Skip to main content

10 Free Hack Guides!

Start hacking the world with these free hack guides. Have fun! 

If you have just entered the world of hacking, you might want to try your hands on different platforms. So here we bring to you 10 hack guides for Linux, Windows, Mac and many other platforms. 






1. PDF Hacks

The description of the book says, “PDF Hacks is ideal for anyone who works with PDFs on a regular basis. Learn how to create PDF documents that are far more powerful than simple representations of paper pages. Hacks cover the full range of PDF functionality, including generating, manipulating, annotating, and consuming PDF information. Far more than another guide to Adobe Acrobat, the book covers a variety of readily available tools for generating, deploying, and editing PDF.”

2. BSD Hacks

The description of the book says, “Looking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources. If you want more than the average BSD user--to explore and experiment, unearth shortcuts, create useful tools--this book is a must-have.”

3. Linux Server Hacks

The description of the book says, “Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.”

4. Ubuntu Hacks

The description of the book says, “Like all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners will appreciate the installation advice and tips on getting the most out of the free applications packaged with the Ubuntu Linux distribution, while intermediate and advanced readers will learn the ins-and-outs of power management, wireless roaming, 3D video acceleration, server configuration, and much more.”

5. Car PC Hacks

The description of the book says, “Car PC Hacks is the first book available to introduce and entrench you into the hot new car PC market. Expect innovation, tools, and fun experiments for creating a mobile multimedia center. This Hacks Series addition packs a punch in this comprehensive and easy-to-read guide. Whether you're venturing into car PC for the first time or an experienced hobbyist, hop in for a joy ride.”

6. Ubuntu Kung Fu

The description of the book says, “Ubuntu's rise to power has been rapid, historic and well-deserved. It's the best Linux distribution ever, but most people only use a fraction of its power. Award-winning Linux author Keir Thomas gets down and dirty with Ubuntu to provide over 300 concise tips that enhance productivity, avoid annoyances, and simply get the most from Ubuntu. You'll find many unique tips here that can't be found anywhere else. You'll also get a crash course in Ubuntu's flavor of system administration. Whether you're new to Linux or an old hand, you'll find tips to make your day easier.”

7. Knoppix Hacks, 2nd Edition

The description of the book says, “If you think Knoppix is just a Linux demo disk, think again. This book includes a collection of tips and techniques for using the enormous amount of software Knoppix offers-not just to work and play, but also to troubleshoot, repair, upgrade, and disinfect your system without having to install a thing. Discover how to use Knoppix to its full potential as your desktop, rescue CD, or as a launching point for your own live CD.”

8. Big Book of Windows Hacks

The description of the book says, “Bigger, better and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. This book takes you beyond the operating system with hacks for applications like Internet Explorer 7 and Office 2007, and hardware such as the Zune, your networking gear, and the PC itself.”

9. Network Security Hacks, 2nd Edition

The description of the book says, “In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The 2nd edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.”

10. Mac Kung Fu

The description of the book says, “After you've uncovered the basics in Lion, Mac Kung Fu is your next step. You'll learn how to master everyday tools such as the Dock, Spotlight, Mission Control, Launchpad, and Dashboard. You'll discover other amazingly useful tools and built-in add-ons that you never knew existed. You'll customize the OS X interface, refine your workflow, learn valuable security tricks, work better with photos, movies and documents, and test your Mac hardware. You'll wow friends with your insanely great Mac knowledge! Mac Kung Fu details things even Mac Geniuses don't know. And why should they? Many of the tips in this book exploit settings or experimental features never officially made public. Each tip in this unique book is deliberately short and readable, and you can dip in and out whenever you want. Most take less than a minute to complete, yet the results last for a lifetime of better computing.” 

Comments

Popular posts from this blog

Here Are 7 Brilliant Cheat Sheets For Linux/Unix

There's nothing better than a cheatsheet when you are stuck and need a reference. So here bringing to you 7 brilliant free cheat sheets. 




1. Unix Tool Box: An incredibly exhaustive reference for all things Linux. This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.

2. One page Linux Manual: Great one page reference to the most popular Linux commands, it is a summary of useful Linux commands.

3. Linux Reference Card: One great reference published by FOSSwire.

4. Linux Command Line Cheat Sheet: This is an interestingly sorted and helpful cheat sheet by cheatography.

5. Linux Command Line Tips: This is a linux command line reference for common operations. Cleanly sorted and well described.

6. Treebeard’s Unix Cheat Sheet: A great reference that shows command comparisons with that of DOS. So if you are someone who was a DOS user and has switched to Linux, this is the best one too have!

7. Linux Shortcuts and Commands:…

WhatsApp is illegal, will soon banned in India : Government

WhatsApp could have accidentally entered into troubled waters here in India by enabling its end-to-end encryption for all. The new security feature by WhatsApp is not what is required by the Indian telecom rules and WhatsApp could face a ban, if the rules are not adhered to. But not yet.
In India, companies need to follow the country’s rules and adhere to specific types of encryption, which WhatsApp does not currently use. WhatsApp’s end-to-end encryption on its chat service means that WhatsApp or anyone else won’t be able to crack open its contents.  Only the sender and the recipient are able to read the encrypted data. WhatsApp uses a 256-bit key for encryption of all chat messages, which is only known to the sender and the recipient.
Why is it not possible for WhatsApp to help decrypt users’ messages? "No one can see inside that message. Not cybercriminals. Not hackers. Not oppressive regimes. Not even us," WhatsApp founders Jan Koum and Brian Acton wrote on their blog. How…

3 Mega Acquisitions in last week affects the Internet Space of India

Qihoo 360 buys Opera in $1.2 Billion Opera Software intends to accept a $1.2 billion acquisition offer from a group of Chinese companies. The Chinese consortium includes Internet security company Qihoo 360, Internet firm Beijing Kunlun (which invested roughly$93 millioninto Grindr earlier in the year) and investment group Golden Brick and Yonglian. According to Opera, the $1.2 billion is a 56 percent premium over Opera's share price during the last 30 trading days. Despiteclaiming350 million users, the company's browser has struggled in the oversaturated Western market. China could be a profitable arena for Opera, in part because Google's Chrome browserdoes not come preinstalled on Android phones in China like it does elsewhere. In addition, doing business in China without local partners is nigh impossible, but Opera could leverage the networks of Kunlun and Qihoo 360 if the deal goes through.


Snapdeal Buys Freecharge in $400Million e-commerce marketplace Snapdeal has acquired …