Author: Dave Prochnow
Publisher: McGraw Hill Professional
ISBN: 0071477373
Category : Digital media
Languages : en
Pages : 494
Book Description
This guide shows how 30 common household items can be hacked and tweaked into products totally different than what the manufacturer intended. Garage and basement tinkerers will get fully illustrated coverage of which products are 'hackable', how to hack them and how to convert them into some unique, fun stuff.
Take This Stuff and Hack It!
Author: Dave Prochnow
Publisher: McGraw Hill Professional
ISBN: 0071477373
Category : Digital media
Languages : en
Pages : 494
Book Description
This guide shows how 30 common household items can be hacked and tweaked into products totally different than what the manufacturer intended. Garage and basement tinkerers will get fully illustrated coverage of which products are 'hackable', how to hack them and how to convert them into some unique, fun stuff.
Publisher: McGraw Hill Professional
ISBN: 0071477373
Category : Digital media
Languages : en
Pages : 494
Book Description
This guide shows how 30 common household items can be hacked and tweaked into products totally different than what the manufacturer intended. Garage and basement tinkerers will get fully illustrated coverage of which products are 'hackable', how to hack them and how to convert them into some unique, fun stuff.
Google Hacking for Penetration Testers
Author: Johnny Long
Publisher: Elsevier
ISBN: 0080478050
Category : Computers
Languages : en
Pages : 529
Book Description
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.*First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
Publisher: Elsevier
ISBN: 0080478050
Category : Computers
Languages : en
Pages : 529
Book Description
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.*First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
Hackers & Painters
Author: Paul Graham
Publisher: "O'Reilly Media, Inc."
ISBN: 0596006624
Category : Computers
Languages : en
Pages : 272
Book Description
The author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more. He also tells important stories about the kinds of people behind technical innovations, revealing their character and their craft.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596006624
Category : Computers
Languages : en
Pages : 272
Book Description
The author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more. He also tells important stories about the kinds of people behind technical innovations, revealing their character and their craft.
Hacking Life
Author: Joseph M. Reagle, Jr.
Publisher: MIT Press
ISBN: 0262538997
Category : Social Science
Languages : en
Pages : 217
Book Description
In an effort to keep up with a world of too much, life hackers sometimes risk going too far. Life hackers track and analyze the food they eat, the hours they sleep, the money they spend, and how they're feeling on any given day. They share tips on the most efficient ways to tie shoelaces and load the dishwasher; they employ a tomato-shaped kitchen timer as a time-management tool.They see everything as a system composed of parts that can be decomposed and recomposed, with algorithmic rules that can be understood, optimized, and subverted. In Hacking Life, Joseph Reagle examines these attempts to systematize living and finds that they are the latest in a long series of self-improvement methods. Life hacking, he writes, is self-help for the digital age's creative class. Reagle chronicles the history of life hacking, from Benjamin Franklin's Poor Richard's Almanack through Stephen Covey's 7 Habits of Highly Effective People and Timothy Ferriss's The 4-Hour Workweek. He describes personal outsourcing, polyphasic sleep, the quantified self movement, and hacks for pickup artists. Life hacks can be useful, useless, and sometimes harmful (for example, if you treat others as cogs in your machine). Life hacks have strengths and weaknesses, which are sometimes like two sides of a coin: being efficient is not the same thing as being effective; being precious about minimalism does not mean you are living life unfettered; and compulsively checking your vital signs is its own sort of illness. With Hacking Life, Reagle sheds light on a question even non-hackers ponder: what does it mean to live a good life in the new millennium?
Publisher: MIT Press
ISBN: 0262538997
Category : Social Science
Languages : en
Pages : 217
Book Description
In an effort to keep up with a world of too much, life hackers sometimes risk going too far. Life hackers track and analyze the food they eat, the hours they sleep, the money they spend, and how they're feeling on any given day. They share tips on the most efficient ways to tie shoelaces and load the dishwasher; they employ a tomato-shaped kitchen timer as a time-management tool.They see everything as a system composed of parts that can be decomposed and recomposed, with algorithmic rules that can be understood, optimized, and subverted. In Hacking Life, Joseph Reagle examines these attempts to systematize living and finds that they are the latest in a long series of self-improvement methods. Life hacking, he writes, is self-help for the digital age's creative class. Reagle chronicles the history of life hacking, from Benjamin Franklin's Poor Richard's Almanack through Stephen Covey's 7 Habits of Highly Effective People and Timothy Ferriss's The 4-Hour Workweek. He describes personal outsourcing, polyphasic sleep, the quantified self movement, and hacks for pickup artists. Life hacks can be useful, useless, and sometimes harmful (for example, if you treat others as cogs in your machine). Life hacks have strengths and weaknesses, which are sometimes like two sides of a coin: being efficient is not the same thing as being effective; being precious about minimalism does not mean you are living life unfettered; and compulsively checking your vital signs is its own sort of illness. With Hacking Life, Reagle sheds light on a question even non-hackers ponder: what does it mean to live a good life in the new millennium?
