generated Passwords -- Non-Random Machine-Generated Passwords -- Programs are People Too -- Brute Force Methods -- Foiling the Brute Force Assault -- Chapter 5. Social Engineering -- The Noble Form -- Hacker as Neophyte -- Hacker in Power -- Hacker as Helper -- Peak Hours -- Other Hints -- Sample Social Engineering Situations -- Miscellaneous Social Engineering Tips -- Other Roles -- In-Person Engineering -- Written Engineering -- Request for Information -- Message From God -- Trouble in Paradise? -- Chapter 6. Reverse Social Engineering -- Overcoming Social Engineering Drawbacks -- Reverse Social Engineering Sabotage Methods -- RSE Case Study: The Translation Table -- Solving the Sabotage -- RSE Advertising Methods -- Trouble for Nothing?".
- catalog extent "vi, 205 p. :".
- catalog identifier "1559501065 :".
- catalog issued "1994".
- catalog issued "c1994.".
- catalog language "eng".
- catalog publisher "Port Townsend, Wash. : Loompanics Unlimited,".
- catalog subject "005.8 20".
- catalog subject "Computer crimes.".
- catalog subject "Computer security.".
- catalog subject "Computers Access control.".
- catalog subject "Data protection.".
- catalog subject "QA76.9.A25 K62 1994".
- catalog tableOfContents "Introduction. Hackers: Heroes or Villains? / Gareth Branwyn -- Part 1. Before Hack -- Chapter 1. The Basics -- Reading vs. Doing -- Opening Remarks -- Equipment -- Modems And Speed -- Communications Software -- Handy Features -- Data Capture -- Past and Future -- Days of Yore Live On -- Computer Crime -- Stealing Money -- Sabotage -- Various Thieveries -- The Seventh Crime -- Hacker Motivations -- Chapter 2. The History Of Hacking -- First Came Hardware -- YIPL and TAP -- Computer Crime -- 2600 -- WarGames and Phrack -- Shadow Hawk -- The Electronic Frontier Foundation -- Chapter 3. Researching The Hack -- Targeting -- Collecting Information -- Some Unusual Research Methods -- On-line Computer Simulators and Tutorials -- Sorting Through Trash -- GIRK -- Found Disk Analysis -- Check Up -- Damage to One Side -- Rips and Tears -- Imperfections -- Examining Screenshots -- Snooping -- Chapter 4. Passwords And Access Control -- Passwords -- Passwords Supplied by the User -- Possible Password Investigation -- Password Studies -- Password Restraints -- Computer Generated Passwords: Fakery and Analysis of Machine-Generated Passwords -- Non-Random Machine-Generated Passwords -- Programs are People Too -- Brute Force Methods -- Foiling the Brute Force Assault -- Chapter 5. Social Engineering -- The Noble Form -- Hacker as Neophyte -- Hacker in Power -- Hacker as Helper -- Peak Hours -- Other Hints -- Sample Social Engineering Situations -- Miscellaneous Social Engineering Tips -- Other Roles -- In-Person Engineering -- Written Engineering -- Request for Information -- Message From God -- Trouble in Paradise? -- Chapter 6. Reverse Social Engineering -- Overcoming Social Engineering Drawbacks -- Reverse Social Engineering Sabotage Methods -- RSE Case Study: The Translation Table -- Solving the Sabotage -- RSE Advertising Methods -- Trouble for Nothing?".
- catalog title "Secrets of a super hacker / by the Knightmare ; [introduction by Gareth Branwyn ; illustrations by Dan Wend].".
- catalog type "text".