My Account Log in

3 options

OS X for Hackers at Heart.

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
Potter, Bruce.
Contributor:
Hurley, Chris.
Long, Johnny.
Owad, Tom.
Rogers, Russ.
Language:
English
Subjects (All):
Mac OS.
Social media--Security measures.
Social media.
Online social networks--Security measures.
Online social networks.
Risk management--Social aspects.
Risk management.
Computer security.
Local Subjects:
Mac OS.
Physical Description:
1 online resource (464 p.)
Edition:
1st ed.
Place of Publication:
Burlington : Elsevier Science, 2005.
Language Note:
English
Summary:
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker's eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world's foremost "true hackers? unleash the power of OS X for everything form cutting edge research and development to just plain old fun.OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple's Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of a
Contents:
Contents; Foreword; Chapter 1 A Network Admin's Guide to Using Mac OS X; Running a Headless Mac; Adding Interfaces to the Mac; The Macintosh as a Router; Mac OS X as a RADIUS server; Chapter 2 Automation; Using Automator; Understanding AppleScript; Bash Scripting; Using Bash, AppleScript, and Automator Together!; Chapter 3 OS X in a Microsoft Environment; Accessing Network File Systems; NTLM Authentication; Connecting to a Windows PPTP Server; Zen of Running Windows Boxes from a Mac; Chapter 4 WarDriving and Wireless Penetration Testing with OS X; WarDriving with KisMAC
Penetration Testing with OS XOther OS X Tools for WarDriving and WLAN Testing; Chapter 5 Mac OS X for Pen Testers; The OS X Command Shell; Compiling and Porting Open Source Software; Using The "Top 75 Security Tools" List; Installing and Using The "Big" Tools; Other OS X "Must Haves"; Chapter 6 Mac Tricks (Stupid Powerbook Stunts That Make You Look Like a God); Desktop Console; Screen Savers; Widgets; Apple Motion Sensor; VNC with Apple Remote Desktop; Gestures; Sogudi; GUI Scripts; Chapter 7 OS X For the Road Warrior; Safe and Secure E-mail; Battery Management; Appendix A Hacking the iPod
Opening Your iPodReplacing the iPod Battery; Upgrading a 5GB iPod's Hard Drive; From Mac to Windows and Back Again; iPod Diagnostic Mode; Additional iPod Hacks; iPod Resources on the Web
Notes:
Description based upon print version of record.
Description based on publisher supplied metadata and other sources.
ISBN:
9786611035624
9780080489483
0080489486
9781597499873
1597499870
9781281035622
1281035629
OCLC:
181421117

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account