
Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $24.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
James C. Lewis
-
De:
-
Lance Henderson
Acerca de esta escucha
FIVE books that will change your life!
The best five books on anonymity in existence! Want to surf the web anonymously? Cloak yourself in shadow on the Deep Web or The Hidden Wiki? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP - whether on the Deep Web or regular Internet. This audiobook covers it all: encrypting your files, securing your PC, masking your Online footsteps with Tor, VPNs, Freenet, and bitcoins, and all while giving you peace of mind with total 100 percent anonymity.
Just a few more benefits this audiobook bundle will provide
- Step-by-step guides for Tor, Freenet, I2P, VPNs, Usenet, and more browser fingerprinting
- How to avoid it antI-hacking and counter-forensics techniques
- How to encrypt files (I make this super simple)
- How to defeat NSA spying
- How and where to browse the deep web (Tor Onion Sites, Freenet sites)
- How to protect your identity
- How to hide anything from ANYONE
- Bitcoins, Darknet Marketplaces and the Opsec Requirements You Need Tor Hidden Servers
- How to not get caught
- Counter-forensics the FBI doesn't want you to know about
- Windows vs. Linux Network Security
- Cryptocurrency (real bitcoin anonymity)
- Supercookies
- Preventing marketers and debt collectors from finding you
- How to protect your assets
- Home, money & family
Get this audiobook today and watch your life change for the better!
©2018 Lance Henderson (P)2018 Lance HendersonLos oyentes también disfrutaron...
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601 (Sixth Edition)
- De: Wm. Arthur Conklin, Greg White
- Narrado por: Derek Shoales
- Duración: 30 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
-
-
great study materials
- De Zak West en 12-03-23
De: Wm. Arthur Conklin, y otros
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- De: Kevin Mitnick, William L. Simon
- Narrado por: Ray Porter
- Duración: 13 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- De Joshua en 09-17-14
De: Kevin Mitnick, y otros
-
CompTIA Security+ All-in-One Exam Guide Exam SY0-601 (Sixth Edition)
- De: Wm. Arthur Conklin, Greg White
- Narrado por: Derek Shoales
- Duración: 30 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
Get complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations.
-
-
great study materials
- De Zak West en 12-03-23
De: Wm. Arthur Conklin, y otros
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
- De: Lance Henderson
- Narrado por: James C. Lewis
- Duración: 3 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
This manual will give you the incognito tools that'll make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive...and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll grow a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online.
-
-
It's not really me.
- De Douglas C. en 10-22-15
De: Lance Henderson
-
Darknet
- A Beginner's Guide to Staying Anonymous Online
- De: Lance Henderson
- Narrado por: John T. Parker
- Duración: 2 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
Want to surf the web anonymously? This audiobook is the perfect guide for anyone who wants to cloak their online activities. Whether you're on Usenet, Facebook, P2P, or browsing the web with standard browsers like Opera, Firefox, and Internet Explorer, I will show you how to become a ghost on the internet, leaving no tracks back to your isp, or anyone else.
-
-
Good information, even for techies.
- De J en 01-06-15
De: Lance Henderson
-
Invisibility Toolkit
- 100 Ways to Disappear and How to Be Anonymous From Oppressive Governments, Stalkers & Criminals
- De: Lance Henderson
- Narrado por: James C. Lewis
- Duración: 2 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Your sovereignty is under attack. You don't need the red pill to see it because you've already been unplugged. It's all around you. Within this audiobook lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever.
-
-
This writer talks a lot of shit
- De John Albert en 12-10-15
De: Lance Henderson
-
Permanent Record
- De: Edward Snowden
- Narrado por: Holter Graham
- Duración: 11 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- De Ryan L en 09-22-19
De: Edward Snowden
-
Burners & Black Markets
- How to Be Invisible on Android, Blackberry & iPhone
- De: Lance Henderson
- Narrado por: James C. Lewis
- Duración: 3 h y 45 m
- Versión completa
-
General
-
Narración:
-
Historia
The FBI wants to backdoor your smartphone. So does the NSA. They failed with Apple's iPhone but like most bullies, they'll try softer targets - targets that don't fight back. That's why unless you've got the proper tools to ward them off, they'll return. Be ready for them. Buy this book and master anonymity and give the NSA a burn notice they'll never forget. A lot of books say install this, avoid that, but here you'll find easy steps to starve the beast.
