But the most important aspect of maintenance is a rock-solid backup strategy that protects all your important data in the event of catastrophe. To that end, Joe provides an at-a-glance comparison of different strategies, explains the pros and cons of each type of media, and helps you pick the best backup program for your needs. You'll find time-tested recommendations that help you set up, test, and maintain your backups, complete with instructions on how to restore after a crash. Important lessons you'll learn along the way include the utility of having both a duplicate and an archive, the necessity of testing backups, and the importance of offsite backups.
In this book you'll find the answers to questions like these:
When is my Mac likely to have trouble? How can I find out which unnecessary files are taking up space on my disk? Should I defragment my hard disk and repair permissions regularly? What is the best backup software and hardware? How can I make sure I can restore from my backups?
Updated Feb 2, 2016
If you've ever thought you should learn to use the Unix command line that underlies Mac OS X, or felt at sea when typing commands into Terminal, Joe Kissell is here to help! With this 167-page ebook, you'll become comfortable working on the Mac's command line, starting with the fundamentals and adding more advanced topics as your knowledge increases.
Joe includes 50 real-life "recipes" for tasks that are best done from the command line, as well as directions for working with permissions, carrying out grep-based searches, creating shell scripts, and installing Unix software.
"I found answers to many questions in your book, and I enjoyed reading it. I am definitely more confident now in facing the Mac command line. Thank you for the time and art that you spent to create such a clarifying text."
--Mona Hosseini, grad student in Genomic Medicine and Statistics at the University of Oxford
The book begins by teaching you these core concepts:The differences between Unix, a command line, a shell, and TerminalExactly how commands, arguments, and flags workThe basics of Terminal's interface and how to customize it
Next, it's on to the command line, where you'll learn:How to navigate your Mac's file systemBasic file management: creating, copying, moving, renaming, opening, viewing, and deleting filesCreating symbolic linksThe types of command-line programsHow to start and stop a command-line programHow to edit a text file in nanoWhat a profile is, why it's cool, and how to customize yoursThe importance of your PATH and how to change it, if you need toHow to get help (Joe goes way beyond telling you to read the man pages)
You'll extend your skills as you discover how to:Create basic shell scripts to automate repetitive tasks. Make shell scripts that have variables, user input, conditional statements, loops, and math.See which programs are running and what system resources they're consuming.Quit programs that refuse to quit normally.Enable the command line to interact with the Finder.Control another Mac via its command line with ssh.Understand and change an item's permissions, owner, and group.Run commands as the root user using sudo.Handle output with pipe (|) or redirect (>).Use grep to search for text patterns in files and filter output.Install new command-line software from scratch or with a package manager.
Questions answered include:Which shell am I using, and how can I change my default shell?How do I quickly figure out the path to an item on my Mac?How can I customize my Terminal window so I can see man pages behind it?How can I make a shortcut to avoid retyping the same long command?Is there a trick for entering a long path quickly?What should I say when someone asks if I know how to use vi?How do I change my prompt to suit my mood or needs?What is Command Line Tools for Xcode?When it comes to package managers, which one should I use?
"Very good! A pleasure to read, the right balance of coverage and clarity."
Finally, to help you put it all together, the book showcases over 50 real-world "recipes" that combine commands to perform useful tasks, such as listing users who've logged in recently, using a separate FileVault password, figuring out why a disk won't eject, copying the source code of a Web page, determining which apps have open connections to the Internet, flushing the DNS cache, finding out why a Mac won't sleep, sending an SMS message, and deleting stubborn items from the Trash.
Need to give a presentation, but worried about how you'll do? Steve Jobs relied on Keynote for his famous keynote presentations, and while using Keynote won't guarantee Jobs-level success, Joe Kissell's advice in Take Control of Keynote will get you closer.
