Many people ask how to get started how to get started, but I don't know what to ask. I rarely read some good articles patiently from the head, I have a deep understanding this time.
For example, Yuan Ge's Sniffer principle has always thought that he was very clear about the principle of Sniffer, so he did not read this article in Yuan Ge. Later, I have discussed the night and Yuan Ge, how to get the MAC address directly through port reading, why Antisniff can get a real MAC address, not by changing the impact of MAC address technology, how to get a real MAC address under Linux. I have been reading and writing of ports under Linux, I always think that the ports in the protection mode have done a memory image.
As a result, Yuan Ge asked me, you carefully see that I wrote the article, I have, I have to print a lot of documents, I am forced to filter them, and I have found that Yuan Ge's article made me new. understanding. Then I organize a few buffers to TT overflow, especially the above about Solaris can load the kernel module, that is more embarrassing.
I used to say that the book is not read, and now the article is left on the hard disk but not read. In fact, this version has been many classic articles, but also recommended a lot of classic books, have a few very much. W.Richard.stevens' unp, I have a serious look, Apue is not so serious, and half of the volume II is seriously read, read the reading notes, the volume III doesn't look at a page. Douglas's Volume I, Volume III is a serious look, volume II is only intermittent. And many technical articles, if you get your hands, you will be too lazy, but I don't know how much resources are wasted, how much resources have been ignored.
Is BBS to really learn something? Rain said no, I said it is not. But here can open the horizons, you can get guidelines in the big direction, enough. I have always hoped that everyone learned here is not the technology itself, but the learning method and a unseafulness. Many technologies, tomorrow will time, if you have a learning method, then you still have a chance, if you master this technology itself, you have no chance.
In fact, I really don't understand system security, because I have always liked to watch the program writing programs but I don't like it or have no ability to attack who's host / site. What I can do here is to provide you with a direction, a kind of enthusiasm for your fanaticism. If you have read the
There is always a responsibility, you have to ask for a statement, saying that Questions have not answered. If you don't answer it is already the right way, at least you have not returned to you, read the book, right, at least no disturbance, let you sternly sullen.
Unix's Man Manual You have to read it, I don't want UNIX. Microsoft's MSDN, Platform SDK DOC you have to finish, you want to find Win programming to find a reason. Or the sentence, a programmer does W.Richard.stevens, and after the death of the world, the top Hacker in the world can miss the text, but they have never been attacked, think about it, then Is it a kind of realm, it is a bit of light.
We can discuss technical problems, and we can discuss technical issues, but there is no intentional knowledge, and the list of resource information is repeated. I just posted a bunch of ISBASE articles in front, the beginning is the home page ID, but immediately asked what home page? I just discussed how to modify the MAC address, and I will come again later, and there is only 3 articles before and after. Choosing silence is already the excellent performance of many friends' endurance. Many things can be lifted. Vertex's LIDS, is tracked by PacketStorm, and you have to read the three articles of THC, I feel that I understand a bunch, all the hands and feet on the kernel module. You don't look at how you know. I don't want to fall into the discussion of specific technical issues here. If you think that you do something, you will go to see yourself. No one has a shelf, and there is no life to do this. You ask yourself, do you try your best?