LESSON 1 BEING A HACKER part IV

Exercises:
A. Using a search engine, find sites that may have mistakenly given privileged access to
everyone. To do this, we will look for directory listings which are accessible when you don't go

directly to the right web page. To do this, we will go to http://www.google.com and enter
this into the search box:
allintitle: "index of" .pdf
Click on a link in the results and you should find one that looks like a directory listing.
This type of searching is also known as Google Hacking.

 

练习:

A. 通过一个搜索引擎,搜寻出现授权漏洞的网站。如果不直接进入那个网站,我们需要通过找一个目录列表去寻找那样的网站,

进入http://www.google.com ,在输入关键字的地方输入“allintitle: "index of" .pdf”,然后点击搜索,你就能够找到

像目录列表一类的网页,这种搜索技术一般被称作Google黑客入侵。(我尝试着这么做了,也找到了类似目录列表的网页,但是

我不懂这个列表是干嘛用的,而且这能称作Google黑客入侵吗,我实在是不太明白

 

B. Can you find other types of documents in this way using Google? Find 3 more directory
listings which contain .xls files and .avi files.

 

B. 你能通过Google用相同的方法找到其他格式的文档吗?另外找出三个包含.xls和.avi格式文件的目录列表。


C. There are many search engines out there besides Google. A good researcher knows how
to use them all. Some websites specialize in tracking search engines, such as
http://www.searchengine.com. However, there are many more and you can generally find
them by using search engines. There is even a search engine for “the invisible web”. Find 10
search engines which are NOT meta search engines.

 

C. 除了Google还有其它搜索引擎。一个搜索高手知道如何综合利用它们。有些专门跟踪搜索引擎的网站(不太明白意思

譬如http://www.searchengine.com。当然通过搜索引擎你能找到更多相关网站。甚至有种能搜索到“隐藏网站”

的搜索引擎。找10个非元搜索引擎的搜索引擎。

 

D. Search for “security testing and ethical hacking” and list the top 3 answers.
E. Search for the same without the quotes and give the top 3 answers. Are they different?

 

D. 搜索“security testing and ethical hacking”,列出前3个搜索结果。

E. 搜索 security testing and ethical hacking,列出前3个搜索结果,和D有什么不同?

 
F. It is very different to search for a topic than it is to search for a word or phrase. In exercise
D, you searched for a phrase. Now you will search for an idea. To do this, you need to think
about what you want and how you want to find it. For example, you want to find an online
resource of magazines for ethical hacking. If you enter online resource of magazines for
ethical hacking into a search engine, you will get a number of opinions about the topic. This
is helpful but not as helpful as actually getting the resource. Instead, you need to think, “If I
was to make such a resource, what information would be in there and what key words could I
pick from that information?” Put the following words and phrases into a search engine and
find out which provides the best results for your search:

1. my favorite list of magazines on ethical hacking
2. list of ethical hacking magazines
3. resources for ethical hackers
4. ethical hacking magazine
5. magazines ethical hacking security list resource

 

F. 搜索一个单词和词组与搜索一个话题有很大的不同,在练习题D中,你搜索的是词组,现在,你要搜索话题。

 在搜索之前,你要先知道自己打算搜索什么,怎么搜索。例如,你想在网上找有关伦理黑客的杂志。如果你在

搜索引擎上输入伦理黑客杂志,你会得到谈论伦理黑客杂志的观点。这种方法尽管有用,但是没有真的得到资源

有用,所以,你需要考虑“如果我是提供这个资源的,我要怎样写相关信息,我要怎么提供查找这个资源的关键字?”

将下列单词词组输入到搜索引擎中然后比较得出搜索结果最好的词组。

1. 我最喜欢的伦理黑客杂志列表

2. 伦理黑客杂志列表

3. 伦理黑客杂志资源

4. 伦理黑客杂志

5. 伦理黑客安全杂志列表资源


G. Find the oldest website from Mozilla in the Internet Archive. To do this you need to search
on “www.mozilla.org” at the http://www.archive.org website.
H. Now to put it all together, let's say you want to download version 1 of the Netscape web
browser. Using search engines and the Internet Archives, see if you can locate and
download version 1 (but don't install it).

 

G. 通过Mozilla浏览器在互联网档案馆中查找出最老的网站。你要在http://www.archive.org上查找“www.mozilla.org”。

H. 现在综合利用何种方法,假设你现在想下载网景浏览器版本1.0。综合利用搜索引擎和互联网档案馆,看你能不能找到并下载

版本1.0(但别安装)。

 

1.1.7 Chat
Chats, also known as Internet Relay Chat (IRC), as well as Instant Messaging (IM), are very
popular modes of quickly communicating with others.
As a research source, chat is extremely inconsistent, because you will be dealing with
individuals in real time. Some will be friendly, and some will be rude. Some will be harmless
pranksters, but some will be malicious liars. Some will be intelligent and willing to share
information, and some will be completely uninformed, but no less willing to share. It can be
difficult to know which is which.

 

1.1.7 聊天

聊天,也称作英特网在线聊天(IRC),和即时通讯(IM)一其非常流行的和他人聊天的通讯模式。

作为研究源之一,聊天这种方式非常矛盾,因为你要恰当的和他人聊天,有些人是友好的,有些人很粗鲁,有些人

会和你开些无恶意的玩笑,但是有些人却是恶意说谎者。有些人博闻强识并且愿意和你分享信息,但有些人很无知,

没有也不愿分享信息。很难分辨事实。

 

However, once you get comfortable with certain groups and channels, you may be
accepted into the community, and you will be allowed to ask more and more questions, and
you will learn who you can trust. Eventually you will be able to learn the very newest security
information (also known as zero day, which implies that it was just discovered) and advance
your own knowledge.