Drawing on years of speaking experience, Joe suggests you start by figuring out what you want to say -- and he explains exactly how to accomplish this task, even though you won't do it in Keynote. He then helps you work in Keynote with the right theme, and explains how to create slides by filling in placeholders, adding objects (images, movies, sounds, tables, and charts), and inserting and styling text. You'll also learn how to add build effects to slides and transitions between slides, as well as how to make self-playing presentations designed for kiosks, and presentations with recorded narration or a soundtrack.
Finally, Joe offers real-world advice about delivering presentations, including tips on what to bring, making presenter notes and customizing the presenter display, setting up your display, and controlling your presentation.
"As someone whose life (and income) is doing training presentations, this ebook is the most useful I have ever bought. I know Keynote well and have used it since its first release; however, Joe's ebook has both challenged me to think about the way I structure my presentations and has taught me stuff about Keynote I didn't know." -Michael Durrant, Psychologist ... mental health & corporate trainer (Sydney, Australia)
You'll learn how to use the features that go into making a great slide deck:Making master slides with carefully positioned placeholdersAdjusting the slide orderViewing more than one slide at onceUsing all the fancy layout features to position objects on a slideApplying cool visual effects to photos, such as masking and Instant AlphaSorting out builds gone wild with the Build Order paletteHiding particular slides from an audience without deleting themTaking control of text boxes and Keynote's many text styling optionsCreating a presentation that requires clicks in specific places to advanceCommenting on slides while collaborating on your presentation
Additional advice helps you prep for a successful delivery and avoid technical glitches:What to consider in advance, with respect to the screen(s) you'll be usingPracticing the mechanics of delivering from KeynoteViewing presenter notes while you speakPlaying a sound or movie from a slide during your presentationEvaluating the many options for remote control instead of a mouse or trackpadPacking your bag with the right set of cables and gadgetsSetting up once you're at the speaking venue
You'll find even more assistance with answers to questions like:Should I store my presentation on iCloud Drive?What are my options if I want to print my presentation?What's the best way to turn my slide deck into a PDF?
The bulk of the book documents Keynote for the Mac, but an appendix explains what's similar and different about Keynote for iOS and Keynote for iCloud.
Because Dropbox is so simple to use for basic file syncing, it's easy to forget that you can do far more with it than just sync files between two computers. If that's all you're doing, you're missing out!
Author Joe Kissell explains why Dropbox is cool, shares best practices for using Dropbox on your own or with a group, helps you avoid common mistakes, clues you in to newer and advanced collaboration features, teaches you how to secure your Dropbox account, and describes unusual uses of Dropbox.
Readers can quickly benefit from the book: new users can start in the "Dropbox Quick Start," which directs you to beginner basics or to special information for people who just want to access a shared Dropbox document.
But, for those who already know Dropbox basics, "Check Your Dropbox Skills" routes you immediately to help with exciting new features that you may not yet have mastered -- or even been aware of(!) -- such as Dropbox Team, Dropbox Paper collaboration, file requests, and Office integration/collaboration.
Teach This Book! Because a powerful aspect of Dropbox is sharing files with others, you may want to help your colleagues and friends use it. To that end, Take Control of Dropbox includes links to a downloadable 1-page PDF handout and to a 21-slide PDF-based presentation.
Joe focuses on using Dropbox from a Macintosh or Windows PC, or Linux, but part of why this book has crept up to 151 pages in its second edition is that he has included helpful details for integrating a mobile device (primarily iOS and Android) into your Dropbox workflow.
You'll find out how to:Recover accidentally deleted or revised files.Put new photos and videos into Dropbox with Camera Upload and share them easily.Sync data from Dropbox-savvy apps on all your devices (apps like 1Password, DEVONthink, and GoodReader). Make sure you're set up optimally by checking a few account-related details. These include security settings and methods of getting more storage space.Edit shared Office documents on the Dropbox Web site -- you don't need to have Office installed locally on your computer or subscribe to Office 365.Work with the Dropbox badge if you are editing a Dropbox-shared Office file on your local computer.Open PDFs from Dropbox from within Adobe Acrobat DC or Acrobat Reader DC -- and save any changes back to Dropbox.Set up a Dropbox team: learn how it works, and how to control who can do what and when.Create a Dropbox folder that other people can drop files into, but not see inside of.Unlink and remote-wipe Dropbox from a stolen device.
