T.J. O'Connor
Twitter
Genre
More books by T.J. O'Connor…
“With our program modularized into separate functions, we can now increase our performance. Instead of trying each word in the dictionary one at a time, we will utilize threads of execution”
― Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
― Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
“In 1988, RSH provided an excellent (although not very secure) method for a system administrator to remotely connect to a machine and manage it by performing a series of terminal commands on the host. The Secure Shell (SSH) protocol has since replaced RSH by combining RSH with a public-key cryptographic scheme in order to secure the traffic.”
― Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
― Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
“With the MAC address of a wireless access point, we can now also print out the physical location of the access point as well. Quite a few databases, both open-source and proprietary, contain enormous listings of wireless access points correlated to their physical locations.”
― Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
― Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Topics Mentioning This Author
| topics | posts | views | last activity | |
|---|---|---|---|---|
| Cozy Mysteries : January 2015 | 12 | 106 | Feb 04, 2015 08:13PM | |
| Cozy Mysteries : January 2016 | 15 | 114 | Jan 15, 2016 10:00AM | |
| Goodreads Librari...: Merge Author Series / Create New | 7 | 13 | Sep 20, 2024 08:05AM |
Is this you? Let us know. If not, help out and invite T.J. to Goodreads.














