官术网_书友最值得收藏!

A glimpse of hacking

In the coming sections, we are going to learn how to install the operating systems and programs needed for hacking. We will then learn some basics about hacking, and how to use the operating systems involved. Before we start, I'd like to give you the gist of what you're going to be able to do by the end of this book. In this section, we are going to go through an example of hacking a Windows computer from a Linux machine.

Don't worry about how we installed these machines or how to run these commands; right now, this is just an example. In the future, we're going to break this into steps, and you will see exactly how to run the attack. You will also learn about how the attack works, and how to protect yourself from such an attack.

主站蜘蛛池模板: 读书| 华池县| 普定县| 板桥市| 老河口市| 恭城| 水富县| 台山市| 胶州市| 启东市| 虹口区| 葵青区| 普兰县| 旌德县| 榆中县| 汉阴县| 田林县| 鸡东县| 沽源县| 红河县| 井冈山市| 介休市| 安乡县| 二连浩特市| 汝南县| 伊通| 邹平县| 兰州市| 屏东市| 临江市| 奉节县| 墨江| 汤原县| 桐城市| 梓潼县| 察雅县| 双柏县| 安多县| 武定县| 岳阳县| 红安县|