Joe also shares examples of interesting Internet services that can interact with files that you put in your Dropbox folder to publish a blog, automate Web activities, automate your Mac, sync with other cloud services, and even publish a book like this one!
"Thanks for a great guide! I used it to successfully cook my first complete Thanksgiving, almost single-handed. While I can follow recipes, I am nowhere close to 'a cook'—your guide gave me the confidence to take on this meal!" —Ed Ruder
Appendixes cover special cases from allergies to vegans, drawings guide you as you work with the turkey, and a special included "Print Me" file provides shopping lists and schedules, as well as versions of the recipes that you can tape up in the kitchen. Although these recipes scale easily for a few more people, they are meant for 8-12 people. The recipes use U.S. and metric units.
Read this ebook to learn the answers to questions such as:What type of turkey should I buy?Is there a fast way to make cranberry relish? What's the secret behind making perfect gravy?How do you deal with a raw turkey, and which end is the neck?
"I've been cooking Thanksgiving dinner for longer than I care to admit, and I never would have thought I'd pick up so many good tips! Great book!" —Trish Huffman
Updated December 17, 2015
Beyond keeping track of what's new in the latest operating system is the larger problem facing most of us—how to work effectively in today's ecosystem of devices, servers, and collaborators. Frankly, sharing with other people and devices is messy, because everyone wants something different. That's why this may be our most important book, and why we are so grateful to Joe Kissell for taking on the challenge of describing how to share nearly everything you can think of in nearly every imaginable situation.
Here are just a few of the gems in this book:How iCloud Photo Sharing and My Photo Stream are entirely differentHow to share photos fleetingly, privately, permanently, or with your fridgeThe best ways to sync a project's worth of files with othersServices to provide ubiquitous access to your own files across devicesQuick ways to make a file available for download by anyoneHow to share calendars with others, whether or not they use iCloudA tutorial on enabling Family SharingTweaky workarounds for contact sharing, which is surprisingly difficultHow to rip a DVD to your MacBook Air using an older Mac's SuperDriveHow to turn your iPhone or Mac into a Wi-Fi hotspotWays of watching your uncle work remotely, as you help him with iTunesApproaches to syncing Web browser bookmarks and tabs with multiple devicesHow to securely share a collection of passwords with someone else
The list of essential but often frustrating tasks goes on and on, and the solutions go way beyond what Apple offers, so the book does too.
Non-Apple products mentioned include 1Password, AirFoil, Air Login, BitTorrent Sync, CargoLifter, CloudyTabs, Dropbox, Exchange, Facebook, Firefox, Flickr, Google+, Google Calendar, Google Chrome, Google Docs, handyPrint, Instagram, LastPass, Outlook, Pandora, PhotoCard, PowerPhotos, Printopia, Reflector, ScreenFlow, Spotify, SyncMate, Transporter, Twitter, Xmarks, and more.
And, thanks to the Take Control Crash Course format, you can jump right to the chapter that answers your question, without having to read through lots of other information -- as part of our Crash Course series, this book provides the first-rate content you expect from us in short chunks so you can dip in and read quickly. Because so many Take Control readers give tech support to others, each concise chapter has sharing buttons and practical tweet-tips, making it easy to share a few pages with Facebook friends, Twitter followers, and others who need the info. Crash Courses have a modern, magazine-like layout in PDF while retaining a reflowable design in the EPUB and Mobipocket versions.
After reading this book, you should be able to use these tools to do some testing and even working on penetration projects. You just need to remember not to use these techniques in a production environment without having a formal approval.
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor and whistleblower Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy. As the arguments rage on and the government considers various proposals for reform, it is clear that we have yet to see the full impact of Snowden's disclosures.
Now for the first time, Greenwald fits all the pieces together, recounting his high-intensity ten-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with never-before-seen documents entrusted to him by Snowden himself.
