Contents
1) Being a Hacker
2) Windows and Linux
3) Ports and protocols
4) Services and Connections
5) System Identification
6) Malware
7) Attack Analysis
Forensics
9) Email Security
10) Web Security & Privacy
11) Passwords
12) Legalities & Ethics
13) Glossary
No comments:
Post a Comment