(BQ) This book contains proven steps and strategies on how to have better security when it comes to using your computer and making sure that it is protected against malicious hackers. | Hacking By Solis Tech How to Hack Computers, Basic Security and Penetration Testing Copyright 2014 by Solis Tech - All rights reserved. In no way is it legal to reproduce, duplicate, or transmit any part of this document in either electronic means or in printed format. Recording of this publication is strictly prohibited and any storage of this document is not allowed unless with written permission from the publisher. All rights reserved. Table of Contents Introduction Chapter 1 Introduction to Hacking Chapter 2 The Rules of Ethical Hacking Chapter 3 What Hackers See During a Sweep Chapter 4 Understanding Basic Security Systems Chapter 5 Where Hackers Attack Chapter 6 Understanding Social Engineering Chapter 7 Protecting your Passwords Chapter 8 Hacking Skills: Learn Programming Chapter 9 Hacking Skills: Open-sources Chapter 10 Hacking Skills: Proper Writing Chapter 11 Creating A Status in the Hacker Culture Chapter 12 Hacker and Nerd Chapter 13 Concept of Free Access in Hacking Chapter 14 Culture of Sharing Chapter 15 Hacking as a Community and Collaborative Effort Chapter 16 Ethical Hacking Chapter 17 Hacking for Free Internet Chapter 18 Securing Your Network Chapter 19 Dealing with Fake Wi-Fis Chapter 20 Hacking Facebook Chapter 21 Understanding a Denial of Service Attack Chapter 22 Introduction to Digital Forensics Chapter 23 Windows Registry and Forensics Chapter 24 Going Undercover in Your Own Network Conclusion Introduction I want to thank you and congratulate you for downloading the book, “Hacking: How to Hack Computers, Basic Security and Penetration Testing” . This book contains proven steps and strategies on how to have better security when it comes to using your computer and making sure that it is protected against malicious hackers. This book is designed to give an overview of what people are up against to: fraudulent use of their personal data and invasion of their privacy. Millions of users are being attacked every day and billions of .