-
-
This book will set you on the right path.
- De Public Name different than account en 02-28-17
De: Lance Henderson
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- De: Quinn Kiser
- Narrado por: Ivan Busenius
- Duración: 7 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- De Scott Redfern en 10-01-21
De: Quinn Kiser
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- De: Joseph Menn
- Narrado por: Jonathan Davis
- Duración: 8 h y 11 m
- Versión completa
-
General
-
Narración:
-
Historia
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- De Sam Kopp en 12-18-19
De: Joseph Menn
-
Human Hacking
- Win Friends, Influence People, and Leave Them Better Off for Having Met You
- De: Christopher Hadnagy, Seth Schulman
- Narrado por: Christopher Hadnagy
- Duración: 8 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good - to help you regain your confidence and control. Hacking Humans provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other’s decisions, and more.
-
-
Instead of this, buy “Social Engineering, Second Edition”.
- De Jessica en 11-30-21
De: Christopher Hadnagy, y otros
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
The Art of Deception
- Controlling the Human Element of Security
- De: Kevin Mitnick
- Narrado por: Nick Sullivan
- Duración: 13 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- De James S. en 02-01-21
De: Kevin Mitnick
-
Bushcraft 101: A Field Guide to the Art of Wilderness Survival
- Bushcraft Series
- De: Dave Canterbury
- Narrado por: Travis Tonn
- Duración: 4 h y 40 m
- Versión completa
-
General
-
Narración:
-
Historia
The ultimate resource for experiencing the backcountry! Written by survivalist expert Dave Canterbury, Bushcraft 101 gets you ready for your next backcountry trip with advice on making the most of your time outdoors. Based on the Five Cs of Survivability - cutting tools, covering, combustion devices, containers, and cordages - this valuable guide offers only the most important survival skills to help you craft resources from your surroundings and truly experience the beauty and thrill of the wilderness.
-
-
This book would be better in Palermo kindle
- De Moto-ikemen-Ossan en 07-09-19
De: Dave Canterbury
-
How to Have That Difficult Conversation
- Gaining the Skills for Honest and Meaningful Communication
- De: Henry Cloud, John Townsend
- Narrado por: Henry Cloud
- Duración: 2 h y 41 m
- Versión resumida
-
General
-
Narración:
-
Historia
Successful people confront well. They know that setting healthy boundaries improves relationships and can solve important problems. They have discovered that uncomfortable situations can be avoided or resolved through direct conversation. But most of us don't know how to have difficult conversations, and we see confrontation as scary or adversarial.
-
-
Misleading Book Description
- De Catherine en 09-18-18
De: Henry Cloud, y otros
Las personas que vieron esto también vieron...
-
Hacking with Kali Linux
- A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
- De: Peter Bradley
- Narrado por: Cliff Weldon
- Duración: 1 h y 56 m
- Versión completa
-
General
-
Narración:
-
Historia
Are you fascinated by the idea of hacking? Do you want to learn the secrets of ethical hackers? This practical, step-by-step guide audiobook will teach you all you need to know! Hacking is a term that evokes ideas of criminals infiltrating your website and causing all sorts of mayhem with malware. But that’s only half the story, and there are hackers out there who are ethical and do a lot of good. Hacking with Kali Linux is a comprehensive guide. Packed with practical examples and simple to follow instructions, it will show you the easy way to overcome cybersecurity.
-
-
Better than most of what's available.
- De Kindle Customer en 05-20-19
De: Peter Bradley
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- De: Jake T. Mills
- Narrado por: Tom Brooks
- Duración: 5 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies. Each question is accompanied by detailed explanations and insights into the reasoning behind the correct answers, helping you grasp the underlying concepts thoroughly.
-
-
Very basic, not helpful for testing
- De Michael R. Young en 03-02-24
De: Jake T. Mills
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- De: Roger A. Grimes
- Narrado por: Jonathan Todd Ross
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- De Jonathan en 11-16-19
De: Roger A. Grimes
-
Hacking with Kali Linux
- A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking with Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
- De: Peter Bradley
- Narrado por: Cliff Weldon
- Duración: 1 h y 56 m
- Versión completa
-
General
-
Narración:
-
Historia
Are you fascinated by the idea of hacking? Do you want to learn the secrets of ethical hackers? This practical, step-by-step guide audiobook will teach you all you need to know! Hacking is a term that evokes ideas of criminals infiltrating your website and causing all sorts of mayhem with malware. But that’s only half the story, and there are hackers out there who are ethical and do a lot of good. Hacking with Kali Linux is a comprehensive guide. Packed with practical examples and simple to follow instructions, it will show you the easy way to overcome cybersecurity.
