官术网_书友最值得收藏!

A glimpse of hacking

In the coming sections, we are going to learn how to install the operating systems and programs needed for hacking. We will then learn some basics about hacking, and how to use the operating systems involved. Before we start, I'd like to give you the gist of what you're going to be able to do by the end of this book. In this section, we are going to go through an example of hacking a Windows computer from a Linux machine.

Don't worry about how we installed these machines or how to run these commands; right now, this is just an example. In the future, we're going to break this into steps, and you will see exactly how to run the attack. You will also learn about how the attack works, and how to protect yourself from such an attack.

主站蜘蛛池模板: 垦利县| 呼和浩特市| 永宁县| 团风县| 德庆县| 彭山县| 砚山县| 桃源县| 永福县| 瑞昌市| 阿拉尔市| 凤翔县| 郴州市| 定西市| 栾川县| 东港市| 北川| 江川县| 湖南省| 夏河县| 宁陕县| 肃北| 浙江省| 瑞金市| 嘉鱼县| 济宁市| 准格尔旗| 上栗县| 岐山县| 错那县| 于田县| 溆浦县| 阜南县| 桃江县| 邻水| 韶关市| 青田县| 义乌市| 麻栗坡县| 大宁县| 米泉市|