Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

Hacking Books
Books related to hacking and phreaking.


Wi-Foo : The Secrets of Wireless Hacking

Wi-Foo : The Secrets of Wireless Hacking
No description


MAKE: Technology on Your Time Vol. 1 (Make: Technology on Your Time)

MAKE: Technology on Your Time Vol. 1 (Make: Technology on Your Time)
No description


Google Hacking for Penetration Testers

Google Hacking for Penetration Testers
No description


Hacking: The Art of Exploitation

Hacking: The Art of Exploitation
No description


PHP Hacks : Tips & Tools For Creating Dynamic Websites (Hacks)

PHP Hacks : Tips & Tools For Creating Dynamic Websites (Hacks)
No description


Hacking Knoppix (ExtremeTech)

Hacking Knoppix (ExtremeTech)
No description


Gray Hat Hacking : The Ethical Hacker's Handbook

Gray Hat Hacking : The Ethical Hacker's Handbook
No description


Hacking Linux Exposed, Second Edition

Hacking Linux Exposed, Second Edition
"Throw up a Linux box," comes the chorus whenever there's a need to provide some network service or other without impinging upon the boss's martini budget. Fair enough, but by doing so are you opening security holes you don't know how to find or fix? The newest edition of Hacking Linux Exposed helps you answer that question and solve many of the security problems you find. To a certain extent this book is a recipe collection in that it describes weaknesses in Linux (calling attention to specific distributions where appropriate). The authors stop short of explicitly showing you how to wage most kinds of attacks, a reasonable thing to do from an ethical point of view even though the instructions can be found easily on the Internet. Rather than do that, they give step-by-step instructions on how to defend against the attacks they catalog. The point is not, "Here's precisely how to bring down a server by means of an ACK storm," but rather, "Here's how to defend against such problems." They do demonstrate plenty of weaknesses, though, as in their coverage of the conversation that goes back and forth between an FTP server and its client.

This book covers pretty much everything you'd want to do with a Linux machine as a network server. Read it and see some of the weaknesses in your system--and do something about them before someone else does. --David Wall

Topics covered: Security best practices, approached from the perspective of what can go wrong and what can be done about the problems. Specific coverage goes to all major services, including user management, FTP, HTTP, and firewalling.


Hacking Windows XP (ExtremeTech)

Hacking Windows XP (ExtremeTech)
No description


Hardware Hacking Projects for Geeks

Hardware Hacking Projects for Geeks
No description


Hackers and Painters: Big Ideas from the Computer Age

Hackers and Painters: Big Ideas from the Computer Age
No description


Hacking the Xbox: An Introduction to Reverse Engineering

Hacking the Xbox: An Introduction to Reverse Engineering
This--this being the attitude encapsulated in Andrew "bunnie" Huang's Hacking the Xbox--is why a lot of people got into the computer industry in the first place. These people liked taking things apart and figuring out how they worked, then making them serve purposes they weren't originally designed for and sharing the new discoveries with others of like mind. Sure, Huang's book is about how to how to turn Microsoft's game console into a high-performance, general-purpose personal computer with a small price tag, and it contains lots of details about the how the heavily advertised gizmo is put together. But you can get the technical material on the Web. What's valuable about Huang's work is that he communicates the pure joy of taking the Xbox apart, figuring out how it works--despite its many designed-in anti-hacking features--and making it do new things. This book reads like the journal of a seventeenth-century voyage of discovery.

There's a wealth of information in these pages about how to disassemble and reverse-engineer electronics, and Huang is careful to show you what tools you need, and how to use them (don't worry if you don't know how to use a soldering iron--that's covered here). There also are step-by-step guides (complete with photos) to a couple of projects, and interviews with key figures in the Xbox-hacking community. --David Wall

Topics covered: How to enjoy a Microsoft Xbox game console without the mindless tedium of playing video games. This book shows you how to open an Xbox, make modifications to it (from a cosmetic LED color change, to putting in a new power supply, to adding a USB connector), and make the changes needed to get Linux running on it. In the process, readers get an education in reverse engineering electronic circuits, as well as in basic electronic techniques (soldering, crimping, etc) and in the intellectual property law that governs hacker activity.


Hacking for Dummies

Hacking for Dummies
No description


Home Hacking Projects for Geeks (Hacks)

Home Hacking Projects for Geeks (Hacks)
No description


Wireless Hacking : Projects for Wi-Fi Enthusiasts

Wireless Hacking : Projects for Wi-Fi Enthusiasts
No description


Hacking Video Game Consoles : Turn your old video game systems into awesome new portables (ExtremeTech)

Hacking Video Game Consoles : Turn your old video game systems into awesome new portables (ExtremeTech)
No description


Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations

Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
No description


Hacking Exposed Cisco Networks (Hacking Exposed)

Hacking Exposed Cisco Networks (Hacking Exposed)
No description


Wireless Hacks : 100 Industrial-Strength Tips & Tools

Wireless Hacks : 100 Industrial-Strength Tips & Tools
No description


Hacking Exposed Computer Forensics (Hacking Exposed)

Hacking Exposed Computer Forensics (Hacking Exposed)
No description


Network Security Hacks

Network Security Hacks
No description


Hacking the PSP : Cool Hacks, Mods, and Customizations for the Sony Playstation® Portable (ExtremeTech)

Hacking the PSP : Cool Hacks, Mods, and Customizations for the Sony Playstation® Portable (ExtremeTech)
No description


Hacking Firefox : More Than 150 Hacks, Mods, and Customizations (ExtremeTech)

Hacking Firefox : More Than 150 Hacks, Mods, and Customizations (ExtremeTech)
No description


Hacking Wireless Networks For Dummies ® (For Dummies (Computer/Tech))

Hacking Wireless Networks For Dummies ® (For Dummies (Computer/Tech))
No description


Hardware Hacking: Have Fun While Voiding Your Warranty

Hardware Hacking: Have Fun While Voiding Your Warranty
No description


Hacking GMail (ExtremeTech)

Hacking GMail (ExtremeTech)
No description


Web Hacking: Attacks and Defense

Web Hacking: Attacks and Defense
No description


Hackers: Heroes of the Computer Revolution

Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to the mid-1980s. These eccentric characters used the term "hack" to describe a clever way of improving the electronic system that ran their massive railroad. And as they started designing clever ways to improve computer systems, "hack" moved over with them. These maverick characters were often fanatics who did not always restrict themselves to the letter of the law and who devoted themselves to what became known as "The Hacker Ethic." The book traces the history of hackers, from finagling access to clunky computer-card-punching machines to uncovering the inner secrets of what would become the Internet. This story of brilliant, eccentric, flawed, and often funny people devoted to their dream of a better world will appeal to a wide audience.


Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense
No description


The Unofficial Guide to Ethical Hacking (Miscellaneous)

The Unofficial Guide to Ethical Hacking (Miscellaneous)
No description


OS X for Hackers at Heart

OS X for Hackers at Heart
No description


Hacking Movable Type (ExtremeTech)

Hacking Movable Type (ExtremeTech)
No description


The Unofficial Guide to Ethical Hacking, Second Edition

The Unofficial Guide to Ethical Hacking, Second Edition
No description


Hacking the TiVo, 2nd Edition

Hacking the TiVo, 2nd Edition
No description


Hacking iPod and iTunes (ExtremeTech)

Hacking iPod and iTunes (ExtremeTech)
No description


Hacking RSS and Atom

Hacking RSS and Atom
No description


Hacking Photoshop CS2

Hacking Photoshop CS2
No description


Hacking the TiVo

Hacking the TiVo
No description



Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.