• Complain

Long - No Tech Hacking

Here you can read online Long - No Tech Hacking full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2011, publisher: Elsevier Science, genre: Detective and thriller. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

No Tech Hacking: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "No Tech Hacking" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Johnny Longs last book sold 12,000 units worldwide. Kevin Mitnicks last book sold 40,000 units in North America. As the cliche goes, information is power. In this age of technology, an increasing majority of the worlds information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology. - Dumpster Diving Be a good sport and dont read the two?D{u0094} words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). - Tailgating Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows. - Shoulder Surfing If you like having a screen on your laptop so you can see what youre working on, dont read this chapter. - Physical Security Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity? - Social Engineering with Jack Wiles Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal war stories from the trenches of Information Security and Physical Security. - Google Hacking A hacker doesnt even need his own computer to do the necessary research. If he can make it to a public library, Kinkos or Internet cafe, he can use Google to process all that data into something useful. - P2P Hacking Lets assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself. - People Watching Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter well take a look at a few examples of the types of things that draws a no-tech hackers eye. - Kiosks What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash? - Vehicle Surveillance Most people dont realize that some of the most thrilling vehicular espionage happens when the cars arent moving at all! Read more...
Abstract: Johnny Longs last book sold 12,000 units worldwide. Kevin Mitnicks last book sold 40,000 units in North America. As the cliche goes, information is power. In this age of technology, an increasing majority of the worlds information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology. - Dumpster Diving Be a good sport and dont read the two?D{u0094} words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). - Tailgating Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows. - Shoulder Surfing If you like having a screen on your laptop so you can see what youre working on, dont read this chapter. - Physical Security Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity? - Social Engineering with Jack Wiles Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal war stories from the trenches of Information Security and Physical Security. - Google Hacking A hacker doesnt even need his own computer to do the necessary research. If he can make it to a public library, Kinkos or Internet cafe, he can use Google to process all that data into something useful. - P2P Hacking Lets assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself. - People Watching Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter well take a look at a few examples of the types of things that draws a no-tech hackers eye. - Kiosks What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash? - Vehicle Surveillance Most people dont realize that some of the most thrilling vehicular espionage happens when the cars arent moving at all!

No Tech Hacking — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "No Tech Hacking" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

No Tech Hacking

A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Johnny Long

Scott Pinzon, CISSP, Technical Editor

Jack Wiles

Kevin D. Mitnick

Syngress

Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively Makers) of this book (the Work) do not guarantee or warrant the results to be obtained from the Work.

There is no guarantee of any kind, expressed or implied, regarding the Work or its contents. The Work is sold AS IS and WITHOUT WARRANTY. You may have other legal rights, which vary from state to state.

In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you.

You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files.

Syngress Media, Syngress, Career Advancement Through Skill Enhancement, Ask the Author UPDATE, and Hack Proofing, are registered trademarks of Elsevier, Inc. Syngress: The Definition of a Serious Security Library, Mission Critical, and The Only Way to Stop a Hacker is to Think Like One are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.

KEY SERIAL NUMBER
001HJIRTCV764
002PO9873D5FG
003829KM8NJH2
004BAL923457U
005CVPLQ6WQ23
006VBP965T5T5
007HJJJ863WD3E
0082987GVTWMK
009629MP5SDJT
010IMWQ295T6T

PUBLISHED BY

Elsevier, Inc.

30 Corporate Drive

Burlington, MA 01803

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.

Printed in the United States of America

1 2 3 4 5 6 7 8 9 0

Publisher: Andrew Williams

Technical Editor: Scott Pinzon

Page Layout and Art: SPi

For information on rights, translations, and bulk sales, contact Matt Pedersen, Commercial Sales Director and Rights, at Syngress Publishing; email m.pedersen@elsevier.com.

Johnny Long, Author

Whats the story with the proceeds?

