A PHP Error was encountered

Severity: 8192

Message: Methods with the same name as their class will not be constructors in a future version of PHP; Waterfall_Cache has a deprecated constructor

Filename: _common/waterfall_cache.php

Line Number: 47

A PHP Error was encountered

Severity: 8192

Message: Methods with the same name as their class will not be constructors in a future version of PHP; Cache_System has a deprecated constructor

Filename: _common/waterfall_cache.php

Line Number: 194

A PHP Error was encountered

Severity: 8192

Message: Methods with the same name as their class will not be constructors in a future version of PHP; Memcache_Cache_System has a deprecated constructor

Filename: _common/waterfall_cache.php

Line Number: 275

A PHP Error was encountered

Severity: 8192

Message: Methods with the same name as their class will not be constructors in a future version of PHP; Filesystem_Cache_System has a deprecated constructor

Filename: _common/waterfall_cache.php

Line Number: 440

A PHP Error was encountered

Severity: 8192

Message: Methods with the same name as their class will not be constructors in a future version of PHP; APC_Cache_System has a deprecated constructor

Filename: _common/waterfall_cache.php

Line Number: 628

Hacking for Everyone

Hacking for Everyone

By ServerWatch Staff (Send Email)
Posted Mar 24, 2003


by Marcin Policht Book Review - "Hack Proofing Your Network" from Syngress Publishing

"Hack Proofing Your Network"
from Syngress Publishing

As the book proclaims, "the only way to stop a hacker is to think like one". This seems to be a consistent approach across all the chapters, written by a collection of authors, known for their "hacking" accomplishments. Most notably, the contributors include Georgi Guninski (famous in the world of security professionals for discovering numerous security holes in Microsoft products - most recently Internet Explorer), Mudge (originator of legendary L0phtCrack and security advisor to the White House and Congress), Rain Forest Puppy (whose frequent posting to the NTBugtraq list expose bugs and flaws in Windows NT and 2000), and Jeromy Rauch (co-designer of Internet Security Scanner and CA CyberCop Scanner and Monitor).

If you are looking for a specific examples of most common security attacks (and the way of detecting and protecting from them), you won't be disappointed. SYN flood description contains its source code and detailed description. Similarly, diffing, cryptography and unexpected input attacks (via buffer overflow - with clever C++ code, logic alteration, use of http/html and SQL queries) are covered in lots of details.

The book also contains the in-depth analysis of Melissa source code, giving you insight on system vulnerabilities used by hackers. Definitely the recommended reading for security professionals and hackers alike...

Page 1 of 1

Thanks for your registration, follow us on our social networks to keep up-to-date