本站已收录 番号和无损神作磁力链接/BT种子 

The Black Packet - Tech Info - Volume 2 - Hacking The System (DVD Master)

种子简介

种子名称: The Black Packet - Tech Info - Volume 2 - Hacking The System (DVD Master)
文件类型:
文件数目: 50个文件
文件大小: 4.29 GB
收录时间: 2015-7-25 19:14
已经下载: 3
资源热度: 146
最近下载: 2024-9-9 00:32

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:94D2008B54DF8FCE20408B4FDF70F188FFE867BF&dn=The Black Packet - Tech Info - Volume 2 - Hacking The System (DVD Master) 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

The Black Packet - Tech Info - Volume 2 - Hacking The System (DVD Master).torrent
  • 00 - How it's Made - Microprocessors, Circuit Boards, Compact Discs, Computers and more.avi287.27MB
  • 00 - In The Realm Of The Hackers (Electron).avi350.61MB
  • 00 - Sonic Outlaws (1995).avi635.25MB
  • 01 - Thinking Machines - The Creation of the Computer.avi351.31MB
  • 02 - Triumph of The Nerds - The Rise of Accidental Empires - Part 1 (1996).avi499.96MB
  • 03 - How Internet Traffic works (Warriors of the Net).avi81.47MB
  • 04 - Tactical Exploitation-WP.pdf193.5KB
  • 04 - Tactical Exploitation.m4v66.06MB
  • 04 - Tactical Exploitation.pdf143.39KB
  • 05 - Dangerous Minds - The Art of Guerrilla Data Mining-wp.pdf229.67KB
  • 05 - Dangerous Minds - The Art of Guerrilla Data Mining.m4v139.72MB
  • 05 - Dangerous Minds - The Art of Guerrilla Data Mining.pdf1.99MB
  • 06 - Boomstick Fu - The Fundamentals of Physical Security.m4v92.03MB
  • 06 - Boomstick Fu - The Fundamentals of Physical Security.pdf306.06KB
  • 07 - Biometric and Token Based Access Control - Your Protected by 2 Screws.m4v94.78MB
  • 07 - Biometric and Token Based Access Control - Your Protected by 2 Screws.pdf1.42MB
  • 08 - Pen Testing WIFI.m4v33.63MB
  • 08 - Pen Testing WIFI.pdf1.37MB
  • 09 - How To Be A Wifi Ninja.m4v85.57MB
  • 10 - Shifting The Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key.m4v147.58MB
  • 10 - Shifting The Focus of WIFI Security - Beyond Cracking Your Neighbors WEP Key.pdf212.85KB
  • 11 - WiFish Finder Who Will Bite the Bait.m4v74.37MB
  • 11 - WiFish Finder Who Will Bite the Bait.pdf586.39KB
  • 12 - Attacks Against 2wire Residential Gateway Routers.m4v55.71MB
  • 12 - Attacks Against 2wire Residential Gateway Routers.pdf2.4MB
  • 13 - Hacking Iraq.m4v81.71MB
  • 14 - Picking Electronic Locks-wp.pdf94.7KB
  • 14 - Picking Electronic Locks.m4v39.19MB
  • 14 - Picking Electronic Locks.pdf741.89KB
  • 15 - Hacking with the iPod Touch, iPhone, or iPad.m4v150.24MB
  • 15 - Hacking with the iPod Touch, iPhone, or iPad.pdf1.81MB
  • 16 - Is Your iPhone Pwned - Auditing, Attacking and Defending Mobile Devices.m4v178.28MB
  • 16 - Is Your iPhone Pwned - Auditing, Attacking and Defending Mobile Devices.pdf168.35KB
  • 17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage-wp.pdf69.02KB
  • 17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage.m4v154.74MB
  • 17 - Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage.pdf6.02MB
  • 18 - Hacking the Smart Grid WP.pdf31.09KB
  • 18 - Hacking the Smart Grid.m4v64.69MB
  • 18 - Hacking the Smart Grid.pdf136.36KB
  • 19 - Hacking the Smart Parking Meter.m4v181.6MB
  • 19 - Hacking the Smart Parking Meter.pdf409.56KB
  • 20 - The Science of Social Engineering.m4v34.87MB
  • 20 - The Science of Social Engineering.pdf83.54KB
  • 21 - Satellite Imagery Analysis.m4v80.08MB
  • 21 - Satellite Imagery Analysis.pdf7.13MB
  • 22 - Thinking Outside the Console Box.m4v62.16MB
  • 22 - Thinking Outside the Console Box.pdf5.14MB
  • 23 - RFID Mythbusting.m4v131.98MB
  • 24 - High Security - Locks Lies and Liability.m4v203.23MB
  • 24 - High Security - Locks Lies and Liability.pdf1.34MB