E-Book, Englisch, 512 Seiten, Web PDF
Hurley / Potter / Rogers OS X for Hackers at Heart
1. Auflage 2005
ISBN: 978-0-08-048948-3
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 512 Seiten, Web PDF
ISBN: 978-0-08-048948-3
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker's eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world's foremost true hackers unleash the power of OS X for everything form cutting edge research and development to just plain old fun.
OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple's Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
* Analyst reports indicate that OS X sales will double in 2005. OS X Tiger is currently the #1 selling software product on Amazon and the 12-inch PowerBook is the #1 selling laptop
* Only book on the market directly appealing to groundswell of hackers migrating to OS X
* Each chapter written by hacker most commonly associated with that topic, such as Chris Hurley (Roamer) organizer of the World Wide War Drive
Autoren/Hrsg.
Weitere Infos & Material
1;Contents;11
2;Foreword;21
3;Chapter 1 A Network Admin’s Guide to Using Mac OS X;25
3.1;Running a Headless Mac;27
3.2;Adding Interfaces to the Mac;43
3.3;The Macintosh as a Router;49
3.4;Mac OS X as a RADIUS server;66
4;Chapter 2 Automation;77
4.1;Using Automator;79
4.2;Understanding AppleScript;105
4.3;Bash Scripting;124
4.4;Using Bash, AppleScript, and Automator Together!;163
5;Chapter 3 OS X in a Microsoft Environment;183
5.1;Accessing Network File Systems;187
5.2;NTLM Authentication;196
5.3;Connecting to a Windows PPTP Server;204
5.4;Zen of Running Windows Boxes from a Mac;209
6;Chapter 4 WarDriving and Wireless Penetration Testing with OS X;247
6.1;WarDriving with KisMAC;248
6.2;Penetration Testing with OS X;268
6.3;Other OS X Tools for WarDriving and WLAN Testing;274
7;Chapter 5 Mac OS X for Pen Testers;281
7.1;The OS X Command Shell;284
7.2;Compiling and Porting Open Source Software;288
7.3;Using The “Top 75 Security Tools” List;312
7.4;Installing and Using The “Big” Tools;325
7.5;Other OS X “Must Haves”;330
8;Chapter 6 Mac Tricks (Stupid Powerbook Stunts That Make You Look Like a God);341
8.1;Desktop Console;342
8.2;Screen Savers;344
8.3;Widgets;346
8.4;Apple Motion Sensor;352
8.5;VNC with Apple Remote Desktop;355
8.6;Gestures;358
8.7;Sogudi;361
8.8;GUI Scripts;363
9;Chapter 7 OS X For the Road Warrior;371
9.1;Safe and Secure E-mail;372
9.2;Battery Management;385
10;Appendix A Hacking the iPod;393
10.1;Opening Your iPod;398
10.2;Replacing the iPod Battery;406
10.3;Upgrading a 5GB iPod’s Hard Drive;421
10.4;From Mac to Windows and Back Again;433
10.5;iPod Diagnostic Mode;437
10.6;Additional iPod Hacks;442
10.7;iPod Resources on the Web;444