?>
IT eBooks
Download, Read, Use

Hack eBooks

HackSpace Magazine: Issue 61
HackSpace Magazine: Issue 61

With a little bit of coding, you can breathe life into anything. Discover the building blocks of programming that will take your creations to the next level - whether that's motors, servos, sensors or just adding blinkenlights. Coding is a superpower! - How to build an elite-level hot air balloon - Get ready for Christmas with flashy festive PCBs ... - ... and mince pies! - Weave fabric on a tiny loom - Get a taste of what's coming next in the world of 3D printing ...
HackSpace Magazine: Issue 60
HackSpace Magazine: Issue 60

The Internet of Things is playground for makers. From practical projects such as pet feeders and automatic blind, to silly things like a texting pot plant, there are as many ways of connecting ordinary object to the internet as you can imagine. Let's explore! - Meet the mom behind Geek Mom Projects - Build a flatpack rocket - Turn 3D printing filament into compost - Trap a fairy in a lamp (well, a GIF of a fairy) ...
Practical Social Engineering
Practical Social Engineering

Even the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an email attachment, or revealing sensitive information in a phone call. Practical Social Engineering will help you better understand the techniques behind these social engineering attacks and how to thwart cyber criminals and malicious actors who use them to take advantage of human nature. Joe Gray, an award-winning expert on social engineering, shares case studies, best practices, open source intelligence (OSINT) tools, and templates for orchestrating and reporting attacks so companies can better protect themselves. He outlines creative techniques to trick users out of their credentials, such as leveraging Python scripts and editing HTML files to clone a legitimate website. Once you've succeeded in harvesting information about your targets with advanced OSINT methods, you'll discover how to defend your own organization from similar threats. Fast-paced, hands-on, ...
Hacking APIs
Hacking APIs

An Application Programming Interface (API) is a software connection that allows applications to communicate and share services. Hacking APIs will teach you how to test web APIs for security vulnerabilities. You'll learn how the common API types, REST, SOAP, and GraphQL, work in the wild. Then you'll set up a streamlined API testing lab and perform common attacks, like those targeting an API's authentication mechanisms, and the injection vulnerabilities commonly found in web applications. In the book's guided labs, which target intentionally vulnerable APIs. By the end of the book, you'll be prepared to uncover those high-payout API bugs that other hackers aren't finding, and improve the security of applications on the web. ...
HackSpace Magazine: Issue 58
HackSpace Magazine: Issue 58

As children we were told not to play with our food. As adults, we can do whatever the heck we like. Join us this month to celebrate the joy of messing around with food, whether that's grilling cheese, making coffee, or automating the construction of tacos. - Find things to make and do with polystyrene - Drool over a 3D printed chocolate Jean-Luc Picard - Make magical curiosities with double hinges - Keep food fresh with 3D printed teeth ...
HackSpace Magazine: Issue 57
HackSpace Magazine: Issue 57

The Raspberry Pi Pico: it's tiny, it's fast, it's versatile, and even more impressively these days it's available. And now it's got even better, with the introduction of the new internet-enabled Raspberry Pi Pico W. We'll run through the capabilities of this little board, and get you started on the road to victory with a couple of choice projects. - Turn an old beer keg into a device for cooking meat - Harvest the sun's rays to power a free-form soldered robotic sculpture - Visit a field full of geeks in Herefordshire (EMF Camp - it's back!) - Program a thermal printing camera using Python ...
HackSpace Magazine: Issue 56
HackSpace Magazine: Issue 56

From component choice, to packaging, to marketing, to the million other things that you need to do when you scale up production, we'll help you turn your project into a product - and along the way it'll help you be a better maker. - Build a rocket-powered wing-wing glider out of balsa wood and 3D printed parts (it's like the space shuttle, but smaller and cheaper, and dare we say it, better); - Discover new things to do with concrete, if you're lucky enough to have a bag of cement to spare; - Control the brightness of addressable LEDs with the magic of dithering; - Make hobby electronics projects without feeling like you're ruining the planet. ...
HackSpace Magazine: Issue 55
HackSpace Magazine: Issue 55

There's a huge range of computer-controlled machines used by makers - 3D printers, laser cutters, CNC mills and more - but the plotter is the easiest to make. This makes it a great build for getting started in the world of computer-controlled machines. For around $15 you can create your own drawing machine with our guide. - Learn how hydraulics work - All you need to know about lubrication - Make your own Guitar-Hero style controller - And much more ...
HackSpace Magazine: Issue 54
HackSpace Magazine: Issue 54

What could be more satisfying than building a whole computer, from scratch? You might think it's impossible these days, but we've found a band of makers who are re-creating the clicky switches and flashing LEDs of a bygone age. Have a go yourself! - Design, sustainability and ethics with Jude Pullen; - Add much-needed safety features to a cheap off-the-internet laser cutter; - Send communication signals through the ground; - Get going with gears. ...
Mastering Kali Linux for Advanced Penetration Testing, 4th Edition
Mastering Kali Linux for Advanced Penetration Testing, 4th Edition

Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you'll learn an offensive approach to enhance your penetration testing skills by testing the sophisticated tactics employed by real hackers. You'll go through laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test. You'll explore different ways of installing and running Kali Linux in a VM and containerized environment and deploying vulnerable cloud services on AWS using containers, exploiting misconfigured S3 buckets to gain access to EC2 instances. This book delves into passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on this, different vulnerability assessments are explored, including threat modeling. See how hackers use lat ...
HackSpace Magazine: Issue 53
HackSpace Magazine: Issue 53

Things fall apart, the centre cannot hold. That's why repair skills are so important! This month we're talking upcycling - the art of making beautiful new projects out of old junk. Plus: what happens when your just-for-kicks project turns out to be something that loads of people want? We talk to Timon Skerutsch, creator of the Piunora, to find out. And can you use open source technology to keep satellites in orbit? Of course you can - we meet someone who'll tell you all about it. - Sheet metal CAD - Logic chips - PCB buttons - The smallest RP2040 board we've seen yet ...
      Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2022