Going beyond NSA specifics, Greenwald also takes on the establishment media, excoriating their habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people. Finally, he asks what it means both for individuals and for a nation's political health when a government pries so invasively into the private lives of its citizens—and considers what safeguards and forms of oversight are necessary to protect democracy in the digital age. Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state.
As the Android operating system continues to increase its shareof the smartphone market, smartphone hacking remains a growingthreat. Written by experts who rank among the world's foremostAndroid security researchers, this book presents vulnerabilitydiscovery, analysis, and exploitation tools for the good guys.Following a detailed explanation of how the Android OS works andits overall security architecture, the authors examine howvulnerabilities can be discovered and exploits developed forvarious system components, preparing you to defend againstthem.
If you are a mobile device administrator, security researcher,Android app developer, or consultant responsible for evaluatingAndroid security, you will find this guide is essential to yourtoolbox.A crack team of leading Android security researchers explainAndroid security risks, security design and architecture, rooting,fuzz testing, and vulnerability analysisCovers Android application building blocks and security as wellas debugging and auditing Android appsPrepares mobile device administrators, security researchers,Android app developers, and security consultants to defend Androidsystems against attackAndroid Hacker's Handbook is the first comprehensiveresource for IT professionals charged with smartphonesecurity.
“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.
Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?
WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
At first, the firm’s programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
They had, they soon learned, stumbled upon the world’s first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility.
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet’s planning, execution, and discovery, covering its genesis in the corridors of Bush’s White House and its unleashing on systems in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today’s flourishing zero-day “grey markets,” in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike—and shows us just what might happen should our infrastructure be targeted by such an attack.
Propelled by Zetter’s unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.
Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and “self-police their own organizations.
Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with MySpace, LinkedIn, and more for passive reconaissance.
• Learn Google Searching Basics
Explore Google’s Web-based Interface, build Google queries, and work with Google URLs.
• Use Advanced Operators to Perform Advanced Queries
Combine advanced operators and learn about colliding operators and bad search-fu.
• Learn the Ways of the Google Hacker
See how to use caches for anonymity and review directory listings and traversal techniques.
• Review Document Grinding and Database Digging
See the ways to use Google to locate documents and then search within the documents to locate information.
• Understand Google’s Part in an Information Collection Framework
Learn the principles of automating searches and the applications of data mining.
• Locate Exploits and Finding Targets
Locate exploit code and then vulnerable targets.
• See Ten Simple Security Searches
Learn a few searches that give good results just about every time and are good for a security assessment.
• Track Down Web Servers
Locate and profile web servers, login portals, network hardware and utilities.
• See How Bad Guys Troll for Data
Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information.
• Hack Google Services
Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.
In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.
This is not the way it was supposed to be. The Internet’s original promise of a global commons of shared knowledge and communications is now under threat.
Drawing on the first-hand experiences of one of the most important protagonists in the battle — the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide — Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.
ONE OF THE WASHINGTON POST'S 10 BEST BOOKS OF 2015
One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined.
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning. To date, no computer has been created that could not be hacked—a sobering fact given our radical dependence on these machines for everything from our nation’s power grid to air traffic control to financial services.
Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today’s Internet is the size of a golf ball, tomorrow’s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car’s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders.
With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment.
Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.
From the Hardcover edition.
The important stuff you need to know:Get started fast. Quickly set up accounts, customers, jobs, and invoice items.Follow the money. Track everything from billable and unbillable time and expenses to income and profit.Keep your company financially fit. Examine budgets and actual spending, income, inventory, assets, and liabilities.Gain insights. Open a new dashboard that highlights your company’s financial activity and status the moment you log in.Spend less time on bookkeeping. Create and reuse bills, invoices, sales receipts, and timesheets.Find key info. Use QuickBooks’ Search and Find features, as well as the Vendor, Customer, Inventory, and Employee Centers.
