Greetings, readers! Now that Amazon has disabled its popular ebook lending feature, we're more committed than ever to helping you find the best ways to borrow FREE or save big on the Kindle books that you want to read. Kindle Unlimited and Amazon Prime Reading offer members free reading access to over 1 million titles, including Kindle books, magazines, and audiobooks. Beginning soon, each day in this space we will feature "Today's FREEbies and Top Deals for Our Favorite Readers" to share top 5-star titles that are available for KU and Prime members to read FREE, plus a link to a 30-day FREE trial for Kindle Unlimited!

Lendle

Lendle is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com. As an Amazon Associates participant, we earn small amounts from qualifying purchases on the Amazon sites.

Apart from its participation in the Associates Program, Lendle is not affiliated with Amazon or Kindle in any other way. Amazon, Kindle and the Amazon and Kindle logos are trademarks of Amazon.com, Inc. or its affiliates. Certain content that appears on this website is provided by Amazon Services LLC. This content is provided "as is" and is subject to change or removal at any time. Lendle is published independently by Stephen Windwalker and Windwalker Media and is not endorsed by Amazon.com, Inc.

Book (Hacking: Being A Teen Hacker) overview and key Learning Points---



This work is not what most people would expect to read when they pick up a “hacking” book. Rather than showing the reader how to perform traditional penetration test attacks against networks and systems.



we will be taking an unusual journey, intended to expand the mind of the reader and force them to Learn Key Points How to start Ethical Hacking & Computer Security Awareness from a completely different perspective.



A step By Step Ethical Hacking & Computer Security Awareness Guide for Teens. Including Live 25 Google Hacks that force Peoples to think that Hackers (you) are Most Intelligent Guys on this earth. Hacking is the most exhilarating game on the planet. They Think that you are an Evil Genius.



This Guide to (Mostly) Harmless Hacking can be your gateway into this world. After reading just a few from this Guides you will be able to pull off stunts that will be legal, phun, and will impress the heck out of your friends.



This is first Hacking Book on this Earth for Teens, for elementary school students, junior high school students, and high school students.



Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves Hackers, but few have the strong technical foundation needed to really push the envelope.



Rather than merely showing how to run existing exploits, World Famous Hackers & Author Harry Hariom Choudhary & Richard Pryce explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone,



What's Inside--


==========


Chapter-I (HISTORY_of_Computer_Hacking)


A brief history of Computer Hacking.


Top 10 Indian Hackers.


Evolution of Hacking.


The golden Era & Now.


Criminalization.


Hacker and cracker profiles.


Who cracks?



Chapter-II (Being_a_TEEN_Hacker)



Resources.


Books.


Magazines and Newspapers.


Forums and Mailing Lists.


Websites.


Chat.


P2P.



Chapter –III (Windows_and_Linux)



What Is Operating System?


Windows and Linux.


Introduction and Objectives.


Requirements and Setup.


Requirements.


Setup.


System Operation: WINDOWS.


How to open an MS-DOS window.


Commands and tools (Windows).


System Operations: Linux.


How to open a console window.


Commands and tools (Linux).


Exercises in Windows & Linux



Chapter –IV (Ports_and_Protocols)



Basic concepts of networks.


Devices.


Topologies.


TCP/IP model.


Introduction.


Layers.


Application.


Transport.


Internet.


Network Access.


Protocols.


Application layer protocols.


Transport layer Protocols.


Internet layer Protocols.


IP Addresses.


Ports.


Encapsulation.


Exercise 1: Net stat.


Exercise 2: Ports and Protocols.


Exercise 3: My First Server.



Chapter-V (Services_and_Connections)



SERVICES AND CONNECTIONS.


Services.


HTTP and The Web.


E-Mail – POP and SMTP.


IRC.


FTP.


Telnet and SSH.


DNS.


DHCP.


Connections.


ISPs.


Plain Old Telephone Service.


DSL.


Cable Modems.



Chapter-VI (System_Identification)




Identifying a Server.


Identifying the Owner of a Domain.


Identifying the IP address of a Domain.


Identifying Services.


Ping and Trace Route.


Banner Grabbing.


Identifying Services from Ports and Protocols.


System Finger printing.


Scanning Remote Computers.



Chapter-Vii (Malwares)



Viruses (Virii).


Boot Sector Viruses.


The Executable File Virus.


The Terminate and Stay Resident (TSR) Virus.


The Polymorphic Virus.


The Macro Virus.


Worms.


Trojans and Spyware.


Introduction.


Rootkits and Backdoors.


Logic bombs and Time bombs.


Counter measures.


Anti-Virus.


NIDS.


HIDS.


Firewalls.


Sandboxes.


Good Safety Advice.



Chapter-Vii (Google live Hacking)



Google Gravity


Google for you


Chuck Norris


God on Google Earth


Pac-man


Mirror


Hacker


Barrel Roll


Rainbow


Sphere.


Spam.


Tilt or Askew


Dragon

Genres for this book