Jump to ratings and reviews
Rate this book

Hacking: Being a Teen Hacker - a Beginners Guide to Ethical Hacking and Computer Security Awareness

Rate this book
Book ( Being A Teen Hacker) overview and key Learning Points-This work is not what most people would expect to read when they pick up a “hacking” book. Rather than showing the reader how to perform traditional penetration test attacks against networks and systems, we will be taking an unusual journey, intended to expand the mind of the reader and force them to Learn Key Points How to start Ethical Hacking & Computer Security Awareness from a completely different perspective. A step By Step Ethical Hacking Guide for Teens. Including Live 25 Google Hacks that force Peoples to think that Hackers (you) are Most Intelligent Guys on this earth. Hacking is the most exhilarating game on the planet. They Think that you are an Evil Genius.This Guide to (Mostly) Harmless Hacking can be your gateway into this world. After reading just a few from this Guides you will be able to pull off stunts that will be legal, phun, and will impress the heck out of your friends. This is first Hacking Book on this Earth for Teens, for elementary school students, junior high school students, and high school students.Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, World Famous Hackers & Author Harry Hariom Choudhary & Richard Pryce explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Being A Teen Hacker,What InsideChapter-I (HISTORY_of_Computer_Hacking) A brief history of Computer Hacking. Top 10 Indian Hackers. Evolution of Hacking. The golden Era & Now. Criminalization. Hacker and cracker profiles. Who cracks?Chapter-II (Being_a_TEEN_Hacker) Resources. Books. Magazines and Newspapers. Forums and Mailing Lists. Websites. Chat. P2P.Chapter –III (Windows_and_Linux) What Is Operating System? Windows and Linux. Introduction and Objectives. Requirements and Setup. Requirements. Setup. System WINDOWS. How to open an MS-DOS window. Commands and tools (Windows). System Linux. How to open a console window. Commands and tools (Linux).Chapter –IV (Ports_and_Protocols) Basic concepts of networks. Devices. Topologies. TCP/IP model. Layers. Application. Transport. Internet. Network Access. Protocols. Application layer protocols. Transport layer Protocols. Internet layer Protocols. IP Addresses. Ports. Encapsulation.Chapter-V (Services_and_Connections) SERVICES AND CONNECTIONS. Services. HTTP and The Web. E-Mail – POP and SMTP. IRC. FTP. Telnet and SSH. DNS. DHCP. Connections. ISPs. Plain Old Telephone Service. DSL. Cable Modems.Chapter-VI (System_Identification) Identifying a Server. Identifying the Owner of a Domain. Identifying the IP address of a Domain. Identifying Services. Ping and Trace Route. Banner Grabbing. Identifying Services from Ports and Protocols. System Finger printing. Scanning Remote Computers.Chapter-Vii (malwares) Viruses. Description. Boot Sector Viruses. The Executable File Virus. The Terminate and Stay Resident (TSR) Virus. The Polymorphic Virus. The Macro Virus. Worms. Trojans and Spyware. Description. Rootkits and Backdoors. Logic bombs and Time bombs. Counter measures. Anti-Virus. NIDS. HIDS. Firewalls. Sandboxes. Good Safety Advice.Chapter-Vii (Google live hacking) Gravity God on Earth Pac-man Mirror Google Hacker Barrel Roll Rainbow Sphere Spam Tilt or Askew Dragon Slayer Ninja Doodles Recursion Flight Simulator Anagram disappearing “OO” Annoying Epic Weenie Chicken Rolling

104 pages, Paperback

First published July 28, 2013

4 people want to read

About the author

Harry Hariom Choudhary

33 books3 followers
Harry, Hariom Chaudhary is an 26 year old young Famous Indian computer Programming Author and scientifically Hacking professional (Hacker) has a unique experience in the field of computers Programming, Hacking and Cyber Security.

He has helped Indian USA, European governments and some multinational software companies of around the globe to secure their networks and securities. He has authored several books on Various Computers Programming Languages and computer security & Hacking.

Harry, is Technically Graduate and, MSC-IT, MBA-IT Master, Harry is the leading authority on C Programming and C++ Programming as well as on Core Java & Data Structure and Algorithms. His acclaimed C and C++ & Java books. He has over 6 years of experience as a software methodologist. His teaching and research interests are in the areas of artificial intelligence, programming languages, practical complexity problems, heuristic search methods, deductive algorithms, and educational and social issues. He originated error analysis in heuristic search methods and deductive algorithms.

Harry describes himself as an Ethical Hacker, Harry Also Known as (Captain Harry Chief Hacker) In cyber space ranked under top three extremely intelligent Indian Hacker according to Famous Hacking Book “Hacking Beginner's Guide 2014, Hackers: Heroes
of the Computer Revolution.”

Recently, Harry turned his passion from technology to Action Crime Novelist. Currently he is writing a Trilogy novel series (Illegal Mind & The Hacker) Based on Extremely Intelligent Hacker. Upcoming Novel’s first series is “Blood Tears.” Confirmed
release in 2014.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
1 (100%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.