PayPal Hacks
Author: Shannon Sofield
Publisher: "O'Reilly Media, Inc."
ISBN: 0596007515
Category : Business & Economics
Languages : en
Pages : 368
Book Description
If you've bought or sold items through eBay, or through hundreds of other online sites, then you're familiar with PayPal, the online payment service. With PayPal, a valid email address, and a credit card or bank account, you can easily send and receive payments online. Not a bank or financial institution itself, PayPal describes its service as one that builds on the financial infrastructure of bank accounts and credit cards, and using advanced propriety fraud prevention systems, creates a safe, global, real-time payment solution. Put simply, PayPal provides the means for people to conduct financial transactions online, instantly and securely. But there's more to PayPal than meets the eye. PayPal Hacks shows you how to make the most of PayPal to get the most out of your online business or transactions. Authors Shannon Sofield of Payloadz.com and PayPal evangelist David Nielsen guide you through the rigors of using and developing with PayPal. Whether you're building an ecommerce site using PayPal as a transaction provider, or simply trying to pay for an eBay auction without getting burned, PayPal Hacks will give you the skinny on this leading global online payment service. The collection of tips and tricks in PayPal Hacks shows you how to find or even build the right tools for using PayPal to buy and sell on eBay or as a transaction provider for ecommerce on your own site. Written for all PayPal users, from those just starting out to those developing sophisticated ecommerce sites, this book begins with the basics such as setting up your account, then moves quickly into specific tips and tools for buyers, sellers, and developers. With PayPal Hacks, you can: Learn extra steps to help protect yourself while buying or selling on eBay Save time and money with advanced tips and undocumented features Learn dozens of easy-to-follow procedures to help you request and receive payments and fill orders Use PayPal to handle subscriptions, affiliate systems, and donations Create and customize your customers' checkout process Effortlessly integrate PayPal's shopping cart system into your own website Implement digital fulfillment with Instant Payment Notification (IPN) and Payment Data Transfer (PDT) Develop and distribute ecommerce applications with the PayPal API Each hack consists of a task to be accomplished or a creative solution to a problem, presented in a clear, logical, and task-oriented format. PayPal Hacks provides the tools and details necessary to make PayPal more profitable, more flexible, and more convenient.
Publisher: "O'Reilly Media, Inc."
ISBN: 0596007515
Category : Business & Economics
Languages : en
Pages : 368
Book Description
If you've bought or sold items through eBay, or through hundreds of other online sites, then you're familiar with PayPal, the online payment service. With PayPal, a valid email address, and a credit card or bank account, you can easily send and receive payments online. Not a bank or financial institution itself, PayPal describes its service as one that builds on the financial infrastructure of bank accounts and credit cards, and using advanced propriety fraud prevention systems, creates a safe, global, real-time payment solution. Put simply, PayPal provides the means for people to conduct financial transactions online, instantly and securely. But there's more to PayPal than meets the eye. PayPal Hacks shows you how to make the most of PayPal to get the most out of your online business or transactions. Authors Shannon Sofield of Payloadz.com and PayPal evangelist David Nielsen guide you through the rigors of using and developing with PayPal. Whether you're building an ecommerce site using PayPal as a transaction provider, or simply trying to pay for an eBay auction without getting burned, PayPal Hacks will give you the skinny on this leading global online payment service. The collection of tips and tricks in PayPal Hacks shows you how to find or even build the right tools for using PayPal to buy and sell on eBay or as a transaction provider for ecommerce on your own site. Written for all PayPal users, from those just starting out to those developing sophisticated ecommerce sites, this book begins with the basics such as setting up your account, then moves quickly into specific tips and tools for buyers, sellers, and developers. With PayPal Hacks, you can: Learn extra steps to help protect yourself while buying or selling on eBay Save time and money with advanced tips and undocumented features Learn dozens of easy-to-follow procedures to help you request and receive payments and fill orders Use PayPal to handle subscriptions, affiliate systems, and donations Create and customize your customers' checkout process Effortlessly integrate PayPal's shopping cart system into your own website Implement digital fulfillment with Instant Payment Notification (IPN) and Payment Data Transfer (PDT) Develop and distribute ecommerce applications with the PayPal API Each hack consists of a task to be accomplished or a creative solution to a problem, presented in a clear, logical, and task-oriented format. PayPal Hacks provides the tools and details necessary to make PayPal more profitable, more flexible, and more convenient.