 

但是,一旦你跟一群人和某个频道混熟后,你将被允许加入社区,这样你就可以问很多的问题,同时你也开始明白

谁值得你相信。最后,你就能接收到最新的安全信息(也称作零时差,说明消息是刚刚发现的)并且更新自己的知识。

 

Exercises:
A. Find 3 chat programs to use for instant messaging. What makes them different? Can
they all be used to talk to each other?
B. Find out what IRC is and how you can connect to it. Once you are able to connect,
enter the ISECOM chat room as announced on the front page of http://www.isecom.org.
C. How do you know which channels exist to join in IRC? Find 3 computer security
channels and 3 hacker channels. Can you enter these channels? Are there people talking or
are they “bots”?

 

练习:

A. 找出3个可以及时通讯的聊天工具。它们各有什么不同?它们全部都能用来和对方聊天吗?

B. 查找IRC是什么,并找出连接的方式。一旦你能连接,就进入如http://www.isecom.org首页上所说的ISECOM聊天室。

C.你是怎样知道进入IRC的通道的?找出3个电脑安全频道和3个黑客频道。你能进入这些频道吗?这些人都说些什么

   这些频道是木马吗?

 

1.1.8 P2P
Peer to Peer, also known as P2P, is a network inside the Internet. Instead of many local
computers communicating with each other through a centralized, remote computer, the
computers in a P2P network communicate directly with each other. Most people associate
P2P with the downloading of mp3s and pirated movies, however, many other P2P networks
exist – both for the purposes of exchanging a wide variety of information and as a means to
conduct research on distributed information sharing. One website dedicated to teaching
about this, http://infoanarchy.org, is based on the premise that information should be free.
On the Infoanarchy website, you can find a listing of available P2P networks and clients.

 

1.1.8 P2P(点对点技术)

对等网络技术,简写P2P,是互联网里的网络。和电脑之间只能通过一个集中远程的电脑进行交流不同,在P2P网络中的电脑之间

可以直接进行交流。许多人将P2P与MP3s和盗版电影挂钩,但是,许多P2P网络是为了进行大量信息的共享,同时作为对

分享的信息进行研究的方式。有一个网站专门教这个,http://infoanarchy.org,这个网站是以开放的信息为基础的。

在Infoanarchy网站上,你能找到可用的P2P网络和客户清单。


The problem with P2P networks is that, while you can find information on just about anything
on them, some of that information is on the network illegally. The Hacker Highschool program
doesn't condone the use of P2P to illegally download intellectual property, but there is no
question that P2P networks can be a vital resource for finding information. Remember: there
is nothing illegal about P2P networks – there are a lot of files that are available to be freely
distributed under a wide variety of licenses – but there are also a lot of files on these networks
that shouldn't be there. Don't be afraid to use P2P networks, but be aware of the dangers.

 

P2P网络的问题是,虽然你能通过它找到任何存在在它上面的信息,但是它提供的有些信息是非法的。高中黑客课程

课程不允许通过P2P去非法获得知识产权。但是P2P网络毋庸置疑是搜索信息的重要途径。记住:P2P网络没有任何

违法的东西,在这个网络中有大量不用许可证就可以传播获取的资源---但是也有很多本不该存在在该网络中的文件。

不要怕使用P2P网络,但是要警惕危险。

 

1.2 Further Lessons
Now you should practice to master the skill of researching. The better you get at it, the more
information you can find quickly, and the faster you will learn. To help you become a better
researcher for the Hacker Highschool program, here are some additional topics and terms for
you to investigate:
Meta Search
The Invisible Web
Google Hacking
How Search Engines Work
The Open Source Search Engine

 

1.2 深入课程

现在你应该练习深入掌握搜索技巧。你掌握的技术越好,你就能更快的找到更多的信息,同时你学的也就越快。为了让你

跟成为更好的研究者,下面是一些额外的你需要深入学习的话题和术语。

元搜索

隐形网站

Google黑客技术

搜索引擎的工作原理

开放源代码搜索引擎

 

 

 

 

wow,欢呼吧,lesson 1终于翻译完了,由于不成熟的翻译水平,肯定有很多不足之处,欢迎提出意见哦~~~,后面让我们一起继续

学习。。。。再次谢谢忠实的读者小马哥,/(^o^)/~

 

 

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
提供的源码资源涵盖了Java应用等多个领域,每个领域都包含了丰富的实例和项目。这些源码都是基于各自平台的最新技术和标准编写,确保了在对应环境下能够无缝运行。同时,源码中配备了详细的注释和文档,帮助用户快速理解代码结构和实现逻辑。 适用人群: 适合毕业设计、课程设计作业。这些源码资源特别适合大学生群体。无论你是计算机相关专业的学生,还是对其他领域编程感兴趣的学生,这些资源都能为你提供宝贵的学习和实践机会。通过学习和运行这些源码,你可以掌握各平台开发的基础知识,提升编程能力和项目实战经验。 使用场景及目标: 在学习阶段,你可以利用这些源码资源进行课程实践、课外项目或毕业设计。通过分析和运行源码,你将深入了解各平台开发的技术细节和最佳实践,逐步培养起自己的项目开发和问题解决能力。此外,在求职或创业过程中,具备跨平台开发能力的大学生将更具竞争力。 其他说明: 为了确保源码资源的可运行性和易用性,特别注意了以下几点:首先,每份源码都提供了详细的运行环境和依赖说明,确保用户能够轻松搭建起开发环境;其次,源码中的注释和文档都非常完善,方便用户快速上手和理解代码;最后,我会定期更新这些源码资源,以适应各平台技术的最新发展和市场需求。 所有源码均经过严格测试,可以直接运行,可以放心下载使用。有任何使用问题欢迎随时与博主沟通,第一时间进行解答!

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值