Hack I.T.


Book Description

CD-ROM contains: Freeware tools.




Life Hacks for Kids


Book Description

Presents unique craft projects that have been seen on the Life hacks for kids YouTube show, including feather earrings, melted crayon art, a headband holder, and indoor s'mores, and includes questions answered by Sunny.




Our Inherently Controversial Human Nature - and How We Should Hack It


Book Description

Human induced climate change, overuse of natural resources, overwhelming amount of waste and pollution, gender inequality, elevated stress levels, flood of fake news. All these have a lot to do with our controversial human nature and how our race has formed, besides making our life more difficult and less sustainable. You are to see the controversial process of how we began to become the only highly intelligent species, how widespread is our impact on our environment and why we are inching ahead to the point where extinction will be an issue to deal with. This book provides an original context of the links to our roots and hints at what we should do. It offers a solution to the seven decade-old Fermi paradox and answers the eternal question of meaning and importance of happiness. It is easy to get the idea. Accepting the conclusions might be a harder task. The real challenge is making a change. Are you ready to start seeing the whole picture?




Hack It!


Book Description

This Hacky Sack Manual covers many main kicks to start off with and learn how to juggle the sack with your feet. It then moves into harder kicks and several trick kicks that are sure to wow people watching you play!




Hack This


Book Description

Presents instructions for creating and enhancing a variety of projects, including a sandwich-making robot, a Twitter-monitoring Christmas tree, and a bronze-melting blast furnace.




Hack This


Book Description

Join today’s new revolution in creativity and community: hackerspaces. Stop letting other people build everything for you: Do it yourself. Explore, grab the tools, get hands-on, get dirty...and create things you never imagined you could. Hack This is your glorious, full-color passport to the world of hackerspaces: your invitation to share knowledge, master tools, work together, build amazing stuff–and have a flat-out blast doing it. Twin Cities Maker co-founder John Baichtal explains it all: what hackerspaces are, how they work, who runs them, what they’re building—and how you can join (or start!) one. Next, he walks you through 24 of today’s best hackerspace projects...everything from robotic grilled-cheese sandwich-makers to devices that make music with zaps of electricity. Every project’s packed with color photos, explanations, lists of resources and tools, and instructions for getting started on your own similar project so you can DIY! JUST SOME OF THE PROJECTS YOU’LL LEARN ABOUT INCLUDE... • Kung-fu fighting robots • Home-brewed Geiger counter • TransAtlantic balloon • Twitter-monitoring Christmas tree • Sandwich-making robot • Interactive Space Invaders mural • CNC mill that carves designs into wood, plastic and metal • Telepresence robot that runs an Internet classroom • Toy cars that are ridden by people • Bronze-melting blast furnace • Laptop-controlled robot fashioned from a wheelchair • DIY book scanner JOHN BAICHTAL is a founding member of Twin Cities Maker, a hackerspace organization that has been collaborating for almost two years. Based in Minneapolis-St. Paul, Minnesota, Twin ities Maker has its own rented warehouse complete with a welding station, woodshop, classroom, and ham radio transmitter. Baichtal has written dozens of articles, including pieces for AKE, the D&D publication Kobold Quarterly, and 2600: The Hacker Quarterly. He has contributed to Wired.com’s GeekDad blog for four years and blogged at Make: Online for two, publishing more than 1,500 posts during that time. He is now writing a book about Lego.




Hack


Book Description

Journalism. Narcissism. Cannibalism. It’s a dog-eat-dog world at the infamous tabloid the New York Mail, where brand new pet columnist F.X. Shepherd accidentally finds himself on the trail of The Hacker, a serial killer targeting unpleasant celebrities in inventive—and sometimes decorative—ways. And it’s only his second day on the job. Luckily Shepherd has hidden talents, not to mention a hidden agenda. But as bodies and suspects accumulate, he finds himself running afoul of cutthroat office politics, the NYPD, and Ginny Mac, an attractive but ruthless reporter for a competing newspaper. And when Shepherd himself is contacted by The Hacker, he realizes he may be next on the killer’s list...




The Code Book


Book Description

Provides young adults with a review of cryptography, its evolution over time, and its purpose throughout history from the era of Julius Caesar to the modern day.




Hacking Multifactor Authentication


Book Description

Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. Learn how different types of multifactor authentication work behind the scenes See how easy it is to hack MFA security solutions—no matter how secure they seem Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.




Ghost in the Wires


Book Description

In this "intriguing, insightful and extremely educational" novel, the world's most famous hacker teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data (Frank W. Abagnale). Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated through false identities, a host of cities, and plenty of close shaves, to an ultimate showdown with the Feds, who would stop at nothing to bring him down. Ghost in the Wires is a thrilling true story of intrigue, suspense, and unbelievable escapes -- and a portrait of a visionary who forced the authorities to rethink the way they pursued him, and forced companies to rethink the way they protect their most sensitive information. "Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR