Dr. Praetorious has joined forces with Mary Shelley Lovecraft, and they're looking to make some changes around here. (Note: by 'around here' we mean 'across our entire reality' - which is NOT A GOOD THING!) Meanwhile, our heroes are doing their best to stay alive on the mean streets of Detroit...which happen to be crawling with freaks, weirdos and monster hit-squads!
An edited and slightly updated version of the popular LiveCD for working with wireless networks. Based on Ubuntu, provides a graphical interfeys.Disk boot, there is a script to be installed on the PC hard drive or a virtual machine (VirtualPC is not supported).
Hack Proof Your Wireless Network TYPE : PDF | LANG : English | PAGE : 513 | ISBN: 1928994598 | Size: 5.52 MB
Market comes a wave of stories about snoops intercepting sensitive LAN traffic from out in the company parking lot or across the concourse at the airport. Hack Proofing Your Wireless Network takes a look at strategies for defending wireless LANs–those based on Bluetooth and IEEE 802.11a as well as WiFi–against signal interception and other attacks peculiar to their wireless nature. Unfortunately, there's also a lot of background information on WiFi (as well as on security principles in general), and this is related to wireless network security only tangentially.
Wifi Hack Ultimate All In One (x86/x64) Final|2011 | 910 MB
This time we bring you the best software to hack the WiFi networks 2009-2010. The compilation includes powerful encryption software in network detection and ideal for hacking WiFi networks.Download Programs to hack Free Full WiFi networks.
Dissecting the Hack: The F0rb1dd3n Network Syngress | 2009-10-01 | ISBN: 159749478X | 448 pages | PDF | 13 MB
Dissecting the Hack is one heck of a ride! Hackers, IT professionals, and Infosec aficionados will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats. Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book!