Wednesday, July 18, 2007

Free VOIP Call Free SMS Send & Low Cost Domain Register... Here

Friday, July 6, 2007

Office Password Recovery Tools

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-5

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-5

Publisher Sybex IncAuthor(s)
Kimberly Graves
ISBN 0782144373
Release Date 27 February 2007

Prepare for the CEH certification exam with this official review guide
Learn how to identify security risks to networks and computers and get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. The only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.
* Easy-to-use book is organized by exam objectives for quick review* Flexible review guide goes hand-in-hand with any learning tool on the market* “Exam Essentials” in each chapter helps you zero in on what you need to know* Book includes over 300 review questions and practice tools
Look inside for complete review coverage of all exam objectives for CEH exam 312-50.


Certified Ethical Hacker Lab 3.0

Certified Ethical Hacker Lab 3.0 (Tools for exam preparation)

If you want to stop hackers from invading your network, first you've got to invade their minds.
The CEH Program certifies individuals in the specific network security discipline of Ethical hacking from a vendor-neutral perspective. The Certified Ethical hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.


The Certified Ethical Hacker Training Solution

The Certified Ethical Hacker Training Solution from Specialized Solutions explores the existence and the use of hacking tools and security systems across 21 topical domains. Within each domain, students are presented with several tools that a hacker can use, and which countermeasures are most effective against their use.

• Introduction to Ethical Hacking
• Footprinting Techniques
• Scanning• Enumeration
• System Hacking
• Trojans and Backdoors
• Sniffers
• Denial of Service
• Social Engineering
• Session Hijacking
• CEH Hacking Web Servers
• Web Application Vulnerabilities
• Web-based Password Cracking Techniques
• SQL Injection
• Hacking Wireless Networks
• Virus and Worms
• Hacking Novell
• Linux Hacking
• Evading, IDS, Firewalls and Honeypots
• Buffer Overflows
• Cryptography
• Penetration Testing