Americaville
Author: Minor Watts
Publisher: Olympia Press
ISBN:
Category :
Languages : en
Pages : 187
Book Description
Publisher: Olympia Press
ISBN:
Category :
Languages : en
Pages : 187
Book Description
Google Hacking for Penetration Testers
Author: Bill Gardner
Publisher: Syngress
ISBN: 012802982X
Category : Computers
Languages : en
Pages : 236
Book Description
Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing. - Third edition of the seminal work on Google hacking - Google hacking continues to be a critical phase of reconnaissance in penetration testing and Open Source Intelligence (OSINT) - Features cool new hacks such as finding reports generated by security scanners and back-up files, finding sensitive info in WordPress and SSH configuration, and all new chapters on scripting Google hacks for better searches as well as using Google hacking with other search engines and APIs
Publisher: Syngress
ISBN: 012802982X
Category : Computers
Languages : en
Pages : 236
Book Description
Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing. - Third edition of the seminal work on Google hacking - Google hacking continues to be a critical phase of reconnaissance in penetration testing and Open Source Intelligence (OSINT) - Features cool new hacks such as finding reports generated by security scanners and back-up files, finding sensitive info in WordPress and SSH configuration, and all new chapters on scripting Google hacks for better searches as well as using Google hacking with other search engines and APIs
Smashing WordPress
Author: Thord Daniel Hedengren
Publisher: John Wiley & Sons
ISBN: 0470710500
Category : Computers
Languages : en
Pages : 322
Book Description
"Inside, WordPress expert Thord Daniel Hedengren takes readers beyond the basic blog, to push WordPress to its limits as a CMS, a forum, a photo gallery, an e-commerce site and more"--
Publisher: John Wiley & Sons
ISBN: 0470710500
Category : Computers
Languages : en
Pages : 322
Book Description
"Inside, WordPress expert Thord Daniel Hedengren takes readers beyond the basic blog, to push WordPress to its limits as a CMS, a forum, a photo gallery, an e-commerce site and more"--
Beer Hacks
Author: Ben Robinson
Publisher: Workman Publishing Company
ISBN: 1523505060
Category : Cooking
Languages : en
Pages : 208
Book Description
For the Love of Beer In this tour de force of 100 top tips and tricks, Beer Hacks presents the very best and most creative ways to serve, share, store, and savor your favorite brews. There’s PROBLEM SOLVING: Warm beer? Chill a bottle in about a minute with a can of compressed air. DIY PROJECTS: Turn empty bottles into guitar slides. PARTY TRICKS: The one foolproof technique for shotgunning a beer. FLAVOR BOMBS: a French press is all you need to infuse an ale with fresh berries. Whether you’re hosting a tasting, replenishing after a workout (that’s right—beer has more electrolytes than water), or relishing the singular tranquility of a shower beer, this book is your guide to making beer drinking better, easier, more interesting, delicious, and—especially—fun. Other tips and tricks: Keep beer cold by using an ice bag as a portable fridge. Make authentic bratwurst by boiling in beer. Visit Starkenberger brewery in Austria for a total beer vacation.
Publisher: Workman Publishing Company
ISBN: 1523505060
Category : Cooking
Languages : en
Pages : 208
Book Description
For the Love of Beer In this tour de force of 100 top tips and tricks, Beer Hacks presents the very best and most creative ways to serve, share, store, and savor your favorite brews. There’s PROBLEM SOLVING: Warm beer? Chill a bottle in about a minute with a can of compressed air. DIY PROJECTS: Turn empty bottles into guitar slides. PARTY TRICKS: The one foolproof technique for shotgunning a beer. FLAVOR BOMBS: a French press is all you need to infuse an ale with fresh berries. Whether you’re hosting a tasting, replenishing after a workout (that’s right—beer has more electrolytes than water), or relishing the singular tranquility of a shower beer, this book is your guide to making beer drinking better, easier, more interesting, delicious, and—especially—fun. Other tips and tricks: Keep beer cold by using an ice bag as a portable fridge. Make authentic bratwurst by boiling in beer. Visit Starkenberger brewery in Austria for a total beer vacation.
Hardware Hacking
Author: Joe Grand
Publisher: Elsevier
ISBN: 0080478255
Category : Computers
Languages : en
Pages : 575
Book Description
"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help"* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB· Includes hacks of today's most popular gaming systems like Xbox and PS/2.· Teaches readers to unlock the full entertainment potential of their desktop PC.· Frees iMac owners to enhance the features they love and get rid of the ones they hate.
Publisher: Elsevier
ISBN: 0080478255
Category : Computers
Languages : en
Pages : 575
Book Description
"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help"* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB· Includes hacks of today's most popular gaming systems like Xbox and PS/2.· Teaches readers to unlock the full entertainment potential of their desktop PC.· Frees iMac owners to enhance the features they love and get rid of the ones they hate.