instructions with callouts to photos that show you exactly what to do
when you run into problems or limitations with Evernote
Tips and Notes
to help you take full advantage of Evernote on your smartphone, tablet, or computer
Full-color, step-by-step tasks walk you through making the most of
Evernote –free or premium, on any device! Learn how to
• Install and use Evernote on your iPhone, Android, iPad, BlackBerry, Windows Phone, PC or Mac, and beyond
• Create and share notebooks, customized just the way you like, and organize your
notes your way
• Save images, drawings, handwriting, web content, even webcam snapshots in
notes you can access anywhere, anytime
• Add notes straight from Twitter or Google+, and link Evernote to your Facebook account
• Format your notes to look great, and easily print the notes you want to file
the old-fashioned way
• Build easy-to-use To Do lists, complete with checkboxes
• Sync your notes across multiple devices, and store them in the cloud so they’re always available over the Web
• Import notes from other popular note-taking tools, such as Microsoft OneNote and
• Record high-quality audio notes and organize and share them as needed
• Send notes to Evernote from Apple’s Siri digital assistant
• Organize, tag, and search your notebooks to instantly find whatever you’re looking for
• Install and use the Evernote Web Clipper in all popular web browsers
• Securely share notebooks publicly or privately and collaborate with teams, wherever they are
• Find apps and add-ons that make Evernote do even more for you
CATEGORY: Desktop Applications
USER LEVEL: Beginning-Intermediate
A thoroughly revised and updated edition of the essential guide to preserving your personal security
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly updated third edition of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect your home address, hide your ownership of vehicles and real estate, use pagers with dumbphones, switch to low-profile banking and invisible money transfers, use alternate signatures, and how to secretly run a home-based business.
J.J. Luna is an expert and highly trained security consultant with years of experience protecting himself, his family, and his clients. Using real life stories and his own consulting experience, J.J. Luna divulges legal methods to attain the privacy you crave and deserve, whether you want to shield yourself from casual scrutiny or take your life savings with you and disappear without a trace. Whatever your needs, Luna reveals the shocking secrets that private detectives and other seekers of personal information use to uncover information and then shows how to make a serious commitment to safeguarding yourself.
There is a prevailing sense in our society that true privacy is a thing of the past. In a world where privacy concerns that only continue to grow in magnitude, How to Be Invisible, Third Edition is a critical antidote to the spread of new and more efficient ways of undermining our personal security.
Privacy is a commonly-lamented casualty of the Information Age and of the world's changing climate--but that doesn't mean you have to stand for it. This new edition of J. J. Luna's classic manual contains step-by-step advice on building and maintaining your personal security, including brand new chapters on:
- The dangers from Facebook, smartphones, and facial recognition
- How to locate a nominee (or proxy) you can trust
- The art of pretexting, aka social engineering
- Moving to Baja California Sur; San Miguel de Allende, Guanajuato; Cuenca, Ecuador; or Spain's Canary Islands
- The secrets of international privacy, and much more!
An inside look at who's watching you, what they know and why it matters. We are being watched.
We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.
In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.
Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
With SQLite, you'll discover how to develop a database-backed application that remains manageable in size and complexity. This book guides you every step of the way. You'll get a crash course in data modeling, become familiar with SQLite's dialect of the SQL database language, and much more.Learn how to maintain localized storage in a single file that requires no configurationBuild your own SQLite library or use a precompiled distribution in your applicationGet a primer on SQL, and learn how to use several language functions and extensionsWork with SQLite using a scripting language or a C-based language such as C# or Objective-CUnderstand the basics of database design, and learn how to transfer what you already know to SQLiteTake advantage of virtual tables and modules
"Complex SQL concepts explained clearly."
--D. Richard Hipp, creator of SQLite
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.
This is the story of the code and the characters—idealists, anarchists, extremists—who are transforming the next generation’s notion of what activism can be.
With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, reporter Andy Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.
Kevin Mitnick, the world's most celebrated hacker, now devotes hislife to helping businesses and governments combat data thieves,cybervandals, and other malicious computer intruders. In hisbestselling The Art of Deception, Mitnick presented fictionalizedcase studies that illustrated how savvy computer crackers use"social engineering" to compromise even the most technically securecomputer systems. Now, in his new book, Mitnick goes one stepfurther, offering hair-raising stories of real-life computerbreak-ins-and showing how the victims could have prevented them.Mitnick's reputation within the hacker community gave him uniquecredibility with the perpetrators of these crimes, who freelyshared their stories with him-and whose exploits Mitnick nowreveals in detail for the first time, including: A group of friends who won nearly a million dollars in LasVegas by reverse-engineering slot machinesTwo teenagers who were persuaded by terrorists to hack into theLockheed Martin computer systemsTwo convicts who joined forces to become hackers inside a TexasprisonA "Robin Hood" hacker who penetrated the computer systems ofmany prominent companies-andthen told them how he gainedaccessWith riveting "you are there" descriptions of real computerbreak-ins, indispensable tips on countermeasures securityprofessionals need to implement now, and Mitnick's own acerbiccommentary on the crimes he describes, this book is sure to reach awide audience-and attract the attention of both law enforcementagencies and the media.
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment
“Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI
Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself
Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats.
Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includesDiscovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code—and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies
The important stuff you need to know:Dive into relational data. Solve problems quickly by connecting and combining data from different tables.Create professional documents. Publish reports, charts, invoices, catalogs, and other documents with ease.Access data anywhere. Use FileMaker Go on your iPad or iPhone—or share data on the Web.Harness processing power. Use new calculation and scripting tools to crunch numbers, search text, and automate tasks.Run your database on a secure server. Learn the high-level features of FileMaker Pro Advanced.Keep your data safe. Set privileges and allow data sharing with FileMaker’s streamlined security features.
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don’t cover them at all. Now there’s a book that brings together start-to-finish information about today’s most widespread chained exploits—both how to perform them and how to prevent them.
Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use today’s most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering.
Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce today’s most effective countermeasures– both technical and human. Coverage includes:Constructing convincing new phishing attacks Discovering which sites other Web users are visiting Wreaking havoc on IT security via wireless networks Disrupting competitors’ Web sites Performing—and preventing—corporate espionage Destroying secure files Gaining access to private healthcare records Attacking the viewers of social networking pages Creating entirely new exploits and more
Andrew Whitaker, Director of Enterprise InfoSec and Networking for Training Camp, has been featured in The Wall Street Journal and BusinessWeek. He coauthored Penetration Testing and Network Defense. Andrew was a winner of EC Council’s Instructor of Excellence Award.
Keatron Evans is President and Chief Security Consultant of Blink Digital Security, LLC, a trainer for Training Camp, and winner of EC Council’s Instructor of Excellence Award.
Jack B. Voth specializes in penetration testing, vulnerability assessment, and perimeter security. He co-owns The Client Server, Inc., and teaches for Training Camp throughout the United States and abroad.
Cover photograph © Corbis /
The 2011 version of the Microsoft Office productivity suite forthe Mac sports major changes from what Mac users are accustomed to.This soup-to-nuts guide gets the Mac crowd up to date quickly andeasily. Individual minibooks thoroughly cover the Project Gallery,Word, Excel, PowerPoint, Outlook (new for Mac), and the ProjectCenter. You’ll learn how the new Office integrates with theWindows version, how to use and customize the new Ribbon interface,and much more.Office for Mac is the most popular office productivity suitefor the Mac, used by 1.5 to 2 million peopleThe new version includes new features such as the Ribboninterface, Outlook (which replaces Entourage), and greaterintegration with the Windows versionCovers everything you’ll want to know about the ProjectGallery, Word, Excel, PowerPoint, Outlook, and the ProjectCenter
With Office 2011 for Mac All-in-One For Dummies,you’ll be ready to use the newest version of Office like apro.
“Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors.” — Los Angeles Times
“Unsettling . . . A deeply informative account of how corporations, governments, and even individuals are rapidly perfecting the ability to monitor and sabotage the Internet infrastructure.” — Christian Science Monitor
The wars of the future are already being fought today. The United States military currently views cyberspace as the “fifth domain” of warfare (alongside land, air, sea, and space), and the Department of Defense, the National Security Agency, and the CIA all field teams of hackers who can, and do, launch computer virus strikes against enemy targets. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information, and the military has also formed a new alliance with tech and finance companies to patrol cyberspace. Shane Harris offers a deeper glimpse into this partnership than we have ever seen before, and he explains what the new cyber security regime means for all of us who spend our daily lives bound to the Internet—and are vulnerable to its dangers.
“@War is superb . . . Rigorous, comprehensive, and a joy to read.” — Lawfare
You’ll gain in-depth knowledge of Java application performance, using the Java Virtual Machine (JVM) and the Java platform, including the language and API. Developers and performance engineers alike will learn a variety of features, tools, and processes for improving the way Java 7 and 8 applications perform.Apply four principles for obtaining the best results from performance testingUse JDK tools to collect data on how a Java application is performingUnderstand the advantages and disadvantages of using a JIT compilerTune JVM garbage collectors to affect programs as little as possibleUse techniques to manage heap memory and JVM native memoryMaximize Java threading and synchronization performance featuresTackle performance issues in Java EE and Java SE APIsImprove Java-driven database application performance
CorelDRAW X The Official Guide is the one-stop tutorial/reference for learning how to create gorgeous graphics for a variety of print and web uses. Veteran graphic designer and author Gary Bouton shows you how to use the new product features, and shows off beautiful graphics and techniques in this Corel-authorized guide. Packed with examples and techniques, this book delivers details no CorelDRAW user can afford to be without!
Ideal for beginners through experts getting started on the new release, the book explains how to install the software, use the illustration and drawing tools, work with text, apply colors, fills, and outlines, apply special effects, and work in 3D.
CorelDRAW X The Official GuideOffers hundreds of tips, tricks, and shortcuts that show how to get the most out of product features, not just what the features do Includes online access to 30+ video tutorials of hands-on instruction from the author, plus CorelDRAW native files, stock images for tutorials in Corel PHOTO-PAINT, custom typefaces designed by the author, and other useful starter pieces for learning CorelDRAW Includes a full-color insert demonstrating results of various filters and effects Provides a comprehensive CorelDRAW X reference as well as drawing tips and illustration techniques Discusses print and web use and potential issues Explains how to use PHOTO-PAINT, Corel’s image-editing tool
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.
This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away.
Wireless Network Security: A Beginner's Guide features:Lingo--Common security terms defined so that you’re in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work
This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012)
Written with the clarity, humor, and objective scrutiny, Photoshop CS5: The Missing Manual is the friendly, thorough resource you need.
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot
Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA
Reinforce your organization’s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.Contains the essentials for developing both data breach and malware outbreak response plans—and best practices for maintaining those plans Features ready-to-implement CIRPs—derived from living incident response plans that have survived the rigors of repeated execution and numerous audits Clearly explains how to minimize the risk of post-event litigation, brand impact, fines and penalties—and how to protect shareholder value Supports corporate compliance with industry standards and requirements, including PCI, HIPAA, SOX, and CA SB-24
Tom Thomas and Donald Stoddard
Your first step into the world of network securityNo security experience required Includes clear and easily understood explanations Makes learning easy
Your first step to network security begins here!Learn how hacker attacks work, from start to finish Choose the right security solution for each type of risk Create clear and enforceable security policies, and keep them up to date Establish reliable processes for responding to security advisories Use encryption effectively, and recognize its limitations Secure your network with firewalls, routers, and other devices Prevent attacks aimed at wireless networks
No security experience required!
Computer networks are indispensible, but they also are not secure. With the proliferation of security threats, many people and companies are looking for ways to increase the security of their networks and data. Before you can effectively implement security technologies and techniques, you need to make sense of this complex and quickly evolving world of hackers and malware, as well as the tools to combat them.
Network Security First-Step, Second Edition explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or simply are interested in gaining knowledge of the technology, this book is for you!