Skip to main content

10 Free Hack Guides!

Start hacking the world with these free hack guides. Have fun! 

If you have just entered the world of hacking, you might want to try your hands on different platforms. So here we bring to you 10 hack guides for Linux, Windows, Mac and many other platforms. 






1. PDF Hacks

The description of the book says, “PDF Hacks is ideal for anyone who works with PDFs on a regular basis. Learn how to create PDF documents that are far more powerful than simple representations of paper pages. Hacks cover the full range of PDF functionality, including generating, manipulating, annotating, and consuming PDF information. Far more than another guide to Adobe Acrobat, the book covers a variety of readily available tools for generating, deploying, and editing PDF.”

2. BSD Hacks

The description of the book says, “Looking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources. If you want more than the average BSD user--to explore and experiment, unearth shortcuts, create useful tools--this book is a must-have.”

3. Linux Server Hacks

The description of the book says, “Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.”

4. Ubuntu Hacks

The description of the book says, “Like all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners will appreciate the installation advice and tips on getting the most out of the free applications packaged with the Ubuntu Linux distribution, while intermediate and advanced readers will learn the ins-and-outs of power management, wireless roaming, 3D video acceleration, server configuration, and much more.”

5. Car PC Hacks

The description of the book says, “Car PC Hacks is the first book available to introduce and entrench you into the hot new car PC market. Expect innovation, tools, and fun experiments for creating a mobile multimedia center. This Hacks Series addition packs a punch in this comprehensive and easy-to-read guide. Whether you're venturing into car PC for the first time or an experienced hobbyist, hop in for a joy ride.”

6. Ubuntu Kung Fu

The description of the book says, “Ubuntu's rise to power has been rapid, historic and well-deserved. It's the best Linux distribution ever, but most people only use a fraction of its power. Award-winning Linux author Keir Thomas gets down and dirty with Ubuntu to provide over 300 concise tips that enhance productivity, avoid annoyances, and simply get the most from Ubuntu. You'll find many unique tips here that can't be found anywhere else. You'll also get a crash course in Ubuntu's flavor of system administration. Whether you're new to Linux or an old hand, you'll find tips to make your day easier.”

7. Knoppix Hacks, 2nd Edition

The description of the book says, “If you think Knoppix is just a Linux demo disk, think again. This book includes a collection of tips and techniques for using the enormous amount of software Knoppix offers-not just to work and play, but also to troubleshoot, repair, upgrade, and disinfect your system without having to install a thing. Discover how to use Knoppix to its full potential as your desktop, rescue CD, or as a launching point for your own live CD.”

8. Big Book of Windows Hacks

The description of the book says, “Bigger, better and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. This book takes you beyond the operating system with hacks for applications like Internet Explorer 7 and Office 2007, and hardware such as the Zune, your networking gear, and the PC itself.”

9. Network Security Hacks, 2nd Edition

The description of the book says, “In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The 2nd edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.”

10. Mac Kung Fu

The description of the book says, “After you've uncovered the basics in Lion, Mac Kung Fu is your next step. You'll learn how to master everyday tools such as the Dock, Spotlight, Mission Control, Launchpad, and Dashboard. You'll discover other amazingly useful tools and built-in add-ons that you never knew existed. You'll customize the OS X interface, refine your workflow, learn valuable security tricks, work better with photos, movies and documents, and test your Mac hardware. You'll wow friends with your insanely great Mac knowledge! Mac Kung Fu details things even Mac Geniuses don't know. And why should they? Many of the tips in this book exploit settings or experimental features never officially made public. Each tip in this unique book is deliberately short and readable, and you can dip in and out whenever you want. Most take less than a minute to complete, yet the results last for a lifetime of better computing.” 

Comments

Popular posts from this blog

Here Are 7 Brilliant Cheat Sheets For Linux/Unix

There's nothing better than a cheatsheet when you are stuck and need a reference. So here bringing to you 7 brilliant free cheat sheets. 




1. Unix Tool Box: An incredibly exhaustive reference for all things Linux. This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users.

2. One page Linux Manual: Great one page reference to the most popular Linux commands, it is a summary of useful Linux commands.

3. Linux Reference Card: One great reference published by FOSSwire.

4. Linux Command Line Cheat Sheet: This is an interestingly sorted and helpful cheat sheet by cheatography.

5. Linux Command Line Tips: This is a linux command line reference for common operations. Cleanly sorted and well described.

6. Treebeard’s Unix Cheat Sheet: A great reference that shows command comparisons with that of DOS. So if you are someone who was a DOS user and has switched to Linux, this is the best one too have!

7. Linux Shortcuts and Commands:…

Ten Important Rules Of Ethical Hacking

The world of ethical hacking too is bound by a set of rules and principles, here are 10 crucial ones!

Time and again we have been bringing you valuable resources on ethical hacking since we know and understand the nature of things as far as security goes. Ethical hacking is picking up steam each day with more and more organisations spending heftily to maintain the sanctity of their systems and data. As such, ethical hacking is a glorious career option in the current scheme of things.



1.Set your goals straight

To begin with, an ethical hacker must start thinking like the intruder. He must be able to identify the loopholes on the target access points or networks that are prone to attack, he must be aware of the repercussions of these loopholes and how the intruder can use it against the same. An ethical hacker then has to find out if anyone at the target notice the intruder's attempts to carry out his/her acts. Finding out and eliminating unauthorised wireless access points is always t…

Extracting Administrator Passwords Using LCP

Extracting Administrator Passwords Using LCP
Link Control Protocol (LCP) is part of the Point-to-Point (PPP) protocol In PPP communications, both the sending and receiving devices send out LCP packets to determine specific information required for data transmission.
■ Use an LCP tool ■ Crack administrator passwords
Tools Needed
■ A computer running Windows Server 2012 ■ A web browser with an Internet connection ■ Administrative privileges to run tools
■ You can also download the latest version of LCP from the link http: / www.lcpsoft.com/engl1sh/1ndex.htm
■ If you decide to download the latest version, then screenshots shown     might differ ■ Follow the wizard driven installation instructions ■ Run this tool in Windows Server 2012 ■ Administrative privileges to run tools ■ TCP/IP settings correctly configured and an accessible DNS server
Overview of LCP
LCP program mainly audits user account passwords and recovers them in Windows 2008 and 2003. General features of this protocol are password recovery, bru…