Its simple, really. My proceeds from this book are going to AOET (aoet.org), an organization that provides food, education and medical care to children left in the wake of Africas HIV/AIDS epidemic. More than an aid organization, AOET aims to disrupt the cycle of poverty and hopelessness in sub-Saharan Africa through empowerment programs and job training, enabling children and adults to be self-sustaining, restoring not only their health but their pride and hope for a brighter future. A single book purchase made through my Amazon associates account (linked from any of my websites, or though http://tiniuri.com/f/Xpc) will generate enough income for AOET to feed a child for an entire month. Other retail purchases (which generate half as much income) will provide either medical services or educational supplies and funding for a single child through a donation pool set aside for those purposes. Because I am called to look after orphans and widows in their distress (James 1:27), and I know from personal experience how mutually transformative it can be to take that calling seriously. Hamlet was onto something when he wondered, Whether this nobler in the mind to suffer the slings and arrows of outrageous fortune or to take arms against a sea of troubles, and by opposing, end them.

Im Johnny. I Hack Stuff.

There are many people to thank this time around, and I wont get to them all. But Ill give it my best shot. First and foremost, thanks to God for the many blessings in my life. Christ for the Living example, and the Spirit of God that encourages me to live each day with real purpose. This book is more a God thing than a Johnny thing. Thanks to my wife and four wonderful kids. Words cant express how much you mean to me. Thanks for putting up with the real me.

Id like to thank the members of the Shmoo group for fielding lots of questions, and to my book team: Alex, CP, Deviant, Eric, Freshman, Garland, Jack, Joshua, Marc, Ross, Russ, Vince and Yoshi. It was great to have your support, especially in such a tight timeframe. Thanks also to Scott Pinzon, for being a mentor and a great editor. Youve taught me so much. Id also like to thank Vince Ritts for taking the time to plant no-tech hacking seed all those years ago.

And to the many friends and fans that have supported my work over the years, a final thanks. You make it very difficult to remain anti-social.

Be sure to check out our companion website at http://notechhacking.com as we continue the story of the no-tech hacker.

Johnny Long is a Christian by grace, a professional hacker by trade, a pirate by blood, a ninja in training, a security researcher and author. He can be found lurking at his website (http://johnny.ihackstuff.com). He is the founder of Hackers For Charity (http://ihackcharities.org), an organization that provides hackers with job experience while leveraging their skills for charities that need those skills.

Technical Editor

Scott Pinzon, CISSP, is Editor-in-Chief for LiveSecurity, a service offered by WatchGuard Technologies in Seattle. Pinzon has edited, written, and/or published well over 1,500 security alerts and best practices articles to LiveSecurity subscribers, who have tripled in number during his tenure. Pinzon has worked in the fields of security, encryption products, e-commerce, and voice messaging, with 18 years of experience writing about high-tech products for clients both large (Weyerhaeuser IT) and small (Seattles first cash machine network). LiveSecurity training videos that Pinzon has co-written and directed have accumulated more than 100,000 views on Google Video and YouTube. He also hosts the internationally respected podcast, Radio Free Security. Pinzon was story editor for Stealing the Network: How to Own a Shadow, available from Syngress. He still believes he made the right call when he turned down the publisher who asked him to ghost-write books for Mr. T.

Contributing Author

Jack Wiles is a security professional with over 30 years experience in security-related fields, including computer security, disaster recovery, and physical security. He is a professional speaker and has trained federal agents, corporate attorneys, and internal auditors on a number of computer crime-related topics. He is a pioneer in presenting on a number of subjects that are now being labeled Homeland Security topics. Well over 10,000 people have attended one or more of his presentations since 1988. Jack is also a cofounder and president of TheTrainingCo. He is in frequent contact with members of many state and local law enforcement agencies as well as special agents with the U.S. Secret Service, FBI, U.S. Customs, Department of Justice, the Department of Defense, and numerous members of high-tech crime units. He was also appointed as the first president of the North Carolina InfraGard chapter, which is now one of the largest chapters in the country. He is also a founding member and official MC of the U.S. Secret Service South Carolina Electronic Crimes Task Force.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «No Tech Hacking»

Look at similar books to No Tech Hacking. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «No Tech Hacking»

Discussion, reviews of the book No Tech Hacking and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.