- Shopping Bag ( 0 items )
Posted May 29, 2001
This was a good book- as a bedtime story
Not much on content here, mostly stories of how 'Knightmare' hacked into things. This is NOT a step by step procedure book, it's just tales of exploits. An example- 'I used a fake log on screen to capture users names and passwords'. He does not mention how he did this. Was it a web server that you changed the page URL? Was it a custom app you wrote? How did you store and retrieve the list of user names and passwords? Pick this up for a good read, but not if you want to learn any techniques.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.