-
-
Better than most of what's available.
- De Kindle Customer en 05-20-19
De: Peter Bradley
-
Hacking for Dummies, 7th Edition
- De: Kevin Beaver CISSP
- Narrado por: Tom Perkins
- Duración: 11 h y 34 m
- Versión completa
-
General
-
Narración:
-
Historia
Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them.
-
-
Good Book Preview says exactly what is the book,
- De Amazon Customer en 12-25-22
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- De: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrado por: Ray Porter
- Duración: 9 h y 17 m
- Versión completa
-
General
-
Narración:
-
Historia
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- De James C en 10-14-17
De: Kevin Mitnick, y otros
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- De: Glen D. Singh
- Narrado por: Alex Freeman
- Duración: 13 h y 47 m
- Versión completa
-
General
-
Narración:
-
Historia
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- De Anonymous en 01-30-25
De: Glen D. Singh
-
CEH Certified Ethical Hacker Certification
- The Ultimate Study Guide to Practice Questions and Master the Exam
- De: Jake T. Mills
- Narrado por: Tom Brooks
- Duración: 5 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
In this audiobook, you'll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensuring a comprehensive understanding of ethical hacking principles, tools, and methodologies. Each question is accompanied by detailed explanations and insights into the reasoning behind the correct answers, helping you grasp the underlying concepts thoroughly.
-
-
Very basic, not helpful for testing
- De Michael R. Young en 03-02-24
De: Jake T. Mills
-
Hacking the Hacker
- Learn From the Experts Who Take Down Hackers
- De: Roger A. Grimes
- Narrado por: Jonathan Todd Ross
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology.
-
-
Please stop reading the urls
- De Jonathan en 11-16-19
De: Roger A. Grimes
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- De: Quinn Kiser
- Narrado por: Ivan Busenius
- Duración: 7 h y 1 m
- Versión completa
-
General
-
Narración:
-
Historia
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- De Scott Redfern en 10-01-21
De: Quinn Kiser
-
Hackers: Heroes of the Computer Revolution
- 25th Anniversary Edition
- De: Steven Levy
- Narrado por: Mike Chamberlain
- Duración: 20 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.
-
-
Remember Why You Got Into Computing
- De Dan Collins en 07-01-16
De: Steven Levy
-
Cybersecurity All-in-One for Dummies
- De: Joseph Steinberg, Kevin Beaver CISSP, Ira Winkler CISSP, y otros
- Narrado por: Tom Perkins
- Duración: 24 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever.
-
-
Great book
- De KatieLynn en 10-08-24
De: Joseph Steinberg, y otros
-
The Art of Deception
- Controlling the Human Element of Security
- De: Kevin Mitnick
- Narrado por: Nick Sullivan
- Duración: 13 h y 41 m
- Versión completa
-
General
-
Narración:
-
Historia
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide.
-
-
Good security device delivered by old misogynist
- De James S. en 02-01-21
De: Kevin Mitnick
-
Kali Linux for Beginners
- Computer Hacking & Programming Guide with Practical Examples of Wireless Networking Hacking & Penetration Testing with Kali Linux to Understand the Basics of Cyber Security
- De: Learn Computer Hacking in Deep
- Narrado por: Jowanna Lewis
- Duración: 3 h y 23 m
- Versión completa
-
General
-
Narración:
-
Historia
Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100 percent security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software. In fact, for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find the information in this audiobook.
-
-
KLCP TRAINING
- De Suwan Lechowicz en 03-16-20
-
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
- De: Lance Henderson
- Narrado por: James C. Lewis
- Duración: 3 h y 20 m
- Versión completa
-
General
-
Narración:
-
Historia
This manual will give you the incognito tools that'll make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive...and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll grow a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online.
-
-
It's not really me.
- De Douglas C. en 10-22-15
De: Lance Henderson
-
Permanent Record
- De: Edward Snowden
- Narrado por: Holter Graham
- Duración: 11 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down.
-
-
Great (if incomplete) account
- De Ryan L en 09-22-19
De: Edward Snowden
-
Pegasus
- How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
- De: Laurent Richard, Sandrine Rigaud, Rachel Maddow
- Narrado por: Andrew Wehrlen, Rachel Maddow, Rachel Perry
- Duración: 12 h y 31 m
- Versión completa
-
General
-
Narración:
-
Historia
Laurent Richard and Sandrine Rigaud's Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the story of the one of the most sophisticated and invasive surveillance weapons ever created, used by governments around the world.
-
-
Incredible!
- De Silvershopper en 01-18-23
De: Laurent Richard, y otros
-
Social Engineering, Second Edition
- The Science of Human Hacking
- De: Christopher Hadnagy
- Narrado por: Christopher Hadnagy
- Duración: 9 h y 28 m
- Versión completa
-
General
-
Narración:
-
Historia
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- De RM en 04-10-19
-
CompTIA PenTest+ Certification
- The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam
- De: Jake T Mills
- Narrado por: Tom Brooks
- Duración: 5 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Dive into the dynamic world of ethical hacking with "CompTIA Pentest+," your definitive guide to understanding and excelling in the art of penetration testing. Authored by seasoned cybersecurity experts, this comprehensive book provides an immersive journey through the critical principles, methodologies, and practical applications needed to navigate the CompTIA Pentest+ Certification.
-
-
Did AI write this?
- De Kjell Morten Gudmestad en 03-07-25
De: Jake T Mills
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Countdown to Zero Day
- Stuxnet and the Launch of the World's First Digital Weapon
- De: Kim Zetter
- Narrado por: Joe Ochman
- Duración: 13 h
- Versión completa
-
General
-
Narración:
-
Historia
The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility.
-
-
Amazingly detailed, sober and above all, damning
- De Greg en 11-22-14
De: Kim Zetter
Lo que los oyentes dicen sobre Tor Darknet Bundle (5 in 1) Master the Art of Invisibility (Bitcoins, Hacking, Kali Linux)
Con calificación alta para:
Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.
-
Total
-
Ejecución
-
Historia
- Anonymous User
- 06-22-18
Good for basic anonymity
Great books on topic of anonymity, books are mostly repeating themself, no need for bundle, just buy one book. There is nothing here about Kali or Hacking.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 9 personas
-
Total
-
Ejecución
-
Historia
- Lena Christensen
- 03-05-21
Worth the read
This book is a good one to get if you would like to learn about online anonymity and how to keep yourself private online. It goes into detail on how to set things up as well as what providers to use. So if those are subjects you are just interested in learning about or something you really want to start doing would highly recommend this book.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- jonathan
- 08-05-19
I loved it
brings to light many issue that are currently about. hope to find more book like this.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Spawn
- 02-15-20
thank you
this is the power I've been searching for
thank you, father is cryptologist in the Navy and mother works for NSA
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Jack Frasier
- 07-09-18
best audiobook on web anonymity!
this was an excellent audiobook on web and anybody I highly recommended definitely check it out
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 2 personas
-
Total
-
Ejecución
-
Historia
- Millah
- 12-26-23
Could be Interesting for beginners
It’s 2023, so quite outdated ; a lot of repetition stuff, but general knowledge is ok
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Kristine Barbian
- 04-25-24
planning to listen again
I think the title of my review speaks for itself. Even at 10y old its worth the time
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- FUKU
- 04-19-20
Anonymity vs Privacy
I found this book to be very helpful in several ways. A well explained distinction between the differences from anonymity vs. privacy, how if anonymity is important to you how you should think & approach establishing anonymity, a realistic warning of the discipline it takes to achieve true anonymity and lastly invaluable links to help you to get on the road to true anonymity. For this wealth of knowledge I think it’s only fair to give a 5 Star!!!
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
esto le resultó útil a 1 persona
-
Total
-
Ejecución
-
Historia
- Pudge
- 05-24-19
Excellent Book
excellent book, highly recommend. Anyone wanting a better understanding of privacy should read this book.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña
-
Total
-
Ejecución
-
Historia
- Amazon Customer
- 05-20-23
Very informative
In depth information with step by step instructions on how to successfully maintain a high level of anonymity.
Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.
Has calificado esta reseña.
Reportaste esta reseña