Ads 468x60px

Labels

Saturday, January 26, 2013

Harmless Hacking for dummies


The six Guides to (mostly) Harmless Hacking of Vol. 1 jumped immediately into
how-to hacking tricks. But if you are like me, all those details of probing ports
and playing with hypotheses and pinging down hosts gets a little dizzying.
So how about catching our breath, standing back and reviewing what the heck it
is that we are playing with? Once we get the basics under control, we then can
move on to serious hacking.

Also, I have been wrestling with my conscience over whether to start giving you
step-by-step instructions on how to gain root access to other peoples’ computers.
The little angel on my right shoulder whispers, “Gaining root without permission
on other people’s computers is not nice. So don’t tell people how to do it.” The
little devil on my left shoulder says, “Carolyn, all these hackers think you don’t
know nothin’! PROOVE to them you know how to crack!” The little angel says,

“If anyone reading Guide to (mostly) Harmless Hacking tries out this trick, you
might get in trouble with the law for conspiracy to damage other peoples’
computers.” The little devil says, “But, Carolyn, tell people how to crack into root
and they will think you are KEWL!”

Download the entire file here

:: DOWNLOAD ::

0 comments:

Post a Comment

 

Count

About Me

HatHack flashes on the updated news on hacking the system which ranges from the computer to internet and network hacking. Hacking -- Taking control over any thing and every is hacking of that particular system. Start Hacking !!!!

Visits

Sample Text