ျမန္မာေတြကြန္ပ်ဴတာကုိ ကေလးကစားစရာလုပ္ၾကမယ္။
This is not a dream!!!

Friday, November 23, 2012

Certified Ethical Hacker v 7












Introduction to Ethical Hacking  http://adf.ly/FCV34
Footprinting and Reconnaissance   http://adf.ly/FCV8A
Scanning Network          http://adf.ly/FCVAI
Emuration     http://adf.ly/FCVCz
 System Hacking         http://adf.ly/FCVF7
 Trojans and Backdoors    http://adf.ly/FCVMl
 Viruses and Worms     http://adf.ly/FCVPo


Sniffers          http://adf.ly/FCVSJ
Social Engineering       http://adf.ly/FCVX4
Denial of Service               http://adf.ly/FCVZZ
Session Hijacking         http://adf.ly/FCVe2
Hacking Webserver      http://adf.ly/FCVhJ
Hacking Web Applications     http://adf.ly/FCVmB
SQL Injection   http://adf.ly/FCVpY
Hacking Wireless Networks http://adf.ly/FCVrA
Evading IDS, Firewalls and Honeypots http://adf.ly/FCVtF
Buffer Overflows  http://adf.ly/FCVvK
Cryptography http://adf.ly/FCW3T
Penetration Testing   http://adf.ly/FCW6M

Comment

IP