No Starch Press

Displaying 1-3 of 3 results

  • Downloads // Feb 2012

    Recognizing covert methods of launching malware attacks

    This chapter from Practical Malware Analysis offers a detailed look at various ways covert malware attacks are launched. Recognizing launching techniques is critical to finding malware on a live system. Note: The publisher has provided a promo code in this PDF for 30% off the purchase price of the...

    Provided By No Starch Press

  • Book chapters // Jul 2007

    Analyze capture files and investigate some common protocols in Wireshark

    In this chapter download from Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, learn how to use Wireshark to analyze capture files and to use those capture files to discover how some common protocols work. First, receive an overview of some of the more common protocols that appear...

    Provided By No Starch Press

  • Book chapters // Oct 2006

    Looking to hack your cable modem? First build your own console cable in seven easy steps

    Go inside the device that makes Internet via cable possible and, along the way, discover the secrets of many popular cable modems, including products from Motorola, RCA, WebSTAR, D-Link. Start by building your own inexpensive RS-232-to-TTL converter aka console cable, which will allow you to communicate directly with the...

    Provided By No Starch Press

  • Book chapters // Oct 2006

    Looking to hack your cable modem? First build your own console cable in seven easy steps

    Go inside the device that makes Internet via cable possible and, along the way, discover the secrets of many popular cable modems, including products from Motorola, RCA, WebSTAR, D-Link. Start by building your own inexpensive RS-232-to-TTL converter aka console cable, which will allow you to communicate directly with the...

    Provided By No Starch Press

  • Book chapters // Jul 2007

    Analyze capture files and investigate some common protocols in Wireshark

    In this chapter download from Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems, learn how to use Wireshark to analyze capture files and to use those capture files to discover how some common protocols work. First, receive an overview of some of the more common protocols that appear...

    Provided By No Starch Press

  • Downloads // Feb 2012

    Recognizing covert methods of launching malware attacks

    This chapter from Practical Malware Analysis offers a detailed look at various ways covert malware attacks are launched. Recognizing launching techniques is critical to finding malware on a live system. Note: The publisher has provided a promo code in this PDF for 30% off the purchase price of the...

    Provided By No Starch Press