Being A Teen Hacker.: A Beginners Guide To Ethical Hacking & Computer Security Awareness. VOL-I

· Hariom Choudhary
4.1
60 reviews
Ebook
100
Pages
Ratings and reviews aren’t verified  Learn More

About this ebook

 Book (Hacking: Being A Teen Hacker) overview and key Learning Points- This work is not what most people would expect to read when they pick up a “hacking” book. Rather than showing the reader how to perform traditional penetration test attacks against networks and systems, we will be taking an unusual journey, intended to expand the mind of the reader and force them to Learn Key Points How to start Ethical Hacking & Computer Security Awareness from a completely different perspective. A step By Step Ethical Hacking Guide for Teens. Including Live 25 Google Hacks that force Peoples to think that Hackers (you) are Most Intelligent Guys on this earth. Hacking is the most exhilarating game on the planet. They Think that you are an Evil Genius. This Guide to (Mostly) Harmless Hacking can be your gateway into this world. After reading just a few from this Guides you will be able to pull off stunts that will be legal, phun, and will impress the heck out of your friends. This is first Hacking Book on this Earth for Teens, for elementary school students, junior high school students, and high school students. Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, World Famous Hackers & Author Harry Hariom Choudhary & Richard Pryce explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: Being A Teen Hacker, What Inside Chapter-I (HISTORY_of_Computer_Hacking) A brief history of Computer Hacking. Top 10 Indian Hackers. Evolution of Hacking. The golden Era & Now. Criminalization. Hacker and cracker profiles. Who cracks? Chapter-II (Being_a_TEEN_Hacker) Resources. Books. Magazines and Newspapers. Forums and Mailing Lists. Websites. Chat. P2P. Chapter –III (Windows_and_Linux) What Is Operating System? Windows and Linux. Introduction and Objectives. Requirements and Setup. Requirements. Setup. System Operation: WINDOWS. How to open an MS-DOS window. Commands and tools (Windows). System Operations: Linux. How to open a console window. Commands and tools (Linux). Chapter –IV (Ports_and_Protocols) Basic concepts of networks. Devices. Topologies. TCP/IP model. Layers. Application. Transport. Internet. Network Access. Protocols. Application layer protocols. Transport layer Protocols. Internet layer Protocols. IP Addresses. Ports. Encapsulation. Chapter-V (Services_and_Connections) SERVICES AND CONNECTIONS. Services. HTTP and The Web. E-Mail – POP and SMTP. IRC. FTP. Telnet and SSH. DNS. DHCP. Connections. ISPs. Plain Old Telephone Service. DSL. Cable Modems. Chapter-VI (System_Identification) Identifying a Server. Identifying the Owner of a Domain. Identifying the IP address of a Domain. Identifying Services. Ping and Trace Route. Banner Grabbing. Identifying Services from Ports and Protocols. System Finger printing. Scanning Remote Computers. Chapter-Vii (malwares) Viruses. Description. Boot Sector Viruses. The Executable File Virus. The Terminate and Stay Resident (TSR) Virus. The Polymorphic Virus. The Macro Virus. Worms. Trojans and Spyware. Description. Rootkits and Backdoors. Logic bombs and Time bombs. Counter measures. Anti-Virus. NIDS. HIDS. Firewalls. Sandboxes. Good Safety Advice. Chapter-Vii (Google live hacking) Gravity God on Earth Pac-man Mirror Google Hacker Barrel Roll Rainbow Sphere Spam Tilt or Askew Dragon Slayer Ninja Doodles Recursion Flight Simulator Anagram disappearing “OO” Annoying Epic Weenie Chicken Rolling

Ratings and reviews

4.1
60 reviews
Thomas McIntosh
November 28, 2014
This book doesn't teach anything, all the stuff I here is usless, just google Kali Linux, and a few Tut's, it's better then all the cmd bullshit this book trys to pass off as "hacking". Seriously it has a chapter about l337 2933k or leet speek... 3/5 would not read again
35 people found this review helpful
Did you find this helpful?
Shakti singh Chauhan
November 21, 2015
Not worth reading just has some basic overview which anyone can get through wiki
41 people found this review helpful
Did you find this helpful?
Esther KalaiSelvi Kalai Chelvam
September 5, 2020
I hate becaus I have no reason . And I dont make sense. Hahahahahhaha
1 person found this review helpful
Did you find this helpful?

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.