Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Introduction Chapter 1: Bluetooth Hacking
Introduction To Bluetooth Advantages/disadvantages What are the disadvantages/why should we avoid it happening Diagram representation Bluetooth hacking software’s Conclusion
Chapter 2: methods of hacking a website
Cross-site request forgery Frame injection Javascript injection Sql injection
Chapter 3: spam
Different types of spam Email spam Email spamming techniques Costs involved in spamming Anti spamming techniques
Chapter 4: security breach awareness
Introduction Types of security breach Conclusion
Chapter 5: a case study of hacking
OS identification How to identify a remote computer ip Pre request for hacking Protecting yourself before hacking Cookies
Chapter 6: use of CAPTCHA to avoid hacking
Why implement CAPTCHA in ASP? How to implement CAPTCHA in ASP? Display image & get input from user
Chapter 7: internet security
What’s a threat? Virus vs spyware Symptoms that you are a victim of cybercrime How to protect from internet threats? Encryption Decryption Cryptography What are viruses, worms and trojan horses and what are the differences between them?
Conclusion
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion