Details for this torrent 

Syngress - WarDriving Drive, Detect, Defend A Guide to Wireles
Type:
Other > E-books
Files:
1
Size:
37.05 MiB (38852067 Bytes)
Uploaded:
2005-01-02 19:36:13 GMT
By:
nethernet
Seeders:
0
Leechers:
1
Comments
3  

Info Hash:
B4D14A0BFDC3E86EF7F4B3C590BA37E5C8D0F181




(Problems with magnets links are fixed by upgrading your torrent client!)
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security.
by Chris Hurley, Michael Puchol, Russ Rogers, Frank Thornton.
ISBN: 1-931836-03-5, 512 Pages, April 2004.
 The practice of WarDriving is a unique combina-tion of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the tele-communications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers. 
 Wireless networks have become a way of life in the past two years. As more wireless networks are deployed the need to secure them increases. This book educates users of wireless networks as well as those who run the networks about the insecurities associated with wireless networking. This effort is called WarDriving. In order to successfully WarDrive there are hardware and software tool required. This book covers those tools, along with cost estimates and recommendations. Since there are hundreds of possible configurations that can be used for WarDriving, some of the most popular are presented to help readers decide what to buy for their own WarDriving setup. 
 Many of the tools that a WarDriver uses are the same tools that could be used by an attacker to gain unauthorized access to a wireless network. Since this is not the goal of a WarDriver, the methodology that users can use to ethically WarDriveis presented. In addition, complete coverage of WarDriving applications, such as NetStumbler, MiniStumbler; and Kismet, are covered.


File list not available.

Comments

pls seed !
men varför funkar det inte :(
please, please ... seed ...